pback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140)={0x0, 0xfffffffffffffffc}, &(0x7f0000000180)=0x8) 2018/04/10 10:27:23 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x1000000]]}, 0x178) 2018/04/10 10:27:23 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x4000000]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:27:23 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x9, r0, 0x2) socketpair(0x17, 0xa, 0x4, &(0x7f0000000380)) 2018/04/10 10:27:23 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) umount2(&(0x7f00000075c0)='./file0\x00', 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x212181, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f00000000c0)={0x0, 0xe, "a9f9115d27ec09d5b1673ded269e"}, &(0x7f0000000100)=0x16) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000140)=@sack_info={r1, 0x8, 0x2e9b}, &(0x7f0000000180)=0xc) 2018/04/10 10:27:23 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:23 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x2000000]]}, 0x178) 2018/04/10 10:27:23 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x2000000000000, &(0x7f000000a000)) umount2(&(0x7f00000075c0)='./file0\x00', 0x0) 2018/04/10 10:27:23 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:23 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, r0, 0x2) socketpair(0x17, 0xa, 0x4, &(0x7f0000000380)) 2018/04/10 10:27:24 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x1f) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], &(0x7f0000f59000)='GPL\x00', 0x6, 0xfcb6, &(0x7f00001a7f05)=""/251}, 0x48) 2018/04/10 10:27:24 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)={0x0, 0x5d, "1fc8adb9c44b67e94068c3269c388206e2e394126aab8373039f53616e5f5fbebf02652aed322129a29351908ca1967a091c4b0ac10a1091249355c7ad193b6f213b954e76f2817f0f90f38e678b0baacb25fbcedfcb7fa7a29b31e9db"}, &(0x7f0000000080)=0x65) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f00000000c0)={r1, 0x6}, 0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) 2018/04/10 10:27:24 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x9, 0xc80) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000200)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) accept$netrom(r0, 0x0, &(0x7f0000000380)) pipe2(&(0x7f0000e3eff8)={0x0, 0x0}, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r6 = dup3(r5, r4, 0x0) ioctl$KVM_SMI(r5, 0xaeb7) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f0000000340)={0x5001, 0x2000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000480)=[@textreal={0x8, &(0x7f0000000500)="0f005c0666b8ef0000000f23d00f21f86635300000010f23f866b9770b000066b80000008066ba000000000f30f20f35f30f1bcff4650f01cabaf80c66b8c261a58266efbafc0cb874daef0f236d0f32", 0x50}], 0x0, 0x3ffe, &(0x7f0000000040), 0x38b) ioctl$KVM_RUN(r6, 0xae80, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r7 = userfaultfd(0x0) ioctl$UFFDIO_API(r7, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r7, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r8 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r8, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(r7) 2018/04/10 10:27:24 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)=0x0) ptrace$setregset(0x4205, r0, 0x207, &(0x7f0000000040)={&(0x7f00000000c0)="c975522198e565749b0756c0c0fc5ea10ceaa725602a2fa36801f9b30d652f12afcf1979263ff73298c1538146385726b06480c288f2868ef3bf1fe861445cc6faa06a2adfc26048fa8e8394ee34c9d4904452dcd2d8cbf9844d4f39832fae547e2b0f", 0x63}) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) umount2(&(0x7f00000075c0)='./file0\x00', 0x0) 2018/04/10 10:27:24 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0xc, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:24 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x2]]}, 0x178) 2018/04/10 10:27:24 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x300]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:27:24 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, r0, 0x2) socketpair(0x17, 0xa, 0x4, &(0x7f0000000380)) 2018/04/10 10:27:24 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) r0 = accept(0xffffffffffffff9c, &(0x7f0000000000)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f00000000c0)=0x80) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000100)=[@in6={0xa, 0x4e20, 0x4, @loopback={0x0, 0x1}, 0x8000}, @in6={0xa, 0x4e23, 0x8, @dev={0xfe, 0x80, [], 0x100}, 0x400}, @in={0x2, 0x4e24, @loopback=0x7f000001}], 0x48) umount2(&(0x7f00000075c0)='./file0\x00', 0x0) 2018/04/10 10:27:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getpeername(r0, &(0x7f0000000340)=@vsock={0x0, 0x0, 0x0, @reserved}, &(0x7f0000000040)=0x80) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(ecb-twofish-3way)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000000180)={0x0, 0x7530}, 0x10) sendmmsg$alg(r1, &(0x7f0000000100)=[{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000037c0)="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", 0x1010}], 0x1, &(0x7f0000000300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x2001, 0x0) ioctl$KVM_GET_NR_MMU_PAGES(r2, 0xae45, 0x8) recvmsg(r0, &(0x7f0000000ac0)={&(0x7f00000009c0)=@sco, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000a40)=""/6, 0x6}, 0x20000000) r3 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x4, 0x200c01) recvmsg$kcm(r3, &(0x7f00000008c0)={&(0x7f0000000480)=@in6={0x0, 0x0, 0x0, @mcast1}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000500)=""/36, 0x24}, {&(0x7f0000000540)=""/77, 0x4d}, {&(0x7f00000005c0)=""/114, 0x72}, {&(0x7f0000000640)=""/127, 0x7f}, {&(0x7f00000006c0)=""/225, 0xe1}], 0x5, &(0x7f0000000840)=""/114, 0x72, 0x1}, 0x1) 2018/04/10 10:27:24 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, r0, 0x2) socketpair(0x17, 0xa, 0x4, &(0x7f0000000380)) 2018/04/10 10:27:24 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x6f, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:24 executing program 0: r0 = socket$inet6_sctp(0xa, 0xfffffffffffffffd, 0x84) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x20, 0x8, &(0x7f0000000640)=[{&(0x7f0000000080)="8e8921f9bcf76d6029c063e2c554a422b0bbe6e5c5efff9cca14d36780fc9b5a92a35da75927e65a890a0a82799b4eaf2a4867d8c9e1ef2fc0a77086e5ef43904a5d905cdf2ba8e55ac428ed6c0acc967e5a33c81844398dff50c15f622d4a27b449e70390514517ee8d7fcf6e035a4f02a40afbefc54225424d213b4d64bc7b2ce73f7c897f3c0c465b5d1df4c3662928a2840770bb21dd80a60e0206caa0f818c720054326b330ac1978e6347708218583eeb1eb2c3c5c30664f2a7e6758", 0xbf, 0x7f}, {&(0x7f00000001c0)="13386ced7d9f046292c0b85928e6675ae8cd0a9c351aa6cc0e82c80b5ddca587ec36c7c86e641cf6a3caf5be21fcc66cb90941f80692123b9c59ddb30b1da03d5ca8ed853ac13fbea61a6a4ac2ff7d84aad9409c545dfbd4089fe0892dc496d4769859c17350b6f36893ec082a285483872fc908667e4bf04b21e4f72ab4145984103c9ae5549c1d98f8a751a28e9f80d78fad403129981c164b649e43f4fa2c23468746a90e05ca7f8a36c0e231", 0xae, 0x9}, {&(0x7f0000000280)="7b6a26af9649fce31b994b93a89eb24bd561c4ca19bb5156ff607d53ce44a9679df996f16a301498fa33e8b86e41b89ee4bbfb20e51075cf9645225053d4ff4c729a1d7c3d023a60e82baaf2bc510d7f93da1b83095dc9e90dc41d81b3b14a454a9c68b11b570c2043694f2a8185058da217fe3adf792d4c7f617bf8e95b9626872d67822190fc16e7c38f18fd46aad8720fae5e455d63ee452fb1f5050ac229f45bfdd40c1d0cecc9d190701211644b462082f6a2e86a6030d060c8be52fed3baf29d8a372cf4cd0f3a077dfb77cbd184c7c5709dae3863428135585586b2132ff1", 0xe2, 0x81}, {&(0x7f0000000380), 0x0, 0x1ff}, {&(0x7f0000000700)="cebaccd231496432f397f6381aefc6a6a9605d22e7dd1a091710a4aa65395c16b8d6dadeb0d4adfc897b54500e3930c4a55415764bae352b0963ae936c96d3a8c62d6fc564dcb13e6c75b7be031700120623d52ff87860e78a393ee053cfbb75f46d7fe20c3650ae6ed0340a7249ccf89796aff09d46738d0129c80e0f68390e0292dabddb13", 0x86, 0x5}, {&(0x7f0000000480)="9308936cb8f653a79a3390a515aca402d37c5bfe368807a47ead0214ffeb496395d457d96858e7", 0x27, 0x3}, {&(0x7f00000004c0)="c52e72f740c8f8be9095c47735d3312b783d1dad9a66edec91796bf3c83cd5584cff851b6d37d7e941542deb15c9d6a7c0863c6fd164970362c97a614381e2be9201430cedd56eaf7677156cdba08c1da6d9ea3446ed015ad759ad5b5f0efb076a2f50f98e3f7c9912f4492b12066e8d9e406eb2ccb8a70603f7bfd6da88c1550d8c90eaf38dcde23e4cbcc8ed3cd4ace0f25cd39ec06bc4dd78d364a7d0ab6a90bb3f04ac2605dd85ad0bf0daa916032a95f5c2cf39e1258bb67bc528cf9c41176ee75548aa91c3b05100469ca7f1e0d06e7176ad61cfff6dc3ef56d5", 0xdd, 0x200}, {&(0x7f00000005c0)="c38f8d9e07c8763078b2f66880a44f4516797b748b410567d9ad06bc3d56e228af725c71b6b103916b175b917778b742dc30aad9e8a1e4ba9f225cacfd43aa50b16427cc0ba7b7732ab7ce41a795aca29b9f590ad25144d3d959eea4063015e1e012f548c02d69a77332d8c49dc36c0049d343bb93840136", 0x78, 0x1}], 0x40, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000003c0)=@assoc_value={r1, 0x3}, 0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000380)=ANY=[@ANYRES32=r1, @ANYBLOB="05000b004037937ee5a4b23023195b"], 0x13) r2 = syz_open_dev$dspn(&(0x7f0000000400)='/dev/dsp#\x00', 0x9, 0x200000) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000940)=0x6e, 0x4) sendmsg$nl_crypto(r2, &(0x7f0000000900)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0xa}, 0xc, &(0x7f00000008c0)={&(0x7f00000007c0)=@upd={0xe8, 0x12, 0x0, 0x70bd2c, 0x25dfdbfe, {{'lrw-serpent-avx2\x00'}, [], [], 0x2000, 0x2000}, [{0x8, 0x1, 0x1}]}, 0xe8}, 0x1, 0x0, 0x0, 0x44014}, 0x1) 2018/04/10 10:27:24 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x500]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:27:24 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x100000000000000]]}, 0x178) 2018/04/10 10:27:24 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0xa, 0x4, &(0x7f0000000380)) 2018/04/10 10:27:24 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0xe, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:24 executing program 5: r0 = memfd_create(&(0x7f0000000180)='}\x00', 0x2) utimensat(r0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x100) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) accept4(r0, 0x0, &(0x7f0000000240), 0x80000) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x40, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x4, 0x3f71}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000280)={r2, 0x9}, &(0x7f0000000140)=0x381) umount2(&(0x7f00000075c0)='./file0\x00', 0x0) [ 236.169314] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=8d8fc300) [ 236.269490] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=8d8fc300) 2018/04/10 10:27:25 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x9, 0xc80) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000200)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) accept$netrom(r0, 0x0, &(0x7f0000000380)) pipe2(&(0x7f0000e3eff8)={0x0, 0x0}, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r6 = dup3(r5, r4, 0x0) ioctl$KVM_SMI(r5, 0xaeb7) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f0000000340)={0x5001, 0x2000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000480)=[@textreal={0x8, &(0x7f0000000500)="0f005c0666b8ef0000000f23d00f21f86635300000010f23f866b9770b000066b80000008066ba000000000f30f20f35f30f1bcff4650f01cabaf80c66b8c261a58266efbafc0cb874daef0f236d0f32", 0x50}], 0x0, 0x3ffe, &(0x7f0000000040), 0x38b) ioctl$KVM_RUN(r6, 0xae80, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r7 = userfaultfd(0x0) ioctl$UFFDIO_API(r7, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r7, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r8 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r8, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(r7) 2018/04/10 10:27:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x17, 0xa, 0x4, &(0x7f0000000380)) 2018/04/10 10:27:25 executing program 1: ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000240)={0x0}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuset.effective_cpus\x00', 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000780)='/dev/amidi#\x00', 0x10001, 0x60000) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000140)={0x0, r0}) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f00000007c0)={0x3c9}, 0x4) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f0000000180)={r2}) preadv(0xffffffffffffffff, &(0x7f0000000700)=[{&(0x7f00000002c0)=""/236, 0xec}, {&(0x7f00000003c0)=""/172, 0xac}, {&(0x7f0000000480)=""/246, 0xf6}, {&(0x7f0000000580)=""/213, 0xd5}, {&(0x7f0000000680)=""/124, 0x7c}], 0x5, 0x0) r3 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000000)=0x101, 0x4) socketpair(0xc, 0x80f, 0x10001, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_pwait(r5, &(0x7f0000000080)=[{}], 0x1, 0x3, &(0x7f00000000c0)={0x40}, 0x8) syncfs(r5) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000001c0)={0x0, 0x20}, &(0x7f0000000200)=0x8) setsockopt$sock_int(r3, 0x1, 0xf, &(0x7f0000356ffc)=0xffffffffffffff40, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x33, &(0x7f00000a2000)={0x1, &(0x7f0000f07000)=[{0x6, 0x83}]}, 0x10) ioctl$SNDRV_TIMER_IOCTL_TREAD(r4, 0x40045402, &(0x7f0000000100)) close(r3) 2018/04/10 10:27:25 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x66, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:25 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x1000000]]}, 0x178) 2018/04/10 10:27:25 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) umount2(&(0x7f00000075c0)='./file0\x00', 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000000)=0x1, 0x4) 2018/04/10 10:27:25 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x5000000]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:27:25 executing program 0: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x20) sendmmsg$nfc_llcp(r0, &(0x7f0000002b80)=[{&(0x7f0000000040)={0x27, 0x1, 0x2, 0x7, 0x9, 0x1, "6473447a1207a1d22760af50ff46e7d84438089c056cbb486bdd6244d4638051f80636950334f90764d9800bb9d567d8a83a4d64d89c6953027167b28d4962"}, 0x60, &(0x7f00000002c0)=[{&(0x7f00000000c0)="1e5cfe2afee011f4ce72c585dda4ce96e0e21e1473a4fb1a511beea02c7a8995d3a2a3cc42fd63a4dead40ae2cdada7f66803f0b082cc4e12e71b1c2646d47ece25a84d3a7ef78715f671686c6e7c6edf6b0c04041d8347b66a3265271ae54ef8e3295f08aeb50739147", 0x6a}, {&(0x7f00000001c0)="79c8b51a04754296ce9db37e44a9aebb1fa2cc694f606ebed9eaed1b2d812b0ba3adece0969d751cbf47f2575feb231bf74a40e4f75a", 0x36}, {&(0x7f0000000200)="f09f67ff3caf95163342bf514c8575ee99fcec7024be6b9a0a0fcd4a086243e9d553fa0fa8e41793c029811c46b2a2b5b8d8f3ee95828eeac5b4de17ba228f65d5407bdce26f7fedd7e065a4e14c7b64c559f7c385a67df8b48a00901f0d191f25b70130c96358f77b37fae575f0ad43fdd73a0099d4a3db67bdb7c3dfa00f88bbe7d7d4deeede5ba1754dcc506626a502ef2d60d495eb7629934bd27c25444c97389b88a6eb9fd5", 0xa8}], 0x3, &(0x7f0000000300)={0x108, 0x101, 0x8, "fd64fa757356bd5a66de91a8e0e3599c964e26fbe2cb6c560b7e7cee98f2c7112325ca0a2dd70f9e58dcacb41e605fa861f6e00d7fdc86727332a3f8f558c8beac14c2017c5a2a89a0a4e00004c58fe4a00aedc76944a1059b26bd1ef7bb24b84fbc8ea08a9d5f896abcc07fad41f5adb0dadedb31e76095d980add66185c0ed56e644f1b98b9e7b3467179d4a190bce21702a5b312e9ae6fbe7231c7687dbf4adbcff82f660dd29bf2829780f30d97e8347cb5937c83672f45b0c93b2f3663ef765a30dde6aff1c0921462540ad89e4b07f38a171a847220623a142e4e4eb3c38cfda1583e28f9a7db2a6d171e07a69c7d69a22fa"}, 0x108, 0x40}, {&(0x7f0000000440)={0x27, 0x1, 0x1, 0x7, 0x0, 0x0, "f146c1b0bc548855b7e769159b0f46f5ebde211fbbdaef2bb502d30ab859b2ea1ebe5cebbf278d238a8f6892cfe44acd5e568d28cb9d48412f0b7cd9884342", 0x2a}, 0x60, &(0x7f0000000500)=[{&(0x7f00000004c0)}], 0x1, &(0x7f0000000540)={0x1010, 0x10b, 0x786, "82a6752ce00379d6046615a36f3103157cdea92cf5838d97508a2cfe29e11b943b70ae0983686ffd5c398b5bcb058cb90a60fe25805c4d772978dacbf2422fc5662642f3ea6c94982aa29d7a0cae9e67a92dc5eea70637f342d804bcfdbd4f7d8846604da04abba19e94803950d4e8daf9867cd34501c78c365d263ac04530a7ba2466181a3e59035bc3f53e5efe21353739712d4d7c171aaf4e1223065b5e04fe89972a89baa4e83e722ae7c65859ff4918b72082a0799b630eb250d1e7d038783b5f2a96d548703d8493c23c4547c4bdc91c8b8a98be81e2edfebd9be4a037575f28ab307b076745ca941c1b78d0c4da9245a52a81ef2f469ea8d0083e35849be13412860290e08631fe747018f044d693c99bf6ea3151e6a2bef14f23506474243f9f0d02036a1dc2fd5fa221d6745df91cc2cb85e4c928e6d92f3ccc095248ef00081347c591192e130188113aeae91e76fe828af732f8b30d5a3b8b5bdf5c57de9fcd83371e54d7b2856ad31fd53d769d47919103464019c8e750ed1e01e6c7a7edfda132f5261d580e5dddbbb782aed122189c34bae084821d68d60e520eb5bdb8f8a6b4e05121426d2f9a0e516a3c81fdcd97980fe75b7c4b2dec9906882ec83658241122e38514d5f113cbb523b4732f05ab582affd70146680db7283e2791f225ac92839375d44c027fbc72cd511f80f6213e4297471bfdc7d7c41240fa7b107cea7d402ad28fef91b8fb890cf1991b7c9b9e9f267c1ddc968fd4cb330148cc6e01a28a03d1c17c4d3ae377f197afcf079fd1e8b4eb2053edcaed73bc9e29273ea50e280c195d6f84dd0d4eef0c4f07b52861a0840f223d59da20bc905f4a5602fb61fb980d567c8c3ea0d7be0684d3235a1a87a981d6db6686685a45eb7f21af018f6080cb7593ecdda72962e4ed27494a185c6d01e84b518ca222dec5a2bb8fad355f5c7eff8fcb063db77fd4a465bf309af6b955de3f2b7f179698cb8a2147883937a36794cd2015c6928c05010e371fb0477f0ac0d51a21ba85d989cd8e6d5eaeb4eef51660448943ee62b055de6f3dc742d1a698dba76083bafc657ba83b9b0a7cb5c22ee25520d60d2af71afeb0f586e04edc2261d662f073c46c1b2ff1c40bdb24ba3f5922dd5492954f8dd3642d828577028e5c60ee723bd61943df4a0f0717b249073ccbbe8ec705014453a92ed454c6b5e965aeb962a930241ed60a4608e8d1828493564a1ff6505afa4141334c489e56ffa6a0dca215fcfea691d626c4384aa6e179fd3dfac65361ae4ba694cbb7475afbb160f630f01963ec016f0fdb328b8102715d8c778c4054c3244586df2d126ad83a1a27e69a0f5e7472e9f64eeece6bdb48134a55550d35131bb34bcf79506c4fe5bb3f17ac5a33f2feaf6a15d664d8191db2d6d93d34abace52aa2198f3870127e3752db52a41f694e85231e18641414c875b5b1eef77e62493fd4aaf1d7320e5cceef265f3cf32e7322c117696663b21474a2171428389b20da4aef0bb22600a767d90692b92642b27ff7b016fa4c4e90dc1d61408df59a390189529f5ece46ce1390d0cfc18112c03e266efe2656a47a1eaa436e9ac93f9b71a8e52e65ee5f1a232a1652f899266942e4be50195fd34de1845394adabcdad30a80e79236bface44eab1b6647d89edf0b4bdd7d0a5ca808f6d4420fc686ba229d1af6042aebf5c4c7d4907eb8babc520a781783a68e76578bbfea5a1933197cc037ef770a54742ce7ca49a418c56c31c42ac5045c5003cc362687991485b3c49c8c682d74d236aaa55f8b702d7663b925f01750e3700de85750a5b264985287e1f1ad76e42543f488c4c4aba819fa9d2780b4e596cff2e719582b3643d016593d20997742639cd352f27f09df5c6097f89fedd00c9864431abc868420f05b1f0473981bc9327f5f060d75ea5089dd5d50c0508618db19ceeea9efbc7dc80c2b5c406bcdb49b77adc0f1e08dbb6f8305f7c8309e8a44881f877bcaba2856c8a96c4693552a7bc343b53c02aadf08b18bd37bfc1c22aa7c58cd2b2b7b8a9d0321bc409838cba0a783af11774441b3e75e831ba80e2c64115a66b749962e6cdecf96def20ce3a0e87411bd0fba3472408be913cc99e511e447fc942f8fbefd7fd58e8faf3aa41776032f35281dc7d49cb4b25fa5204dabe80f722e1390cc5fcacc2728d14e0e7721a056c1019b99abb6e1fcd0ee8434a8b678a9ee1597fcd9d53f5a1f25bbaa851ba6d8841dce7563cb1cfa8a96e6f8d44eba30f6c5c9b4adbf1ac9818364e1247bd970dfd6c88ab5d8ad50e5f9e96d05c9caba24fcfdc0752dda980fddd3a6fe9808b1549daeff550a384cd2e6d208d5d2c1cf323464076d7d37b4e88362fe94caf5bfe0a76d1e438eb8247da6382a13898519d944d20482a8da10fd71e9009f8bb565da27438ca690f598ac32fda303429227d60b23e83b6b01ece601f6f41e0653fbcbd6c3289500fd0b7bd087fa287f00c95af7ea771f555b0cd0a5f34981f622f317fa77584dcc8b215bfca9874c207ce76134fea471f729dfb853c00c3360afe4029cdc5b78b1c5444eac77cc74cead60411b1aceb3287729ec57e8e8a8c5ae42f3823e5d691ba96a1f13821bae5151cd602d22543928579962b81bb93f8ef419cc66e3302866d51ae0e266e4ef1cc32a26823b50ed4dca9f0e6cee1ea10a529f7ed09507bb12456b4ce574a399d5b150ec8ae17f05be4758e64a293595a935c44e4c13c077f575c792c8800b62e7d5b23674c85d7962833bcc897f7a99629f929fb3956be1dff99a71838ac42a6e7a6f4586a51b98d1fd360479e7991ab113840863b6836b4162da2d749c4b7c3d9dcfb6760f19e14e6d43aed10af3cd6c343ccbf5d6e3289b38d708ecd89db5eac35e2e8375046b7f88cbb994c84a3edfcf8e5eb576a29bd08a4577c680342d8dc7572d98cb393a385894364b9028b4e8d06a700b5f8d1f3f019ae6763cfaccf0b2326273412bdd3e9a290959c7a991b17086f58de506e0edeab74e8305b7913ef1122d6d23430af48e0dec2ef0de069f63942bb22be707cf3a9b8d929186c519a430b506dd7edcfa6c5491088009cf30be357ebaf0454a12a8c1ffcd430d845fea2c8a1800b17f82cf075b07a9b4773c58a588feff8e3616c37935a5f68534541cc48f8d741a89bc67f978552a895c232fcf0ce475fa15c12ed01cd672bd6bec8045b87c6b140093065b5d8073210671ed7e67139452a8a962daf9e6fb1e8d52860d819e0a598bf2bc2648f1fd78297b409d8562102ba55108250ea737db9cd0f7a599729db21d9dbd60577eba9e4a7179933de0c1503a2743c474be45b897b5b23b625a726ee26a4bd240d9bfcef0fff3da3ce9db8ef8585fe615b2e113ca0e98e1cbe432670e1abd930b1e9f3918411303bef9c8ac04c038ccaa63fb65acb3ffb4bf3680df1f8ef916f3667b3a4c735ca7b2e364368a76547b7813243e5b110e1e52a10f297d91bc1b8a0b86728c7869a6937d482928549daff9c1fc98c14a667f37c45fdcdbf0a5c1d613b4979f86f39b9514853f2ccf27b4deecf8b45f0d740c49ee538bb85d2a052a460c085691a0de91cc3ce319866a9913dd8be618dc2413e33f611dc52bd52f64695184811ce525b126f9ec39759d2db9c3b617d693da86242a8da8fd92970caee630528ca0550009400609037077dae4e3ba26dbd84120193d0ab29ea76ae2958fb20324cbf27e31493d9afa1b3154cf297775b9b44e125db1fe46fe8124097ade0d1fe3899ce7a74296ce37986035698b42ccc6ef98409c7a32f2d45d646f083a8cb05e7d2e6fb00ec3a01e1129df8d3061383b0ea5cf2af41f4165249f5dd54fccb5efdb97f3ac47a7e0176848faae9fb327b18d9a8713c6c0531da65279ceeaaff32834de823153bb67ac069c335467aa89a143b7a8a2629362299923b8cd6ee6b7f51d42f2b74a23adae612f19d26d43906830be3ae6928dbc65d88db590cd9203126181bd12e2cd972488950ac55afe85e8add164a335317398a17f0572d44d123b0652d77aaa24937a1c72b3d311a3ac3f1cf61d8c746406ac09cbc56b6814c0a8c956b843bd8fa36bf18264d990ae3f55bad9840c3b92b99da6418a56cc9190f0fa51c3846ddd93a806b622b0a2a999f0eb3f265a34f4a46bf4f8b7b414298d4e4082d6216dca7d2a2811e92d5df3146600b880ba226db60a69f36ab94d0f52382ed8d2b9068307a9c50ab500b65386c478bd53d7debeb60ac50b54093dc8db68d4814970dc62c52356730cddca404cb727e99dc8c232caf6a52d9f99dfa1f6fd0deb7a9c06992dd87e149bdbe1ad31c8f33ba593b663a13f5a7cb92558efd008c1e751b83ebba610f38887878d56535d78e0b97162cf9997da5a7b2e89f28e0cdc39668938646e32c0565de26b88ac2fbf02acb5de25dcf094219cf9ef2a0a4defeb97e9c9578d8d06a2efa2f74e2dacdcdd49e7a4cb44df4110f6de2b152f4c4ad08aaaf617dc3f2ad3fb5e0ce47834cb8075fe0216db364f035518f105364a45fb4876504e0824d3dfedab7e4b05658f709c133c106914951ab778df5127e0687ee9c9f7cd67c14bcec28430c2b91686413684a74d8188cdce85830dc63710515064a67eacf64e6b0a64df5c0a9fcb01152dc3b3df472297b58b475a7a9ec9d597999c8c6250dc1074bac00b07dcf5a2dd066eab580e4277cbe9eb98979d0d60e6d7fd4ba67b0988551b48d870915d93590b187881d95c737d476227808e983c0b221d2cda6ba0240dbed2c90393d1c484dbd91caa8e07567923ccc9138dc972a1c9e6e97bd43e1fbdf3fa4d7f824b0c1ac22a6775cd661acc43ad34fa609f2e89e02cb54befdd745be651cca10dcd2daf83bfec79b07dbe2046cf9b2f2f7e97a2fb1012a580e7a8f2e666bc9d4453406377bcda66ea11f0a93b55b03ef3cebc47b459a2ef8c6aa6f9e448171eb6e2b9ec7b156ca15b1e02c6159f25d1b3a36859d594624af5884ef08f383ca7c7224f77baa9ab1318eb4722be8908e948d05dd7468b9e20f96f4470d2d94a7ee0af726641cbfa327ccadf8b3df7cf6d4ffbde75860cf1a2f1c35d2cdc903f1f5c05cac4ceb6abf1b14004dc5e5911b3d965eeecd9d77b4da52fdf805b11b27447b671c9c3e45fe7c100cdc3978e74b000a1bd3f10e2724a82fc1bf255056a0aec70f51845705a8abb3ebac8d34cda1d8844325dd2f0e61d96c0ee9243d1039847d98fe80b52fc5ed3ba37ef7a60445abdea069428cc244abc70d40c12a258475ede813468c945ef96151945fcd580c6db243ed84d311467f3e0b4d05c2293eddbc09c062f6914e7becd8b9dc80f6d466af1b34497712d48e085e20e1422739e068f33ee47d7ab3d81349b9419703d72e20d1d87fe0ae7a347fcbb24ce2cc40e4ed840e9ea82abf7358e7a0be9b23a625f491e5c3039896203b889a21f7eca7873c63d050a2d5a733bcf91d2bfda66762fbd663f6b3d5392401c5a69bbba63a18eea8b0ca08db6b2603ce55ac7a58c413e1d4e1b565056a0c3e1857883a29651b5a37ec3adbc3a708cfab7f5ddedacf7184d67dd158126c5943383c601bbcd7b7b1b9d3d664b72bf7a0a3e36047b51922073e4a205282d57ff07c7e6c24373e82c826ee26d4566a24202f9f7c8ebc5d610c1804b1b42451a2da5d30d403a451301d74ef0f2b4b6d1ce0ebcf88d812cf47d0a4a8c22e4a504c5331961ff94b06b1388a1470473eaddb6aea628ddbf51931c9e323efe5a8d2"}, 0x1010, 0x1}, {&(0x7f0000001580)={0x27, 0x0, 0x2, 0x7, 0xa15b, 0x8, "400d0e145193599619cead470168eaf3135407e2bec1002a97c78400b7ac0110afc722d987f3510d906506c8d873f08e2c493ac81dcb1c1983eaea011b4bdc", 0x3f}, 0x60, &(0x7f0000002a40)=[{&(0x7f0000001600)="75092c37ba36cc370530fd64d9428f4c09f6f3c43ea2784961d0d090ce3022683b182d815991fe22f237fa6e15a086714d19927ef498a8947b6ef9948a24da896551ffe68cccb6f7547037489e9b18fc4df8fe99e6e054f0d32e6a25705e9c5cb65dcf048d87ea65a2a57cd57342511f1d8d24d92aca100c9812974ddfcf245ef1f3388cefd1283d233ff6e451a1cca1328be975e9aaab8db2606a0719dc29b08344a13413e7014578b9ce8a5f50abdb6593055b27a08e2291e6c377869014f6e687520e5dd8a407db1473bd3085dcd0a9ed5db6a5214a2c1b4d3470d5fca57ea44a9f984a70ed991486f643aa5f7232bb0b9985938bc0d35b6c2e284d", 0xfd}, {&(0x7f0000001700)="c444425e43e9bb0978a6e7473b60f0ca3c950b2968bf5557c323acb839c8aa923222b12aafbe5bcd76efc833cb673126d63e753d2f46002db9c82c4fe816c66a8f4cb840954c4a4523ec3f82db686bd93f8ed05e3dffe355f021b98b91808ad6f4c0f501ce45653e33ca", 0x6a}, {&(0x7f0000001780)="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", 0x1000}, {&(0x7f0000002780)="78889ae8d7dfaa2ec13fddd75bc3b41fcf4529d3acf0783d593a8f00d658d70fbb1056d66dde06a43ef604805f7ede83b139af39af7d0ef5b881b460f3d21cfdde92619aa18e7b8d823f9d72c5f4e429a4d4c2c8cfe79fdcda3cab55c6386f0c7c112340eeb53055e20a779efebc086bd70189e1820609c73843837b0f66d0e0dcfed05226f25d286ac06c8f5d1c6b0036aa78d67d42a70684090bd31dc9e2a21f733a920abda0b0fd1493cf4f9c3cb25b2d626437014df825", 0xb9}, {&(0x7f0000002840)="1d8475b09cac1d5b5ca8a994ce13905f749452a2b2c0e70f1acbb6ce9d53e79fbbbb0298b51eb840098e0024c666e254d15a50867b36de3c4d1992f4e503b65101c424f0", 0x44}, {&(0x7f00000028c0)="95d414802810b93f6cd5d5b97bbfaff9443734deb165d7e8b61931e22517a0e07a81e47e24881ec840ff459609478032b316cbdfb4ff93e3ac98bfd2bc5048eeb6d56aedc0b9c50d157d3e813b01e10c3441d475e1d4d9a28a0de2a46f29fddb8e1563bb3fe0610e63fab02f3236aee076cda27c30fe70f25028208c358bef243d0e13c871ebfaf0d112bafb690af132443d719ea7ae34fc0da93790d9ac1fdcbec00304821802bbe8204d2264c2c8d77d989e35b42c7b93509065afd7e986d193804e0ce9c76f79b2a89f615651e9c501", 0xd1}, {&(0x7f00000029c0)="4612a117c3ba8983b217d37146c698b5466d9b0c9f169459d3523496418d7dcb6ecfc42f22aa952b406dacc41898d6ac478a047ebd584f191ff16a26b7bd94671750ff4328ec69b6733800f4c22fd52b53d6c5", 0x53}], 0x7, &(0x7f0000002ac0)={0xb8, 0x12f, 0x101, "88428068162f313ca8757bc167048fa645fb83183d8bb84ba896369af7d5e87151141abbcd0a19ee24f47a69a61c19b3200f95197f6269a6588ff8430561c253347c3a9c9d63d1080641f2bf374d3b8182d43c66f6d1879e6bb93d29d376bd91d766a37ba431058d1867e88393dedfff1934317499806e2c750351f39e878feba35ff33f673ee78592703fd9fbbd8653660a0e860bee8f21b742c0875b75035415b0ffb3fc2db8"}, 0xb8, 0x24000010}], 0x3, 0x20000000) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r1, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:25 executing program 5: mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) symlinkat(&(0x7f0000000140)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x4000, &(0x7f0000000100)="9897e3c4d042b4bdbbe44ff38a") 2018/04/10 10:27:25 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x2]]}, 0x178) 2018/04/10 10:27:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x17, 0xa, 0x4, &(0x7f0000000380)) 2018/04/10 10:27:25 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0xa, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:25 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) semget$private(0x0, 0x2, 0x104) umount2(&(0x7f00000075c0)='./file0\x00', 0x0) 2018/04/10 10:27:25 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) r1 = open(&(0x7f0000000000)='./file0\x00', 0x204080, 0x81) r2 = getpgid(0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f00000001c0)={{0x7, 0x0, 0x2c2, 0x6, "298f0275d38fcf8e1744121a3d11ab1e13d38761fe0916ebc1dbd149a1e12273199f7fea310af290958f3a49", 0x1}, 0x0, 0x0, 0x8, r2, 0x1, 0x6, "ac68cb6e0c5511810b548791a2c394add4eebea1dbfaca19f7f84b32b0458fbdf96f73c5e9e0e6db53457b9be2f9db508674a5d6022df08015b8e8ffb5a444ee", &(0x7f0000000040)='\x00', 0x1, [], [0x200, 0x9, 0x2400000000, 0x2]}) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:25 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x2000000]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:27:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x10) umount2(&(0x7f0000000040)='./file0\x00', 0x9) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) umount2(&(0x7f00000075c0)='./file0\x00', 0x0) open(&(0x7f0000000080)='./file0\x00', 0x8000, 0x32) 2018/04/10 10:27:26 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x9, 0xc80) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000200)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) accept$netrom(r0, 0x0, &(0x7f0000000380)) pipe2(&(0x7f0000e3eff8)={0x0, 0x0}, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r6 = dup3(r5, r4, 0x0) ioctl$KVM_SMI(r5, 0xaeb7) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f0000000340)={0x5001, 0x2000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000480)=[@textreal={0x8, &(0x7f0000000500)="0f005c0666b8ef0000000f23d00f21f86635300000010f23f866b9770b000066b80000008066ba000000000f30f20f35f30f1bcff4650f01cabaf80c66b8c261a58266efbafc0cb874daef0f236d0f32", 0x50}], 0x0, 0x3ffe, &(0x7f0000000040), 0x38b) ioctl$KVM_RUN(r6, 0xae80, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r7 = userfaultfd(0x0) ioctl$UFFDIO_API(r7, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r7, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r8 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r8, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(r7) 2018/04/10 10:27:26 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x18, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:26 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x100000000000000]]}, 0x178) 2018/04/10 10:27:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x17, 0xa, 0x4, &(0x7f0000000380)) 2018/04/10 10:27:26 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x3, 0x44080) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f0000000280)) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000180)=@add_del={0x2, &(0x7f0000000140)='team0\x00', 0x4}) r1 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$sock_bt_bnep_BNEPCONNDEL(r1, 0x400442c9, &(0x7f0000000040)={0x50}) umount2(&(0x7f0000000000)='./file0\x00', 0x3) accept$nfc_llcp(r1, &(0x7f00000001c0), &(0x7f0000000240)=0x60) 2018/04/10 10:27:26 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x2d, &(0x7f0000000000)=0x1ff, 0x4) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:26 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) semget$private(0x0, 0x2, 0x104) umount2(&(0x7f00000075c0)='./file0\x00', 0x0) 2018/04/10 10:27:26 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x7000000]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:27:26 executing program 5: rmdir(&(0x7f0000001300)='./file0/file0\x00') mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) r0 = fcntl$getown(0xffffffffffffffff, 0x9) rt_sigqueueinfo(r0, 0x34, &(0x7f0000000000)={0x35, 0xffffffff, 0x800, 0x930e}) umount2(&(0x7f00000075c0)='./file0\x00', 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) name_to_handle_at(r1, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180)={0x1008, 0x1, "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"}, &(0x7f00000011c0), 0x1400) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001200)={&(0x7f0000000040)='./file0\x00', r1}, 0x10) mkdir(&(0x7f00000000c0)='./file0\x00', 0x4) 2018/04/10 10:27:26 executing program 1: r0 = socket(0x15, 0x80005, 0x9) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f00000000c0)="200000000104f500000000000000060020200af80900010002e8006007080000", 0x20}], 0x1}, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000000)=0x1, 0xfffffffffffffee4) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000180)='./file0\x00', 0x200000, 0x4) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f0000000100)={0x2, 0x101, 0x9}) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000040)=0x4, 0x471b) flock(r0, 0xf) connect$rds(r2, &(0x7f0000000140)={0x2, 0x4e20, @multicast2=0xe0000002}, 0x10) 2018/04/10 10:27:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x0, 0xa, 0x4, &(0x7f0000000380)) 2018/04/10 10:27:26 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x2) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x5, @remote={0xfe, 0x80, [], 0xbb}, 0x5}, @in={0x2, 0x4e21, @loopback=0x7f000001}, @in={0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in6={0xa, 0x4e24, 0x2, @mcast2={0xff, 0x2, [], 0x1}, 0x8}], 0x78) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:26 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x600]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:27:26 executing program 1: r0 = perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0xca}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffff9c, 0x50, &(0x7f0000000280)={0x0, 0x0}}, 0x10) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)=r1, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="637075262d3200fbfffffffffffff6240ebfdf0368528b445ea8c4bb56a2881cf2b76ae175ef25cfcaed426b975d3765b983d239f659cb13") ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000080)) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x10400, 0x0) ioctl$KDSKBLED(r3, 0x4b65, 0x3) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000003c0)=ANY=[@ANYBLOB="870430cebb9ad65579bf286cbb2d09ce7b55097fed196603aafc1782702be09bd288074ca1bc04000000a8ae61fdd4bfa98473a93551e318a6ff7e376aa2fc18b1431f0f8e32dba33d2bc0382ad2c1b66d3847459dd321117d4ade48816befd93b3c9ceb65752db600857f7efb6c011ff5848b3bb9300687ddaa2e59319b7fa8e6429362503f4d9bc277e49269761df27ac2eacbd1c15f031fb2bd1e75e59587851cd8da81039909db81197ab28d2d24da9001fce3116df20ee9f7274f6ca1c7875d71dc3283a44028f4c8eb8abd483b96842f428447ed770eb5a13f13578ace05ba36a60e2f491c87665db29e27f3e460a8f646ce758092ecc488a8115c739383550a7645addd5d22c7502c1f3bdc7781d50a3c5f722d82e536252d4be2310b2d3e395ad5bfd2a11b25a6bfbe3bb1d6d02f7c146c9b6fa201085d34a948b406ff3f74c93c1d08c47ee14f6e8671444f35a919ecd910c4e32a9fa8d9288d0ba499c82f8284434db0cbc9f65aa30f5c1555527a4eda3570a18fca1a9ebedd93b1b1ee28cfc0a456d032f72b3b0dc80679e7c4272cba94480693d333f2d88b608ea161b2f29c6fed8d0454e34ab0a4d564f3710047b73f329e2b"]) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000380)=0xfffffffffffffffe, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)="657468312c76626f786e657430f800") socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000000240)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140)={0x0, r2, 0x3}, 0x14) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x1) 2018/04/10 10:27:26 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x15, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:26 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x200000000000000]]}, 0x178) 2018/04/10 10:27:26 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x9, 0xc80) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000200)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) accept$netrom(r0, 0x0, &(0x7f0000000380)) pipe2(&(0x7f0000e3eff8)={0x0, 0x0}, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r6 = dup3(r5, r4, 0x0) ioctl$KVM_SMI(r5, 0xaeb7) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f0000000340)={0x5001, 0x2000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000480)=[@textreal={0x8, &(0x7f0000000500)="0f005c0666b8ef0000000f23d00f21f86635300000010f23f866b9770b000066b80000008066ba000000000f30f20f35f30f1bcff4650f01cabaf80c66b8c261a58266efbafc0cb874daef0f236d0f32", 0x50}], 0x0, 0x3ffe, &(0x7f0000000040), 0x38b) ioctl$KVM_RUN(r6, 0xae80, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r7 = userfaultfd(0x0) ioctl$UFFDIO_API(r7, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r7, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) creat(&(0x7f0000000240)='./control/file0\x00', 0x0) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(r7) 2018/04/10 10:27:26 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) umount2(&(0x7f0000000040)='./file0\x00', 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x5, 0x80) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) write$sndseq(r0, &(0x7f0000000100)=[{0x1, 0x9, 0x8, 0x0, @time={r1, r2+30000000}, {0x7, 0x8}, {0x43f8000000000000, 0x8}, @connect={{0x4, 0xffffffff}, {0x5, 0x9}}}], 0x30) 2018/04/10 10:27:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x0, 0xa, 0x4, &(0x7f0000000380)) 2018/04/10 10:27:26 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000000)={'syz_tun\x00', 0x1}) 2018/04/10 10:27:26 executing program 1: r0 = open(&(0x7f0000ae8ff8)='./file0\x00', 0x14104a, 0x0) write$evdev(r0, &(0x7f0000000040)=[{}], 0x1eb) sendfile(r0, r0, &(0x7f00009bcffe), 0x2000000000004c35) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000240)={0x3, 0x0, [{0x14005, 0x72, &(0x7f0000000080)=""/114}, {0x1, 0xb6, &(0x7f0000000100)=""/182}, {0xf000, 0x78, &(0x7f00000001c0)=""/120}]}) 2018/04/10 10:27:26 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x1b, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:26 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x2000000]]}, 0x178) 2018/04/10 10:27:26 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x7]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:27:26 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x41, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000080)=@assoc_value={0x0, 0x400}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000180)={r1, 0xfff}, 0x8) inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x20000000) umount2(&(0x7f0000000100)='./file1\x00', 0x8) 2018/04/10 10:27:27 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x2]]}, 0x178) 2018/04/10 10:27:27 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x1d, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x0, 0xa, 0x4, &(0x7f0000000380)) 2018/04/10 10:27:27 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x600000000000000]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:27:27 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:27 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x9, 0xc80) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000200)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) accept$netrom(r0, 0x0, &(0x7f0000000380)) pipe2(&(0x7f0000e3eff8)={0x0, 0x0}, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r6 = dup3(r5, r4, 0x0) ioctl$KVM_SMI(r5, 0xaeb7) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f0000000340)={0x5001, 0x2000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000480)=[@textreal={0x8, &(0x7f0000000500)="0f005c0666b8ef0000000f23d00f21f86635300000010f23f866b9770b000066b80000008066ba000000000f30f20f35f30f1bcff4650f01cabaf80c66b8c261a58266efbafc0cb874daef0f236d0f32", 0x50}], 0x0, 0x3ffe, &(0x7f0000000040), 0x38b) ioctl$KVM_RUN(r6, 0xae80, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r7 = userfaultfd(0x0) ioctl$UFFDIO_API(r7, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r7, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) creat(&(0x7f0000000240)='./control/file0\x00', 0x0) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(r7) 2018/04/10 10:27:27 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x129200, 0x0) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x2, 0x200, 0x8, 0x9, @random="3be5d170f3ee"}, 0x10) r1 = accept4$bt_l2cap(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000040)=0xe, 0x800) setsockopt$sock_void(r1, 0x1, 0x24, 0x0, 0x0) umount2(&(0x7f00000075c0)='./file0\x00', 0x0) 2018/04/10 10:27:27 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x20000148) 2018/04/10 10:27:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x4, &(0x7f0000000380)) 2018/04/10 10:27:27 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) setsockopt$inet_tcp_int(r0, 0x6, 0x15, &(0x7f0000000240)=0x8, 0x21f) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x9, 0x8000) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f00000000c0)='ip6_vti0\x00') setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000)="6970365f76746930000000000400", 0x10) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0xc) capget(&(0x7f0000000280)={0x0, r5}, &(0x7f0000000300)={0x7, 0x24000, 0xfffffffffffffffb, 0xf6c2, 0x100000000, 0x9}) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000140)={0x0, 0x2, 0x2a, "9e21b0619a808741927d86430da079a7c7fe9cdac5c022dee25f82c365c8b836852cdf33046e1169a9a2"}, 0x32) sendmsg$nl_xfrm(r4, &(0x7f0000000780)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000740)={&(0x7f0000000480)=@updpolicy={0xb8, 0x19, 0x0, 0x0, 0x0, {{@in=@loopback=0x7f000001, @in6=@mcast1={0xff, 0x1, [], 0x1}}}}, 0xffcb}, 0x1}, 0x0) sendmmsg(r0, &(0x7f0000007000)=[{{&(0x7f0000005100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}}}, 0x80, &(0x7f0000005380)=[{&(0x7f0000005340)='\b', 0x1}], 0x1, &(0x7f00000053c0)}}], 0x1, 0x4001) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000080)) 2018/04/10 10:27:27 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e20, 0x1, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x4e20}]}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000000)={r1, 0x8}, &(0x7f0000000180)=0x8) 2018/04/10 10:27:27 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x3000000]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:27:27 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x100000000000000]]}, 0x178) 2018/04/10 10:27:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) 2018/04/10 10:27:27 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vga_arbiter\x00', 0x30000, 0x0) close(r0) umount2(&(0x7f00000075c0)='./file0\x00', 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000040)={0x6, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}]}) 2018/04/10 10:27:27 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x7) 2018/04/10 10:27:27 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x9, 0xc80) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000200)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) accept$netrom(r0, 0x0, &(0x7f0000000380)) pipe2(&(0x7f0000e3eff8)={0x0, 0x0}, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r6 = dup3(r5, r4, 0x0) ioctl$KVM_SMI(r5, 0xaeb7) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f0000000340)={0x5001, 0x2000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000480)=[@textreal={0x8, &(0x7f0000000500)="0f005c0666b8ef0000000f23d00f21f86635300000010f23f866b9770b000066b80000008066ba000000000f30f20f35f30f1bcff4650f01cabaf80c66b8c261a58266efbafc0cb874daef0f236d0f32", 0x50}], 0x0, 0x3ffe, &(0x7f0000000040), 0x38b) ioctl$KVM_RUN(r6, 0xae80, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r7 = userfaultfd(0x0) ioctl$UFFDIO_API(r7, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r7, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) creat(&(0x7f0000000240)='./control/file0\x00', 0x0) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(r7) 2018/04/10 10:27:27 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) rt_sigprocmask(0x0, &(0x7f0000000000)={0x81}, &(0x7f0000000040), 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000100)=r1) 2018/04/10 10:27:27 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x3f00]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:27:27 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x200000000000000]]}, 0x178) 2018/04/10 10:27:27 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) r1 = socket$inet(0x11, 0xa, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) listen(r1, 0x7) write(r0, &(0x7f0000000180)="2700000014000707030e0000120f0a00110001002945222027bbb57a3e0e49d6a90600d6ec0000", 0x27) 2018/04/10 10:27:27 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x7f, 0x410000) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, &(0x7f00000000c0)=""/160, &(0x7f0000000040)=0xa0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) umount2(&(0x7f00000075c0)='./file0\x00', 0x0) 2018/04/10 10:27:27 executing program 2 (fault-call:5 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) 2018/04/10 10:27:28 executing program 1: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x9, 0x4400) sendto$inet6(r0, &(0x7f0000000040)="b94abaf9d61fc92951499668ca9dacb6326c131163a7e658ccabb023a8080ea6095560d08441baf644f4d0feb6029c4794fcf330560ecf7e74b22f0ac5ffdba5c551711bb55dc8659bcb3e4c1867ca26ee12a019da140dc4cae87eddac771af6560880d54df04ee2269e37cf010ec1cc22e8cdab64b27b26240b9fd1d001d4cd5cacefd67f68906bb746f33aa3d11e13462a13f8595d089668e3fc2d019c573c79d3654c6985130646dee893e95be947f8cc41e38868401d9671a497f0ade4c95b6987427827db66a6edb3f3307920155ac7896b211dabed7cb2a6ca408708ab050b", 0xe2, 0x4880, &(0x7f0000000140)={0xa, 0x4e20, 0x42e, @loopback={0x0, 0x1}, 0x9}, 0x1c) 2018/04/10 10:27:28 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x1000000]]}, 0x178) 2018/04/10 10:27:28 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$unix(0x1, 0x5, 0x0) getsockname(r0, &(0x7f0000000000)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f00000000c0)=0x80) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) umount2(&(0x7f00000075c0)='./file0\x00', 0x0) [ 239.723627] FAULT_INJECTION: forcing a failure. [ 239.723627] name failslab, interval 1, probability 0, space 0, times 0 [ 239.734989] CPU: 1 PID: 17530 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 239.741912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 239.751260] Call Trace: [ 239.753946] dump_stack+0x1b9/0x294 [ 239.757602] ? dump_stack_print_info.cold.2+0x52/0x52 [ 239.762799] ? perf_trace_lock_acquire+0xe3/0x980 [ 239.767661] should_fail.cold.4+0xa/0x1a [ 239.771724] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 239.776835] ? lock_downgrade+0x8e0/0x8e0 [ 239.780981] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 239.786539] ? proc_fail_nth_write+0x96/0x1f0 [ 239.791042] ? proc_cwd_link+0x1d0/0x1d0 [ 239.795106] ? find_held_lock+0x36/0x1c0 [ 239.799175] ? check_same_owner+0x320/0x320 [ 239.803487] ? __lock_is_held+0xb5/0x140 [ 239.807545] ? rcu_note_context_switch+0x710/0x710 [ 239.812470] __should_failslab+0x124/0x180 [ 239.816698] should_failslab+0x9/0x14 [ 239.820493] __kmalloc_track_caller+0x2c4/0x760 [ 239.825160] ? strncpy_from_user+0x500/0x500 [ 239.829575] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 239.835118] ? strndup_user+0x77/0xd0 [ 239.838928] memdup_user+0x2c/0xa0 [ 239.842477] strndup_user+0x77/0xd0 [ 239.846158] ksys_mount+0x3c/0x140 [ 239.849696] SyS_mount+0x35/0x50 [ 239.853057] ? ksys_mount+0x140/0x140 [ 239.856855] do_syscall_64+0x29e/0x9d0 [ 239.860750] ? vmalloc_sync_all+0x30/0x30 [ 239.864891] ? _raw_spin_unlock_irq+0x27/0x70 [ 239.869377] ? finish_task_switch+0x1ca/0x820 [ 239.873887] ? syscall_return_slowpath+0x5c0/0x5c0 [ 239.878819] ? syscall_return_slowpath+0x30f/0x5c0 [ 239.883756] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 239.889123] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 239.893963] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 239.899143] RIP: 0033:0x455259 [ 239.902326] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 239.910050] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 [ 239.917313] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 2018/04/10 10:27:28 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x406, r0) r2 = semget(0x2, 0x2, 0x8) semop(r2, &(0x7f0000000280)=[{0x0, 0x8, 0x1000}, {0x3, 0x2}, {0x2, 0x7, 0x1800}, {0x3, 0x3, 0x1000}, {0x0, 0x1, 0x1800}, {0x3, 0x1, 0x800}], 0x6) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f00000000c0)={0x0, 0x1f, 0x81, 0x7fffffff}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000001c0)={r3, @in6={{0xa, 0x4e24, 0x4, @mcast1={0xff, 0x1, [], 0x1}, 0x3ff}}, 0x0, 0x88b5}, 0x90) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_HAS_DEVICE_ATTR(r4, 0x4018aee3, &(0x7f0000000080)={0x0, 0x8, 0x3ff, &(0x7f0000000040)}) [ 239.924597] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 [ 239.931857] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 239.939117] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000000 2018/04/10 10:27:28 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x2c) set_mempolicy(0x4002, &(0x7f00000001c0)=0xe, 0x6) sendmsg(r0, &(0x7f0000006fc8)={0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000011000)}, 0xc100) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000029f90)=[{&(0x7f0000000080)="80", 0x1}], 0x1, &(0x7f000001f000)}, 0x0) 2018/04/10 10:27:28 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x480000, 0x0) ioctl$KVM_INTERRUPT(r1, 0x4004ae86, &(0x7f00000000c0)=0xb3a6) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0xffffffffffffffd6) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) bind$llc(r2, &(0x7f0000000040)={0x1a, 0x323, 0x8, 0x2, 0x8001, 0x10001, @random="7e08a20a3089"}, 0x10) 2018/04/10 10:27:28 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e22, 0x8001, @mcast2={0xff, 0x2, [], 0x1}, 0x6}], 0x3) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) ioctl$sock_netrom_SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000000c0)) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2f, 'io', 0x20}, {0x2f, 'cpu', 0x20}, {0x2b, 'memory', 0x20}, {0x2d, 'pids', 0x20}, {0x2d, 'memory', 0x20}]}, 0x1f) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000001c0)={{{@in, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) r4 = getegid() fchownat(r2, &(0x7f0000000100)='./file0\x00', r3, r4, 0x1800) 2018/04/10 10:27:28 executing program 5: socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000100)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000140)={0x0, 0x10001, 0x1, 0x1, 0x40, 0x0, 0x9, 0x6, {0x0, @in={{0x2, 0x4e21}}, 0x3, 0x1, 0x5, 0x8001}}, &(0x7f0000000200)=0xb0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000240)={r1, 0x5}, &(0x7f0000000280)=0x8) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f0000000040)) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x4200, 0x0) umount2(&(0x7f00000075c0)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f00000000c0)=&(0x7f0000000040)) 2018/04/10 10:27:28 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x2]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:27:28 executing program 2 (fault-call:5 fault-nth:1): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) 2018/04/10 10:27:28 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x9, 0xc80) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000200)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) accept$netrom(r0, 0x0, &(0x7f0000000380)) pipe2(&(0x7f0000e3eff8)={0x0, 0x0}, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r6 = dup3(r5, r4, 0x0) ioctl$KVM_SMI(r5, 0xaeb7) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f0000000340)={0x5001, 0x2000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000480)=[@textreal={0x8, &(0x7f0000000500)="0f005c0666b8ef0000000f23d00f21f86635300000010f23f866b9770b000066b80000008066ba000000000f30f20f35f30f1bcff4650f01cabaf80c66b8c261a58266efbafc0cb874daef0f236d0f32", 0x50}], 0x0, 0x3ffe, &(0x7f0000000040), 0x38b) ioctl$KVM_RUN(r6, 0xae80, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r7 = userfaultfd(0x0) ioctl$UFFDIO_API(r7, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r7, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(0xffffffffffffffff, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(r7) 2018/04/10 10:27:28 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x2000000]]}, 0x178) [ 240.082613] FAULT_INJECTION: forcing a failure. [ 240.082613] name failslab, interval 1, probability 0, space 0, times 0 [ 240.094010] CPU: 0 PID: 17556 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 240.100934] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 240.110279] Call Trace: [ 240.112855] dump_stack+0x1b9/0x294 [ 240.116469] ? dump_stack_print_info.cold.2+0x52/0x52 [ 240.121645] ? perf_trace_lock_acquire+0xe3/0x980 [ 240.126570] should_fail.cold.4+0xa/0x1a [ 240.130615] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 240.135706] ? save_stack+0x43/0xd0 [ 240.139313] ? kasan_kmalloc+0xc4/0xe0 [ 240.143182] ? __kmalloc_track_caller+0x14a/0x760 [ 240.148019] ? memdup_user+0x2c/0xa0 [ 240.151716] ? strndup_user+0x77/0xd0 [ 240.155511] ? graph_lock+0x170/0x170 [ 240.159295] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 240.164642] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 240.170164] ? proc_fail_nth_write+0x96/0x1f0 [ 240.174646] ? find_held_lock+0x36/0x1c0 [ 240.178711] ? check_same_owner+0x320/0x320 [ 240.183019] ? lock_release+0xa10/0xa10 [ 240.186982] ? rcu_note_context_switch+0x710/0x710 [ 240.191894] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 240.196892] ? __check_object_size+0x95/0x5d9 [ 240.201376] __should_failslab+0x124/0x180 [ 240.205599] should_failslab+0x9/0x14 [ 240.209383] __kmalloc_track_caller+0x2c4/0x760 [ 240.214062] ? strncpy_from_user+0x500/0x500 [ 240.218475] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 240.224005] ? strndup_user+0x77/0xd0 [ 240.227792] memdup_user+0x2c/0xa0 [ 240.231317] strndup_user+0x77/0xd0 [ 240.234926] ksys_mount+0x73/0x140 [ 240.238451] SyS_mount+0x35/0x50 [ 240.241798] ? ksys_mount+0x140/0x140 [ 240.245592] do_syscall_64+0x29e/0x9d0 [ 240.249462] ? vmalloc_sync_all+0x30/0x30 [ 240.253608] ? _raw_spin_unlock_irq+0x27/0x70 [ 240.258089] ? finish_task_switch+0x1ca/0x820 [ 240.262572] ? syscall_return_slowpath+0x5c0/0x5c0 [ 240.267484] ? syscall_return_slowpath+0x30f/0x5c0 [ 240.272413] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 240.277766] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 240.282598] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 240.287772] RIP: 0033:0x455259 [ 240.290943] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 240.298635] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 [ 240.306173] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 [ 240.313425] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 [ 240.320679] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 2018/04/10 10:27:28 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) r1 = fcntl$getown(r0, 0x9) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000100)=r1) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = semget$private(0x0, 0x0, 0xa2fcfd241601c289) semctl$GETNCNT(r2, 0x0, 0xe, &(0x7f0000000000)=""/210) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) [ 240.327927] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000001 2018/04/10 10:27:28 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000030ff8)='pagemap\x00') mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800000, 0x0, &(0x7f0000130000/0x800000)=nil) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000000)="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") ioctl$TIOCNOTTY(r0, 0x5422) sendfile(r1, r0, &(0x7f0000014000)=0x100000, 0x10001) 2018/04/10 10:27:28 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x9, 0xc80) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000200)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) accept$netrom(r0, 0x0, &(0x7f0000000380)) pipe2(&(0x7f0000e3eff8)={0x0, 0x0}, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r6 = dup3(r5, r4, 0x0) ioctl$KVM_SMI(r5, 0xaeb7) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f0000000340)={0x5001, 0x2000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000480)=[@textreal={0x8, &(0x7f0000000500)="0f005c0666b8ef0000000f23d00f21f86635300000010f23f866b9770b000066b80000008066ba000000000f30f20f35f30f1bcff4650f01cabaf80c66b8c261a58266efbafc0cb874daef0f236d0f32", 0x50}], 0x0, 0x3ffe, &(0x7f0000000040), 0x38b) ioctl$KVM_RUN(r6, 0xae80, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r7 = userfaultfd(0x0) ioctl$UFFDIO_API(r7, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r7, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(0xffffffffffffffff, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(r7) 2018/04/10 10:27:28 executing program 2 (fault-call:5 fault-nth:2): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) 2018/04/10 10:27:28 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000000)={r1, @in6={{0xa, 0x4e23, 0xc, @local={0xfe, 0x80, [], 0xaa}, 0x7}}, 0x2, 0x2}, 0x90) socket$inet6_sctp(0xa, 0x1, 0x84) 2018/04/10 10:27:28 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x40000, 0x40) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) umount2(&(0x7f00000075c0)='./file0\x00', 0x0) 2018/04/10 10:27:28 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x100000000000000]]}, 0x178) [ 240.483991] FAULT_INJECTION: forcing a failure. [ 240.483991] name failslab, interval 1, probability 0, space 0, times 0 [ 240.495350] CPU: 1 PID: 17597 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 240.502273] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 240.511605] Call Trace: [ 240.514198] dump_stack+0x1b9/0x294 [ 240.517813] ? dump_stack_print_info.cold.2+0x52/0x52 [ 240.522990] should_fail.cold.4+0xa/0x1a [ 240.527034] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 240.532120] ? kasan_kmalloc+0xc4/0xe0 [ 240.535987] ? __kmalloc_track_caller+0x14a/0x760 [ 240.540809] ? memdup_user+0x2c/0xa0 [ 240.544500] ? strndup_user+0x77/0xd0 [ 240.548280] ? graph_lock+0x170/0x170 [ 240.552062] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 240.557578] ? proc_fail_nth_write+0x96/0x1f0 [ 240.562053] ? proc_cwd_link+0x1d0/0x1d0 [ 240.566096] ? find_held_lock+0x36/0x1c0 [ 240.570158] ? check_same_owner+0x320/0x320 [ 240.574470] ? lock_release+0xa10/0xa10 [ 240.579058] ? check_same_owner+0x320/0x320 [ 240.583546] ? rcu_note_context_switch+0x710/0x710 [ 240.588465] ? __check_object_size+0x95/0x5d9 [ 240.592955] __should_failslab+0x124/0x180 [ 240.597180] should_failslab+0x9/0x14 [ 240.600967] kmem_cache_alloc_trace+0x2cb/0x780 [ 240.605624] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 240.611151] ? _copy_from_user+0xdf/0x150 [ 240.615294] copy_mount_options+0x5f/0x380 [ 240.619516] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 240.625039] ksys_mount+0xd0/0x140 [ 240.628567] SyS_mount+0x35/0x50 [ 240.631919] ? ksys_mount+0x140/0x140 [ 240.635710] do_syscall_64+0x29e/0x9d0 [ 240.639584] ? vmalloc_sync_all+0x30/0x30 [ 240.643721] ? _raw_spin_unlock_irq+0x27/0x70 [ 240.648213] ? finish_task_switch+0x1ca/0x820 [ 240.652694] ? syscall_return_slowpath+0x5c0/0x5c0 [ 240.657608] ? syscall_return_slowpath+0x30f/0x5c0 [ 240.662524] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 240.667874] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 240.672705] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 240.677875] RIP: 0033:0x455259 2018/04/10 10:27:29 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x700000000000000]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:27:29 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000040)={0x0, 0xc4, 0x8, 0x4, 0x1, 0x20}, &(0x7f0000000080)=0x14) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f00000000c0)={r1, 0x1c12}, 0x8) getpeername(r0, &(0x7f00000001c0)=@l2, &(0x7f0000000100)=0x80) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:29 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) sendmmsg(r0, &(0x7f0000002100)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="0af303b9c471b516162e8623d0b508a75a04650bf7fe99cc31f26c1d3a317cad1d83ead187", 0x25}], 0x1, &(0x7f00000024c0)=ANY=[@ANYBLOB="48003b2d363888854fbb7b56b552000000000000050100000800000085b232f1cae4b908a6ff09c686cf621ed3e3958ae4c5fe3679d3d1ffbe75b812db835609d5fe4845110110c2f777fa5fddd582e600000000e0000000000000001701000001000000ffa7aaf0081aa6abf731cb91c023a952934c370ee360832bead685ad4eafcb6fcd390f41837992c43c49e72b1f557c05dea45ab648747dfe035bd6d4c849ec1fe2ebf455b7847b3d72504565c46ad721619eef1a74b6f09f74f63649cccbb23929287e14de369373419b204d1427dac10c267bc97accc4d7fa17f4695888991f7d966dc3aac2094174849127ca03be1f2f7a63dad7845007986d3cc4f6879dad88875727224566ab40096b7cdd0397d4e30cd1cfe7d85b16fde4312939265b2f5221a976cb9f86bf7c76295a000000004000000000000000120100000900000097ff0fc9d7de975985436aba8cc1612cc7bf1f315895b90d1c35381c198c3e8ce4d89aa74855dcb0634ea48e93724b00c0000000000000000a0100000500000005839e6d38b39002cc91d03442ab46b2f46ccec76a34cf0fb9002fdaea5f2c8d8794a7da56800ef18576dc769495a03742ce0718d8b0067db0d6be8e0c50f389d05673423648b9ff03a26e82db729717ca9beb9c69428d5ed2602b6cd7cfb7cfb211e61273b06686a2d9d27a4c2532ff23db04fdbda8bd6636838f559cecf010710229077a037187db411ffb12302dcd64080209d082ff13c0844ddfbf98316488add1ae9a9f7abfca0000000000000068000000000000000f01000080000000d621e7c6f4b054fd04163af635e606fe8a9543cd91b9b03b9d88e7f94aa3163553e2efe2d19a1249b41fd0a2f0e74f977427d8b2991f191333d1e94b7fabaa1f0a165466d8c782ebb750ea4df315390a964118e800e10000"], 0x290, 0x40000}, 0x5}, {{&(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e24, @loopback=0x7f000001}, 0x2, 0x3}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000100)="75c2751cb4d7904004c0887700634a51ef64f7356eff42ff1ce9aa16d2fa80cac5b848a9e5d9ba879a279dec202895ed432ac2ebc0fe99a2a137ddc835bb463126bc6a9159631ee5d90ff35df67fbfff7eaff92b8684bf7d084e2f03f71d7d86739f88b7bb96ac", 0x67}, {&(0x7f0000000180)="6a8eb12ce58dd033ee0066e3ed7eec14e5a83eded282bc9ce2b1a04b3f796f60132deb6ac8c0fd00775b8a8fb15f468cb0e92b9f775f6b4a523b847117d8777f7f239aa1dc4215099b27", 0x4a}, {&(0x7f0000000200)="f104", 0x2}, {&(0x7f0000000240)="6d0226e502b8c1a696a88e50344f7bc10819a3942d1c89d3b292af34f1266abe503deb438979a10d4a99d71d3811ea6f131ea793be8e5f11cf602da8ce7da6d4ffb7ce79ac7c5ff465f7", 0x4a}, {&(0x7f00000002c0)="362cb222ce71c277ef5ed7a63dc4f50117243ee90a4326e53916db53bcf6c869b0aa88b1", 0x24}, {&(0x7f0000000340)="79de3d2f4fd97fb97784d038e61421bc44c777a8a4dec8a09e6255943ad9e406e5e10d6b4dafd693282065b4126ea965669f2dc878ff825167ae62f75794d2ea1ba0615f0be446ffb3239265635afd7b74c3a096f357", 0x56}], 0x6, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], 0x140, 0x800}, 0x4}, {{&(0x7f0000000440)=@ipx={0x4, 0x8, 0x2, "fa756ab95ada", 0x8}, 0x80, &(0x7f0000001e40)=[{&(0x7f0000000940)="b641b33f0e1fa0aeddb09176a72ad038bf2aa65c57590170e77acd25c9ca653fcda4be4b680d9a2b51d496cd167fa9f10392849a62a81cffaf09796a1a6fba69c5", 0x41}, {&(0x7f0000000a80)="cb84c713f9ee58249e91b32dd437b4f45e0d93474e562fea1003808f7d4c5d84be745d701e35f7fb25130ef32c8f0ca6374c82967e47d53b330850159ffddc186b1a2178f7fbb047d48fbae06ac6a1eaeacdcfb943512f451c1ed41af4", 0x5d}, {&(0x7f00000009c0)="ee8fc3161e069fe0c6d273d4bf2170127a142498b8c6f9447005a47da574b5c4c52d21", 0x23}, {&(0x7f0000000b00)="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", 0x1000}, {&(0x7f0000001b00)="19b59c9e5764eddc11e4ab9e5ed93ed9a79a3c2436961a2e436e5fe414b090651746b02b280478d06beda03810cc1d4428d1653aea151ff1fc884ec8ac8f9b07c4637469f709cb42caafb796c1b3bbbbd6d1629006392b8a412eaa5a055b72905c236501602bf75e112686eb4bfb08f4280bde096f3df0427dde897e54ad2b9d96e3eccd034236962778959f890bc82b940b585528cc916a84a4b36856ed82b071203f5bf773f3f2b2bfe2c85919e86efd6f65f94510a90d2a43eb6304b547ae605b0e90298ebe", 0xc7}, {&(0x7f0000001c00)="381e375f6a873f9f355baa7b77600d068e747ebe6daccd56adc413b5e08a45a8ed76ca16e6beff183323838c9a3be65589b5c36b6c9c704878bfdbda7957ce323697585385092c3820ad8016f0d47ab359075d8355b04e0929854af21fb4a54ffc98e493db96eafc877704421456fbc23e63214f09cd3ec7368f6b50886680378aad24bd8799b0997bf2431e26f92de2f0c5b38f8077fa20b07b361e1bb0ddea38da161c81e4e8e04e3277496e0b1fc6c78dd83c239c45ffd57d9f4a9627ae9b789ebb1467eb75bab9b798cb54", 0xcd}, {&(0x7f0000001d00)="bc558f818186d67fc27d2f966eaeeade275e7ef71164a3375099188856bfa9a95de779db33d5d5a2f85463544f58d8ca773134f584fda5ce7745e8b821d2f3fe52b16aeb4122778c70611952615dbdbc49e0372a02e544e5c4e945dcfe749cf9c90b82fddb57a2f1c51c6a979ca480ab208142b78b029a413bdcb0bf7c4566f940ad359933bf1d5b163d8bbfb93454fb0374", 0x92}, {&(0x7f0000001dc0)="bca209c0c3751e3577587e47abe63d830eaa74727a2381b19e6c410b72a2acf2b22d1d6842c015b32034c3d6d99c76cece054eb265351a4aa70c030a118d8e238cce591e955dd4b1cd3949f44c", 0x4d}], 0x8, &(0x7f0000001ec0)=[{0xd8, 0x114, 0x200, "3f770c67009ea55968c516650f67b56a882337ea404b4bb06fafd82e23afa29797904173ec51343d42ad51240d36cf99382b0dd1b9835283f4005bb69a78b44e1dbbcfe4d3c5d73cc9fdadd75ed292409b56a901b088a2b09a3bb16313ecfa58691a77e750f4f7094d0c98c8b7411ff2c84161fd498d188596b60504453c50f1664fb8abd3db17c4c6a0602a15afa845b2abef0ce5466cd3b0fa9c496cda4d3a8334325fe59404bbffbd9071e707361a415b8a78f3dabb68705f6e8889d416029d26"}, {0xb8, 0xff, 0x4, "9ea70d4cd95396942766185f4f9d65e0019bef2c7703f60c71f4c954d83287d212b6313b7c86b66319eb12783d1c63481aa8c7d182de99f0e52eb1c95d97e483a695bc6fd2be01b670894fa773982ffba5d05ff01beac0aee40ffed2e460082bca7142d59cc4798006277bd2ac37625ecc5b2c517f772364e7e8d505376cd54f8d2de4e7bf6de4825dbc0fe87482c8d22b76a869b9ee36ce48bdc4f08e2655f568fcde40c0"}, {0xa0, 0x29, 0x8, "1089c85f26ef09d1f0a0dff45af1bbbde64f1e8c9cfbf99ac436328607b0ec66bef4c47f650880102add23026a4311a1284085028ead4039d6e59c4b27b77c486f1ea9c34865f4d78a3cc1a3f5c0ff4d3549b3648848b2fb6631b7208cab0cbd70a90f3544b2cc857318d7def11afa90d84191c11735937043a4410b2788713348c45ed170658f788a"}], 0x230}, 0x3}], 0x3, 0x0) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000023c0)='cgroup.stat\x00', 0x0, 0x0) ioctl$KVM_GET_DEVICE_ATTR(r1, 0x4018aee2, &(0x7f0000002440)={0x0, 0x1, 0x0, &(0x7f0000002400)}) fremovexattr(r0, &(0x7f0000002480)=ANY=[@ANYBLOB="747275737465642e242f776c61aca41bde4d523100"]) r2 = openat$dir(0xffffffffffffff9c, &(0x7f00000022c0)='./file0\x00', 0x40, 0x80) r3 = syz_open_dev$vcsn(&(0x7f0000002340)='/dev/vcs#\x00', 0xffffffffffff8000, 0x0) renameat(r2, &(0x7f0000002300)='./file0\x00', r3, &(0x7f0000002380)='./file0\x00') sendmmsg(r0, &(0x7f0000003900)=[{{&(0x7f00000004c0)=@can={0x1d}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000f40)}}, {{&(0x7f0000000a00)=@sco={0x1f}, 0x80, &(0x7f0000002300), 0x0, &(0x7f0000002380)}}], 0x2, 0x20004081) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002200)='/dev/ppp\x00', 0x400, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000002240)={0x80, 0x0, 0x10000, 0xffffffffffff8000}) fcntl$setsig(r0, 0xa, 0x18) ioctl$DRM_IOCTL_AGP_ALLOC(r4, 0xc0206434, &(0x7f0000002280)={0x74ef, r5, 0x0, 0x200}) [ 240.681046] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 240.688740] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 [ 240.695991] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 [ 240.703245] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 [ 240.710501] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 240.717756] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000002 2018/04/10 10:27:29 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f00000001c0)=0xe8) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r0, &(0x7f0000000040)='./file0\x00', r1, r2, 0x1000) umount2(&(0x7f00000075c0)='./file0\x00', 0x0) unlinkat(r0, &(0x7f00000002c0)='./file0\x00', 0x0) 2018/04/10 10:27:29 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x800000001, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000040)={0x100000001, 0x6, 0x3, 0x7, 0x80000001, 0x7}) write$fuse(r0, &(0x7f0000000080)={0x18, 0x1, 0x0, @fuse_bmap_out}, 0x18) 2018/04/10 10:27:29 executing program 4: r0 = socket$inet6_sctp(0xa, 0x200000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) r1 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0xa7, 0x301000) bind$nfc_llcp(r1, &(0x7f00000001c0)={0x27, 0x1, 0x2, 0x7, 0xfffffffffffffffd, 0x68, "d27c52b712d25b01ad36e6178998249a824bee4048fc93d5d82bc8affc9bd35858a6688f84a37e1c9d1e1b98894dc0fc71cbf9e518eb88ec2004c66af3a0e4", 0x3b}, 0x60) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x5c, 0xfffffffffffffeff, 0x2, 0x80000001, 0x8, 0x1, 0x10000, 0x1, r2}, &(0x7f0000000040)=0x20) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000100)=ANY=[@ANYRES32=r2, @ANYBLOB="00000000000016d9e42cc84c707ffbd390c7a6"], 0xa) 2018/04/10 10:27:29 executing program 0: r0 = socket$inet6_sctp(0xa, 0x4000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000040)=0x4) 2018/04/10 10:27:29 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x200000000000000]]}, 0x178) 2018/04/10 10:27:29 executing program 2 (fault-call:5 fault-nth:3): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) 2018/04/10 10:27:29 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x40000000]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:27:29 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000003b40)={&(0x7f0000001400)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @ipv4={[], [], @loopback}}}}, 0x80, &(0x7f0000003980)=[{&(0x7f0000001480)=""/173, 0xad}, {&(0x7f0000001540)}, {&(0x7f0000001580)=""/228, 0xe4}, {&(0x7f0000001680)=""/234, 0xea}, {&(0x7f0000001780)=""/8, 0x8}, {&(0x7f00000017c0)=""/4096, 0x1000}, {&(0x7f00000027c0)=""/19, 0x13}, {&(0x7f0000002800)=""/129, 0x81}, {&(0x7f00000028c0)=""/4096, 0x1000}, {&(0x7f00000038c0)=""/133, 0x85}], 0xa, &(0x7f0000003a40)=""/255, 0xff, 0x10001}, 0x2023) accept4$alg(r0, 0x0, 0x0, 0x80000) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000040)='./file0\x00', 0x100, 0x5, &(0x7f0000001340)=[{&(0x7f00000000c0)="ce87a0238637b1ccf3e9dd43fea821fade4b02437ef3e6adadc56c47774b89de39382a8ffaaa5178991b14a45035a6ed3b551a645b9aaee2f7fbb760811c4fdb87faf10a8fd854e80d7fc56f28070593734b08167b8828d036e8e2260e4e39dc7352060e0f8afae7e3c3c6e65d86cefe3749587e6feecf0b802f944183c71af92cb04a27ddb0b16d1ebf5d5902ebac0340d336752ccde75c93fb0a", 0x9b, 0x144f8fc9}, {&(0x7f0000000180)="3c2bdf2179e51e25061bfa6a6e1ed076bb019caffc2fa3598c820a578ef9c9b8200e5415e018244218b9fcacc7316405abad12e57e3c27fdb9a610e4dcfbe9", 0x3f, 0x8}, {&(0x7f00000001c0)="77fb51794d529ac1974ad21e329d87950a9f25e38bd5ce3975bcc370b674b34adea9df0dc5df531dd75b0ed0a8c63e5f91bd1d3f552eb021069ad7c4f37668638067c49675c7446d38a51915a92e209ac3318e3bd9a87118896919b1fae8a8657853574b91a774ad103a11c3ebde08fbdcc808ba3add87e5b656a07078555be4be7d4c3ce77d6f50cfb9095d7629cb324884bbc556d3fd83d04d563e050a7e6f0675ae3e60a484f8281710bdae40a1aabb060655f19c364791c3f207c9bfc0d978c958", 0xc3}, {&(0x7f00000002c0)="42dd8409e20aa373485bb5029cdf9251a6f3b78f430a4ab3c1ea202b02c4c11efe53998648e74a666e37b62749cdbaf47ff31391de8b1416aa6ef01767253e63f5b52b44974241d41123a83ca7358566e258805ab42bc41b052cb6051049910d25ebc1c718626e968c2a1adc62641f3e9b8ad859932bffd1812e229ca352234215d3279d8d3469dbe14675cbcd519299a405542d1b6bf129f1ca14ee8f3c91e759feee11e8550fbdc4138de65f2e15d19772c390dec8e53edb7029b418288a293549861e251ac82c36c9d61a21b599dfca635bd51045e0d699b962b2922817e82be70520fc0535cf8792fd19e89f7503b7f065a6bbc06719e40e0ce865e73e5e0d4b1ad8ffa8a2ff871892b7f12a157ce5ccd76ceca6d18ad0ce29b43ae53711c194c3c210729f8c3689041a58b30fe9fbaf0407a40744a46859e3ba681c042f214cda7025da950743e9b2408db6972fa332e00b6511275ffa183fa2a6165456dc9d591d0ab05a677591aec15d9e435bc645fa16ddf97a93d9a4e317882a9584444638eb3e116827cf3ad53281804e0de283fa1beb50ac642d5a94c7668ee8dc6cc238f2b4b076904ed456e9bcc8b14eaacab462c53234b89cd1d86c3a7c0670df681b89ce3d59a35c1ac55865392f2401f93cfc86889b2ff0cc3e9e5f8eed3ef9df0d89f6ab081164d4930b24aab28101dde2edc9627d8926d323a48e95b0b0157bdb44aeb79c30229e49e96f4a9e95fe7dc46f33e466204bc4ff0f2641facf85424301381fee55459525fdb1bdb58567ff99cd417f79143a75e9a99e50db26f9b95d45a94fc34baabd4b80f0b0aec82129169930ff525f601f678a4ffb8dd90c283bc21509846fbaaf1adb823968fa49942c9d2854641c5296bdb1851ebc42ae60cc42fd275fe9ca8fcc2ce5421f157757d8167653281295bf523d58bfe344c20ec8915d2d25bd88d5973cfdebf4ca35ed1dec1d79cc7bbd05da66334ed6d6396b92cdc533c9c1e3b7ad3bd159bba1fbb8c1aeb5cd0fdad27fb769ab897c44f82997ca31ef647c7666980beff12892444d0d29f4e8d5fadb79c32247b5910c7fefeeca43d81f419cb3b982d3a3674722d80bba0c94f677a14c536112fa73d3de849bea8afb109cea21df20c4c021c533e018544718f5870fa748b726c8a6e16c6c2096d2764e01a6378fd248145392175f5f19051068a75ab6a6b0682f0ebb143c011542d3feda77f2d658b4647772a6e4942869e693543ee46454c1b94a298f0c563c0fc7e19aa556b115649407b7f1b367704a42cbc843ae493449ea71406251c7fdf00c5b6cfc48ffe0f4efee8776a3192ea3858c1fd5c8783d525241d1678e0b279d77e1420c6cc6370477a99c1c348170c73fc7a265c7ce366567deffe733a300bf1df5de15a8b138e9f9965fc8f244831bdd5492d70a2efe9ad7ce95557c40c1da6b7824ce32627febf8033bd73452b3fd7891bc137420f4ffda1446af3e61d9f76638529267a4b99b411e75cd1b812172252a016928bf3eafb2ff1ba4406a0fff50295a5ca2b36c62d84aa8be4f5ae9f850ff75d4c9dc1d68f8c4680df3a30ed0a2418a46a39f16fa06c40c38d8ac34faa8f34a9f7701fd9aaf34fdb5eae6cc47573cd9ea63e21512773eb22829da97bc89dc1b108f004f653fbb01704ff810c00d8d76868e2e3ae4f7b2926978ebf8fc436bbb8b63d24fdb81c9fbafb1662f3727f547cff0a3fa77bb4d8b65942c337c019334d8ca1d4b55c1b958fde8777f982729923232f4b478857c5556bf4a1a54e8308b9e68e60af7cd3d596d9183a1b0409bdc686e472bea8ea1038372695d3ba7e63629a89896cec2ce3da7690217e7c7397573c1b0f24eba7b0ffe71ec16a707410bd249d04f421886169e64e5b211d7a2a1670234af30d8454469b1695ff7d44a05d31fc5fa21f3e5ca98ac1a9ec217929b288e4cb0c0cf40e64019adb0a3c619e2d69905b2106edaa290d4c2362f0a45dd6c7e98c6bebc7467dece3e2de43cdf4b81321b09deb858ab1f49bfac0e0a8a82539f614964b9d2d260d069fe2128b4e82c2c3e9769f2b2c7cf6a8e2ecbfb1ee3ae62bc87b453f36fdf44dacf16ca7c332c344465b4c1e4dc97bcd13cfb5d9c398a8adf82e05d79ab0b6459c1c164ef6c407c673d9ee9c5dfa71ebd3b27af542cd39e49daf9e554b3fc87bf27273c6071a5e0ac997d2c5f09928e9a06d51de9f3a2efe09d0d785eeb7229dac957ae6a9f3c42f716592cb96343a271ac339ce657b48481ba49d8774f08e2e70090666a79ac9500ce86fe6e9ac1a97343ca70f81937369eb1f2252fbcfeea60171653d3a51049824b8ad515ef24a2f2a516dc19ac497b52a0f32fe4a7be12f6355c5a0cae062cbc4779bed819a748de3d7e0e973bed349e7de2286117fb7a32b7fd0d7f5e4c30bcc9422821e0c603de39a062b3fa8bcc42399e2efeeba07b9e88d6bf46bd5aaf5f5736e850a959c611212652a466960e4957dcf3740d0671548dc5d779acc88bda44c19b5ee9fb047519cf4eda76fa6fb64b34507c2f579317ba7f936bdf8fa5ed245bc2e0046562b6f64e1c84306148db2355cbb7c59ebec117086851c2bdbf3a355ec6d05bd3e9a872f180409dd230f66f9bd68210238dbdc694642784bf9a8e79888631e5e08c8497412b42d2e8f3c1eb5d2802f10d2b06afeab0a621c2cfcc6d73c163d726000247df50c84666c03bd00605e4146111b99aac57e7ebf51aca95b87a45820ba3c4070dfffc74b03bdbed20be0341cb11a7d611c8136a5ab32ec071c7f2f9c41518f4ce8fa9a8ed98e17d99820f62f973b38100ba458994907e53a878d08fbf63b1ce931c9cb23bf2761e14ab4f2e7898f4f65e069d2598b2172710359f9456c51e62984f59cd4b2ad43efd946ebeba64039641843607a23907203ee7184b9ae5c1e2b69d7619414c2ca1774f32c0493f31ccc1ca4fb064a6ae8fe53aa84f816ffabc74a4a2dc4c9c411a92d771dcc02caa6ad7e1ed8119396d945861b5292fe0c8e475e890fa220874875edc3a2e6c9fb4abd4a29ce8b3948d3f17bd31957fa831dbccd4a34810a26dd9e5d1acd50000ca5af649f005895dd695fdc06927b7d2beed3693ae9c6f77d4146d30c94e65f3a4546d7779a809b10a62eb8e59c5eb3f5572460ae14aa1f96420e6a083f1e4242d2f47a234b9f16fe46b52ae713404ec18ca5e19678e04e73172828c208fa1b6980e299fcba3dff83aefddecc4f67656d57204f5418b59372ffa50714d9a0e897c1b7017aea6fd08f416661f7534c2989da3f9f47fc2d3e573a54e3dd2b8c6396d98a1fc5bd0c9a1a36389c7f88b865a61581f6531e6bfadfd8a835947aec1d5fdc094ee516a6726e103b6f1c16ce0354579b8b157e8f1d084a2e5d5900dbd469b4878e0c820a0102dcf493fe1a090239502c858d2fd308eb7e20ace82d05341bf3a441e9661084bd8cca0b52d80bea973bcda37e7c2357fcc716b7fd08cb5749952515e176e36fdf15c9b9f16a9dbe98ae580b049619ccb9d688aee7f67f0f2ee4023ed2ba41a6d67d7e24a77a9f2e76c0d7f10e89b7a2d40ea7136c2d245bd86c42145055da9cf7ceaecc80f2c3266bda60d25137cdfbae55aaee02e8f081e2ce73a18609c3f87f8a0c1436b11af277d4baa1abf9c3ede858d9875816ea7761a9e5e3e7e135352391b1e1fcc921b780701b43eae97c33fbfb70ed8f670247b50c05ebd8aca98d6d50dc022ee9e73df38950fedbb9c953c64df9824b07bd1e3cc87feefb8fa21f8f0c389fd212af27e2851e5eefa096dccb1a51f7b002ae0c2f057cd170937a4df1e9c1cb21d03404efe34dfe7fae3fd4a666ba41291edad69134a9dc7b900fba31325d221a8ff6c7e590e3be1593a77ab854f39d5cd83488f955f871c98fcf5290ab425bc83ff0f21cebb14c7353c4688474ca98f1f78aabd416257701571f850c23daada5e7aa503aabd58d0e275d47ee3ea1ab616741fd6bb2b1e86ce1d2ee91cd1e908a519cf5d9173f21c620196a3a8de4145344f35dd56c5eddfd3b10c224ad73b0aa9865bbf4178b8c5cd83fb84c5bba83eae6e48b48630a07fe28d8ffe2f9ca4d2cf6dc7faed55b6a048e401c8d0257f0dbcfd27f0fba9adbe93b9a48952cafe0d5973146f87c67c7db28cdf959d3f005cb6e7646017ca4d41bfc3ab10303b6d17078785411a0fbdfefec8e5a16aa1f66460ded93d0e92223051620adf4e1d5c667f7223f2e3ccfcf5afaad08045f9fb632e664508c6d1ef0402f94ba47bcf8f1b765ea6de925db85a1ac98bad0b1482a78cd640cf5c12daab283e871e54e802d70fde221d791b9a3e324bf1c5c22dbc7b6613ee3e56fb1b703f1873c5db7e89305ff25eaabc3bdc68e76ae8cb51a7bf686f950bbd9eb4601dc07d6ffd7b8b28b9ef2737a2ead6d6d67a4ede4c0dbb0efeddef44e18463bebd227752776eb283b76ae1d4065b9356b4fbc1487558de7dd262d88cf3e2286d163c886bf9689269ea1e6c24a43ba6c36d5ad2982a16eb40807c01e92f0de605fa9105df19b1bb5eccefd15f6b61cb09fcd882036ac83e1463882c02d50178cc48c9979ebaaf2ac4e402d4be12d31e80decde79e6ebee6420ce25056f07ae1bcb5efd1a3c143cff61c8e21e46e59acbfe90e6fc6fd499a4a9046562097356075c191bfa8a94928c7a0abcd253e033bf9d48e2689ee8af8fa94c5bc47366817e3533e2eee04eb954f657bd392484d92dd75aab6c4f815155457b3a782f30944587565dd93f37f776442687fb7d979b27b965a0705b74a251a483299e478044146eb48739ea08ab8966d7883f3ee9edc33a133f7f5366289689a2c89b78f32791924d22aab654642e622ec31361d66d445d018d32b14d8aad79d3a544a7b6a2986971e66f5e20152f5e907d7c02ba8c5acd27d8c8aa4d459fa0d3a3886e69c024beb8a688033076d11e4d04f26f02ab718152cca5f6fe02f3881e12ac4babb80dd14977270f139bdf49b80f6bfdeb6f75e6f41cf664100432bac04f281fc38a7ed7fadb980f638b6b25217cb983ba7f35e73897660124b3f8c287f850a33d1266b4b379805d70be65e7a06e8af2b03640c93fd0fae34fde6f87dcbc0db58193d96e06ff65b3fc7a530cab65a861451c19e733ef08a9f07021ef119a84e13ec535ea3d4e2265a9f4cfc2a2654b75e949f7f7936393961ce4733fd8167c249eaba4c72b9a6bdd0b5ecbac78d8a3374cb0fe1018ebaf5fd0d05ab55b8f8efd4d1c6f1064d88d1a79f0163c6c571f6345240ff01e5fdb3039e1051d3d94bb9458e6783cf4ad004f956581164ee0f3fe179f3b647add2ddd911854074bc5c43081898ce559d98c4c8024a1957ee06ce00617eee37e6309c86dc793e709c6a26cdc5bbf2ef7421e817fd5f101b7e635de3c742a3c601b12449344c1a3b7e1aa099b3733b270a2831103d0f248ffc3e98de5251053932d607c4bd4df340cb5dd92a0cbf19fb65a1d0f203f403869fb02f3504d926a44f35f3a5d912357621d7f1bc74c7823032e79ad4c7cfa3cabe3ee7524fe628edc95dd0b0529ae0c1e66e8b1f7577f2bea7253e24f61eacaed013af10dcc830f7297e9ed3e509436e6f0f7e3db8248446de22ad7474714813d56fd269874c5c4c0d533f1bccba499560a9e9fb76992b4874849e3dbb347dc956cc395822c108b7c63f066682bef33eeda69f725a931788715838231bf7a72ca5f279a9dc5e68e728c9ac9c72d9e753ab3882382ae7160d9edc129ed9d26345485d", 0x1000, 0x1}, {&(0x7f00000012c0)="7cffc5bd71f76c4b53044afae5132d2d2e82e42cb64631ea8aa50acb51cc8967f26a98123f769106b9c1f8535f2f659daba3c74182b2e973378a3c90216b2f5bcacbe2d0362fa1077820ac68dcf258d45ed02c2c5c8c654d41b91298afd33b0ba793fae51454f72250c972b879bb3260", 0x70, 0xf000}], 0x80, &(0x7f00000013c0)={[{@part={'part', 0x3d, [0x0, 0x3d, 0x35, 0x3b, 0x30, 0x30, 0x2d, 0x37, 0x39]}, 0x2c}]}) umount2(&(0x7f00000075c0)='./file0\x00', 0x0) 2018/04/10 10:27:29 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x9, 0xc80) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000200)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) accept$netrom(r0, 0x0, &(0x7f0000000380)) pipe2(&(0x7f0000e3eff8)={0x0, 0x0}, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r6 = dup3(r5, r4, 0x0) ioctl$KVM_SMI(r5, 0xaeb7) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f0000000340)={0x5001, 0x2000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000480)=[@textreal={0x8, &(0x7f0000000500)="0f005c0666b8ef0000000f23d00f21f86635300000010f23f866b9770b000066b80000008066ba000000000f30f20f35f30f1bcff4650f01cabaf80c66b8c261a58266efbafc0cb874daef0f236d0f32", 0x50}], 0x0, 0x3ffe, &(0x7f0000000040), 0x38b) ioctl$KVM_RUN(r6, 0xae80, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r7 = userfaultfd(0x0) ioctl$UFFDIO_API(r7, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r7, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(0xffffffffffffffff, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(r7) 2018/04/10 10:27:29 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x800000001, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000040)={0x100000001, 0x6, 0x3, 0x7, 0x80000001, 0x7}) write$fuse(r0, &(0x7f0000000080)={0x18, 0x1, 0x0, @fuse_bmap_out}, 0x18) [ 241.049751] hfsplus: unable to parse mount options [ 241.082444] FAULT_INJECTION: forcing a failure. [ 241.082444] name failslab, interval 1, probability 0, space 0, times 0 [ 241.093804] CPU: 0 PID: 17653 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 241.100746] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 241.110108] Call Trace: [ 241.112720] dump_stack+0x1b9/0x294 [ 241.116369] ? dump_stack_print_info.cold.2+0x52/0x52 [ 241.121573] ? perf_trace_lock_acquire+0xe3/0x980 [ 241.126438] ? find_held_lock+0x36/0x1c0 [ 241.130537] should_fail.cold.4+0xa/0x1a [ 241.134625] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 241.139744] ? kasan_check_read+0x11/0x20 [ 241.143910] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 241.149118] ? find_held_lock+0x36/0x1c0 [ 241.153215] ? check_same_owner+0x320/0x320 [ 241.154456] gfs2: invalid mount option: rgaclšnoacl [ 241.157548] ? rcu_note_context_switch+0x710/0x710 [ 241.157566] ? save_stack+0xa9/0xd0 [ 241.157589] __should_failslab+0x124/0x180 [ 241.157609] should_failslab+0x9/0x14 2018/04/10 10:27:29 executing program 4: r0 = socket$inet6_sctp(0xa, 0x2000000005, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="f0d8fc463cc5fecaabf26c391f9b465ddb59dfd8b46a22ba3e275f1a1aaa6ac1786a1f6bcd20171a57e6aae388708d1a25bea05eebc00e7d924b09ba843052840df1fd653933d3fabc31d3452c9fad7c42e7cc24505bf5b67ca9a0f3484c5faa660b0918", 0x64, 0x6}, {&(0x7f00000001c0)="e4780543c25a09a6af7136cefb9a8da23a3be87235559f5a92b2abd3b7521ab9cdb5c865a066be1dd105e950a0b37b28ed13ade2e637b673034047c880e1e74d87af72693c845cb5a4667a6df35f420708f952ddddecaecc9e809da5bcb4bbdaa12840055135b13aeda2dee9fb42ef2b0e5045769d86687bbcdd673f6d93fd72f995", 0x82, 0x3}, {&(0x7f0000000280)="b2c1f221e94e60d811d2f60cf18fe9e631645a0eacbbc15b3aa3fd455eedc6e42ec0c3e37a931ac94c6146a4106b6fb98183f88c9dccc3ff40011795c26d7aabe1708d13345c144cd4031775ae26147ff3853f7795fa9da90779dc053684b53d895a46456d125a763cf5136dbc966eee14c5", 0x72, 0x5}], 0x4000, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f626172726965722c726761636c9a6e6f61636c2c7374617466735f7175616e74756d3d3f3631363401002c6c6f63636f6f6b69652c0012b5703407b2f8b123f9432c7c4abcb9d73807e2bac66882b38f7f1c15787d866217d29e349f61d467ff630715496039de2b99b363c87518a4f862c5c410b93385616be398782cca84548f0d39d983b358e7dd9ba934cb3c5e91adbe1b223c4b2ccb97ecd00987b269265d000000000000002f24533a8322f2aa"]) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:29 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x1000000]]}, 0x178) 2018/04/10 10:27:29 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000000)) r1 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x2, 0x0) r2 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000380)=[@in6={0xa, 0x4e23, 0x9, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, @in6={0xa, 0x4e23, 0x1, @dev={0xfe, 0x80, [], 0x13}, 0x7}, @in6={0xa, 0x4e20, 0x49f, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0x1}, @in6={0xa, 0x4e21, 0x81, @mcast1={0xff, 0x1, [], 0x1}, 0x7ff}, @in6={0xa, 0x4e22, 0x100000001, @mcast2={0xff, 0x2, [], 0x1}, 0xf3ef}], 0x6c15) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000040)=0xc95b, 0x4) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000001c0)={r3, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x18}}}, 0x4, 0x73}, 0x90) 2018/04/10 10:27:29 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r1, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) shutdown(r1, 0x1) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000040)) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "e5a41c893a5fcc5d4ea885947886f1c890dacfc06e588016879d4954e83c27c24f34b8cca30f7586812d29ff42fe76c8eec88c86b65b05442b698743177feb"}, 0x60) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x40, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f000031aff8)={r0, r4}) sendmsg$kcm(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be9", 0x3}], 0x1, &(0x7f0000000640)}, 0x80) socket$inet(0x2, 0x6, 0x101) setsockopt$kcm_KCM_RECV_DISABLE(r5, 0x119, 0x1, &(0x7f0000000200)=0x3ff, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) sendto$inet6(0xffffffffffffffff, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) [ 241.157622] kmem_cache_alloc+0x2af/0x760 [ 241.157643] ? proc_cwd_link+0x1d0/0x1d0 [ 241.162973] gfs2: can't parse mount arguments [ 241.167796] getname_flags+0xd0/0x5a0 [ 241.167817] user_path_at_empty+0x2d/0x50 [ 241.167833] do_mount+0x172/0x3070 [ 241.167852] ? copy_mount_string+0x40/0x40 [ 241.207796] ? rcu_pm_notify+0xc0/0xc0 [ 241.211707] ? copy_mount_options+0x5f/0x380 [ 241.216128] ? rcu_read_lock_sched_held+0x108/0x120 [ 241.221156] ? kmem_cache_alloc_trace+0x616/0x780 [ 241.226014] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 2018/04/10 10:27:29 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x2000000]]}, 0x178) [ 241.231563] ? _copy_from_user+0xdf/0x150 [ 241.235732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 241.241279] ? copy_mount_options+0x285/0x380 [ 241.245789] ksys_mount+0x12d/0x140 [ 241.249426] SyS_mount+0x35/0x50 [ 241.252800] ? ksys_mount+0x140/0x140 [ 241.256611] do_syscall_64+0x29e/0x9d0 [ 241.260504] ? vmalloc_sync_all+0x30/0x30 [ 241.264657] ? _raw_spin_unlock_irq+0x27/0x70 [ 241.269161] ? finish_task_switch+0x1ca/0x820 [ 241.273669] ? syscall_return_slowpath+0x5c0/0x5c0 [ 241.278612] ? syscall_return_slowpath+0x30f/0x5c0 [ 241.283553] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 241.288915] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 241.293755] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 241.298932] RIP: 0033:0x455259 [ 241.302106] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 241.309804] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 [ 241.317059] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 [ 241.324314] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 2018/04/10 10:27:29 executing program 0: r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, @local}, &(0x7f0000000040)=0x1c, 0x80000) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f00)=[{{&(0x7f0000000080)=@hci={0x0, 0x0}, 0x80, &(0x7f00000023c0)=[{&(0x7f00000001c0)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/153, 0x99}, {&(0x7f0000001280)=""/4096, 0x1000}, {&(0x7f0000000100)=""/6, 0x6}, {&(0x7f0000002280)=""/13, 0xd}, {&(0x7f00000022c0)=""/97, 0x61}, {&(0x7f0000002340)=""/83, 0x53}], 0x7, &(0x7f0000002440)=""/96, 0x60, 0x6}, 0x776a}, {{&(0x7f00000024c0)=@in={0x0, 0x0, @multicast1}, 0x80, &(0x7f0000002700)=[{&(0x7f0000002540)=""/208, 0xd0}, {&(0x7f0000002640)=""/171, 0xab}], 0x2, &(0x7f0000002740)=""/134, 0x86, 0x7fff}, 0x1000}, {{&(0x7f0000002800)=@l2, 0x80, &(0x7f0000002940)=[{&(0x7f0000002880)=""/11, 0xb}, {&(0x7f00000028c0)=""/124, 0x7c}], 0x2, &(0x7f0000002980), 0x0, 0x9}, 0x4}, {{&(0x7f00000029c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003e00)=[{&(0x7f0000002a40)=""/35, 0x23}, {&(0x7f0000002a80)=""/79, 0x4f}, {&(0x7f0000002b00)=""/150, 0x96}, {&(0x7f0000002bc0)=""/4096, 0x1000}, {&(0x7f0000003bc0)=""/182, 0xb6}, {&(0x7f0000003c80)=""/185, 0xb9}, {&(0x7f0000003d40)=""/147, 0x93}], 0x7, 0x0, 0x0, 0x7}, 0x101}, {{&(0x7f0000003e80)=@alg, 0x80, &(0x7f0000004200)=[{&(0x7f0000003f00)=""/157, 0x9d}, {&(0x7f0000003fc0)=""/46, 0x2e}, {&(0x7f0000004000)=""/177, 0xb1}, {&(0x7f00000040c0)=""/205, 0xcd}, {&(0x7f00000041c0)=""/40, 0x28}], 0x5, &(0x7f0000004280)=""/158, 0x9e, 0x3}, 0x5}, {{&(0x7f0000004340)=@sco, 0x80, &(0x7f0000004400)=[{&(0x7f00000043c0)=""/16, 0x10}], 0x1, 0x0, 0x0, 0x2}, 0x6000000}, {{&(0x7f0000004440)=@ipx, 0x80, &(0x7f0000004680)=[{&(0x7f00000044c0)=""/96, 0x60}, {&(0x7f0000004540)=""/60, 0x3c}, {&(0x7f0000004580)=""/194, 0xc2}], 0x3, &(0x7f00000046c0)=""/169, 0xa9, 0x80000001}, 0x6}, {{0x0, 0x0, &(0x7f0000005900)=[{&(0x7f0000004780)=""/89, 0x59}, {&(0x7f0000004800)=""/4096, 0x1000}, {&(0x7f0000005800)=""/245, 0xf5}], 0x3, &(0x7f0000005940)=""/64, 0x40, 0x5}, 0x800}, {{&(0x7f0000005980), 0x80, &(0x7f0000005e40)=[{&(0x7f0000005a00)=""/53, 0x35}, {&(0x7f0000005a40)=""/179, 0xb3}, {&(0x7f0000005b00)=""/248, 0xf8}, {&(0x7f0000005c00)=""/85, 0x55}, {&(0x7f0000005c80)=""/184, 0xb8}, {&(0x7f0000005d40)=""/215, 0xd7}], 0x6, &(0x7f0000005ec0)=""/40, 0x28, 0x7f}, 0x4}], 0x9, 0x20, &(0x7f0000006140)={0x0, 0x989680}) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000006180)={@ipv4={[], [0xff, 0xff]}, r1}, 0x14) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r2, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) removexattr(&(0x7f0000002980)='./file0\x00', &(0x7f00000061c0)=@known='system.sockprotoname\x00') getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000006200)={0x0, 0xff}, &(0x7f0000006240)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000006280)={r3, 0x5}, &(0x7f00000062c0)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:29 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x300]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) [ 241.331572] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 241.338831] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000003 [ 241.392990] gfs2: invalid mount option: rgaclšnoacl [ 241.398198] gfs2: can't parse mount arguments [ 241.404839] hfsplus: unable to parse mount options [ 241.438596] device lo entered promiscuous mode 2018/04/10 10:27:29 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x9, 0xc80) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000200)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) accept$netrom(r0, 0x0, &(0x7f0000000380)) pipe2(&(0x7f0000e3eff8)={0x0, 0x0}, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r6 = dup3(r5, r4, 0x0) ioctl$KVM_SMI(r5, 0xaeb7) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f0000000340)={0x5001, 0x2000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000480)=[@textreal={0x8, &(0x7f0000000500)="0f005c0666b8ef0000000f23d00f21f86635300000010f23f866b9770b000066b80000008066ba000000000f30f20f35f30f1bcff4650f01cabaf80c66b8c261a58266efbafc0cb874daef0f236d0f32", 0x50}], 0x0, 0x3ffe, &(0x7f0000000040), 0x38b) ioctl$KVM_RUN(r6, 0xae80, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r7 = userfaultfd(0x0) ioctl$UFFDIO_API(r7, 0xc018aa3f, &(0x7f0000000000)={0xaa}) r8 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r8, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(r7) 2018/04/10 10:27:29 executing program 2 (fault-call:5 fault-nth:4): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) 2018/04/10 10:27:29 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x2]]}, 0x178) 2018/04/10 10:27:29 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x28) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) umount2(&(0x7f00000075c0)='./file0\x00', 0x0) [ 241.601577] device lo left promiscuous mode [ 241.631430] FAULT_INJECTION: forcing a failure. [ 241.631430] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 241.643300] CPU: 1 PID: 17702 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 241.650225] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 241.659572] Call Trace: [ 241.662164] dump_stack+0x1b9/0x294 [ 241.665786] ? dump_stack_print_info.cold.2+0x52/0x52 [ 241.670967] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 241.676495] ? __perf_event_task_sched_in+0x247/0xb80 [ 241.681688] should_fail.cold.4+0xa/0x1a [ 241.685741] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 241.690842] ? lock_downgrade+0x8e0/0x8e0 [ 241.694977] ? finish_task_switch+0x182/0x820 [ 241.699467] ? kasan_check_read+0x11/0x20 [ 241.703602] ? do_raw_spin_unlock+0x9e/0x2e0 [ 241.707997] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 241.712573] ? compat_start_thread+0x80/0x80 [ 241.716968] ? _raw_spin_unlock_irq+0x27/0x70 [ 241.721454] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 241.726458] ? trace_hardirqs_on+0xd/0x10 [ 241.730598] ? _raw_spin_unlock_irq+0x27/0x70 [ 241.735084] ? finish_task_switch+0x1ca/0x820 [ 241.739569] ? copy_overflow+0x20/0x20 [ 241.743448] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 241.748974] ? should_fail+0x21b/0xbcd [ 241.752851] __alloc_pages_nodemask+0x34e/0xd70 [ 241.757512] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 241.762522] ? __sched_text_start+0x8/0x8 [ 241.766657] ? find_held_lock+0x36/0x1c0 [ 241.770723] ? check_same_owner+0x320/0x320 [ 241.775038] cache_grow_begin+0x72/0x6c0 [ 241.779093] kmem_cache_alloc+0x689/0x760 [ 241.783231] ? proc_cwd_link+0x1d0/0x1d0 [ 241.787288] getname_flags+0xd0/0x5a0 [ 241.791077] user_path_at_empty+0x2d/0x50 [ 241.795214] do_mount+0x172/0x3070 [ 241.798753] ? copy_mount_string+0x40/0x40 [ 241.802978] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 241.807986] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 241.812738] ? retint_kernel+0x10/0x10 [ 241.816634] ? copy_mount_options+0x1f0/0x380 [ 241.821117] ? copy_mount_options+0x1f6/0x380 [ 241.825600] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 241.831126] ? copy_mount_options+0x285/0x380 [ 241.835610] ksys_mount+0x12d/0x140 [ 241.839226] SyS_mount+0x35/0x50 [ 241.842580] ? ksys_mount+0x140/0x140 [ 241.846371] do_syscall_64+0x29e/0x9d0 [ 241.850248] ? vmalloc_sync_all+0x30/0x30 [ 241.854385] ? _raw_spin_unlock_irq+0x27/0x70 [ 241.858876] ? finish_task_switch+0x1ca/0x820 [ 241.863363] ? syscall_return_slowpath+0x5c0/0x5c0 [ 241.868281] ? syscall_return_slowpath+0x30f/0x5c0 [ 241.873206] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 241.878561] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 241.883398] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 241.888572] RIP: 0033:0x455259 [ 241.891750] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 241.899449] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 [ 241.906708] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 [ 241.913963] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 [ 241.921219] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 241.928483] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000004 [ 241.943122] device lo entered promiscuous mode 2018/04/10 10:27:30 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)=0x0) ptrace(0x4219, r1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:30 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x7]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:27:30 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x9, 0xc80) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000200)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) accept$netrom(r0, 0x0, &(0x7f0000000380)) pipe2(&(0x7f0000e3eff8)={0x0, 0x0}, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r6 = dup3(r5, r4, 0x0) ioctl$KVM_SMI(r5, 0xaeb7) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f0000000340)={0x5001, 0x2000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000480)=[@textreal={0x8, &(0x7f0000000500)="0f005c0666b8ef0000000f23d00f21f86635300000010f23f866b9770b000066b80000008066ba000000000f30f20f35f30f1bcff4650f01cabaf80c66b8c261a58266efbafc0cb874daef0f236d0f32", 0x50}], 0x0, 0x3ffe, &(0x7f0000000040), 0x38b) ioctl$KVM_RUN(r6, 0xae80, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r7 = userfaultfd(0x0) ioctl$UFFDIO_API(r7, 0xc018aa3f, &(0x7f0000000000)={0xaa}) r8 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r8, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(r7) 2018/04/10 10:27:30 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in={0x2, 0x4e20, @rand_addr=0xe333}], 0x10) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mixer\x00', 0x800, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @multicast2=0xe0000002}, @in={0x2, 0x4e21, @broadcast=0xffffffff}, @in={0x2, 0x4e22, @loopback=0x7f000001}], 0x30) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) pause() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000100)=0x18) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000180)={r2, 0x1311}, &(0x7f00000001c0)=0x8) preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)=""/133, 0x85}], 0x1, 0x0) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vga_arbiter\x00', 0x19fb07acd340d888, 0x0) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000480)={r3, @in={{0x2, 0x4e24, @multicast1=0xe0000001}}}, 0x84) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f0000000000)=0x6d118711, 0x4) ioctl$ASHMEM_SET_PROT_MASK(r4, 0x40087705, &(0x7f0000000040)={0x1, 0x6}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000003c0)={r3, 0x7}, &(0x7f0000000400)=0x8) ioctl$sock_ipx_SIOCIPXCFGDATA(r4, 0x89e2, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r4, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000080)=0x8) 2018/04/10 10:27:30 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$key(0xf, 0x3, 0x2) r1 = syz_open_dev$dmmidi(&(0x7f00000002c0)='/dev/dmmidi#\x00', 0x7, 0x30001) ioctl$KDDISABIO(r1, 0x4b37) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_dccp_buf(r2, 0x21, 0x0, &(0x7f0000000280)="cd071847e87bdb09c14900f90440570525cc33382f78ed592360e0c1788982cb084af0ac54a47444ad79b78fc0ec41e85a0528e0e703751f066ae3722deb", 0x3e) ioctl$sock_ipx_SIOCAIPXPRISLT(r1, 0x89e1, &(0x7f0000000300)) fcntl$setpipe(r0, 0x407, 0x2) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='nfsd\x00', 0x80002, &(0x7f0000000100)="4081f81c15835b5a5a92e5c4ed9c5bda000b5cf5b1f6baed47cead2363202227ffb7329a5c59cd7f0c87c25ad24d674ccd4829a3bbc02285dd5e58014b135ba37cb3e3df2f464a1f6bd60374aa7fb85a858219617976c7e368e253c60ceafb4534d8a438f538e3f461e8a7c50a7ff464368e93f2298af2df4584c0a64e9d7d70919d485c300e753b299ee170a27317f8d4e12a9778ae8cf5d1bab198978187c9abd13d89851a5d21a0a376d2a5e5d3b98ffee30079488acbdf75377df58db4ba87c0d2dc8b329e0212e029f2ed43675e40fc57f5c597acf5") 2018/04/10 10:27:30 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0xe9e1, 0x18}, 0xc) r1 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x10000, 0x5fd0, 0x7fff, 0x66, 0x0, 0x7, 0x5000, 0x2, 0xffdf, 0x5, 0x5, 0x6, 0x7, 0x7, 0x9, 0x38d1ac83, 0x5ff8, 0xcc7d, 0x8700, 0x8, 0x8000, 0x1, 0x4969, 0x6, 0x0, 0x323, 0x1, 0x7, 0x5, 0x2, 0x73, 0x96ef, 0x1f, 0x5, 0x2, 0xfd93, 0x0, 0x3, 0x4, @perf_config_ext={0xfffffffffffffff7, 0x48052da7}, 0x10, 0x7, 0xff, 0x7, 0x1, 0x8, 0x8}, 0xffffffffffffffff, 0x9, 0xffffffffffffff9c, 0xb) tee(r0, r1, 0x4, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000000)=[{r3}], 0x1, 0x80000000) close(r2) 2018/04/10 10:27:30 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x2000000]]}, 0x178) 2018/04/10 10:27:30 executing program 2 (fault-call:5 fault-nth:5): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) [ 242.139180] FAULT_INJECTION: forcing a failure. [ 242.139180] name failslab, interval 1, probability 0, space 0, times 0 [ 242.150592] CPU: 0 PID: 17724 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 242.157533] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 242.166895] Call Trace: [ 242.169496] dump_stack+0x1b9/0x294 [ 242.173136] ? dump_stack_print_info.cold.2+0x52/0x52 [ 242.178336] ? finish_task_switch+0x1ca/0x820 [ 242.182841] ? finish_task_switch+0x182/0x820 [ 242.187346] should_fail.cold.4+0xa/0x1a [ 242.191400] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 242.196498] ? __schedule+0x80f/0x1e40 [ 242.200392] ? __sched_text_start+0x8/0x8 [ 242.204526] ? find_held_lock+0x36/0x1c0 [ 242.208595] ? check_same_owner+0x320/0x320 [ 242.212904] ? kasan_slab_free+0xe/0x10 [ 242.216864] ? kmem_cache_free+0x86/0x2d0 [ 242.220996] ? putname+0xf2/0x130 [ 242.224439] ? do_mount+0x172/0x3070 [ 242.228144] ? ksys_mount+0x12d/0x140 [ 242.231933] ? SyS_mount+0x35/0x50 [ 242.235460] ? do_syscall_64+0x29e/0x9d0 [ 242.239512] __should_failslab+0x124/0x180 [ 242.243738] should_failslab+0x9/0x14 [ 242.247529] kmem_cache_alloc+0x2af/0x760 [ 242.251675] ? perf_trace_lock_acquire+0xe3/0x980 [ 242.256514] alloc_vfsmnt+0xe0/0x9d0 [ 242.260228] ? mnt_free_id.isra.27+0x60/0x60 [ 242.264629] ? kasan_check_read+0x11/0x20 [ 242.268771] ? graph_lock+0x170/0x170 [ 242.272560] ? rcu_pm_notify+0xc0/0xc0 [ 242.276436] ? trace_hardirqs_off+0xd/0x10 [ 242.280662] ? putname+0xf2/0x130 [ 242.284107] ? putname+0xf2/0x130 [ 242.287550] ? find_held_lock+0x36/0x1c0 [ 242.291610] ? lock_downgrade+0x8e0/0x8e0 [ 242.295746] ? module_unload_free+0x5b0/0x5b0 [ 242.300234] ? lock_release+0xa10/0xa10 [ 242.304202] ? mpi_free.cold.1+0x19/0x19 [ 242.308256] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 242.313787] vfs_kern_mount.part.34+0x88/0x4d0 [ 242.318360] ? may_umount+0xb0/0xb0 [ 242.321975] ? _raw_read_unlock+0x22/0x30 [ 242.326112] ? __get_fs_type+0x97/0xc0 [ 242.329991] do_mount+0x564/0x3070 [ 242.333533] ? copy_mount_string+0x40/0x40 [ 242.337753] ? rcu_pm_notify+0xc0/0xc0 [ 242.341641] ? copy_mount_options+0x5f/0x380 [ 242.346043] ? rcu_read_lock_sched_held+0x108/0x120 [ 242.351048] ? kmem_cache_alloc_trace+0x616/0x780 [ 242.355886] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 242.361414] ? _copy_from_user+0xdf/0x150 [ 242.365557] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 242.371087] ? copy_mount_options+0x285/0x380 [ 242.375574] ksys_mount+0x12d/0x140 [ 242.379193] SyS_mount+0x35/0x50 [ 242.382551] ? ksys_mount+0x140/0x140 [ 242.386348] do_syscall_64+0x29e/0x9d0 [ 242.390231] ? vmalloc_sync_all+0x30/0x30 [ 242.394376] ? kasan_check_write+0x14/0x20 [ 242.398605] ? syscall_return_slowpath+0x5c0/0x5c0 [ 242.403527] ? syscall_return_slowpath+0x30f/0x5c0 [ 242.408449] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 242.413808] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 242.418646] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 242.423826] RIP: 0033:0x455259 [ 242.427003] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/04/10 10:27:30 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x2]]}, 0x178) [ 242.434707] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 [ 242.441967] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 [ 242.449226] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 [ 242.456869] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 242.464125] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000005 2018/04/10 10:27:30 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x4000000]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:27:30 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in={0x2, 0x4e22, @multicast2=0xe0000002}], 0x10) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/35, 0x23) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:30 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=""/72, 0x48) umount2(&(0x7f00000075c0)='./file0\x00', 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0xc000, 0x3) 2018/04/10 10:27:30 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x9, 0xc80) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000200)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) accept$netrom(r0, 0x0, &(0x7f0000000380)) pipe2(&(0x7f0000e3eff8)={0x0, 0x0}, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r6 = dup3(r5, r4, 0x0) ioctl$KVM_SMI(r5, 0xaeb7) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f0000000340)={0x5001, 0x2000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000480)=[@textreal={0x8, &(0x7f0000000500)="0f005c0666b8ef0000000f23d00f21f86635300000010f23f866b9770b000066b80000008066ba000000000f30f20f35f30f1bcff4650f01cabaf80c66b8c261a58266efbafc0cb874daef0f236d0f32", 0x50}], 0x0, 0x3ffe, &(0x7f0000000040), 0x38b) ioctl$KVM_RUN(r6, 0xae80, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r7 = userfaultfd(0x0) ioctl$UFFDIO_API(r7, 0xc018aa3f, &(0x7f0000000000)={0xaa}) r8 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r8, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(r7) 2018/04/10 10:27:30 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x100000000000000]]}, 0x178) 2018/04/10 10:27:31 executing program 2 (fault-call:5 fault-nth:6): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) 2018/04/10 10:27:31 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x600]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:27:31 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x3f, 0x400) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0xfffffffffffffffe, &(0x7f00000000c0)) umount2(&(0x7f00000075c0)='./file0\x00', 0x0) 2018/04/10 10:27:31 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x9, 0xc80) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000200)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) accept$netrom(r0, 0x0, &(0x7f0000000380)) pipe2(&(0x7f0000e3eff8)={0x0, 0x0}, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r6 = dup3(r5, r4, 0x0) ioctl$KVM_SMI(r5, 0xaeb7) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f0000000340)={0x5001, 0x2000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000480)=[@textreal={0x8, &(0x7f0000000500)="0f005c0666b8ef0000000f23d00f21f86635300000010f23f866b9770b000066b80000008066ba000000000f30f20f35f30f1bcff4650f01cabaf80c66b8c261a58266efbafc0cb874daef0f236d0f32", 0x50}], 0x0, 0x3ffe, &(0x7f0000000040), 0x38b) ioctl$KVM_RUN(r6, 0xae80, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r7 = userfaultfd(0x0) ioctl$UFFDIO_REGISTER(r7, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r8 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r8, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(r7) 2018/04/10 10:27:31 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x25c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0x8) pipe2(&(0x7f0000000080), 0x4000) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000000)={r1}, &(0x7f0000000040)=0x8) [ 242.859716] FAULT_INJECTION: forcing a failure. [ 242.859716] name failslab, interval 1, probability 0, space 0, times 0 [ 242.871100] CPU: 1 PID: 17771 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 242.878045] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 242.887404] Call Trace: [ 242.890005] dump_stack+0x1b9/0x294 [ 242.893656] ? dump_stack_print_info.cold.2+0x52/0x52 [ 242.899388] ? kernel_text_address+0x79/0xf0 [ 242.903806] ? __unwind_start+0x166/0x330 [ 242.907970] ? __kernel_text_address+0xd/0x40 [ 242.912487] should_fail.cold.4+0xa/0x1a [ 242.916580] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 242.921706] ? save_stack+0x43/0xd0 [ 242.925344] ? kasan_kmalloc+0xc4/0xe0 [ 242.929244] ? kasan_slab_alloc+0x12/0x20 [ 242.933393] ? kmem_cache_alloc+0x12e/0x760 [ 242.937712] ? alloc_vfsmnt+0xe0/0x9d0 [ 242.941601] ? vfs_kern_mount.part.34+0x88/0x4d0 [ 242.946346] ? find_held_lock+0x36/0x1c0 [ 242.950424] ? check_same_owner+0x320/0x320 [ 242.954743] ? rcu_note_context_switch+0x710/0x710 [ 242.959679] __should_failslab+0x124/0x180 [ 242.963902] should_failslab+0x9/0x14 [ 242.967691] __kmalloc_track_caller+0x2c4/0x760 [ 242.972356] ? kasan_check_read+0x11/0x20 [ 242.976514] ? do_raw_spin_unlock+0x9e/0x2e0 [ 242.981014] ? kstrdup_const+0x66/0x80 [ 242.984896] kstrdup+0x39/0x70 [ 242.988076] kstrdup_const+0x66/0x80 [ 242.991787] alloc_vfsmnt+0x1b3/0x9d0 [ 242.995570] ? mnt_free_id.isra.27+0x60/0x60 [ 242.999963] ? kasan_check_read+0x11/0x20 [ 243.004098] ? graph_lock+0x170/0x170 [ 243.007899] ? rcu_pm_notify+0xc0/0xc0 [ 243.011783] ? trace_hardirqs_off+0xd/0x10 [ 243.016015] ? putname+0xf2/0x130 [ 243.019470] ? putname+0xf2/0x130 [ 243.022907] ? find_held_lock+0x36/0x1c0 [ 243.026959] ? lock_downgrade+0x8e0/0x8e0 [ 243.031104] ? module_unload_free+0x5b0/0x5b0 [ 243.035591] ? lock_release+0xa10/0xa10 [ 243.039568] ? mpi_free.cold.1+0x19/0x19 [ 243.043620] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 243.049144] vfs_kern_mount.part.34+0x88/0x4d0 [ 243.053722] ? may_umount+0xb0/0xb0 [ 243.057343] ? _raw_read_unlock+0x22/0x30 [ 243.061484] ? __get_fs_type+0x97/0xc0 [ 243.065378] do_mount+0x564/0x3070 [ 243.068931] ? copy_mount_string+0x40/0x40 [ 243.073161] ? rcu_pm_notify+0xc0/0xc0 [ 243.077049] ? copy_mount_options+0x5f/0x380 [ 243.081451] ? rcu_read_lock_sched_held+0x108/0x120 [ 243.086455] ? kmem_cache_alloc_trace+0x616/0x780 [ 243.091286] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 243.096822] ? _copy_from_user+0xdf/0x150 [ 243.100976] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 243.106513] ? copy_mount_options+0x285/0x380 2018/04/10 10:27:31 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x9}, &(0x7f0000000040)=0x8) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x600, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f00000001c0)) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000080)={r1, 0x2}, &(0x7f00000000c0)=0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:31 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x200000000000000]]}, 0x178) [ 243.111015] ksys_mount+0x12d/0x140 [ 243.114658] SyS_mount+0x35/0x50 [ 243.118031] ? ksys_mount+0x140/0x140 [ 243.121844] do_syscall_64+0x29e/0x9d0 [ 243.125734] ? vmalloc_sync_all+0x30/0x30 [ 243.129892] ? _raw_spin_unlock_irq+0x27/0x70 [ 243.134393] ? finish_task_switch+0x1ca/0x820 [ 243.138898] ? syscall_return_slowpath+0x5c0/0x5c0 [ 243.143836] ? syscall_return_slowpath+0x30f/0x5c0 [ 243.148777] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 243.154149] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 243.159013] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 243.164205] RIP: 0033:0x455259 [ 243.167397] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 243.175107] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 [ 243.182378] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 [ 243.189656] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 [ 243.196931] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 243.204208] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000006 2018/04/10 10:27:31 executing program 1: mq_open(&(0x7f000004b000)='/$cgrouplo\x00', 0xfffffffffffffffe, 0x0, &(0x7f000004b000)={0x3, 0x7, 0x3}) unshare(0xc000000) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cuse\x00', 0x200400, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000001300)=0x78) r2 = perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r1, &(0x7f0000adb000), 0x0, 0x0, &(0x7f0000809000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r3 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x80, 0x101000) timerfd_gettime(0xffffffffffffffff, &(0x7f00000001c0)) getpeername(r3, &(0x7f0000000200)=@pppoe={0x0, 0x0, {0x0, @link_local}}, &(0x7f0000000280)=0x80) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r4, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) bind$unix(r5, &(0x7f0000000480)=@file={0x1, "e91f7189591e9233614b00"}, 0x3c) sync() dup2(r2, 0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r6 = creat(&(0x7f00000005c0)='./file1\x00', 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000003600), 0x0, 0x8880) write$tun(r6, &(0x7f0000000200)=ANY=[], 0x0) fsync(r6) pwritev(r6, &(0x7f00000000c0)=[{&(0x7f0000000c00)="cfb93447d6feaef9f73c0561e075a8295d43017ab1a157786dcda36c5eec92a4306f284fa7e3ed364cc2da5c08cf7e4030d394520e123eee6d9ab275c91c174b1364fc943b49faefe12f605b5ce6c1400a91210c00477f900aff390901bf594c18557cb38a7d57ac8ded098b96b9dfc125e3bdc9305193f4cd256068baca5208160d820b9e7a043666ba4801cf6d557fc0f97f35c13ec6c0d1fe97ce1af1c17078ef47ab955200836671e402717481d14936b09828fd6f55fda2f11eb4c61b480e941133c0a4c5ec54033d0d174742191754ffe28b093596286a78ea01078337ada8585aa98dcc1143689002e31ccc5b9f5cfd2bbce5683a0f91b395391a60ba8e8f4d3c10c82c71caa74c44c8b0f3e42f1fc264497d5b9dabf309bad7bdfaa1be37137226b5cf2badc1397e0460b1e002dc5e15a143d79b0e44fb59b43b7f164614bb428a22a6b9acffe96c154bb02d256b3f5f53a92dfd8d1f014a3e30cb061a1ea6abc640869f4be210d60622d528999804f7847eb3a886aeb91f5cd80fd892b950d19144867616ddc95d349a84426d2c2288bac7aa0e7392526874f5ec41e677c4a83ea81e18bb2c382d288b69f1102ee944a764988a87fc38c87ebb41402bf0c7cfc10abb80ad010a68467225c566c3c26ce51decb38b4a36daa4b2a71c8d818dc2973d80fefc0428c801cef822aa6d5678184ea9798450910f223b495ba8886751b815443b370f5aa638d2dfa2c47757ef69e92a7d674e6a7fc866c5bf308232dabbd55fa988952319797b458eaba3cbbe23ede09838646d026f85131a5476770bb5a8eff29472fcfd11e830aee3f276b0a007d85282a11282adb8ca7fe659b2155e01a3243a9381e2c0e75a284a1c99574d1db9f36dee4e6fc399c70697c2e7acdb71b4ff6a600ac2eedb193fac270c5fe4d033f310c95393794be698a66ac15dd2b4b78b3dd3eeae4f3635f7d30884c4f0be382818f53539ec82d781468de173c1ff1126789187ce815d7d6724e8b9f72055ff89a60e6ac533997a3cd3e9ce61e6e954536dd44b0647fa3268150cb64f015efd52fc93d242bac33e7111f118eccb18d20feb69520384a40c93915920904f286b41de292d0e6d531bed37d5ab17932fd57f81a55c82c60a80dc133065bee4f16b881400802420fdb2f23603fe754bf0fe2400c866501f3ce1b37651a134f01ee2ff844707351871a2be3d302e8678cc78a2facfe6db33a09cf99ea9befc93b99f4e17444e589fba89185f5d8ec00d1c4866b5a66d53cf7579cae2f5d789efb20cc34466b9bffd6ef15f54686996828a8ae0f3f93668df29790c03e5c91407ffb244ab3f1e2ddf1a3d501679b34a05765d840a28cb3c5cc1aa711a4b8566f274a897d431b1e4a790360f2075ba4b3ca7cb16666f6b9e60b7dbe868f572882890f8c7e5c03dc0fb343b18dfdab5f5f71f77b97e34c0fbcd24b44fa0fa36bf5064a35a0c2331d0bec6e437835928e29a0aa81843e8917380931882b0fa41903580e260c9b87f00356e260d5ea0f3fdfb64ef678c3cc981f3191f5c5f8d7c16c4f46a837491d7888c6997893bdda25a4934591a0edeee3f08f71467369420986fa34ae0f1654eae41f85fcd", 0x480}], 0x1, 0x0) timerfd_create(0x5, 0x80001) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0xc) listen(r5, 0x5) socket$netlink(0x10, 0x3, 0x80000000004) socket$inet(0x2, 0x800000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000b10000)=0xc2, 0x6677bbc4) rt_sigreturn() 2018/04/10 10:27:31 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:27:31 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x9, 0xc80) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000200)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) accept$netrom(r0, 0x0, &(0x7f0000000380)) pipe2(&(0x7f0000e3eff8)={0x0, 0x0}, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r6 = dup3(r5, r4, 0x0) ioctl$KVM_SMI(r5, 0xaeb7) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f0000000340)={0x5001, 0x2000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000480)=[@textreal={0x8, &(0x7f0000000500)="0f005c0666b8ef0000000f23d00f21f86635300000010f23f866b9770b000066b80000008066ba000000000f30f20f35f30f1bcff4650f01cabaf80c66b8c261a58266efbafc0cb874daef0f236d0f32", 0x50}], 0x0, 0x3ffe, &(0x7f0000000040), 0x38b) ioctl$KVM_RUN(r6, 0xae80, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r7 = userfaultfd(0x0) ioctl$UFFDIO_REGISTER(r7, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r8 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r8, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(r7) 2018/04/10 10:27:31 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x80, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f00000001c0)={0x3, 0x1ff000000}) umount2(&(0x7f00000075c0)='./file0\x00', 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x6, 0x208040) dup2(r0, r1) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x94, 0x8002) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46037206048f0500000000000003003e0001000000c700000038000000600300002000000025522000010007000300fe00000000000200000000000000050000005200000002000000fbffffff9000000002000000000000008000000003000000ae02fb16080000008d12a80c0800000076f00000e26286fceac164b101aa604b6718c10701deac89c0719d9591d9666f823c7ce71cb70404a36d75b9222052597d720f1e593d2dec4062d3ac8fef4cea7c8eb6370c94db7f988f63309c4caee0b1ef748b1a132d6dba3a7539bd265ba108418e4789b707c591b636cc50dc23c68d3c8fb4dd42a14728193e053e11dcaf9d774027e31dc9d264571ad2caeef28bff60735a0f5234cb195c8940f4f6a3b672588b27599efed9e7154821ba08d2de8887640de7a277c321166562c54c7ba1cfbacb0b4116398f9a7bf7e6354bd1c4aaafe6e621b24cb9eac2786998c018ddceffadfdf987da8deaf4bddbe564f5f7ae61e5cad03516a9dd327b4e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x870) ioctl$KDGKBDIACR(r2, 0x4b4a, &(0x7f00000000c0)=""/221) 2018/04/10 10:27:31 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) readahead(r0, 0x0, 0x100000001) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) r1 = memfd_create(&(0x7f0000000000)='\'wlan0self\x00', 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000080)={0x15, 0x0, &(0x7f0000000040)}) syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x800) writev(r0, &(0x7f0000001280)=[{&(0x7f0000000280)="5986832b0ba99b6ce20e4fcb071512b89f3412c917dc233c3bbc03c542ac12f0b1ddadabe81a0e1fb6191786bb9cd1ec6b43b5ea86580085cfe44298a1ba08d1c0bccb0d4101cf8a99f9cd62bcea1af706e4a9830e7e6691a198584f915e697a5e4a2a029f056b8408c0e9bfa8063132f7256e34ffa9625bf0a2985dbba5ed3f0cbaad4ffebedc1a6b8bc9e3cddc06a3b6b00742ae7a2d44587448131349ed6988ebd17dac98b3d7d8d440878ccd2cf0d846ee7e201801cbbc241dee5755ab007f1896c4c9c80e58e79e40ed9bf7a016afc57798d4102464cfebcd0a126d33a8f0be245ae4af9b710a8bfc864cb71c312cfab52425aa710ef1cfdab4eeba115bf8bfb2dcb4fdac3aab3ed623bc826d8064ae169164e52c4ec5c9ebeb753be14f1631e1d0e439186e68278d0c4d7416384e636173cb2c2b26247dc87317156869dbb80a7d19aaac3b09f1d7ed8c1399e3737b3a617450cf910561e96ec74e76cf154abc0e114f1c798dedfe002bfe5b089eafebffa3ac600e5e996918d4fe0386d31ba92e3929b66f0d3e3c340355cb9742d303fcb4f43acad0da43426e634072d26c8b65288fda1a7afceb2fea5b54fcf91d51750288e410be23d4c6a6056cf1ef64124051745bfc0fbfa348979fa43411b7f94062b0a95aae84981390b6a7e7f6da8e2e6786fe5cae7eec618747f46c82bb47c3ca8f0b25f5d84091ac5ad59cb728683fa6d45029af19c3198e50068a90e8227b8704cf02195efba2d9aaaad1bc9ac498c0860d10da2e84bf9310009771a628e99dac171716cfb85b5b33934643d9d6a81d6405560876a6be73b9dba2bb4c8acad2e79cc274ce15e02d42f3f36af6a6460a0fbdb1a0552cf083d90616032714d3ea348c583590b241ad3def0de64b5bd31ab1cb1728751f25b4a5ea6ec989062f8739af86534fd6deef0c278c540de145fe847ed4c39d3d002d885b47577bf099e38e217bb3d24b7d8e53d5b347241ff07a6e0cedd1a7e27cccd83763175e9912e9b4d04b9ea81c5fed85dfb0eebf07f7ff3eca15e5776765f096595d97fd1d3ca995cb56d0f692ffab75b17c575438f45c7d67e4f93660cd5fd84aade2a5a78957a89f0c4dcc071a6e395085a326adeb43965db6a1594b96997ac05996343398a9e5eadcfba839972cc6b8f05596000c98381e21a3125604127765c041f9fefb538f73f625e32b94788414d3626e293ec87f2147014bf1d2629bc257a181870a2b375e827b8c41a12b65291d48e4f8f80d03a3f580c39cffb5c3753d7147bf260046d8f094f0e8373b1c0fc627d40720da3374b8782a3c62f289f09a078f6e5596cd158435ac0b044ea3577091138a01e90007ae68b1d3767ce95c74633323c29cdb7d6b863bbfb77bcf5e0a7fc08dd23ba023dd8adbdd1fb4b91c2184f2bcbbeb39089bef29bad5c930082cca226245cc83af4552bc257c5bff72aa99a9c93b7c408e2607cefc06d2cbca3a12f4e5f8fdb3a5afccf1149fba136e623d9c67109cedf10b3a396ddc4c4161b73324629a1fa741995be80ac1df21323bac9c5aca9ca45d14fae3a4025fe8141ce9aa39a5cfa4b8220fe9fcb9e57e0fa4bc85e9b04397823ba6fcedcb7c0d6c7ff265194891384738b0004bd4b12cfd9ac370ce96a5241bbac4381ff733490ab91747f0dc8b069ce1663bae5cf016bfca13b19eda0777f6e9878d0b6aa5e67c5b90add57965537eb6da629d8fde54ba5b98a5e7753675583d3f1af380b46bf742bfbe073e7468f2a5e1a660745d663e289485f0140cea26762d60bacc2cdc45702f6537ba406a0dcc382d29e75e247760a8bbbc46d3edfe63189e39b4d030b2b9ceb99944a9892d60cdea4bc8de092fe198ac06cfaccdfe4457e851022499c45c224494664e6702d682a29f5d72a69ef8b450610b2feafd128fede8b536909d8a8fe591b6470488574a5ab103dba995f6c19033914d6fb106ef17046bf33604b2cb6a712d47a04d2395f29387463d6603b425fec32d7c1543e1ea97789b6a1c5231c47d66cec346becc1b3c316f98094cb31542436bfefcc2c492cf27e004ea22383cf0665929bef735795f6e06683d1edc17b800b0c3d5fa421b04c8f507720240919ef579da6bd800db1aa84429a8688a7fe408844c588795cadd9c916c2c66fc9ba5cb4881a39ea16ac3ad561c764c009dbbcd8856ee43794431788bb695097432bda646db9c6615eb15b59d2da416ecf27c351f26f5b49b8da1c6983d14aea2257e426fd0ab8820340805bb41bb484ede00809f5602f1003c78688d7bd2691b16952d8edf3050ceb56a43b4a83b373358200df6d62a9025476183cfa6e3a8eba7883044f31e7df804b6bf7e6198414f327a0d1a38ab885d02cee0c8a7f4992817c01e6a6f15702cebab7699cda5c9ef8b8f1a0b2cd840a2701e9c1983b4f2f6ecba12e724210cacc14cb5a6efa9a6a722ed33fddc6565f42344db7b72e72f84f6604939f7fc86fa8ef0b6f5f2a236720e27441a94942f101fd34df14ee3c0af7a5c6f0e212dbfc24426cdb251373f179b75ad423f6b2a2cacd56893d27706fad5162020070cc9a516d30fcc45122daf5ba7f41c9e18db81086bc921947064d4f431f09d12ccd65afc01fe2cd666a834933a8b2c9547d8e9db0134e201b2eaae859940eaad233b1e2924d68d05db7b25d85c691b8d4348ee086a3a7467620af0cd9cca972436f87b700f408dfe877c54f17635fe423776654907db5943bebb85e398c8751c0f2e2afc60418667a0a8ea8923f0086782a55e14a0e107375834af8041d71e9384229b5374f946af7a7683297d0881982b1123b12c3febaba27411194f34d44b00fa5888aa8a19e1769c5583b98dc54f3bdd7091068b201145d3faef75f6086052614b4d5142e5fb9a97d5f2bec86e0be3f251926c07d29d73707c0801cfd60136a0a38b1bdbd0d1f1531eb2d6c6e3f6014fe5aadfc9173f4752be4e5121ce877719b79bb0b0f3cafcfae4b9fcb53cf69962a03898926b593c6344d95e830dcf34e843ac885750584db2886a532197d9f19c7f50a1af8d220e4fade27ea244b7f3583304be0767197d4ffc6d03bcf18cd9d1851c37a87da2ad2aa2d334e505aacb58aa6d4fc31c148c0c9a8664381f770e0f6ba265eebc59d1bbbe80b7b2d038b8505bc857558a426f8c8dcf8e38ad4924aa69fcd7439f2a58651e0b5ac1fba0152315da70aba184edf1a68b266a6d80d35dfd266873320d7b9eb416a123fddac067c91b08a059c6db355e8a098023e0a1f4d169e96bc69aee91838f04a5ed901890b39d4713f67b431b92693bffab3b662bc3e867964eb80175497ffc0fbedf7cfbddd560d4bbb975ba60e6926bb563b787398ae8a2fed68aac7541290ad76ab55ca7c7054be3a29954feb986a0c278fa609518151c2ac75f48879f8a7428a3a297b353606ef59f4fbdab55d69b415d9374609fcde09cd87d52432e5da1cfbd6333ce861b637ee44be1bddd5e607b4c82b433aca131c4ceff3a9233c64ee643b22d398f79f2f398d4f6941be9d23f1381a659c503cbbded4c60592a9a265de3419f1b793c644127a6ad579441580433177b6d1cb5c9ee5f3f72d53f549b867caefd595d68efdbd2b56528d707aa8b7f801e7b6afd10d8b2fb8ab6a0612814a7023c4745622f1b401171ba0197863e18a13b41e0dd32be99f05534e29d0f4aab36beb36e738078c45557f8030cc25ffabdec8de46180e6018c6faad6dc9acc07c402d58bcdce9e996d5f9e34099816bb5c07ee13ced8e85712155c00885da1f9189eecb1f3e5ed1b1b7efb5d666e6a2af38741921c77ad3df10e0cfc76a522b8764a10104fc0aa99d2620c40e39a97681f046c671987bdbb488fba1c606c30af35c560bc03f28a128087a5e6555d28d7e0327edb3f071402e882d913be2e8a336bb5aa18cc6be43b3d49cd5ce78bb236b5c6bc5221ba07ee5249808b7a4603cf8bc2e9bde0d2de7b6cdaf939777413958c19a0bf4b2548ad8e74e6df89d7e343d0dbe6d3c08852473e885a45d80e7138516c391f89025974a52f7d14c29327543cb716b28c7fb6ab8a97e05b4c0a8f1d0833e51ce2a58df363096d9a26099d1f6286089584bb47c136ebf9b456007b6dfb966cbef694688d2af1efa3daf6282e4b10a53626c5542c73a57e980034980824dc865347419eee9165fdf76d254ee625d05da167d83122f752f59e682b09d940b0d4f8b34e97354548a3354abb044dc5c6cb71b2fc2a560f474841bc23e42b0fcbde75d82ebae95b0727305a7e01cb6f9385de4a34a664c093d8afaeff8b1da8cb5478f86943628e80772afdb649156a834cd8b6a09e52cf0f26dfebf5938584bf6e8beea4a0deb6fe0dbf885eb8c5c3c6a91ab13fbd1da32290cfb2c9ea64ea2aa0ea9e7d769fa797b3f56b35f2b2d86ce57583ca290021fcc4be6dc7c63ed0aad4cc7c7bdef61e60d635f7d3873e1b62904d0bbd7843598be07444b2891d3ddef006a65c6d424ced8b5bdc6aa77eaa43dccfee12d47affe5f2872a180fc96a8df18368e55e4481a7881ba84ae0cec7d84bfad4bf05f3458a680abacc1f0cd3b2b5be224edabe92a128d2393433cedc153ba2c651e80595e47dadcd61766154b3da9a4a9b543d6b6c47d19e5e1cfdc9fb7cd15bc549d56756658d9ec4a8f453b026a256f8719873cc904e55d1b80267b8dca439a30216c49ac05bc4951f691ad6ea665f735be6e18a2c874b1ca4c94be47b727d79b721665be5631db13698f741a2e921c641a59f7d364efe3cfd561994426d5583b9b3e974f49a811d6ca77894bf072f8bb97c49a1883e0570965200b967b49e5af64bd0179a4eaa0a691458bb22dc72536a06b83f6b6a4c27f559f824b1b08ef8a4abcaa732636a4ea3f9eae46265d148867aa97cfab51a526d4c81803f7d021f90e8db6203d4263768e801acf42d9f62b368fdb3248f1457eb8192db483a7a691010a98c557fd2b4a22f6548d431362fdf12f7848857a4f68fc172f9e9015f9ec8c7e2e9044805366741da4f4fc413fab4db3a654ed3b2edabcec5b0518e7a871b69ea686bf87a5eabf8b23cb190f2d1d9485e68cf0b17c9e2e430e5489d6389c96b2d2acce9aa3047b4942a5a53a0376212298d8b3fe21f7ca52c7d1fec1dc72b0139772ce44e8959a5226d0c3bd698e54734619ef250ca33d62bc56d75a7cedd898b7081743399f61a116f4456593e38ac4aded723ad62cf2cda02d5d31b30700e29480f1d34378bdf83980e4f2e04984b427d9c9d995c007b66d059e630fb48a8776d3b687ce1913df6554cbbf9e116af49b298faa8ae76834b92faffeb17a60df4de2768419d74295f83e1ee97e7ab5cfe34e732e97a324d734117c3440aa9def8ea0bb370b3c0fa4f637c52e6bde34a6f6a05ac92e5052e192549248418eefa65a36f089fd1f97e817a6f74dc5445ae0a133ba42dae2d870eedde77e2dad66e2ddb159d6d8d2b37980a7f9239b7c734d775fb6a47c72d10b010fbb619e90dca688e1a2a048b13d055531f76e58f5f9ecec9c682b6068cc15efe1245dfd9aeaae1f4bd638770344eac162bcde802b5be14b8f7cc90d86242ff8de1c2cf105f9f072f42f4d4e3fac76d7cebf69a5dd6108b5f960d59318da574c60663d3e8b882bf37181dbb0504791025d78971e9779249ffac41d8133392f75d09ea16ef2ce6c6e301420411c2ce3e6d6e6d53551e5e4d5f48749037f66c4e113470e73b927603309851808d731d31d5a7e90bcb85535bf2", 0x1000}], 0x1) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x40000, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f00000000c0)='irlan0\x00') close(r0) ioctl$TTUNGETFILTER(r2, 0x801054db, &(0x7f00000001c0)=""/161) 2018/04/10 10:27:31 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@broadcast}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000100)=0xe8) 2018/04/10 10:27:31 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x1000000]]}, 0x178) 2018/04/10 10:27:31 executing program 2 (fault-call:5 fault-nth:7): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) [ 243.354371] FAULT_INJECTION: forcing a failure. [ 243.354371] name failslab, interval 1, probability 0, space 0, times 0 [ 243.365728] CPU: 0 PID: 17819 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 243.372667] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 243.382032] Call Trace: [ 243.384638] dump_stack+0x1b9/0x294 [ 243.388278] ? dump_stack_print_info.cold.2+0x52/0x52 [ 243.393480] ? perf_trace_lock_acquire+0xe3/0x980 [ 243.398325] ? kernel_text_address+0x79/0xf0 [ 243.402723] ? __unwind_start+0x166/0x330 [ 243.406860] ? __kernel_text_address+0xd/0x40 [ 243.411350] should_fail.cold.4+0xa/0x1a [ 243.415404] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 243.420499] ? perf_trace_lock_acquire+0xe3/0x980 [ 243.425333] ? save_stack+0x43/0xd0 [ 243.429053] ? find_held_lock+0x36/0x1c0 [ 243.433129] ? check_same_owner+0x320/0x320 [ 243.437441] ? rcu_note_context_switch+0x710/0x710 [ 243.442361] __should_failslab+0x124/0x180 [ 243.446586] should_failslab+0x9/0x14 [ 243.450379] __kmalloc_track_caller+0x2c4/0x760 [ 243.455039] ? kasan_check_read+0x11/0x20 [ 243.459185] ? do_raw_spin_unlock+0x9e/0x2e0 [ 243.463588] ? kstrdup_const+0x66/0x80 [ 243.467465] kstrdup+0x39/0x70 [ 243.470649] kstrdup_const+0x66/0x80 [ 243.474352] alloc_vfsmnt+0x1b3/0x9d0 [ 243.478145] ? mnt_free_id.isra.27+0x60/0x60 [ 243.482544] ? kasan_check_read+0x11/0x20 [ 243.486683] ? graph_lock+0x170/0x170 [ 243.490474] ? rcu_pm_notify+0xc0/0xc0 [ 243.494350] ? trace_hardirqs_off+0xd/0x10 [ 243.498758] ? putname+0xf2/0x130 [ 243.502202] ? putname+0xf2/0x130 [ 243.505649] ? find_held_lock+0x36/0x1c0 [ 243.509713] ? lock_downgrade+0x8e0/0x8e0 [ 243.513852] ? module_unload_free+0x5b0/0x5b0 [ 243.518339] ? lock_release+0xa10/0xa10 [ 243.522304] ? mpi_free.cold.1+0x19/0x19 [ 243.526353] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 243.532831] vfs_kern_mount.part.34+0x88/0x4d0 [ 243.537407] ? may_umount+0xb0/0xb0 [ 243.541027] ? _raw_read_unlock+0x22/0x30 [ 243.545162] ? __get_fs_type+0x97/0xc0 [ 243.549043] do_mount+0x564/0x3070 [ 243.552580] ? do_raw_spin_unlock+0x9e/0x2e0 [ 243.556979] ? copy_mount_string+0x40/0x40 [ 243.561201] ? rcu_pm_notify+0xc0/0xc0 [ 243.565086] ? copy_mount_options+0x5f/0x380 [ 243.569492] ? rcu_read_lock_sched_held+0x108/0x120 [ 243.574498] ? kmem_cache_alloc_trace+0x616/0x780 [ 243.579336] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 243.584868] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 243.590408] ? copy_mount_options+0x285/0x380 [ 243.594903] ksys_mount+0x12d/0x140 [ 243.598528] SyS_mount+0x35/0x50 [ 243.601882] ? ksys_mount+0x140/0x140 [ 243.605677] do_syscall_64+0x29e/0x9d0 [ 243.609550] ? vmalloc_sync_all+0x30/0x30 [ 243.613687] ? _raw_spin_unlock_irq+0x27/0x70 [ 243.618172] ? finish_task_switch+0x1ca/0x820 [ 243.622660] ? syscall_return_slowpath+0x5c0/0x5c0 [ 243.627581] ? syscall_return_slowpath+0x30f/0x5c0 [ 243.632510] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 243.637960] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 243.642803] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 243.647984] RIP: 0033:0x455259 2018/04/10 10:27:32 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) umount2(&(0x7f0000000040)='./file0\x00', 0x0) 2018/04/10 10:27:32 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x2]]}, 0x178) 2018/04/10 10:27:32 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, @loopback}, &(0x7f0000000040)=0x10, 0x800) accept4$inet(r1, &(0x7f0000000080)={0x0, 0x0, @local}, &(0x7f00000000c0)=0x10, 0x800) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) [ 243.651163] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 243.658864] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 [ 243.666143] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 [ 243.673406] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 [ 243.680667] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 243.687927] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000007 2018/04/10 10:27:32 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='syzkaller1\x00') connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:32 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x500000000000000]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:27:32 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x181000, &(0x7f0000000000)="ff032dbfa9b34d524732f257b84593b7b97c663d4684fdb9816edf4d19426bf0a9aa68248996adb432e761ca5322036895f5c617afd10cdc24440e4c70b0bb0dc9f236c8bdafb5767292f35a3e8ab4296263d942cee928181854b93dfd0262ae4d9f") umount2(&(0x7f00000075c0)='./file0\x00', 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x2, 0x0) ioctl$sock_ipx_SIOCIPXCFGDATA(r0, 0x89e2, &(0x7f0000000140)) 2018/04/10 10:27:32 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]]}, 0x178) 2018/04/10 10:27:32 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x9, 0xc80) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000200)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) accept$netrom(r0, 0x0, &(0x7f0000000380)) pipe2(&(0x7f0000e3eff8)={0x0, 0x0}, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r6 = dup3(r5, r4, 0x0) ioctl$KVM_SMI(r5, 0xaeb7) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f0000000340)={0x5001, 0x2000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000480)=[@textreal={0x8, &(0x7f0000000500)="0f005c0666b8ef0000000f23d00f21f86635300000010f23f866b9770b000066b80000008066ba000000000f30f20f35f30f1bcff4650f01cabaf80c66b8c261a58266efbafc0cb874daef0f236d0f32", 0x50}], 0x0, 0x3ffe, &(0x7f0000000040), 0x38b) ioctl$KVM_RUN(r6, 0xae80, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r7 = userfaultfd(0x0) ioctl$UFFDIO_REGISTER(r7, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r8 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r8, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(r7) 2018/04/10 10:27:32 executing program 1: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x500000000000000]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:27:32 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x20000]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:27:32 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x9, 0xc80) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000200)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) accept$netrom(r0, 0x0, &(0x7f0000000380)) pipe2(&(0x7f0000e3eff8)={0x0, 0x0}, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r6 = dup3(r5, r4, 0x0) ioctl$KVM_SMI(r5, 0xaeb7) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f0000000340)={0x5001, 0x2000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000480)=[@textreal={0x8, &(0x7f0000000500)="0f005c0666b8ef0000000f23d00f21f86635300000010f23f866b9770b000066b80000008066ba000000000f30f20f35f30f1bcff4650f01cabaf80c66b8c261a58266efbafc0cb874daef0f236d0f32", 0x50}], 0x0, 0x3ffe, &(0x7f0000000040), 0x38b) ioctl$KVM_RUN(r6, 0xae80, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r7 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r7, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(0xffffffffffffffff) 2018/04/10 10:27:32 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]]}, 0x178) 2018/04/10 10:27:32 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x4000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in={0x2, 0x4e22, @broadcast=0xffffffff}], 0xfffffffffffffcc2) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:32 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) umount2(&(0x7f00000075c0)='./file0\x00', 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x8000, 0x1) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x82800b2}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0xb8, r1, 0x10, 0x70bd25, 0x25dfdbfc, {0xe}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x33}]}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x5}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x4}]}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@loopback={0x0, 0x1}}]}, @IPVS_CMD_ATTR_DEST={0x4c, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x9}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xffffffffffffffff}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xfffffffffffffff8}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x6}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xb73}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}]}, 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x10) r2 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockname$inet(r2, &(0x7f0000000000)={0x0, 0x0, @rand_addr}, &(0x7f0000000040)=0x10) 2018/04/10 10:27:32 executing program 2 (fault-call:5 fault-nth:8): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) 2018/04/10 10:27:32 executing program 0: setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000001c0)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) r0 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x6, 0x2) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x80000001, 0xfffffffffffffffd, 0x0, 0x0, 0x5, 0x10, "4bcad708eec39342aed2df1e96639fc573b085e5f514efe1bbe80cd6b131219670ce71938f125cedaad0a4cd1d2595abb1d33532427a0dd75c58f0fd27398289", "728a69f5c8b329f999d20d454836f9c27b26cc8e42bda484d8d8d1ddd4b6c5991a3348a6790bd6966176909ea91c280352bf608d0e4f3fac0bfb17ddfa87cf2d", "d307ba72279376e30e564cb3cee86625190c13d013d3a1958fc138a879ff6a88", [0x9]}) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000200)=0x4000002) connect$inet6(0xffffffffffffffff, &(0x7f00008c0000)={0xa, 0x3, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) [ 244.118860] FAULT_INJECTION: forcing a failure. [ 244.118860] name failslab, interval 1, probability 0, space 0, times 0 [ 244.130247] CPU: 1 PID: 17886 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 244.137185] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 244.146547] Call Trace: [ 244.149156] dump_stack+0x1b9/0x294 [ 244.152797] ? dump_stack_print_info.cold.2+0x52/0x52 [ 244.158003] ? perf_trace_lock_acquire+0xe3/0x980 [ 244.162872] should_fail.cold.4+0xa/0x1a [ 244.166950] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 244.172059] ? find_held_lock+0x36/0x1c0 [ 244.176125] ? check_same_owner+0x320/0x320 [ 244.180446] ? rcu_note_context_switch+0x710/0x710 [ 244.185367] __should_failslab+0x124/0x180 [ 244.189592] should_failslab+0x9/0x14 [ 244.193380] kmem_cache_alloc_trace+0x2cb/0x780 [ 244.198042] ? kasan_check_write+0x14/0x20 [ 244.202267] ? do_raw_spin_lock+0xc1/0x200 [ 244.206494] sget_userns+0x1c7/0xf20 [ 244.210195] ? set_anon_super+0x20/0x20 [ 244.214156] ? get_empty_filp.cold.7+0x3e/0x3e [ 244.218729] ? destroy_unused_super.part.9+0x100/0x100 [ 244.223998] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 244.229022] ? kasan_check_read+0x11/0x20 [ 244.233165] ? rcu_pm_notify+0xc0/0xc0 [ 244.237041] ? trace_hardirqs_off+0xd/0x10 [ 244.241264] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 244.246793] ? cap_capable+0x1f9/0x260 [ 244.250676] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 244.256205] ? security_capable+0x99/0xc0 [ 244.260345] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 244.265880] ? ns_capable_common+0x13f/0x170 [ 244.270284] mount_ns+0x8f/0x1d0 [ 244.273649] ? rpc_pipe_release+0xb70/0xb70 [ 244.277963] rpc_mount+0x9e/0xd0 [ 244.281317] mount_fs+0xae/0x328 [ 244.284764] vfs_kern_mount.part.34+0xd4/0x4d0 [ 244.289336] ? may_umount+0xb0/0xb0 [ 244.292950] ? _raw_read_unlock+0x22/0x30 [ 244.297084] ? __get_fs_type+0x97/0xc0 [ 244.300961] do_mount+0x564/0x3070 [ 244.304490] ? do_raw_spin_unlock+0x9e/0x2e0 [ 244.308975] ? copy_mount_string+0x40/0x40 [ 244.313204] ? rcu_pm_notify+0xc0/0xc0 [ 244.317104] ? copy_mount_options+0x5f/0x380 [ 244.321505] ? rcu_read_lock_sched_held+0x108/0x120 [ 244.326508] ? kmem_cache_alloc_trace+0x616/0x780 [ 244.331350] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 244.336880] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 244.342402] ? copy_mount_options+0x285/0x380 [ 244.346886] ksys_mount+0x12d/0x140 [ 244.350501] SyS_mount+0x35/0x50 [ 244.353853] ? ksys_mount+0x140/0x140 [ 244.357643] do_syscall_64+0x29e/0x9d0 [ 244.361517] ? vmalloc_sync_all+0x30/0x30 [ 244.365668] ? _raw_spin_unlock_irq+0x27/0x70 [ 244.370151] ? finish_task_switch+0x1ca/0x820 [ 244.374632] ? syscall_return_slowpath+0x5c0/0x5c0 [ 244.379555] ? syscall_return_slowpath+0x30f/0x5c0 [ 244.384497] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 244.389855] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 244.394693] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 244.399870] RIP: 0033:0x455259 [ 244.403043] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 244.410753] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 2018/04/10 10:27:32 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]]}, 0x178) 2018/04/10 10:27:32 executing program 4: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) r1 = accept$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, @multicast2}, &(0x7f0000000300)=0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r2, 0xae03, 0x2) r3 = syz_open_dev$sndpcmp(&(0x7f00000002c0)='/dev/snd/pcmC#D#p\x00', 0x2, 0x6001) syz_kvm_setup_cpu$x86(r3, r3, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f00000001c0)="66b9800000c00f326635000100000f3067f30f5d24df653636650fc718b800008ec066b9800000c00f326635000400000f300fc71f3e260f0964dcf666b9020100c00f32263e0fc79ca600", 0x4b}], 0x1, 0x4, &(0x7f0000000280)=[@dstype3={0x7, 0x3}, @cr4={0x1, 0x20001d}], 0x2) connect$unix(r3, &(0x7f0000000040)=@abs={0x1, 0x0, 0x4e23}, 0x6e) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000000c0)={0xf002, 0x3000}) 2018/04/10 10:27:32 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000000)=[@in6={0xa, 0x4e24, 0x5, @loopback={0x0, 0x1}, 0x9}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) [ 244.418009] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 [ 244.425270] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 [ 244.432524] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 244.439783] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000008 2018/04/10 10:27:32 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x5, 0x1810c0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) umount2(&(0x7f00000075c0)='./file0\x00', 0x0) 2018/04/10 10:27:33 executing program 1: r0 = socket(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000673000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}, 0x1c) connect$inet(r0, &(0x7f00009a0000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) setsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000c2d000), 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/04/10 10:27:33 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]]}, 0x178) 2018/04/10 10:27:33 executing program 2 (fault-call:5 fault-nth:9): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) 2018/04/10 10:27:33 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000000), &(0x7f0000000180)=0x8) 2018/04/10 10:27:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f00000000c0)='./file0\x00', 0x99, 0x0, &(0x7f0000000100), 0x20, &(0x7f0000000140)={[{@dioread_lock='dioread_lock', 0x2c}]}) umount2(&(0x7f0000000040)='./file0\x00', 0x0) 2018/04/10 10:27:33 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x9, 0xc80) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000200)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) accept$netrom(r0, 0x0, &(0x7f0000000380)) pipe2(&(0x7f0000e3eff8)={0x0, 0x0}, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r6 = dup3(r5, r4, 0x0) ioctl$KVM_SMI(r5, 0xaeb7) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f0000000340)={0x5001, 0x2000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000480)=[@textreal={0x8, &(0x7f0000000500)="0f005c0666b8ef0000000f23d00f21f86635300000010f23f866b9770b000066b80000008066ba000000000f30f20f35f30f1bcff4650f01cabaf80c66b8c261a58266efbafc0cb874daef0f236d0f32", 0x50}], 0x0, 0x3ffe, &(0x7f0000000040), 0x38b) ioctl$KVM_RUN(r6, 0xae80, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r7 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r7, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(0xffffffffffffffff) 2018/04/10 10:27:33 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4), 0x0) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x5, 0x201) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x200, 0x440001) r2 = openat$cgroup_type(r1, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140)={0x0, 0x5}, &(0x7f0000000000)=0x4) syncfs(r2) 2018/04/10 10:27:33 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x2000000000000]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) [ 244.731223] FAULT_INJECTION: forcing a failure. [ 244.731223] name failslab, interval 1, probability 0, space 0, times 0 [ 244.733713] tmpfs: No value for mount option 'dioread_lock' [ 244.742941] CPU: 0 PID: 17929 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 244.742977] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 244.765097] Call Trace: [ 244.767698] dump_stack+0x1b9/0x294 [ 244.771334] ? dump_stack_print_info.cold.2+0x52/0x52 [ 244.776526] ? perf_trace_lock_acquire+0xe3/0x980 [ 244.781370] ? kernel_text_address+0x79/0xf0 [ 244.785788] ? __unwind_start+0x166/0x330 [ 244.789957] should_fail.cold.4+0xa/0x1a [ 244.794038] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 244.799145] ? graph_lock+0x170/0x170 [ 244.802942] ? save_stack+0x43/0xd0 [ 244.806564] ? kasan_kmalloc+0xc4/0xe0 [ 244.810448] ? __list_lru_init+0xdd/0x790 [ 244.814588] ? find_held_lock+0x36/0x1c0 [ 244.818639] ? __lock_is_held+0xb5/0x140 [ 244.822697] ? check_same_owner+0x320/0x320 [ 244.827019] ? rcu_note_context_switch+0x710/0x710 [ 244.831970] __should_failslab+0x124/0x180 [ 244.836207] should_failslab+0x9/0x14 [ 244.840018] kmem_cache_alloc_node_trace+0x26f/0x770 [ 244.845124] ? mark_held_locks+0xc9/0x160 [ 244.849271] ? __raw_spin_lock_init+0x1c/0x100 [ 244.853842] __kmalloc_node+0x33/0x70 [ 244.857630] kvmalloc_node+0x6b/0x100 [ 244.861429] __list_lru_init+0x559/0x790 [ 244.865490] ? list_lru_destroy+0x4c0/0x4c0 [ 244.869807] ? mark_held_locks+0xc9/0x160 [ 244.873940] ? __raw_spin_lock_init+0x1c/0x100 [ 244.878506] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 244.883508] ? __lockdep_init_map+0x105/0x590 [ 244.887992] ? lockdep_init_map+0x9/0x10 [ 244.892069] sget_userns+0x6d9/0xf20 [ 244.895776] ? set_anon_super+0x20/0x20 [ 244.899748] ? get_empty_filp.cold.7+0x3e/0x3e [ 244.904334] ? destroy_unused_super.part.9+0x100/0x100 [ 244.909622] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 244.914647] ? kasan_check_read+0x11/0x20 [ 244.918781] ? rcu_pm_notify+0xc0/0xc0 [ 244.922653] ? trace_hardirqs_off+0xd/0x10 [ 244.926876] ? cap_capable+0x1f9/0x260 [ 244.930756] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 244.936280] ? security_capable+0x99/0xc0 [ 244.940422] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 244.945956] ? ns_capable_common+0x13f/0x170 [ 244.950371] mount_ns+0x8f/0x1d0 [ 244.953730] ? rpc_pipe_release+0xb70/0xb70 [ 244.958048] rpc_mount+0x9e/0xd0 [ 244.961422] mount_fs+0xae/0x328 [ 244.964777] vfs_kern_mount.part.34+0xd4/0x4d0 [ 244.969356] ? may_umount+0xb0/0xb0 [ 244.972982] ? _raw_read_unlock+0x22/0x30 [ 244.977124] ? __get_fs_type+0x97/0xc0 [ 244.981000] do_mount+0x564/0x3070 [ 244.984537] ? copy_mount_string+0x40/0x40 [ 244.988767] ? rcu_pm_notify+0xc0/0xc0 [ 244.992658] ? copy_mount_options+0x5f/0x380 [ 244.997071] ? rcu_read_lock_sched_held+0x108/0x120 [ 245.002093] ? kmem_cache_alloc_trace+0x616/0x780 [ 245.006929] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 245.012468] ? _copy_from_user+0xdf/0x150 [ 245.016618] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 245.022159] ? copy_mount_options+0x285/0x380 [ 245.026652] ksys_mount+0x12d/0x140 [ 245.030272] SyS_mount+0x35/0x50 [ 245.033623] ? ksys_mount+0x140/0x140 [ 245.037413] do_syscall_64+0x29e/0x9d0 [ 245.041283] ? vmalloc_sync_all+0x30/0x30 [ 245.045504] ? _raw_spin_unlock_irq+0x27/0x70 [ 245.049988] ? finish_task_switch+0x1ca/0x820 [ 245.054485] ? syscall_return_slowpath+0x5c0/0x5c0 [ 245.059416] ? syscall_return_slowpath+0x30f/0x5c0 [ 245.064345] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 245.069706] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 245.074541] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 245.079714] RIP: 0033:0x455259 2018/04/10 10:27:33 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]]}, 0x178) [ 245.082896] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 245.090611] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 [ 245.097881] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 [ 245.105144] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 [ 245.112408] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 245.119674] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000009 2018/04/10 10:27:33 executing program 0: setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) [ 245.159231] tmpfs: No value for mount option 'dioread_lock' 2018/04/10 10:27:33 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x9, 0xc80) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000200)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) accept$netrom(r0, 0x0, &(0x7f0000000380)) pipe2(&(0x7f0000e3eff8)={0x0, 0x0}, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r6 = dup3(r5, r4, 0x0) ioctl$KVM_SMI(r5, 0xaeb7) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f0000000340)={0x5001, 0x2000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000480)=[@textreal={0x8, &(0x7f0000000500)="0f005c0666b8ef0000000f23d00f21f86635300000010f23f866b9770b000066b80000008066ba000000000f30f20f35f30f1bcff4650f01cabaf80c66b8c261a58266efbafc0cb874daef0f236d0f32", 0x50}], 0x0, 0x3ffe, &(0x7f0000000040), 0x38b) ioctl$KVM_RUN(r6, 0xae80, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r7 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r7, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(0xffffffffffffffff) 2018/04/10 10:27:33 executing program 1: r0 = memfd_create(&(0x7f000049dfec)='\'Pvmnet0^lo-+\\wlan0\x00', 0x0) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) close(r1) r3 = syz_open_dev$vcsa(&(0x7f0000580ff5)='/dev/vcsa#\x00', 0x1f, 0x0) fcntl$setstatus(r0, 0x4, 0x4000) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000c85000)) readv(r3, &(0x7f0000266000)=[{&(0x7f000032cf93)=""/109, 0x6d}], 0x100000000000022a) pselect6(0x40, &(0x7f0000f33fc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f0000086000), &(0x7f0000349000), &(0x7f0000f14000)={&(0x7f0000a65ff8), 0x8}) 2018/04/10 10:27:33 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) umount2(&(0x7f00000075c0)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x40000, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)) 2018/04/10 10:27:33 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:27:33 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@dev={0xfe, 0x80, [], 0x14}, 0x3, 0x0, 0x0, 0x8, 0x2, 0x3, 0x7fffffff}, &(0x7f0000000200)=0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x8000, 0x0) getpeername$netlink(r1, &(0x7f0000000280), &(0x7f00000002c0)=0xc) ioctl$sock_ipx_SIOCIPXNCPCONN(r1, 0x89e3, &(0x7f0000000340)=0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140)={0x0}, &(0x7f0000000000)=0x8) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000300), 0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000040)={r2, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, [0x20, 0x0, 0x80000001, 0x3f, 0x6, 0xffffffff, 0x3, 0x63cd, 0xa00f, 0x1f, 0x17, 0xfff, 0x1, 0x5]}, &(0x7f0000000180)=0x100) 2018/04/10 10:27:33 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]]}, 0x178) 2018/04/10 10:27:33 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x9, 0xc80) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000200)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) accept$netrom(r0, 0x0, &(0x7f0000000380)) pipe2(&(0x7f0000e3eff8)={0x0, 0x0}, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r6 = dup3(r5, r4, 0x0) ioctl$KVM_SMI(r5, 0xaeb7) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f0000000340)={0x5001, 0x2000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000480)=[@textreal={0x8, &(0x7f0000000500)="0f005c0666b8ef0000000f23d00f21f86635300000010f23f866b9770b000066b80000008066ba000000000f30f20f35f30f1bcff4650f01cabaf80c66b8c261a58266efbafc0cb874daef0f236d0f32", 0x50}], 0x0, 0x3ffe, &(0x7f0000000040), 0x38b) ioctl$KVM_RUN(r6, 0xae80, 0x0) r7 = userfaultfd(0x0) ioctl$UFFDIO_API(r7, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r7, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r8 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r8, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(r7) 2018/04/10 10:27:33 executing program 0: r0 = socket$inet6_sctp(0xa, 0x80001, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x801) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:33 executing program 1: mkdir(&(0x7f0000226000)='./control\x00', 0x0) r0 = open(&(0x7f0000ac3000)='./control\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000100)='./control\x00', 0xfe) mkdirat(r0, &(0x7f0000016ff8)='./file0\x00', 0x0) r1 = openat(r0, &(0x7f0000563000)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f0000842000)='./file0\x00', r1, &(0x7f00007a4000)='./control\x00') renameat2(r0, &(0x7f0000000080)='./control\x00', r1, &(0x7f00000000c0)='./control\x00', 0x1) 2018/04/10 10:27:33 executing program 2 (fault-call:5 fault-nth:10): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) [ 245.470052] FAULT_INJECTION: forcing a failure. [ 245.470052] name failslab, interval 1, probability 0, space 0, times 0 [ 245.481441] CPU: 1 PID: 17979 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 245.488381] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 245.497742] Call Trace: [ 245.500343] dump_stack+0x1b9/0x294 [ 245.503984] ? dump_stack_print_info.cold.2+0x52/0x52 [ 245.509197] should_fail.cold.4+0xa/0x1a [ 245.513273] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 245.518390] ? graph_lock+0x170/0x170 [ 245.522195] ? wait_for_completion+0x870/0x870 [ 245.526791] ? graph_lock+0x170/0x170 [ 245.530602] ? find_next_zero_bit+0x111/0x140 [ 245.535103] ? find_held_lock+0x36/0x1c0 [ 245.539157] ? __lock_is_held+0xb5/0x140 [ 245.543216] ? check_same_owner+0x320/0x320 [ 245.547525] ? __might_sleep+0x95/0x190 [ 245.551487] ? rcu_note_context_switch+0x710/0x710 [ 245.556410] __should_failslab+0x124/0x180 [ 245.560633] should_failslab+0x9/0x14 [ 245.564420] __kmalloc+0x2c8/0x760 [ 245.567945] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 245.572962] ? __lockdep_init_map+0x105/0x590 [ 245.577445] ? __list_lru_init+0xdd/0x790 [ 245.581587] __list_lru_init+0xdd/0x790 [ 245.585558] ? list_lru_destroy+0x4c0/0x4c0 [ 245.589868] ? mark_held_locks+0xc9/0x160 [ 245.594007] ? __raw_spin_lock_init+0x1c/0x100 [ 245.598585] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 245.603583] ? __lockdep_init_map+0x105/0x590 [ 245.608066] ? lockdep_init_map+0x9/0x10 [ 245.612118] sget_userns+0x6d9/0xf20 [ 245.615816] ? set_anon_super+0x20/0x20 [ 245.619778] ? get_empty_filp.cold.7+0x3e/0x3e [ 245.624346] ? destroy_unused_super.part.9+0x100/0x100 [ 245.629613] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 245.634620] ? kasan_check_read+0x11/0x20 [ 245.638756] ? rcu_pm_notify+0xc0/0xc0 [ 245.642629] ? trace_hardirqs_off+0xd/0x10 [ 245.646851] ? cap_capable+0x1f9/0x260 [ 245.650730] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 245.656339] ? security_capable+0x99/0xc0 [ 245.660474] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 245.665997] ? ns_capable_common+0x13f/0x170 [ 245.670401] mount_ns+0x8f/0x1d0 [ 245.673753] ? rpc_pipe_release+0xb70/0xb70 [ 245.678064] rpc_mount+0x9e/0xd0 [ 245.681419] mount_fs+0xae/0x328 [ 245.684777] vfs_kern_mount.part.34+0xd4/0x4d0 [ 245.689347] ? may_umount+0xb0/0xb0 [ 245.693136] ? _raw_read_unlock+0x22/0x30 [ 245.697273] ? __get_fs_type+0x97/0xc0 [ 245.701151] do_mount+0x564/0x3070 [ 245.704679] ? do_raw_spin_unlock+0x9e/0x2e0 [ 245.709074] ? copy_mount_string+0x40/0x40 [ 245.713294] ? rcu_pm_notify+0xc0/0xc0 [ 245.717174] ? copy_mount_options+0x5f/0x380 [ 245.721570] ? rcu_read_lock_sched_held+0x108/0x120 [ 245.726571] ? kmem_cache_alloc_trace+0x616/0x780 [ 245.731400] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 245.736927] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 245.742456] ? copy_mount_options+0x285/0x380 [ 245.746936] ksys_mount+0x12d/0x140 [ 245.750548] SyS_mount+0x35/0x50 [ 245.753899] ? ksys_mount+0x140/0x140 [ 245.757689] do_syscall_64+0x29e/0x9d0 [ 245.761565] ? vmalloc_sync_all+0x30/0x30 [ 245.765703] ? _raw_spin_unlock_irq+0x27/0x70 [ 245.770186] ? finish_task_switch+0x1ca/0x820 [ 245.774670] ? syscall_return_slowpath+0x5c0/0x5c0 [ 245.779589] ? syscall_return_slowpath+0x30f/0x5c0 [ 245.784509] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 245.789879] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 245.794717] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 245.799904] RIP: 0033:0x455259 [ 245.803078] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 245.810775] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 2018/04/10 10:27:34 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x101000, 0x0) recvfrom$unix(r1, &(0x7f0000000380)=""/81, 0x51, 0x40000063, &(0x7f0000000400)=@abs={0x1, 0x0, 0x4e23}, 0x6e) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x7}, &(0x7f0000000040)=0x8) r3 = syz_open_dev$dspn(&(0x7f0000000340)='/dev/dsp#\x00', 0x4, 0x410911c42aec2986) ioctl$PERF_EVENT_IOC_ID(r3, 0x80082407, &(0x7f00000002c0)) r4 = dup2(r0, r0) sendto$llc(r4, &(0x7f00000001c0)="865bfd014e92696c669b8f1c5be96272443e29de99d7b875c3e275ef1a2d80717ef9faa234eff1f6675c9c95dc44337e87b365f7b595111a36142ca62d1ac6e03982c5c9a146835ca8ea22028b85e8d40d42e8bdec7a19e6a43574a47813e33a9798436e7d3460e9886f4db3025c802b4d0802dcaf6603358bd9212c463839fad0ca93e125f86631ee5390f49ec391475f26a820210d38f2ec62ed229412d495dae252", 0xffffffffffffff5c, 0x40000, &(0x7f0000000100)={0x1a, 0x303, 0x1, 0x7, 0x7ff, 0x7}, 0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000080)={r2, 0x1, 0x30}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:34 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) umount2(&(0x7f0000000000)='./file0\x00', 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000180)={0x829, 0xd, 0x3, 0x5, 0x70000000000, 0x9}) syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x3, 0x200000) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x63, "ba49e0764f81e6d7272adb6d831979652380161fe4c1632d4070f441874e3bf161ebf432cec80bfdf6ef6604a1d7998c7840ddab30ece6562b2d0b496e6874e6b6802c420065f51509bc8768c5ef7672d03893eb23fceeddc5b977e72edbe57661bed9"}, &(0x7f0000000200)=0xffffffffffffffe7) 2018/04/10 10:27:34 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = gettid() setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000ee4ff0)={0x77359400}, 0x10) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x4e20, 0x4, @mcast1={0xff, 0x1, [], 0x1}, 0x67}, {0xa, 0x4e23, 0x5, @empty, 0x1}, 0x6, [0x80000000, 0x101, 0x2, 0x5, 0x8001, 0x4, 0xbf0d, 0x180]}, 0x5c) socket$bt_bnep(0x1f, 0x3, 0x4) r3 = dup(r0) setsockopt$inet6_buf(r1, 0x29, 0x2b, &(0x7f0000000100)="ed7408bcd7e0f36c76f575ecdc439ca927b5c721344b3e1708b2378c55d8c7afdc2059e6fc307aa554b7cfba8e29c5d02ec92d590b2017b93fa1f2c6c9df2755e8fc3b57d2fb847c8ebc6c8aa5dc87f5f71cb50ffaac52b6f2d508ec019a0556307a7cb637b6c6fabd2c49a442c4aa101dd6c07c", 0x74) listen$netrom(r1, 0x7ff) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000000)=0x6) recvmsg$kcm(r3, &(0x7f00000008c0)={&(0x7f00000001c0)=@sco, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000ec0)=""/149, 0x95}, 0x0) timer_create(0x0, &(0x7f0000000240)={0x0, 0x12, 0x0, @tid=r2}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000000040)) tkill(r2, 0x1000000000016) 2018/04/10 10:27:34 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) r1 = socket(0x12, 0x80805, 0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000000)={0x0, 0x83, 0x6}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000080)={0x0, 0x2, 0x0, 0xffffffff, r2}, 0x10) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) [ 245.818033] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 [ 245.825288] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 [ 245.832545] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 245.839799] R13: 00000000000003fb R14: 00000000006f9028 R15: 000000000000000a 2018/04/10 10:27:34 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]]}, 0x178) 2018/04/10 10:27:34 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:27:34 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x9, 0xc80) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000200)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) accept$netrom(r0, 0x0, &(0x7f0000000380)) pipe2(&(0x7f0000e3eff8)={0x0, 0x0}, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r6 = dup3(r5, r4, 0x0) ioctl$KVM_SMI(r5, 0xaeb7) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f0000000340)={0x5001, 0x2000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000480)=[@textreal={0x8, &(0x7f0000000500)="0f005c0666b8ef0000000f23d00f21f86635300000010f23f866b9770b000066b80000008066ba000000000f30f20f35f30f1bcff4650f01cabaf80c66b8c261a58266efbafc0cb874daef0f236d0f32", 0x50}], 0x0, 0x3ffe, &(0x7f0000000040), 0x38b) ioctl$KVM_RUN(r6, 0xae80, 0x0) r7 = userfaultfd(0x0) ioctl$UFFDIO_API(r7, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r7, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r8 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r8, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(r7) 2018/04/10 10:27:34 executing program 2 (fault-call:5 fault-nth:11): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) 2018/04/10 10:27:34 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x40, 0x0) recvmsg$kcm(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000240)=""/101, 0x65}, {&(0x7f00000002c0)=""/180, 0xb4}, {&(0x7f0000000380)=""/159, 0x9f}], 0x3, &(0x7f0000000480)=""/111, 0x6f, 0x8}, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000600)={{{@in6=@dev, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000700)=0xe8) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='minix\x00', 0x100002, &(0x7f0000000100)="631bc974ef2897d1f45c7baaae595d44ea9a0bbe3a759735418a8d4992e591106b3497e560e6745a86ae823570e1e035bd46680dd72f867fc1b2ac45659d440e61f25bf52d1123fa1756b18516971d8f5c9639bb2b6ddc377b2c0f673dd09b648fc5f5394627e854208fd4710db214558c5bd390e1ecaf395a661f672af843238beee93077db7b38a2e582df12ace61c18d0306c0a62fb306fe1d3d1921b3c8a2c9a914070ff7226f5b3a790a4da76b8b3f4c1cf63ff7c2af0f39fde") mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) mkdir(&(0x7f0000000540)='./file0\x00', 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000580)={'mangle\x00', 0x2, [{}, {}]}, 0x48) [ 246.107242] FAULT_INJECTION: forcing a failure. [ 246.107242] name failslab, interval 1, probability 0, space 0, times 0 [ 246.118611] CPU: 1 PID: 18021 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 246.125543] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 246.134890] Call Trace: [ 246.137476] dump_stack+0x1b9/0x294 [ 246.141117] ? dump_stack_print_info.cold.2+0x52/0x52 [ 246.146296] ? perf_trace_lock_acquire+0xe3/0x980 [ 246.151124] ? __save_stack_trace+0x7e/0xd0 [ 246.155440] should_fail.cold.4+0xa/0x1a [ 246.159491] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 246.164581] ? save_stack+0x43/0xd0 [ 246.168197] ? kasan_kmalloc+0xc4/0xe0 [ 246.172069] ? kmem_cache_alloc_trace+0x152/0x780 [ 246.176897] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 246.182074] ? __list_lru_init+0x456/0x790 [ 246.186295] ? sget_userns+0x6d9/0xf20 [ 246.190170] ? graph_lock+0x170/0x170 [ 246.193954] ? do_mount+0x564/0x3070 [ 246.197653] ? ksys_mount+0x12d/0x140 [ 246.201440] ? SyS_mount+0x35/0x50 [ 246.204971] ? do_syscall_64+0x29e/0x9d0 [ 246.209029] ? find_held_lock+0x36/0x1c0 [ 246.213095] ? __lock_is_held+0xb5/0x140 [ 246.217156] ? check_same_owner+0x320/0x320 [ 246.221469] ? rcu_note_context_switch+0x710/0x710 [ 246.226417] __should_failslab+0x124/0x180 [ 246.230646] should_failslab+0x9/0x14 [ 246.234437] kmem_cache_alloc_trace+0x2cb/0x780 [ 246.239099] ? __kmalloc_node+0x33/0x70 [ 246.243061] ? __kmalloc_node+0x33/0x70 [ 246.247035] ? rcu_read_lock_sched_held+0x108/0x120 [ 246.252049] __memcg_init_list_lru_node+0x17d/0x2c0 [ 246.257058] ? kvfree_rcu+0x20/0x20 [ 246.260674] ? __kmalloc_node+0x47/0x70 [ 246.264641] __list_lru_init+0x456/0x790 [ 246.268694] ? list_lru_destroy+0x4c0/0x4c0 [ 246.273006] ? mark_held_locks+0xc9/0x160 [ 246.277149] ? __raw_spin_lock_init+0x1c/0x100 [ 246.281715] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 246.286722] ? __lockdep_init_map+0x105/0x590 [ 246.291207] ? lockdep_init_map+0x9/0x10 [ 246.295256] sget_userns+0x6d9/0xf20 [ 246.298956] ? set_anon_super+0x20/0x20 [ 246.303025] ? get_empty_filp.cold.7+0x3e/0x3e [ 246.307600] ? destroy_unused_super.part.9+0x100/0x100 [ 246.312867] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 246.317873] ? kasan_check_read+0x11/0x20 [ 246.322014] ? rcu_pm_notify+0xc0/0xc0 [ 246.325892] ? trace_hardirqs_off+0xd/0x10 [ 246.330117] ? cap_capable+0x1f9/0x260 [ 246.333998] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 246.339524] ? security_capable+0x99/0xc0 [ 246.343659] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 246.349181] ? ns_capable_common+0x13f/0x170 [ 246.353580] mount_ns+0x8f/0x1d0 [ 246.356935] ? rpc_pipe_release+0xb70/0xb70 [ 246.361244] rpc_mount+0x9e/0xd0 [ 246.364597] mount_fs+0xae/0x328 [ 246.367955] vfs_kern_mount.part.34+0xd4/0x4d0 [ 246.372526] ? may_umount+0xb0/0xb0 [ 246.376138] ? _raw_read_unlock+0x22/0x30 [ 246.380273] ? __get_fs_type+0x97/0xc0 [ 246.384148] do_mount+0x564/0x3070 [ 246.387676] ? copy_mount_string+0x40/0x40 [ 246.391897] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 246.396902] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 246.401650] ? retint_kernel+0x10/0x10 [ 246.405528] ? copy_mount_options+0x1f0/0x380 [ 246.410011] ? copy_mount_options+0x1f6/0x380 [ 246.414499] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 246.420029] ? copy_mount_options+0x285/0x380 [ 246.424512] ksys_mount+0x12d/0x140 [ 246.428129] SyS_mount+0x35/0x50 [ 246.431480] ? ksys_mount+0x140/0x140 [ 246.435268] do_syscall_64+0x29e/0x9d0 [ 246.439140] ? vmalloc_sync_all+0x30/0x30 [ 246.443274] ? _raw_spin_unlock_irq+0x27/0x70 [ 246.447761] ? finish_task_switch+0x1ca/0x820 [ 246.452246] ? syscall_return_slowpath+0x5c0/0x5c0 [ 246.457166] ? syscall_return_slowpath+0x30f/0x5c0 [ 246.462086] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 246.467439] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 246.472274] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 246.477447] RIP: 0033:0x455259 [ 246.480620] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 246.488316] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 [ 246.495571] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 [ 246.502826] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 [ 246.510079] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 246.517345] R13: 00000000000003fb R14: 00000000006f9028 R15: 000000000000000b 2018/04/10 10:27:35 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000000)=0x8) 2018/04/10 10:27:35 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) r2 = dup3(r1, r0, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000040)=0x80, 0x4) setsockopt$sock_int(r2, 0x1, 0x1d, &(0x7f0000059000)=0x89a, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000), 0x153) bind$unix(r1, &(0x7f0000000080)=@abs={0x1, 0x0, 0x4e24}, 0x6e) 2018/04/10 10:27:35 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]]}, 0x178) 2018/04/10 10:27:35 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000000), &(0x7f0000000040)=0x4) 2018/04/10 10:27:35 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@known='com.apple.FinderInfo\x00', &(0x7f0000000180)=""/4096, 0x1000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0xdf, @loopback={0x0, 0x1}, 0x80000000}, 0x1c) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) umount2(&(0x7f00000075c0)='./file0\x00', 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x100, 0x0) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f00000000c0)={0x0, 0x5}) 2018/04/10 10:27:35 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:27:35 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x9, 0xc80) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000200)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) accept$netrom(r0, 0x0, &(0x7f0000000380)) pipe2(&(0x7f0000e3eff8)={0x0, 0x0}, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r6 = dup3(r5, r4, 0x0) ioctl$KVM_SMI(r5, 0xaeb7) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f0000000340)={0x5001, 0x2000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000480)=[@textreal={0x8, &(0x7f0000000500)="0f005c0666b8ef0000000f23d00f21f86635300000010f23f866b9770b000066b80000008066ba000000000f30f20f35f30f1bcff4650f01cabaf80c66b8c261a58266efbafc0cb874daef0f236d0f32", 0x50}], 0x0, 0x3ffe, &(0x7f0000000040), 0x38b) ioctl$KVM_RUN(r6, 0xae80, 0x0) r7 = userfaultfd(0x0) ioctl$UFFDIO_API(r7, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r7, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r8 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r8, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(r7) 2018/04/10 10:27:35 executing program 2 (fault-call:5 fault-nth:12): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) [ 246.671567] FAULT_INJECTION: forcing a failure. [ 246.671567] name failslab, interval 1, probability 0, space 0, times 0 [ 246.682911] CPU: 0 PID: 18042 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 246.689856] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 246.699231] Call Trace: [ 246.701841] dump_stack+0x1b9/0x294 [ 246.705495] ? dump_stack_print_info.cold.2+0x52/0x52 [ 246.710705] ? perf_trace_lock_acquire+0xe3/0x980 [ 246.715560] ? __save_stack_trace+0x7e/0xd0 2018/04/10 10:27:35 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x80, 0x101000) ioctl$KVM_S390_UCAS_MAP(r1, 0x4018ae50, &(0x7f0000000040)={0x8, 0xffff, 0x3}) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0xffffffffffffff26) [ 246.719912] should_fail.cold.4+0xa/0x1a [ 246.723990] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 246.729110] ? save_stack+0x43/0xd0 [ 246.732753] ? kasan_kmalloc+0xc4/0xe0 [ 246.736659] ? kmem_cache_alloc_trace+0x152/0x780 [ 246.741512] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 246.746709] ? __list_lru_init+0x456/0x790 [ 246.750957] ? sget_userns+0x6d9/0xf20 [ 246.754869] ? graph_lock+0x170/0x170 [ 246.758672] ? do_mount+0x564/0x3070 [ 246.762375] ? ksys_mount+0x12d/0x140 [ 246.766249] ? SyS_mount+0x35/0x50 [ 246.769775] ? do_syscall_64+0x29e/0x9d0 [ 246.773828] ? find_held_lock+0x36/0x1c0 [ 246.777885] ? __lock_is_held+0xb5/0x140 [ 246.781947] ? check_same_owner+0x320/0x320 [ 246.786261] ? rcu_note_context_switch+0x710/0x710 [ 246.791191] __should_failslab+0x124/0x180 [ 246.795532] should_failslab+0x9/0x14 [ 246.799320] kmem_cache_alloc_trace+0x2cb/0x780 [ 246.803980] ? __kmalloc_node+0x33/0x70 [ 246.807941] ? __kmalloc_node+0x33/0x70 [ 246.811908] ? rcu_read_lock_sched_held+0x108/0x120 [ 246.816919] __memcg_init_list_lru_node+0x17d/0x2c0 [ 246.822020] ? kvfree_rcu+0x20/0x20 [ 246.825637] ? __kmalloc_node+0x47/0x70 [ 246.829608] __list_lru_init+0x456/0x790 [ 246.833668] ? list_lru_destroy+0x4c0/0x4c0 [ 246.837992] ? mark_held_locks+0xc9/0x160 [ 246.842135] ? __raw_spin_lock_init+0x1c/0x100 [ 246.846706] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 246.851709] ? __lockdep_init_map+0x105/0x590 [ 246.856194] ? lockdep_init_map+0x9/0x10 [ 246.860249] sget_userns+0x6d9/0xf20 [ 246.863948] ? set_anon_super+0x20/0x20 [ 246.867912] ? get_empty_filp.cold.7+0x3e/0x3e [ 246.872482] ? destroy_unused_super.part.9+0x100/0x100 [ 246.877750] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 246.882765] ? kasan_check_read+0x11/0x20 [ 246.886904] ? rcu_pm_notify+0xc0/0xc0 [ 246.890784] ? trace_hardirqs_off+0xd/0x10 [ 246.895015] ? cap_capable+0x1f9/0x260 [ 246.898900] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 246.904510] ? security_capable+0x99/0xc0 [ 246.908647] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 246.914176] ? ns_capable_common+0x13f/0x170 [ 246.918578] mount_ns+0x8f/0x1d0 [ 246.921935] ? rpc_pipe_release+0xb70/0xb70 [ 246.926244] rpc_mount+0x9e/0xd0 [ 246.929601] mount_fs+0xae/0x328 [ 246.932964] vfs_kern_mount.part.34+0xd4/0x4d0 [ 246.937538] ? may_umount+0xb0/0xb0 [ 246.941157] ? _raw_read_unlock+0x22/0x30 [ 246.945294] ? __get_fs_type+0x97/0xc0 [ 246.949176] do_mount+0x564/0x3070 [ 246.952709] ? copy_mount_string+0x40/0x40 [ 246.956929] ? rcu_pm_notify+0xc0/0xc0 [ 246.960814] ? copy_mount_options+0x5f/0x380 [ 246.965212] ? rcu_read_lock_sched_held+0x108/0x120 [ 246.970221] ? kmem_cache_alloc_trace+0x616/0x780 [ 246.975055] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 246.980582] ? _copy_from_user+0xdf/0x150 [ 246.984721] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 246.990260] ? copy_mount_options+0x285/0x380 [ 246.994746] ksys_mount+0x12d/0x140 [ 246.998369] SyS_mount+0x35/0x50 [ 247.001729] ? ksys_mount+0x140/0x140 [ 247.005522] do_syscall_64+0x29e/0x9d0 [ 247.009396] ? vmalloc_sync_all+0x30/0x30 [ 247.013535] ? _raw_spin_unlock_irq+0x27/0x70 [ 247.018022] ? finish_task_switch+0x1ca/0x820 [ 247.022507] ? syscall_return_slowpath+0x5c0/0x5c0 [ 247.027426] ? syscall_return_slowpath+0x30f/0x5c0 [ 247.032348] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 247.037878] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 247.042716] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 247.047890] RIP: 0033:0x455259 [ 247.051073] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 247.058785] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 [ 247.066046] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 2018/04/10 10:27:35 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f0000000000)={@mcast2}, &(0x7f0000000040)=0x14) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) [ 247.073306] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 [ 247.080566] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 247.087916] R13: 00000000000003fb R14: 00000000006f9028 R15: 000000000000000c 2018/04/10 10:27:35 executing program 1: bind$inet(0xffffffffffffffff, &(0x7f00000a9000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) gettid() r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x6, 0x0) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000300)={0x7, {0x2, 0x4e22, @multicast1=0xe0000001}, {0x2, 0x4e23, @broadcast=0xffffffff}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x14}}, 0x210, 0x101, 0x1774f0d0, 0x7, 0x8001, &(0x7f00000000c0)='bond0\x00', 0x9, 0x9344, 0x9}) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendto$inet(0xffffffffffffffff, &(0x7f0000000400), 0x0, 0x0, &(0x7f0000b2d000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) r2 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x0, 0x0, @ipv4}, &(0x7f0000000140)=0x1c) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x11}}}, 0x9, 0x2, 0x0, 0x1ff, 0x8}, &(0x7f0000000240)=0x98) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000280)={r3, 0x4470}, &(0x7f00000002c0)=0x8) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'gre0\x00', 0xc02}) socket(0xa, 0x4, 0xfffffffffffffff9) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000080)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) 2018/04/10 10:27:35 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0xaa) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) umount2(&(0x7f00000075c0)='./file0\x00', 0x0) 2018/04/10 10:27:35 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f00000001c0)=""/4096, &(0x7f0000000040)=0x1000) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000)=@int=0x7, 0x4) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x800, 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r1, &(0x7f00000000c0)='./file0\x00', r2, r3, 0x100) 2018/04/10 10:27:35 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0x8) r2 = syz_open_dev$amidi(&(0x7f0000000440)='/dev/amidi#\x00', 0x3, 0x40800) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000480)={r1, 0x4}, &(0x7f00000004c0)=0xc) 2018/04/10 10:27:35 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]]}, 0x178) 2018/04/10 10:27:35 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x9, 0xc80) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000200)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) accept$netrom(r0, 0x0, &(0x7f0000000380)) pipe2(&(0x7f0000e3eff8)={0x0, 0x0}, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) dup3(r5, r4, 0x0) ioctl$KVM_SMI(r5, 0xaeb7) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f0000000340)={0x5001, 0x2000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000480)=[@textreal={0x8, &(0x7f0000000500)="0f005c0666b8ef0000000f23d00f21f86635300000010f23f866b9770b000066b80000008066ba000000000f30f20f35f30f1bcff4650f01cabaf80c66b8c261a58266efbafc0cb874daef0f236d0f32", 0x50}], 0x0, 0x3ffe, &(0x7f0000000040), 0x38b) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r6 = userfaultfd(0x0) ioctl$UFFDIO_API(r6, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r6, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r7 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r7, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(r6) [ 247.248508] sctp: [Deprecated]: syz-executor0 (pid 18073) Use of int in max_burst socket option deprecated. [ 247.248508] Use struct sctp_assoc_value instead 2018/04/10 10:27:35 executing program 5: clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) select(0x40, &(0x7f0000000000)={0x3ad5, 0x5, 0xfd, 0x5380, 0xd260, 0x3, 0x1, 0x7}, &(0x7f0000000040)={0xffffffff, 0x4, 0x5, 0x4, 0x0, 0x200, 0x5, 0xb7}, &(0x7f00000000c0)={0x5, 0xfffffffffffff81d, 0x11fc, 0xe1, 0x2, 0x80000001, 0x8, 0x7}, &(0x7f0000000140)={r0, r1/1000+10000}) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x90000, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r2, 0x50, &(0x7f00000001c0)}, 0x10) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) umount2(&(0x7f00000075c0)='./file0\x00', 0x0) 2018/04/10 10:27:35 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmmsg$inet_sctp(r0, &(0x7f000093eee8)=[{&(0x7f00001f6000)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10, &(0x7f0000000040)=[{&(0x7f0000000200)="96", 0x1}], 0x1, &(0x7f0000000400)=[@init={0x18, 0x84, 0x0, {0x5, 0x100}}], 0x30}, {&(0x7f0000000000)=@in={0x2, 0x0, @multicast2=0xe0000002}, 0x10, &(0x7f0000000380), 0x0, &(0x7f000093ef10)=[@sndinfo={0x20, 0x84, 0x2}], 0x30}], 0x2, 0x200040c1) 2018/04/10 10:27:35 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x4000]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) [ 247.298260] sctp: [Deprecated]: syz-executor0 (pid 18082) Use of int in max_burst socket option deprecated. [ 247.298260] Use struct sctp_assoc_value instead 2018/04/10 10:27:35 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]]}, 0x178) 2018/04/10 10:27:35 executing program 4: setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:35 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x541200, 0x0) ioctl$EVIOCGABS20(r1, 0x80184560, &(0x7f0000000040)=""/210) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) r2 = fcntl$getown(r0, 0x9) get_robust_list(r2, &(0x7f0000000340)=&(0x7f0000000300)={&(0x7f0000000240)={&(0x7f0000000200)}, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)}}, &(0x7f0000000380)=0x18) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x400001, 0x0) 2018/04/10 10:27:35 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)=0x0) sched_getscheduler(r0) umount2(&(0x7f00000075c0)='./file0\x00', 0x0) 2018/04/10 10:27:36 executing program 2 (fault-call:5 fault-nth:13): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) 2018/04/10 10:27:36 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x40000000000018) r0 = syz_open_dev$sndmidi(&(0x7f0000000580)='/dev/snd/midiC#D#\x00', 0x6c, 0x402080) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r0, 0x40045542, &(0x7f0000000680)=0x200) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000005c0)=ANY=[@ANYBLOB="82992f55489b4222f6eb47e9ce711a0c1825cdb52ca11e25b36624535d698632815ca76aa4601831c6ecf2d1dc07c74172429842bff8d4554800d6e475f7c957e5f22379f98210b86b445471966af400d5928e1ff95e4318e1f187c71e2994ec39845245f14b96af7f738d34e18de077762af486677088dec1c9907f6d074b1d46b58562600e82ff60aa", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f00000000c0)=0x28) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={r1, 0x5c, &(0x7f0000000100)=[@in6={0xa, 0x4e23, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x7}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @multicast2=0xe0000002}, @in={0x2, 0x4e24, @multicast1=0xe0000001}]}, &(0x7f00000001c0)=0x10) lgetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000006c0)=ANY=[@ANYBLOB="73656375726974792e746d706673006a7d4697ad48bcd79cb3ed0c2e6a21141159be4da92f428bd7d97d580c6dfec864ca0f3d9cd951838a2b75cd50d7c61628e468742628caebbe8a7c793f4df512cb9a03fd32bd4e1aefe7233bf9d314c0d001430431808204606c4ff0bdbd4d671b50a3e684ad7deb9d"], &(0x7f0000000300)=""/135, 0x87) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000000)=0x10, 0x4) connect$unix(r0, &(0x7f0000000200)=@abs={0x0, 0x0, 0x4e20}, 0x6e) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000002c0)=0x6, 0x8) umount2(&(0x7f00000075c0)='./file0\x00', 0x0) recvmsg(r0, &(0x7f0000000540)={&(0x7f00000007c0)=@in={0x0, 0x0, @rand_addr}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000840)=""/107, 0x6b}, {&(0x7f00000008c0)=""/199, 0xc7}, {&(0x7f00000009c0)=""/177, 0xb1}, {&(0x7f0000000a80)=""/148, 0x94}], 0x4, &(0x7f0000000b40)=""/208, 0xd0, 0xa1}, 0x40010020) syz_mount_image$hfsplus(&(0x7f0000000740)='hfsplus\x00', &(0x7f0000000400)='./file0\x00', 0x1, 0x1, &(0x7f0000000500)=[{&(0x7f0000000440)="ce00a0081c65b58dd9ec54abcc5666cd851818e747031d5a22c430a86d5e797f969d1e86348ae70868b8f9f88b9a07265e0d2c0c03ce6355d754a59853160b48d109c18d9aab4437565fc9f99bd79d26ef5d2c3968e14673440bb59bd5b475bbe832a12bf8c67310ecf555fd32f979a36ff315c79bc4b74a141c6ac4e1d771fed0b26b3d677b94fb80876f49ae078461348b0eca94ee396535f3e68770c26b35dd4d4dc7157e021c8077eb940031b0", 0xaf}], 0x4003, &(0x7f0000000780)={[{@type={'type', 0x3d, "e45b30c9"}, 0x2c}, {@type={'type', 0x3d, "581ce1f2"}, 0x2c}, {@umask={'umask', 0x3d, [0x37, 0x34, 0x33]}, 0x2c}, {@nodecompose='nodecompose', 0x2c}, {@decompose='decompose', 0x2c}]}) setrlimit(0x3, &(0x7f0000000080)={0x800, 0x3}) 2018/04/10 10:27:36 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x9, 0xc80) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000200)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) accept$netrom(r0, 0x0, &(0x7f0000000380)) pipe2(&(0x7f0000e3eff8)={0x0, 0x0}, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) dup3(r5, r4, 0x0) ioctl$KVM_SMI(r5, 0xaeb7) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f0000000340)={0x5001, 0x2000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r6 = userfaultfd(0x0) ioctl$UFFDIO_API(r6, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r6, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r7 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r7, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(r6) 2018/04/10 10:27:36 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) r1 = accept4(r0, &(0x7f00000001c0)=@ipx, &(0x7f0000000240)=0x80, 0x80000) accept4(r0, &(0x7f00000002c0)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, &(0x7f0000000340)=0x80, 0x80000) setsockopt$ipx_IPX_TYPE(r1, 0x100, 0x1, &(0x7f0000000280)=0xffffffffffffffff, 0x4) r2 = open(&(0x7f0000000000)='./file0\x00', 0x12000, 0xc0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000040)={@in6={{0xa, 0x4e20, 0x2, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, 0x7fffffff}}, 0x81, 0x5, 0x0, "d7871a3f7d05b7c84037c6f2855951d1a051b46267f56793293e5a35446af36f01db0f803f4c117f0b77d36b2a44ef7447deb425cd89cd3ce040bdcdd47bdbad8ad872a0351631761ab283412fc6e187"}, 0xd8) 2018/04/10 10:27:36 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]]}, 0x178) 2018/04/10 10:27:36 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r0, &(0x7f00000016c0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001680)={0xffffffff}, 0x106}}, 0x20) write$rdma_cm(r0, &(0x7f0000000140)=@reject={0x9, 0x108, 0xfa00, {r1, 0x6c, '\r~x', "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"}}, 0x110) write$rdma_cm(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0e004a658e396cce3e5400d18728e18196110000000000fab7e6ccf289d7c340ea5cd08cd225af7f1954cf7bf62951ce562b9e107ac293d089f1028d2f3e155c713e17cb445ebb1823cb56b7266df2ca13814b0019b251a9a9b11360dcde33f67cc08770ad784c6f127cd5fb050518965d298e48d9615d1a236d6b090bfbdffc684dfe292a081818e24d318c0e13d3e26c50e67499", @ANYPTR=&(0x7f00000015c0)=ANY=[@ANYBLOB='\x00'], @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x4d4) finit_module(r0, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x3) 2018/04/10 10:27:36 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, &(0x7f0000000740)=[{{&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/100, 0x64}, {&(0x7f00000001c0)=""/206, 0xce}, {&(0x7f00000002c0)=""/197, 0xc5}], 0x3, &(0x7f00000003c0)=""/94, 0x5e, 0x4}, 0x4}, {{&(0x7f0000000440)=@nfc_llcp, 0x80, &(0x7f0000000640)=[{&(0x7f00000004c0)=""/55, 0x37}, {&(0x7f0000000500)=""/169, 0xa9}, {&(0x7f00000005c0)=""/92, 0x5c}], 0x3, &(0x7f0000000680)=""/170, 0xaa}, 0x101}], 0x2, 0x40000001, &(0x7f00000007c0)={0x0, 0x1c9c380}) vmsplice(r1, &(0x7f0000000ac0)=[{&(0x7f0000000a40)="4e12e87d45ca32fcb7395f2035165486eb68fa374c61a266c89fc8a80b12f088c651cdc384a3d461d4bb87ba459a5c449380d479a01b6c62e01615b469af5527381619c79fa43cb9e7842e0f18a8c53af99df40791a94ceb7683fa22263b085f4646ce2c95d255b74028", 0x6a}], 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f0000000800)={'filter\x00'}, &(0x7f0000000880)=0x44) sendto(r1, &(0x7f00000008c0)="067c30b112843755c9109eb5d5975dcece164d5e2aaae384b5bb383984d60622ec52b156262e7f8bebd80ff6df9889ded2831c8f6c1ce3150ff7440df0faa19d1d0e35a79b808c27dbdc26ff8a2d33013c30465d2b4cabb72ed024ef50f7315897b0814816c5a2d81bef686d9169eeda8400f4d63192ba7a70f6ae2d0312dc4174e87b0cba495f3e099c18f30b", 0x8d, 0x4004, &(0x7f0000000980)=@llc={0x1a, 0x204, 0xbf, 0x100000000, 0xffffffffffff6a06, 0xeea, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0x8) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000a00)) socket$inet(0x2, 0x0, 0x6) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000b00)={r2, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0x1f, 0x3, 0x0, 0x0, 0x90}, &(0x7f0000000bc0)=0x98) 2018/04/10 10:27:36 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) [ 248.268070] FAULT_INJECTION: forcing a failure. [ 248.268070] name failslab, interval 1, probability 0, space 0, times 0 [ 248.279391] CPU: 1 PID: 18135 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 248.286324] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 248.295690] Call Trace: [ 248.298297] dump_stack+0x1b9/0x294 [ 248.301951] ? dump_stack_print_info.cold.2+0x52/0x52 [ 248.307163] ? perf_trace_lock_acquire+0xe3/0x980 [ 248.312020] ? __save_stack_trace+0x7e/0xd0 2018/04/10 10:27:36 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]]}, 0x178) [ 248.316368] should_fail.cold.4+0xa/0x1a [ 248.320453] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 248.325571] ? save_stack+0x43/0xd0 [ 248.329213] ? kasan_kmalloc+0xc4/0xe0 [ 248.333118] ? kmem_cache_alloc_trace+0x152/0x780 [ 248.337972] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 248.343176] ? __list_lru_init+0x456/0x790 [ 248.347421] ? sget_userns+0x6d9/0xf20 [ 248.351327] ? graph_lock+0x170/0x170 [ 248.355135] ? do_mount+0x564/0x3070 [ 248.358856] ? ksys_mount+0x12d/0x140 [ 248.362663] ? SyS_mount+0x35/0x50 2018/04/10 10:27:36 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x10000, @local={0xfe, 0x80, [], 0xaa}, 0x8}, 0x1c) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0xa800, 0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f00000001c0)={0x0, 0x8, 0x3f, 0x9, 0x9, 0x1, 0xbdaf, 0x800, {0x0, @in6={{0xa, 0x4e21, 0x7, @empty, 0x5}}, 0x3ff, 0x1, 0x3f, 0x6ff4, 0x8a35}}, &(0x7f0000000100)=0xb0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000280)={r2, @in6={{0xa, 0x4e21, 0x8001, @mcast1={0xff, 0x1, [], 0x1}, 0x69}}, 0x4, 0x4}, &(0x7f0000000340)=0x90) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) [ 248.366211] ? do_syscall_64+0x29e/0x9d0 [ 248.370287] ? find_held_lock+0x36/0x1c0 [ 248.374364] ? __lock_is_held+0xb5/0x140 [ 248.378453] ? check_same_owner+0x320/0x320 [ 248.382793] ? rcu_note_context_switch+0x710/0x710 [ 248.387741] __should_failslab+0x124/0x180 [ 248.391990] should_failslab+0x9/0x14 [ 248.395802] kmem_cache_alloc_trace+0x2cb/0x780 [ 248.400477] ? __kmalloc_node+0x33/0x70 [ 248.404465] ? __kmalloc_node+0x33/0x70 [ 248.408451] ? rcu_read_lock_sched_held+0x108/0x120 [ 248.413493] __memcg_init_list_lru_node+0x17d/0x2c0 [ 248.418527] ? kvfree_rcu+0x20/0x20 [ 248.422169] ? __kmalloc_node+0x47/0x70 [ 248.426165] __list_lru_init+0x456/0x790 [ 248.430256] ? list_lru_destroy+0x4c0/0x4c0 [ 248.434593] ? mark_held_locks+0xc9/0x160 [ 248.438866] ? __raw_spin_lock_init+0x1c/0x100 [ 248.443443] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 248.448450] ? __lockdep_init_map+0x105/0x590 [ 248.452939] ? lockdep_init_map+0x9/0x10 [ 248.457096] sget_userns+0x6d9/0xf20 [ 248.460795] ? set_anon_super+0x20/0x20 [ 248.464757] ? get_empty_filp.cold.7+0x3e/0x3e [ 248.469328] ? destroy_unused_super.part.9+0x100/0x100 [ 248.474601] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 248.479606] ? kasan_check_read+0x11/0x20 [ 248.483743] ? rcu_pm_notify+0xc0/0xc0 [ 248.487617] ? trace_hardirqs_off+0xd/0x10 [ 248.491844] ? cap_capable+0x1f9/0x260 [ 248.495720] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 248.501249] ? security_capable+0x99/0xc0 [ 248.505393] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 248.510916] ? ns_capable_common+0x13f/0x170 [ 248.515318] mount_ns+0x8f/0x1d0 [ 248.518768] ? rpc_pipe_release+0xb70/0xb70 [ 248.523076] rpc_mount+0x9e/0xd0 [ 248.526428] mount_fs+0xae/0x328 [ 248.529787] vfs_kern_mount.part.34+0xd4/0x4d0 [ 248.534357] ? may_umount+0xb0/0xb0 [ 248.537971] ? _raw_read_unlock+0x22/0x30 [ 248.542105] ? __get_fs_type+0x97/0xc0 [ 248.545983] do_mount+0x564/0x3070 [ 248.549517] ? copy_mount_string+0x40/0x40 [ 248.553738] ? rcu_pm_notify+0xc0/0xc0 [ 248.557615] ? copy_mount_options+0x5f/0x380 [ 248.562012] ? rcu_read_lock_sched_held+0x108/0x120 [ 248.567023] ? kmem_cache_alloc_trace+0x616/0x780 [ 248.571860] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 248.577383] ? _copy_from_user+0xdf/0x150 [ 248.581519] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 248.587043] ? copy_mount_options+0x285/0x380 [ 248.591530] ksys_mount+0x12d/0x140 [ 248.595142] SyS_mount+0x35/0x50 [ 248.598491] ? ksys_mount+0x140/0x140 [ 248.602278] do_syscall_64+0x29e/0x9d0 [ 248.606150] ? vmalloc_sync_all+0x30/0x30 [ 248.610284] ? _raw_spin_unlock_irq+0x27/0x70 [ 248.614768] ? finish_task_switch+0x1ca/0x820 [ 248.619248] ? syscall_return_slowpath+0x5c0/0x5c0 [ 248.624164] ? syscall_return_slowpath+0x30f/0x5c0 [ 248.629087] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 248.634440] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 248.639273] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 248.644447] RIP: 0033:0x455259 [ 248.647618] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 248.655324] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 [ 248.662591] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 2018/04/10 10:27:37 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]]}, 0x178) [ 248.669844] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 [ 248.677097] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 248.684350] R13: 00000000000003fb R14: 00000000006f9028 R15: 000000000000000d [ 248.731824] hfsplus: unable to find HFS+ superblock 2018/04/10 10:27:37 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000380)=0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x14}, 0x14}, 0x1}, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0x2, 0x100) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000005c0)={0x7, &(0x7f0000000600)=[{0xfe0000000000000, 0x8000, 0x3, 0x4}, {0xfff, 0x4, 0x9, 0x4}, {0x4, 0x1, 0x7e1e, 0x5}, {0xfffffffffffff800, 0x2, 0x4, 0x8001}, {0xffffffffffffffff, 0x7, 0x2, 0x3}, {0x4, 0x3, 0x3, 0x94}, {0xed4, 0x8, 0x7, 0x7}]}, 0x10) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f00000002c0)=@generic={0x3, 0x1, 0x2e3b000}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"]}, 0x1}, 0x20000) r1 = socket(0x2, 0x2000000000000003, 0x1) ioctl$sock_SIOCETHTOOL(r1, 0x89f0, &(0x7f0000000380)={'bridge0\x00', &(0x7f0000000000)=ANY=[]}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'bond0\x00', 0x100}) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000580)='fou\x00') sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x48, r2, 0x200, 0x70bd27, 0x25dfdbff, {0x1}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x5e}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e23}, @FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e20}, @FOU_ATTR_AF={0x8, 0x2}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4, 0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x840}, 0x80) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000340)='ip6gre0\x00') epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000500)={0x10000000}) ioctl$fiemap(r1, 0xc020660b, &(0x7f0000000180)={0x18000000, 0x1, 0x6, 0x0, 0x4, [{0x1ff, 0x4, 0x9, 0x0, 0x0, 0x118e}, {0x5, 0x596, 0x100000001, 0x0, 0x0, 0x4}, {0x1000, 0x1, 0x2, 0x0, 0x0, 0x1000}, {0xa, 0x6, 0x3589, 0x0, 0x0, 0x1}]}) 2018/04/10 10:27:37 executing program 4: ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000000)={0x6, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in=@rand_addr, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}}}, &(0x7f0000000300)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@loopback={0x0, 0x1}, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x4e24, 0x4, 0x4e24, 0x9, 0xa, 0x80, 0x80, 0x0, r1, r2}, {0xce, 0xffff, 0x7, 0x2, 0x620, 0x8, 0x9, 0x80000000}, {0x7f, 0x2, 0xffffffffffffffc1, 0x3}, 0xfffffffffffffffa, 0x6e6bb9, 0x1, 0x0, 0x3, 0x2}, {{@in, 0x4d3, 0x6c}, 0x2, @in6=@loopback={0x0, 0x1}, 0x3501, 0x2, 0x3, 0x10000, 0x7ff, 0xfffffffffffffff9, 0x8000}}, 0xe8) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r3, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) mknodat(r0, &(0x7f0000000040)='./file0\x00', 0x9004, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r3, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) [ 248.776926] hfsplus: unable to find HFS+ superblock 2018/04/10 10:27:37 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]]}, 0x178) 2018/04/10 10:27:37 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x5000000]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:27:37 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='ceph\x00', 0x0, &(0x7f00000000c0)="5eafbe097e5731ca4e82") umount2(&(0x7f00000075c0)='./file0\x00', 0x0) [ 248.867151] device bond0 entered promiscuous mode [ 248.926434] ceph: device name is missing path (no : separator in ./file0) [ 248.954338] ceph: device name is missing path (no : separator in ./file0) 2018/04/10 10:27:38 executing program 2 (fault-call:5 fault-nth:14): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) 2018/04/10 10:27:38 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x4) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r1, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) unlinkat(r0, &(0x7f0000000100)='./file0\x00', 0x750e39c1dafcfd5a) 2018/04/10 10:27:38 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_netrom_SIOCGSTAMPNS(0xffffffffffffffff, 0x8907, &(0x7f0000000500)) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000100)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8946, &(0x7f0000000080)={'lo\x00', @ifru_ivalue=0x1}) getsockopt$IP_VS_SO_GET_TIMEOUT(r1, 0x0, 0x486, &(0x7f00000000c0), &(0x7f00000004c0)=0xc) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) listen(0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000040)={0x11, @broadcast=0xffffffff, 0x0, 0x0, "566c630000000bab000800"}, 0x2c) r3 = socket(0x11, 0x100000802, 0x0) r4 = syz_open_dev$tun(&(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f00000000c0)={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}, 0x5c) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={"6966623000faffffffffffffff00", 0x4001}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'ifb0\x00', 0xa201}) io_setup(0x1, &(0x7f0000000180)=0x0) io_submit(r5, 0x1, &(0x7f00000016c0)=[&(0x7f0000001380)={0x0, 0x0, 0x0, 0x7, 0x0, r4, &(0x7f0000000080)="4587c710d5", 0x5}]) set_mempolicy(0x0, &(0x7f0000000200)=0x4, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000001c0)={r1}) 2018/04/10 10:27:38 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r1, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000000)={0x0, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r2, 0xc010641d, &(0x7f0000000100)={r3, &(0x7f0000000280)=""/76}) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:38 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x9, 0xc80) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000200)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) accept$netrom(r0, 0x0, &(0x7f0000000380)) pipe2(&(0x7f0000e3eff8)={0x0, 0x0}, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) dup3(r5, r4, 0x0) ioctl$KVM_SMI(r5, 0xaeb7) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f0000000340)={0x5001, 0x2000}) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r6 = userfaultfd(0x0) ioctl$UFFDIO_API(r6, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r6, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r7 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r7, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(r6) 2018/04/10 10:27:38 executing program 5: r0 = accept$netrom(0xffffffffffffffff, &(0x7f00000000c0)=@full, &(0x7f0000000040)=0xffffffffffffff8f) shutdown(r0, 0x1) mkdir(&(0x7f0000000080)='./file0\x00', 0x20) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) creat(&(0x7f00000001c0)='./file0\x00', 0x102) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) umount2(&(0x7f00000075c0)='./file0\x00', 0x0) 2018/04/10 10:27:38 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]]}, 0x178) 2018/04/10 10:27:38 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x7000000]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) [ 249.677606] FAULT_INJECTION: forcing a failure. [ 249.677606] name failslab, interval 1, probability 0, space 0, times 0 [ 249.688996] CPU: 0 PID: 18215 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 249.695940] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 249.705302] Call Trace: [ 249.707906] dump_stack+0x1b9/0x294 [ 249.711558] ? dump_stack_print_info.cold.2+0x52/0x52 [ 249.716766] ? perf_trace_lock_acquire+0xe3/0x980 [ 249.721626] ? __save_stack_trace+0x7e/0xd0 [ 249.725979] should_fail.cold.4+0xa/0x1a [ 249.730060] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 249.735176] ? save_stack+0x43/0xd0 [ 249.738818] ? kasan_kmalloc+0xc4/0xe0 [ 249.742717] ? kmem_cache_alloc_trace+0x152/0x780 [ 249.747572] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 249.752778] ? __list_lru_init+0x456/0x790 [ 249.757021] ? sget_userns+0x6d9/0xf20 [ 249.760930] ? graph_lock+0x170/0x170 [ 249.764740] ? do_mount+0x564/0x3070 [ 249.768467] ? ksys_mount+0x12d/0x140 [ 249.772293] ? SyS_mount+0x35/0x50 [ 249.775856] ? do_syscall_64+0x29e/0x9d0 [ 249.779944] ? find_held_lock+0x36/0x1c0 [ 249.784024] ? __lock_is_held+0xb5/0x140 [ 249.788116] ? check_same_owner+0x320/0x320 [ 249.792451] ? rcu_note_context_switch+0x710/0x710 [ 249.797410] __should_failslab+0x124/0x180 [ 249.801674] should_failslab+0x9/0x14 [ 249.805486] kmem_cache_alloc_trace+0x2cb/0x780 [ 249.810164] ? __kmalloc_node+0x33/0x70 [ 249.814147] ? __kmalloc_node+0x33/0x70 [ 249.818139] ? rcu_read_lock_sched_held+0x108/0x120 [ 249.823178] __memcg_init_list_lru_node+0x17d/0x2c0 [ 249.828211] ? kvfree_rcu+0x20/0x20 [ 249.831853] ? __kmalloc_node+0x47/0x70 [ 249.835849] __list_lru_init+0x456/0x790 [ 249.839933] ? list_lru_destroy+0x4c0/0x4c0 [ 249.844282] ? mark_held_locks+0xc9/0x160 [ 249.848447] ? __raw_spin_lock_init+0x1c/0x100 [ 249.853043] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 249.858072] ? __lockdep_init_map+0x105/0x590 [ 249.862580] ? lockdep_init_map+0x9/0x10 [ 249.866668] sget_userns+0x6d9/0xf20 [ 249.870389] ? set_anon_super+0x20/0x20 2018/04/10 10:27:38 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) r1 = open(&(0x7f0000000000)='./file0\x00', 0x101000, 0x80) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r1, 0x111, 0x3, 0x1, 0x4) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000040)={0x6, 0x7fffffff, 0xffffffff, 0x6, 0x2, 0x9, 0x5, 0x80000000, 0x101, 0x1, 0x3}, 0xb) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:38 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'yam0\x00', 0x0}) recvfrom$packet(r0, &(0x7f0000000000)=""/130, 0x82, 0x2002, &(0x7f0000000380)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x14) 2018/04/10 10:27:38 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000080)=0xe8) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) finit_module(r0, &(0x7f0000000040)='posix_acl_accessmime_type\\wlan0^:-\x00', 0x2) 2018/04/10 10:27:38 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x5f, "7da8202732cfd1f7665e59171a39fd338edf7b7a8ae00ae3e8caf8a6e1936aa7321730146b206c5c2cdea043cdd281a7f40670f0e3cee6d9f5770439c0171efff41469b965899c204b2d6c15e0071ad620d07e3796f831537d56b1ff82f98d"}, &(0x7f00000003c0)=0x67) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000400)={r1, @in6={{0xa, 0x4e23, 0xfffffffffffffc01, @dev={0xfe, 0x80, [], 0x15}, 0x3ff}}, 0x7ff, 0x6b}, 0x90) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e24, @multicast2=0xe0000002}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000300)={r2, 0x2}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000340)={r3, 0xfffffffffffffffd, 0x30, 0x6, 0x4a}, &(0x7f0000000380)=0xffffffffffffff74) setsockopt$inet6_buf(r0, 0x29, 0xee, &(0x7f00000001c0)="fec667000955cb80e359e85adc491f9d03e1dfe8cd88441b1d739c026a258b75d9052a4590d190428dfdf12b6023466f499bc7c9e0bf112d3c761d950a277f8451e6f34f655d4b3d8cb4623d5040f006102bd617489926083cbed16f32119c42e08c8f50a6dd38841aeb7759532b72291ed81122e118c320950c29fbcc5caed30aa232fd45503508e623fe5b31fa79e5f952c69db312c90081e689e5b577869995c5520d720ff0897432ab1566c257d2bf426c3aecdc57a69f6aa82c78c73246c39f1074710f23f3dc149d2952aa53d5734112e9592ce0ca0c95669badf50245aaf5b31dfd12bdb6055b04f967fc41dc", 0xf0) [ 249.874379] ? get_empty_filp.cold.7+0x3e/0x3e [ 249.877995] IPVS: Scheduler module ip_vs_Vlc not found [ 249.878964] ? destroy_unused_super.part.9+0x100/0x100 [ 249.878987] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 249.879008] ? kasan_check_read+0x11/0x20 [ 249.879028] ? rcu_pm_notify+0xc0/0xc0 [ 249.879045] ? trace_hardirqs_off+0xd/0x10 [ 249.879065] ? cap_capable+0x1f9/0x260 [ 249.879089] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 249.879106] ? security_capable+0x99/0xc0 [ 249.920434] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 249.925985] ? ns_capable_common+0x13f/0x170 [ 249.930415] mount_ns+0x8f/0x1d0 [ 249.933795] ? rpc_pipe_release+0xb70/0xb70 [ 249.938130] rpc_mount+0x9e/0xd0 [ 249.941514] mount_fs+0xae/0x328 [ 249.944895] vfs_kern_mount.part.34+0xd4/0x4d0 [ 249.949494] ? may_umount+0xb0/0xb0 [ 249.953130] ? _raw_read_unlock+0x22/0x30 [ 249.957291] ? __get_fs_type+0x97/0xc0 [ 249.961194] do_mount+0x564/0x3070 [ 249.964748] ? copy_mount_string+0x40/0x40 [ 249.968993] ? rcu_pm_notify+0xc0/0xc0 [ 249.972900] ? copy_mount_options+0x5f/0x380 2018/04/10 10:27:38 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000000)={r1, 0xffff}, &(0x7f0000000040)=0x8) [ 249.977327] ? rcu_read_lock_sched_held+0x108/0x120 [ 249.982349] ? kmem_cache_alloc_trace+0x616/0x780 [ 249.987214] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 249.992763] ? copy_mount_options+0x285/0x380 [ 249.997273] ksys_mount+0x12d/0x140 [ 250.000918] SyS_mount+0x35/0x50 [ 250.004293] ? ksys_mount+0x140/0x140 [ 250.008107] do_syscall_64+0x29e/0x9d0 [ 250.012086] ? vmalloc_sync_all+0x30/0x30 [ 250.016242] ? _raw_spin_unlock_irq+0x27/0x70 [ 250.020751] ? finish_task_switch+0x1ca/0x820 [ 250.025258] ? syscall_return_slowpath+0x5c0/0x5c0 [ 250.030200] ? syscall_return_slowpath+0x30f/0x5c0 [ 250.035152] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 250.040537] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 250.045404] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 250.050609] RIP: 0033:0x455259 [ 250.053800] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 250.061503] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 [ 250.068759] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 2018/04/10 10:27:38 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]]}, 0x178) 2018/04/10 10:27:38 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x3f000000]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) [ 250.076018] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 [ 250.083293] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 250.090550] R13: 00000000000003fb R14: 00000000006f9028 R15: 000000000000000e 2018/04/10 10:27:38 executing program 5: socket$inet_icmp(0x2, 0x2, 0x1) utime(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x7, 0xd48e}) mkdir(&(0x7f0000000080)='./file0\x00', 0x22) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x400000, 0x0) accept4$netrom(r0, 0x0, &(0x7f0000000040), 0x80000) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) umount2(&(0x7f00000075c0)='./file0\x00', 0x0) [ 250.196272] IPVS: Scheduler module ip_vs_Vlc not found 2018/04/10 10:27:38 executing program 2 (fault-call:5 fault-nth:15): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) 2018/04/10 10:27:38 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]]}, 0x178) 2018/04/10 10:27:38 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff}) inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x4000008) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80000, 0x2) umount2(&(0x7f0000000100)='./file0\x00', 0xfffffffffffffffb) mkdir(&(0x7f00000000c0)='./file0\x00', 0x129) 2018/04/10 10:27:38 executing program 1: 2018/04/10 10:27:38 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x5]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:27:38 executing program 0: r0 = socket$inet6_sctp(0xa, 0x2, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r1, 0x54a3) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) ioctl$DRM_IOCTL_CONTROL(r1, 0x40086414, &(0x7f0000000040)={0x1, 0x6}) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:38 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x9, 0xc80) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000200)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) accept$netrom(r0, 0x0, &(0x7f0000000380)) pipe2(&(0x7f0000e3eff8)={0x0, 0x0}, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) dup3(r4, r3, 0x0) ioctl$KVM_SMI(r4, 0xaeb7) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r5 = userfaultfd(0x0) ioctl$UFFDIO_API(r5, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r5, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r6 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r6, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(r5) 2018/04/10 10:27:38 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}}) [ 250.664530] FAULT_INJECTION: forcing a failure. [ 250.664530] name failslab, interval 1, probability 0, space 0, times 0 [ 250.675926] CPU: 1 PID: 18294 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 250.682864] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 250.692211] Call Trace: [ 250.694797] dump_stack+0x1b9/0x294 [ 250.698420] ? dump_stack_print_info.cold.2+0x52/0x52 [ 250.703600] ? perf_trace_lock_acquire+0xe3/0x980 [ 250.708432] ? __save_stack_trace+0x7e/0xd0 [ 250.712747] should_fail.cold.4+0xa/0x1a [ 250.716800] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 250.721894] ? save_stack+0x43/0xd0 [ 250.725512] ? kasan_kmalloc+0xc4/0xe0 [ 250.729383] ? kmem_cache_alloc_trace+0x152/0x780 [ 250.734212] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 250.739384] ? __list_lru_init+0x456/0x790 [ 250.743602] ? sget_userns+0x6d9/0xf20 [ 250.747479] ? graph_lock+0x170/0x170 [ 250.751263] ? do_mount+0x564/0x3070 [ 250.754961] ? ksys_mount+0x12d/0x140 [ 250.758746] ? SyS_mount+0x35/0x50 [ 250.762272] ? do_syscall_64+0x29e/0x9d0 [ 250.766321] ? find_held_lock+0x36/0x1c0 [ 250.770369] ? __lock_is_held+0xb5/0x140 [ 250.774425] ? check_same_owner+0x320/0x320 [ 250.778738] ? rcu_note_context_switch+0x710/0x710 [ 250.783662] __should_failslab+0x124/0x180 [ 250.787889] should_failslab+0x9/0x14 [ 250.791674] kmem_cache_alloc_trace+0x2cb/0x780 [ 250.796331] ? __kmalloc_node+0x33/0x70 [ 250.800290] ? __kmalloc_node+0x33/0x70 [ 250.804259] ? rcu_read_lock_sched_held+0x108/0x120 [ 250.809271] __memcg_init_list_lru_node+0x17d/0x2c0 [ 250.814288] ? kvfree_rcu+0x20/0x20 [ 250.817904] ? __kmalloc_node+0x47/0x70 [ 250.821871] __list_lru_init+0x456/0x790 [ 250.825921] ? list_lru_destroy+0x4c0/0x4c0 [ 250.830233] ? mark_held_locks+0xc9/0x160 [ 250.834368] ? __raw_spin_lock_init+0x1c/0x100 [ 250.838937] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 250.843941] ? __lockdep_init_map+0x105/0x590 [ 250.848431] ? lockdep_init_map+0x9/0x10 [ 250.852481] sget_userns+0x6d9/0xf20 [ 250.856180] ? set_anon_super+0x20/0x20 [ 250.860144] ? get_empty_filp.cold.7+0x3e/0x3e [ 250.864712] ? destroy_unused_super.part.9+0x100/0x100 [ 250.869979] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 250.874985] ? kasan_check_read+0x11/0x20 [ 250.879121] ? rcu_pm_notify+0xc0/0xc0 [ 250.882994] ? trace_hardirqs_off+0xd/0x10 [ 250.887223] ? cap_capable+0x1f9/0x260 [ 250.891103] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 250.896635] ? security_capable+0x99/0xc0 [ 250.900774] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 250.906298] ? ns_capable_common+0x13f/0x170 [ 250.910697] mount_ns+0x8f/0x1d0 [ 250.914054] ? rpc_pipe_release+0xb70/0xb70 [ 250.918361] rpc_mount+0x9e/0xd0 [ 250.921716] mount_fs+0xae/0x328 [ 250.925081] vfs_kern_mount.part.34+0xd4/0x4d0 [ 250.929659] ? may_umount+0xb0/0xb0 [ 250.933274] ? _raw_read_unlock+0x22/0x30 [ 250.937410] ? __get_fs_type+0x97/0xc0 [ 250.941308] do_mount+0x564/0x3070 [ 250.944837] ? do_raw_spin_unlock+0x9e/0x2e0 [ 250.949235] ? copy_mount_string+0x40/0x40 [ 250.953456] ? rcu_pm_notify+0xc0/0xc0 [ 250.957690] ? copy_mount_options+0x5f/0x380 [ 250.962087] ? rcu_read_lock_sched_held+0x108/0x120 [ 250.967088] ? kmem_cache_alloc_trace+0x616/0x780 [ 250.971919] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 250.977447] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 250.982975] ? copy_mount_options+0x285/0x380 [ 250.987459] ksys_mount+0x12d/0x140 [ 250.991076] SyS_mount+0x35/0x50 [ 250.994429] ? ksys_mount+0x140/0x140 [ 250.998215] do_syscall_64+0x29e/0x9d0 [ 251.002094] ? vmalloc_sync_all+0x30/0x30 [ 251.006227] ? _raw_spin_unlock_irq+0x27/0x70 [ 251.010708] ? finish_task_switch+0x1ca/0x820 [ 251.015192] ? syscall_return_slowpath+0x5c0/0x5c0 [ 251.020121] ? syscall_return_slowpath+0x30f/0x5c0 [ 251.025045] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 251.030399] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 251.035234] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 251.040414] RIP: 0033:0x455259 [ 251.043588] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 251.051282] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 [ 251.058541] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 2018/04/10 10:27:39 executing program 1: [ 251.065797] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 [ 251.073049] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 251.080305] R13: 00000000000003fb R14: 00000000006f9028 R15: 000000000000000f 2018/04/10 10:27:39 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) read(r0, &(0x7f00000000c0)=""/33, 0x21) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) umount2(&(0x7f00000075c0)='./file0\x00', 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$int_out(r1, 0x2, &(0x7f0000000000)) 2018/04/10 10:27:39 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) socketpair(0x1b, 0x806, 0x8, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000040)={0xffffffffffffff00, 0x0, 0x0, 0x4}) ioctl$DRM_IOCTL_SG_FREE(r1, 0x40106439, &(0x7f0000000080)={0x100000001, r2}) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:39 executing program 1: 2018/04/10 10:27:39 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]]}, 0x178) 2018/04/10 10:27:39 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x3]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:27:39 executing program 1: 2018/04/10 10:27:39 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x2000000, &(0x7f000000a000)) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'trusted.', '.^&user\x00'}, &(0x7f00000000c0)=""/150, 0x96) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f00000001c0)={0x4, 0xffffffffffffff9c, 0x1}) accept$alg(r0, 0x0, 0x0) umount2(&(0x7f00000075c0)='./file0\x00', 0x0) 2018/04/10 10:27:39 executing program 2 (fault-call:5 fault-nth:16): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) 2018/04/10 10:27:39 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfcc4, &(0x7f0000000180)={@empty, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@mpls_uc={0x8847, {[{0x260a, 0x8001, 0x3, 0xfffffffffffffff8}, {0x3, 0x401, 0x3f, 0xfffffffffffff001}, {0xb12, 0x6, 0x92, 0x401}, {0x6, 0x8, 0x1f, 0x1ff}, {0x8, 0xfffffffffffff1eb, 0x8, 0x3}, {0x6, 0x3780, 0x4, 0x8001}], @generic="53c29022f0ec61c61468d76fba06e9208294dbd8aa7705c500732663a9839fcdd614be6944b107e6c82cf3caad7cbef677d991bb2e5afe0a387c7a037033f4d9562da81053e9cc83360d3eeaeabd661380e0d997d85d7cecc9fe1451d7e4eaea4a4102ed3537018fa1a404a3d9c5ae7042e81b1244202fa8b415272cd4fb2ee458f047f1aebffc8b177f5987a2e689bfb4e79c2995dffb768d1c20c9c9a4c7c192249c1d3749be5ab9fcfdf4054f07572e27b78b28eb734d792b97f02c753badcf0ec02d09ef8a40f3dd2458df4b32ee242db5e4cb2d"}}}}, &(0x7f0000000280)={0x0, 0x0, [0x0, 0x80c, 0xfffffffffffffffe, 0x4c4]}) recvmmsg(0xffffffffffffffff, &(0x7f0000000300)=[{{&(0x7f0000000040)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, 0x80, &(0x7f00000002c0)=[{&(0x7f00000000c0)=""/190, 0xbe}], 0x1, 0x0, 0x0, 0x5}, 0x4}], 0x1, 0x40, &(0x7f0000000340)) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f00000003c0)={0x80000000, {0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e22, @broadcast=0xffffffff}, {0x2, 0x4e20, @multicast1=0xe0000001}, 0xa1, 0x6, 0xfffffffffffffff8, 0x80, 0x8, &(0x7f0000000380)='ip6_vti0\x00', 0x9, 0x3b5, 0x1}) 2018/04/10 10:27:39 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000001c0)=[@in6={0xa, 0x4e24, 0x1, @empty, 0x9d}, @in6={0xa, 0x4e20, 0xdf, @local={0xfe, 0x80, [], 0xaa}, 0x2}, @in6={0xa, 0x4e20, 0x10000, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, 0x1}, @in6={0xa, 0x4e22, 0x1, @local={0xfe, 0x80, [], 0xaa}, 0x3}, @in6={0xa, 0x4e21, 0x7, @mcast2={0xff, 0x2, [], 0x1}, 0x6}, @in={0x2, 0x4e22, @rand_addr=0x400}, @in6={0xa, 0x4e23, 0x10000, @dev={0xfe, 0x80, [], 0xf}, 0x2}, @in6={0xa, 0x4e23, 0x582, @mcast2={0xff, 0x2, [], 0x1}, 0x1}], 0xd4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}, 0x8000000001}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) socketpair$inet6(0xa, 0x0, 0x81, &(0x7f0000000040)) 2018/04/10 10:27:39 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e24, 0x1000, @remote={0xfe, 0x80, [], 0xbb}, 0x9}, 0x1c) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:39 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) umount2(&(0x7f00000075c0)='./file0\x00', 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) 2018/04/10 10:27:39 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x6000000]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:27:39 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x9, 0xc80) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000200)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) accept$netrom(r0, 0x0, &(0x7f0000000380)) pipe2(&(0x7f0000e3eff8)={0x0, 0x0}, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) dup3(r4, r3, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r5 = userfaultfd(0x0) ioctl$UFFDIO_API(r5, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r5, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r6 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r6, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(r5) 2018/04/10 10:27:39 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]]}, 0x178) [ 251.599142] FAULT_INJECTION: forcing a failure. [ 251.599142] name failslab, interval 1, probability 0, space 0, times 0 [ 251.610479] CPU: 1 PID: 18357 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 251.617410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 251.626771] Call Trace: [ 251.629377] dump_stack+0x1b9/0x294 [ 251.633030] ? dump_stack_print_info.cold.2+0x52/0x52 [ 251.638236] ? perf_trace_lock_acquire+0xe3/0x980 [ 251.643074] ? __save_stack_trace+0x7e/0xd0 [ 251.647397] should_fail.cold.4+0xa/0x1a [ 251.651456] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 251.656546] ? save_stack+0x43/0xd0 [ 251.660163] ? kasan_kmalloc+0xc4/0xe0 [ 251.664038] ? kmem_cache_alloc_trace+0x152/0x780 [ 251.668866] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 251.674043] ? __list_lru_init+0x456/0x790 [ 251.678265] ? sget_userns+0x6d9/0xf20 [ 251.682143] ? graph_lock+0x170/0x170 [ 251.685929] ? do_mount+0x564/0x3070 [ 251.689628] ? ksys_mount+0x12d/0x140 [ 251.693411] ? SyS_mount+0x35/0x50 [ 251.696939] ? do_syscall_64+0x29e/0x9d0 [ 251.700995] ? find_held_lock+0x36/0x1c0 [ 251.705054] ? __lock_is_held+0xb5/0x140 [ 251.709112] ? check_same_owner+0x320/0x320 [ 251.713423] ? rcu_note_context_switch+0x710/0x710 [ 251.718349] __should_failslab+0x124/0x180 [ 251.722575] should_failslab+0x9/0x14 [ 251.726361] kmem_cache_alloc_trace+0x2cb/0x780 [ 251.731021] ? __kmalloc_node+0x33/0x70 [ 251.734989] ? __kmalloc_node+0x33/0x70 [ 251.738959] ? rcu_read_lock_sched_held+0x108/0x120 [ 251.743975] __memcg_init_list_lru_node+0x17d/0x2c0 [ 251.748989] ? kvfree_rcu+0x20/0x20 [ 251.752609] ? __kmalloc_node+0x47/0x70 [ 251.756576] __list_lru_init+0x456/0x790 [ 251.760632] ? list_lru_destroy+0x4c0/0x4c0 [ 251.764942] ? mark_held_locks+0xc9/0x160 [ 251.769115] ? __raw_spin_lock_init+0x1c/0x100 [ 251.773685] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 251.778697] ? __lockdep_init_map+0x105/0x590 [ 251.783182] ? lockdep_init_map+0x9/0x10 [ 251.787235] sget_userns+0x6d9/0xf20 [ 251.790934] ? set_anon_super+0x20/0x20 [ 251.794898] ? get_empty_filp.cold.7+0x3e/0x3e [ 251.799467] ? destroy_unused_super.part.9+0x100/0x100 [ 251.804736] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 251.809742] ? kasan_check_read+0x11/0x20 [ 251.813881] ? rcu_pm_notify+0xc0/0xc0 [ 251.817756] ? trace_hardirqs_off+0xd/0x10 [ 251.821983] ? cap_capable+0x1f9/0x260 [ 251.825864] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 251.831389] ? security_capable+0x99/0xc0 [ 251.835527] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 251.841058] ? ns_capable_common+0x13f/0x170 [ 251.845458] mount_ns+0x8f/0x1d0 [ 251.848812] ? rpc_pipe_release+0xb70/0xb70 [ 251.853121] rpc_mount+0x9e/0xd0 [ 251.856475] mount_fs+0xae/0x328 [ 251.859834] vfs_kern_mount.part.34+0xd4/0x4d0 [ 251.864404] ? may_umount+0xb0/0xb0 [ 251.868027] ? _raw_read_unlock+0x22/0x30 [ 251.872164] ? __get_fs_type+0x97/0xc0 [ 251.876044] do_mount+0x564/0x3070 [ 251.879570] ? do_raw_spin_unlock+0x9e/0x2e0 [ 251.883973] ? copy_mount_string+0x40/0x40 [ 251.888192] ? rcu_pm_notify+0xc0/0xc0 [ 251.892075] ? copy_mount_options+0x5f/0x380 [ 251.896476] ? rcu_read_lock_sched_held+0x108/0x120 [ 251.901479] ? kmem_cache_alloc_trace+0x616/0x780 [ 251.906314] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 251.911927] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 251.917455] ? copy_mount_options+0x285/0x380 [ 251.921944] ksys_mount+0x12d/0x140 [ 251.925562] SyS_mount+0x35/0x50 [ 251.928915] ? ksys_mount+0x140/0x140 [ 251.932709] do_syscall_64+0x29e/0x9d0 [ 251.936585] ? vmalloc_sync_all+0x30/0x30 [ 251.940722] ? _raw_spin_unlock_irq+0x27/0x70 [ 251.945205] ? finish_task_switch+0x1ca/0x820 [ 251.949688] ? syscall_return_slowpath+0x5c0/0x5c0 [ 251.954605] ? syscall_return_slowpath+0x30f/0x5c0 [ 251.959525] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 251.964882] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 251.969715] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 251.974891] RIP: 0033:0x455259 [ 251.978072] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 251.985768] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 [ 251.993026] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 [ 252.000282] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 [ 252.007538] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 252.014793] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000010 2018/04/10 10:27:40 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) move_pages(r1, 0x5, &(0x7f0000000040)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil], &(0x7f0000000080)=[0xfff, 0xfffffffffffffffb, 0x6, 0x9, 0x5, 0x7b69], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) 2018/04/10 10:27:40 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) umount2(&(0x7f00000075c0)='./file0\x00', 0x0) r0 = request_key(&(0x7f0000000200)='big_key\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000180)='vmnet1mime_t0:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, r0) 2018/04/10 10:27:40 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x163) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:40 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x6233, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(r0, 0x1, 0x0, 0x10000000) 2018/04/10 10:27:40 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]]}, 0x178) 2018/04/10 10:27:40 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x700]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:27:40 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000040)={0x0, 0x94, "e79ef83ad18cd8d2a0f9a9e77e9c4169e17b19ddac68520e142ce08d6f734f1d71648e5f9491387d39e082223d7564b2d9411cee4cbf1f7eaa4bdd246a40a4260e8e91f3f65e0ff7b79910a4dba1c8a7758d6ea920035e205f0382972f87e3fd9933a4d60f0465a6a6c032751cc08d2c3d71db74439fead394a07ea33e90f6d418dca81edd05825537aa4c8a1695df06df3e243b"}, &(0x7f0000000100)=0x9c) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x7}}, 0x5, 0x4}, &(0x7f0000000280)=0x90) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000340)={r1, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}, 0xe7, 0x8, 0x3, 0xd047, 0x67}, &(0x7f0000000000)=0x98) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000002c0)={r1}, &(0x7f0000000300)=0x8) 2018/04/10 10:27:40 executing program 2 (fault-call:5 fault-nth:17): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) 2018/04/10 10:27:40 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]]}, 0x178) 2018/04/10 10:27:40 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x20000000003, 0x2000) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000100)={0x7, 0x1}) umount2(&(0x7f0000000140)='./file0\x00', 0x1ffffffffffb) r1 = socket$netlink(0x10, 0x3, 0x4) write(r1, &(0x7f00000000c0)="270000001400070000010000120f0a0011000100f5fe211b366912d86283b9391a5b8ccaf1e800", 0x27) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x20) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) umount2(&(0x7f00000075c0)='./file0\x00', 0x0) 2018/04/10 10:27:40 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe2(&(0x7f0000000200)={0x0, 0x0}, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x6) r5 = dup3(r4, r3, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000decfe0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r5, 0x4010ae74, &(0x7f0000000000)={0x0, 0x1eca}) ioctl$KVM_NMI(r4, 0xae9a) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x852, r6, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x8972, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000000c0)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000040)="b907020000b851000000ba000000000f300f013ed808c4c27d5a8805000000b9800000c00f3235008000000f30b83f5e00000f23d80f21f835800000300f23f8660f1ac965640f001ef3262e0f013266bad10466ed", 0x55}], 0x1, 0x0, &(0x7f0000000240), 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r5, 0x8008ae9d, &(0x7f0000000240)=""/248) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/10 10:27:40 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x4]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:27:40 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 10:27:40 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x9, 0xc80) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000200)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) accept$netrom(r0, 0x0, &(0x7f0000000380)) pipe2(&(0x7f0000e3eff8)={0x0, 0x0}, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(r3) 2018/04/10 10:27:40 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x5, 0xfffffffffffffffb, 0x8, 0x4}, {0x1, 0x9, 0xffff, 0x100}, {0x9, 0x1ff, 0x5}, {0x75, 0xfffffffffffffffc, 0x4, 0x3}, {0x1, 0x10000, 0x8, 0x3}]}, 0x10) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) r1 = syz_open_dev$adsp(&(0x7f00000026c0)='/dev/adsp#\x00', 0x0, 0x200100) recvmsg$kcm(r1, &(0x7f0000002980)={&(0x7f0000002700), 0x80, &(0x7f0000002840)=[{&(0x7f0000002780)=""/7, 0x7}, {&(0x7f00000027c0)=""/119, 0x77}], 0x2, &(0x7f0000002880)=""/220, 0xdc, 0x4}, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) [ 252.562636] FAULT_INJECTION: forcing a failure. [ 252.562636] name failslab, interval 1, probability 0, space 0, times 0 [ 252.573976] CPU: 0 PID: 18423 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 252.580913] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 252.590272] Call Trace: [ 252.592871] dump_stack+0x1b9/0x294 [ 252.596520] ? dump_stack_print_info.cold.2+0x52/0x52 [ 252.601718] ? perf_trace_lock_acquire+0xe3/0x980 [ 252.606556] ? __save_stack_trace+0x7e/0xd0 [ 252.610871] should_fail.cold.4+0xa/0x1a [ 252.614924] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 252.620019] ? save_stack+0x43/0xd0 [ 252.623632] ? kasan_kmalloc+0xc4/0xe0 [ 252.627508] ? kmem_cache_alloc_trace+0x152/0x780 [ 252.632336] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 252.637608] ? __list_lru_init+0x456/0x790 [ 252.641825] ? sget_userns+0x6d9/0xf20 [ 252.645699] ? graph_lock+0x170/0x170 [ 252.649484] ? do_mount+0x564/0x3070 [ 252.653179] ? ksys_mount+0x12d/0x140 [ 252.656963] ? SyS_mount+0x35/0x50 [ 252.660488] ? do_syscall_64+0x29e/0x9d0 [ 252.664539] ? find_held_lock+0x36/0x1c0 [ 252.668587] ? __lock_is_held+0xb5/0x140 [ 252.672644] ? check_same_owner+0x320/0x320 [ 252.676956] ? rcu_note_context_switch+0x710/0x710 [ 252.681876] __should_failslab+0x124/0x180 [ 252.686101] should_failslab+0x9/0x14 [ 252.689886] kmem_cache_alloc_trace+0x2cb/0x780 [ 252.694537] ? __kmalloc_node+0x33/0x70 [ 252.698501] ? __kmalloc_node+0x33/0x70 [ 252.702466] ? rcu_read_lock_sched_held+0x108/0x120 [ 252.707472] __memcg_init_list_lru_node+0x17d/0x2c0 [ 252.712479] ? kvfree_rcu+0x20/0x20 [ 252.716092] ? __kmalloc_node+0x47/0x70 [ 252.720059] __list_lru_init+0x456/0x790 [ 252.724109] ? list_lru_destroy+0x4c0/0x4c0 [ 252.728422] ? mark_held_locks+0xc9/0x160 [ 252.732556] ? __raw_spin_lock_init+0x1c/0x100 [ 252.737123] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 252.742126] ? __lockdep_init_map+0x105/0x590 [ 252.746611] ? lockdep_init_map+0x9/0x10 [ 252.750661] sget_userns+0x6d9/0xf20 [ 252.754359] ? set_anon_super+0x20/0x20 [ 252.758322] ? get_empty_filp.cold.7+0x3e/0x3e [ 252.762894] ? destroy_unused_super.part.9+0x100/0x100 [ 252.768159] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 252.773162] ? kasan_check_read+0x11/0x20 [ 252.777295] ? rcu_pm_notify+0xc0/0xc0 [ 252.781171] ? trace_hardirqs_off+0xd/0x10 [ 252.785398] ? cap_capable+0x1f9/0x260 [ 252.789281] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 252.794802] ? security_capable+0x99/0xc0 [ 252.798938] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 252.804460] ? ns_capable_common+0x13f/0x170 [ 252.808857] mount_ns+0x8f/0x1d0 [ 252.812211] ? rpc_pipe_release+0xb70/0xb70 [ 252.816520] rpc_mount+0x9e/0xd0 [ 252.819875] mount_fs+0xae/0x328 [ 252.823232] vfs_kern_mount.part.34+0xd4/0x4d0 [ 252.827800] ? may_umount+0xb0/0xb0 [ 252.831412] ? _raw_read_unlock+0x22/0x30 [ 252.835544] ? __get_fs_type+0x97/0xc0 [ 252.839418] do_mount+0x564/0x3070 [ 252.842942] ? do_raw_spin_unlock+0x9e/0x2e0 [ 252.847338] ? copy_mount_string+0x40/0x40 [ 252.851554] ? rcu_pm_notify+0xc0/0xc0 [ 252.855435] ? copy_mount_options+0x5f/0x380 [ 252.859831] ? rcu_read_lock_sched_held+0x108/0x120 [ 252.864837] ? kmem_cache_alloc_trace+0x616/0x780 [ 252.869670] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 252.875198] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 252.880720] ? copy_mount_options+0x285/0x380 [ 252.885213] ksys_mount+0x12d/0x140 [ 252.888825] SyS_mount+0x35/0x50 [ 252.892265] ? ksys_mount+0x140/0x140 [ 252.896054] do_syscall_64+0x29e/0x9d0 [ 252.899939] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 252.904773] ? syscall_return_slowpath+0x5c0/0x5c0 [ 252.909693] ? syscall_return_slowpath+0x30f/0x5c0 [ 252.914614] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 252.919970] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 252.924804] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 252.929977] RIP: 0033:0x455259 [ 252.933148] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 252.940843] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 [ 252.948185] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 [ 252.955440] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 2018/04/10 10:27:41 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) socketpair$inet(0x2, 0xa, 0x91, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000000)={'security\x00'}, &(0x7f0000000080)=0x54) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) [ 252.962692] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 252.969946] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000011 2018/04/10 10:27:41 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) write$binfmt_aout(r0, &(0x7f00000001c0)={{0x107, 0x1, 0xfff, 0x321, 0x2cc, 0x5, 0x10d, 0xfffffffffffffffd}, "2d6594cc44d01ee3c5a7c18a60e64e6d7a34285bde31f30652d1f774b6cec545431fdc1dbdbf9f486f6ace93d20b3b3cdefe200968197b1031bae6", [[], [], [], []]}, 0x45b) 2018/04/10 10:27:41 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0x8, &(0x7f0000001400)=[{&(0x7f00000000c0)="ac13737433339c262b76b68e5b1c5ffac73111657ec2bc74bf", 0x19, 0xffffffffffffe6a6}, {&(0x7f0000000100)="93eac0c170342cbc3e12b68cf68299b94cc860c26534d609625e336450c0db226aba3e45ff919820274a746195450eb2", 0x30, 0x8}, {&(0x7f0000000140)="544470aac24a34dfb65db2e4565ad51e68f6a594fc2d77e259a78c0808717adb59e959ce639dd33f279cdcc2afced7585c5425850093ec6c57e1f6f8619e1ebee169770a35ca04e8a7b8f0a42192788eb7a328b9b6160dfb9387776d9ce9bef62839d0adf1eb8e59235182b05d6b92fb6547abeb1c27958455e7b1a39702f3d137621679cc1ee35cbced386358e29e1b766455200958e7c7b488ac420a98aee133bbc7ae160d6cda", 0xa8, 0x6}, {&(0x7f0000000200)="6c6db8067bbbea3818f7a74ea050d4938a480d9890f9ad4c742351558edbf21b1023f819d3dee19f544d4ee73447f41520aef22580e46ee829c54b084e7538407be4d5c27a48ac7087144fac1423dbeab4904d5752f6d07415f4a199e31d30940951d8c8355b1b582bb0af5586627de8df719da32611a6535e55246f92c70b5a31ed5c06d9677109b364c38ad80342de1b276b47ec169d3e98cd94d69c138e0a48acd0000f2c1a62c32c9db1efa8128ec5e6de55321cebc7c87edb25cbf70a0164859f38b93690708ef7abd27ae5c364ca95345b106d36dc744b0325866ef91b8ab5ffc3326b08ab4f93ebc3a44d825dbc3efc6463eac8db49893fdb56399377f0dc7ba4d14e512431b95848ac6bd710c0524c1860e1d2991661f554f0ea9536752e3fca98fbdc3843cef60d0ddf498e7de321c116eadda79ae71d4902cbf90527482a8ade7dc54870e4d218f72e5c1bf7e8ad499b3b625983fb8882e0b04906616a1fa874b1f197a626591f5ba092efd1891e5d5abc39f79ad8e042404623ed1c0c2edcb6dd9d9cd5f70f7038f389718f08f7bf640cccc1c98f862d4417484270b348929260773383a67fc4ece135d4b39df041aad2764e417a8950954603e7ad2edc83e92e4a62a92125672dd46985ddbd6ef9061dd464afb59487942ab39abc26e959e011012248cb2cfa1ee80c17da6c1e77cd68350c94f64cdc67c5dffbeb73e2251e1a00d6d7dc10b748f322516d19154c51c239df7e540adbf909d66a0b269af8037d08681d6b49a7f788ec8907ad9156436419c094ffbb2e7165c2e7a9f34876e11f43c46e4e6fca8b0c63a7e75b04f139f48a3122d8e894b7b431c889b0ef280586737a502b4928d3b544d44f6f03afa222fe66baf87ce8fb4dbba213caa2f13b3c5c8e45e9bf148a345c439c0f31aec124c5c76121005de57033055564cb7208107d53d5193b9b502002fcd3bd0b9a8962d58d28243f63e21c763e258c66259cc62ba1fef1cf10b2122ee3594bd203958f81a8b8ce91b82e382e9b7339c34761782688c8733f6c8ad709cfc2276ed5707e4f99f0dda2c90eacf354c4aa6c2da3e8caf93932a83c847954a5e2cac9144209e1c854b201dcae53f586d60d51cf82e232c8d7292785c0bc6ea0ff3f81ab6639597db32191d015f1a3763e0770c4c14c10685480c35f7cf4c37f26a657ab61aafb8c4dae29c6031e83548363ffd53f8a19bceb7b2094008ec4f11bd6c8500ad71f8adc457f3a1368ebb9028e399baa7f5a4235b10589c844dc3886358bb8dc19e3f6756232c2e0833a838cc6990f2c866c36ac3439f78b428c2bed03ae66ad6b69014f5d9b1c4b9a266367f366804c7bf97cb481439a03740c47c743eac0e2d5bdc67adf331056d5004aef872888e0322c579fc73ec9abb8aabda36bf928542d39f0174fa08484d21a7a820bba0036e7b2d23f6fa18eab4381a6f1b4eb17ff1a370c73c3833e82886102d4be4db2428c6c8bea7a192fb017d9d244450758ec5747e27d6bb1bcb074572bc7e89961bc675ca249e01cafb821097ee25c7e3e2cf659a55fa05c2a255cefaff308cb76c66180d2685e6572b92670f16d98af519779699811f556199ed6f9cf17b5cecbcd133f3df626ed77c2fff2f36693e47d00c43fee42f1df77ef8b2c852cceac6dd81fdd5245e42cbece432a21df90b7d204b6b88f0f94c9f1acbd0b16dbdd2bb3ed20e5ba2c99866fd28f6e75d36aa209a24be2b474306a3fe8bf171f126a3525fc3e6303af39f4bd44b2199c5a2036eaada6fa8e789f242439dfbdff226fdd0239d1810e0953eaf0a487cfed378ea544630b75daf77fd384ab2182a63357da87dd2bbb36fd43d33551b16bba4da7c2e342c43424597b334868dfb24c0c088d68d012df0f55bdd83b94b943195235be09e00b004c7fecaa2b5cab76cd284f8a2227f7f092d807dde1a47a02d179bc1d0e7fa72ad5846a3a14c6afac46febf673234ca4141c1397b17d60d77f80f996035042791f35e87f60269667630fad757a6c9112c936e05505c6bb20a532c847a0d17d3ab2b006fab30dd5197ad84de66f75c1e73a30a3029c98071af26eca32d368b0caac200acd399d7be4970040d054d88fc8d17657ab93283c5f89e549d23113fe035d865e1fbd4417e36a562f33062701adda6c2b297b067c60bab03d0d58a6da3d3d06ca56f368acbea36e19e0ef2bf5d87295c3b1ad7f8b76949ea1d18bc5d9bf135163153290b51fc5a41762fa2156e1bd4eb9845df00129d56b70530e1960a03f65ff5425c0eae34c6240d36f4f192de40bc217b556edd52688214668a3c5e0363555b456069057cd690c76f5f9aeb33144f9e99eb2c9f81f18c051853897bacbeac72f52c8c2d383ee1a9fa1c9c61c9dad37b36ae2472e4588d7815849d22b68c34ca2f76b95a61fe5cf8fa406e97a5148966e165564d4305463430fd70c6b68499614ac8a07940c7dcbb6efb49ca49a1e8ed249699c9b1b004e98a0612c8eacf0845f1a8beaf4a256d000afb301c327abd929fca186ba015361ac5351829a9ed3b8ca3436d72dce6882f84c2ab535dff69f31541c5f940bea184a7b03da111fc59c77a039710d77bb41f4315fbc09ea06f0aef98dc24ed567b7760dd4910fd947410bd7fbebe12bfc595076ab317190d4949e6e6e3dd9c6b54ca529a00666cd6c090a52677f18485bf5c9b44b5f79401a728909611d5c0ca7d52aab124cf108d8f82e601cadeeb8dfa196ee866688b027c84ae89e5cf478b749fb3da289dae48c67da6935a9a400da7179a3c7b8db58e9312acd4f1bb2cdbba79067ae8986c2a7fc47aa814039441c5ae6665c8b10778bd157821d5187150603cf07322dabea828dff08dfd0ffaab875b8f54173f5c59d459a15c5bc80377a9e70d21cfdc4732ea69c27c1caf1924f49c1122538bcdb31d655623b41c98c98ab6650fcf56155dab3d8decff0f6945cba7d22faccbb9777613f9fdc890ae2b19d83082f5319903826bdf301612ca5049acd9d1f727b6c0460bc02445ca6915909b1f740d86e785b3b87f71b2ce147d0a62bd11f78890c911da679edde13a6ea3d819f8dfa62dab33fa529ce80d300141adf5c02040a4fb25d461e7146735a3932afa04f2695eeaf8bee1bc3719956b98ab93a56d07dd6a6a41d31571ac02c2210ea2d79b7ff10aead97215d96e92bca229d9a0661cadbcc819afa64795f42047dd02f0e07470b4ebb241044e0e5753fa5b598cd5ebb591235f8d1400e26887249ce02d77cecb912404d05bb7bdc65f6fa4287cb974f0d199ccce18ca5fb56058259a81e80a106614682df69cf5e47484f9b1afda19f7fe4bd0d426b6b1bf6e2e55ade4f8979ac1bc67bcb7ad13b51b2c23d3619f28ab57962136f79cb628006a0fe2f2faa014f24ce94f2e9721b1f244155ecbc76a865179c8fa456af38db501b113fbb30984ea908cddffaeb45def8de7ee14b97d479db522922ec1d563ac79a18b3fd01dd4180ce35320a62627fa389b94ae1b0b76a834dea5c59ad485e936ea46940cdade9efa0f684b06f532c21ebd5257ce308198337a6f83ea9938100f4ddbfd7076a93d3eaf1b7a853323ee39b6c569586b76ec38993c27d49699ccf2ad35822a83347b0fc9f2e8af40ef109fbfd95bba2c5d5ea3d0d8c116e39881d8751e1115259e6f951374e21b5ea07a0ebf8a6233f082cd7b8d89030f0e4644b1746dd38998c120dd3b5dd135b15d46cabeaac52354f06e1b5ec41880b08a5e033a45a33de65b96c0589e52a7b6db1c9d7c31357ec7543257a20d044b30ea3ba8aa242e21ddc8328e06b5fa54d438585cd3e1c0c66d80fafe8a8aa58f5de076c7be69e4465281c9099553a9418b26ac585372826687dd1b24cd0899ea0f3cb8965810a23403912a61b34f5794af51904cf3fc3d1c9ca3ef7862ad462c4063d69b37b632fefcdbb492851757901b9b7abd040dfb3d1472cf11a0972fe2bad6b61934bab8d2b7566eaa1a567441690232778653a38908ed9ebde3de6394b202111e419674dbab36473716e6b22fa8a03aabb116842dc2e2678845babb78107fe85711af6ad6a3a46d80bd91d8116662409f0a0142bf3f2ae57f6b505eb39e3981e3aaeb2193eee51573ebb97bd54710f9022bb7fe172eb8f4628e7168b15d16344137fe1a3f8f2e689a8499aaf92fa56f355959fe4719dc1402622d6bab144266ae0ab7d958602f3c62ba4237b844780c999b20090cf2aa18eb3f8df060698c91bc3a466d237a792a0574fb9fbb9b0281cdf523d80cba540bf25bf9ba4a2164524160eeb046a087347b56625cfa8930f1bd894c6fb0459a91d725b4d82df4c7151b4943dd19122d7eb265c13d550ab50f51aee3d6c4495f8a4d50e0f148c653381cbd1a5f7d67a6e8ae252ee458c77521ce719965a55c4369c2a799d14c68b8af8786af86fbd6ff2016a3c03fee9bffb99f1d7a07d64d90dd07bde4656eaa3254eed58d2bc5f4ba3aaf7254009ea3aed841bd06a54df04d89e54bacd05e6dc9e86e213dcc24b69e4d08d6718cc752d725f3cb99310bc25daaf52488a9b9407356e4a22de3970939b9506034631d095a0c2458cfdb2e49cf4a9b26d2c3e842a37c47de3e5df067886a70899135a63c86290ded70c43478acd0cd127846cfa6d7aa2bf22345b5d5ede312a7564e8e827ac1262320b51ec79b85bf05fcf1b9dbfff7af276d92c2320fa3262acff56454a11f688ecca965f62d514bbaffab4d92c34c67625018da5673c03e9da774a09a56a02c19fb37fb21571f4b5c6b5b25bc9d105984a397628011d6efd9ff2aece8e276b39582ec9b6da511c1aed3a2fac55118ee59d64dbf2cbc3bf85e3125cf71dcaadb41781633b393781d8ed6e8b2a1b4cc1ad832e1518337849fcbfedc78fea8749a84a66a8f061d2793c291e99c463b2f36a23670d5b030dd6787fd9a0f1b811361e5e5ed22c1eeb825a0bee701568a3eb60f7a62c9145e423555a1a80af83ba6a8fedc568ca85beaf9e1f24292bd70c7600c08b05463e0475566bc727674150d0485f06a5e92e9ef453f130262d0e929cbdefd78154d04fd3f013db53632e89993cf3079856c4afae3b41b305ff0e55d5aaefbef24de2032c54659ba474f1391418a3a5dd22e61661c3757f19605ec98001bca42d88255d375aeb866e556ad5a9aa5f454ddfd11e8fca3b22c1fb3fdfebff7739cffc8eb587782eb29adafd4a3c7d1309a961fb60a8bd84f7aec22a9f968f5a0f67eda9c419d4c732fb027c2823eb33ed73e94edf92c399c4a4431ad30fb490ba1418f2734cb530180849cffda4cb1aa0cbe658d379b4bed6c45416f6fe8ee11abe2ddfb9d2b79a15c8aaf2fccfbbcb5c753179e438ee2250015d4e1aac7e5cb010c2af563c06b6eb9956ae26393f93e1372b10dd66cde1076b2eacbf9b032688873974c394f7aa2300bbddd0e819ab92bc1e4979f2412c526f8d9ae2f77d12d20e10dd7bb8474e9c16ce51af34bcb733068d1afed453e8d29601ffa3e8364d0f032bf11730d7386e67411c613bb21d0e809730715d9729f7241e54e5d810738b686eca03813cb991680c0d3658c8ba1d8922c1a3612762e39bb70fc3b0518e90af00adff4a7324df01443c3d613632d9c17d6f9e79e09a899eb4d381b07e24aa1574f6bdcd32b64893227a761c67e36a70ee7a1e8e29ef5fc45d6b4ed3323fe69397aa08595cc70bcdd22ec4ab16105455e7555192b016253fe3e7c49a52d9e064b8a9c3d0f8cbe9effbe487b", 0x1000, 0x9}, {&(0x7f0000001200)="2652540b00d0991906ca6a13c3a28e745d69781f9133fd2cde95208b49615071da0d61a38796fc931efcfd83401f26cdf4c5bad01f337f572e5428b9c83df7d19c76b77c7eddad7aff537bc7934819045402b0039d752cfec474ce2e821caf57b22075e8b75e3a91f1b99ae6350d7147161727d6a52a7ee12cb281bd23d1e783ec2efcf807661d2e14", 0x89, 0xad0}, {&(0x7f00000012c0)="7588ce013dc64076bc395270fc2cff24e3f501dbc3f2dea6051f6daa6f95566f8def98a8d2c1fc36289e69386780855883", 0x31, 0x7}, {&(0x7f0000001300)="1a356ff93f196acdc7a2ab1a7a7cbf64bd9588f0842c5ee5465cdf861c54405257841ffbb7f3659e30137bc0c1bafde404dc9b3984c877acd6", 0x39, 0xffffffffffff0000}, {&(0x7f0000001340)="ea2e5e1cdc28d3d9a700aae6cab0d7287951da29bf4bd6bd6101a3e51bf041026844ff7beb7b6aec53b663f750d3c3509ade63b5af1ac5d0a400de463cf95534e3bea1b83c0b304ce6614040743d67ee78a01f85e2647862ed686fdd312dfc41c6ce56fed1555181a6946cbc2baae45bcacdad955adc3e1faf5459f5b35ad263cafb8c6bf8d6f069dd215968f988b8e396", 0x91, 0xc42}], 0x184000, &(0x7f00000014c0)={[{@nls={'nls', 0x3d, 'iso8859-14'}, 0x2c}, {@gid={'gid', 0x3d, [0x37, 0x0, 0x39, 0x37, 0x30]}, 0x2c}]}) umount2(&(0x7f00000075c0)='./file0\x00', 0x0) [ 253.050095] syz-executor4 uses obsolete (PF_INET,SOCK_PACKET) 2018/04/10 10:27:42 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]]}, 0x178) 2018/04/10 10:27:42 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x300000000000000]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:27:42 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x9, 0xc80) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000200)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) accept$netrom(r0, 0x0, &(0x7f0000000380)) pipe2(&(0x7f0000e3eff8)={0x0, 0x0}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(r2) 2018/04/10 10:27:42 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r1, 0x54a3) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0x8) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x8c1, 0x0) setsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000040)={r2, 0x509}, 0x8) 2018/04/10 10:27:42 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x20000003, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, 0x10000000000000}, 0xfffffe41) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:42 executing program 1: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$minix(&(0x7f0000000040)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1, &(0x7f0000000400)=[{&(0x7f0000000380), 0x0, 0x1f}], 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fsync(r1) r2 = open(&(0x7f0000000300)='./file0/file0\x00', 0x800000000002040, 0x100) rmdir(&(0x7f00000008c0)='./file0/"ile0\x00') open_by_handle_at(r2, &(0x7f0000000000)={0xa, 0x1, "0f05"}, 0x400) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f80100", 0x18}], 0x112, &(0x7f0000000240)=ANY=[]) syz_mount_image$vfat(&(0x7f0000000340)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1, 0x1, &(0x7f0000000500)=[{&(0x7f00000003c0), 0x0, 0x7}], 0x40001, &(0x7f0000000f40)=ANY=[]) r3 = open(&(0x7f0000000080)='./file0\x00', 0x4000, 0x0) syz_mount_image$xfs(&(0x7f00000005c0)='xfs\x00', &(0x7f0000000600)='./file1\x00', 0xfffffffffffffc03, 0x0, &(0x7f0000000b00), 0x2003c, &(0x7f0000000680)=ANY=[@ANYBLOB="0000000000000000adffa7dd02eabfef5d68996c43d3701aa6cc60d59cf8cad9642359dcbb19f2151aafb2c8190eb5ece69663caf6c48d65322aa2761cd77bd8d8db7283cfb542c5e79595d260907dfab452faca5fca186f9afe536c8047004334a0666d6f77b7378ff37f84e798d5dcdc3c05ee6240de98dfb3ceaa40d570f3a0ce6fbf2a553d7cc434689bb25bc2c655443fd5766d5f1d6518d02418868d816455d3a0ce018decbec621ee2d2ecd1460abc603402030eabc2dc5"]) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000ec0)=ANY=[], 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000", 0x15}], 0x0, &(0x7f0000000240)=ANY=[]) vmsplice(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000140)}], 0x3da, 0x7) syz_mount_image$minix(&(0x7f0000000140)='minix\x00', &(0x7f0000000240)='./file0/file0\x00', 0x80000000, 0xaaaaaaaaaaaac86, &(0x7f0000000440), 0x140004, 0x0) fsync(r3) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000900)=ANY=[@ANYBLOB="345eccc56b90fc8e7485f577481b6655f138490875710ed2030000000000000010c32018df43dbfbed4f24000000000000b6da04859786f7842a3a7c235d208ae6f4cfab25894e513969b5703e58d8d5f2ce0000e24b84a4651a955e1273b85077d112d79f2f3448ac58441d5752f63d77edb1293da6cd5eb38c9ae984be27fc128a2ca8c46bdaab74e58b329e1d815e47d0140767a3c8ffed46c9dd178bedfef26dccd8686c9e2f0b0ca6874d4a94a9ce638327071f723e54421a13f5607cc4693260fba70be882616d212b5887a60cf56045656a4da4319d5f37225449f9a160d6ab9d4397580d139f3646fedf3cc50dfc8ceca99a7a9579512998640f356a253fbf343c6b372ca326f39d994fcb3a81a8c9d60333f1cf2adedce5fc38c9c09256c0cbc6f20afda85dbce357bb062e4c882a201ee0605cdf9422084cfb04c9b537c72dd2b92e8cd7020883ea1018440fdd4e636ca03055edaa756a621d1a9cb92adb89cfa1cafaa45deb4ead6645f04ecd47c864e184e09310b7b827b661df21b06647f73f8ec1be7903a39cc71ad5f78ce3a599932336204c08537afb5dfb93e6681efd0f1040"], &(0x7f00000003c0), 0x1000) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) fdatasync(0xffffffffffffffff) symlinkat(&(0x7f0000000280)='./file0\x00', 0xffffffffffffffff, &(0x7f00000002c0)='./file0/file0\x00') openat$kvm(0xffffffffffffff9c, &(0x7f0000000540)='/dev/kvm\x00', 0x2, 0x0) close(0xffffffffffffffff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000440)='gretap0\x00', 0x10) mkdir(&(0x7f0000000300)='./file0/"ile0\x00', 0x20) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x7ffb, 0x0) open(&(0x7f0000000480)='./file0\x00', 0x4000, 0x10) r5 = open$dir(&(0x7f0000000340)='./file0/fi\\e0\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r5, &(0x7f00000002c0)='./file0\x00') lseek(r4, 0x0, 0x902c442be708a8df) symlinkat(&(0x7f0000000000)='./file0/file0\x00', r5, &(0x7f0000000200)='./file0/file0\x00') 2018/04/10 10:27:42 executing program 2 (fault-call:5 fault-nth:18): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) 2018/04/10 10:27:42 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x200010) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) umount2(&(0x7f00000075c0)='./file0\x00', 0x0) 2018/04/10 10:27:42 executing program 4: ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f00000000c0)={0x6, 0xffffffffffffffff, 0x1}) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000100)=0x62a, 0x4) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000000), &(0x7f0000000080)=0x68) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r1, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) [ 253.930707] FAULT_INJECTION: forcing a failure. [ 253.930707] name failslab, interval 1, probability 0, space 0, times 0 [ 253.942073] CPU: 0 PID: 18478 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 253.949006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 253.958367] Call Trace: [ 253.960972] dump_stack+0x1b9/0x294 [ 253.964616] ? dump_stack_print_info.cold.2+0x52/0x52 [ 253.969821] ? __save_stack_trace+0x7e/0xd0 [ 253.974167] should_fail.cold.4+0xa/0x1a [ 253.978248] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 253.983368] ? save_stack+0x43/0xd0 [ 253.987002] ? kasan_kmalloc+0xc4/0xe0 [ 253.990899] ? kmem_cache_alloc_trace+0x152/0x780 [ 253.995751] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 254.000956] ? __list_lru_init+0x456/0x790 [ 254.005199] ? sget_userns+0x6d9/0xf20 [ 254.009100] ? graph_lock+0x170/0x170 [ 254.012978] ? do_mount+0x564/0x3070 [ 254.016699] ? ksys_mount+0x12d/0x140 [ 254.020500] ? SyS_mount+0x35/0x50 [ 254.024034] ? do_syscall_64+0x29e/0x9d0 [ 254.028088] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 254.033446] ? find_held_lock+0x36/0x1c0 [ 254.037512] ? __lock_is_held+0xb5/0x140 [ 254.041575] ? check_same_owner+0x320/0x320 [ 254.045892] ? rcu_note_context_switch+0x710/0x710 [ 254.050819] __should_failslab+0x124/0x180 [ 254.055051] should_failslab+0x9/0x14 [ 254.058839] kmem_cache_alloc_trace+0x2cb/0x780 [ 254.063494] ? __kmalloc_node+0x33/0x70 [ 254.067455] ? __kmalloc_node+0x33/0x70 [ 254.071421] ? rcu_read_lock_sched_held+0x108/0x120 [ 254.076432] __memcg_init_list_lru_node+0x17d/0x2c0 [ 254.081443] ? kvfree_rcu+0x20/0x20 [ 254.085082] ? __kmalloc_node+0x47/0x70 [ 254.089055] __list_lru_init+0x456/0x790 [ 254.093111] ? list_lru_destroy+0x4c0/0x4c0 [ 254.097421] ? mark_held_locks+0xc9/0x160 [ 254.101559] ? __raw_spin_lock_init+0x1c/0x100 [ 254.106129] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 254.111133] ? __lockdep_init_map+0x105/0x590 [ 254.115629] ? lockdep_init_map+0x9/0x10 [ 254.119684] sget_userns+0x6d9/0xf20 [ 254.123384] ? set_anon_super+0x20/0x20 [ 254.127349] ? get_empty_filp.cold.7+0x3e/0x3e [ 254.131920] ? destroy_unused_super.part.9+0x100/0x100 [ 254.137187] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 254.142195] ? kasan_check_read+0x11/0x20 [ 254.146332] ? rcu_pm_notify+0xc0/0xc0 [ 254.150206] ? trace_hardirqs_off+0xd/0x10 [ 254.154430] ? cap_capable+0x1f9/0x260 [ 254.158326] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 254.163848] ? security_capable+0x99/0xc0 [ 254.167985] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 254.173511] ? ns_capable_common+0x13f/0x170 [ 254.177908] mount_ns+0x8f/0x1d0 [ 254.181266] ? rpc_pipe_release+0xb70/0xb70 [ 254.185581] rpc_mount+0x9e/0xd0 [ 254.188936] mount_fs+0xae/0x328 [ 254.192300] vfs_kern_mount.part.34+0xd4/0x4d0 [ 254.196872] ? may_umount+0xb0/0xb0 [ 254.200491] ? _raw_read_unlock+0x22/0x30 [ 254.204625] ? __get_fs_type+0x97/0xc0 [ 254.208506] do_mount+0x564/0x3070 [ 254.212043] ? copy_mount_string+0x40/0x40 [ 254.216265] ? rcu_pm_notify+0xc0/0xc0 [ 254.220155] ? copy_mount_options+0x5f/0x380 [ 254.224551] ? rcu_read_lock_sched_held+0x108/0x120 [ 254.229556] ? kmem_cache_alloc_trace+0x616/0x780 [ 254.234388] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 254.239934] ? _copy_from_user+0xdf/0x150 [ 254.244075] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 254.249598] ? copy_mount_options+0x285/0x380 [ 254.254086] ksys_mount+0x12d/0x140 [ 254.257703] SyS_mount+0x35/0x50 [ 254.261055] ? ksys_mount+0x140/0x140 [ 254.264845] do_syscall_64+0x29e/0x9d0 [ 254.268717] ? vmalloc_sync_all+0x30/0x30 [ 254.272851] ? _raw_spin_unlock_irq+0x27/0x70 [ 254.277335] ? finish_task_switch+0x1ca/0x820 [ 254.281817] ? syscall_return_slowpath+0x5c0/0x5c0 [ 254.286737] ? syscall_return_slowpath+0x30f/0x5c0 [ 254.291659] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 254.297021] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 254.301860] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 254.307037] RIP: 0033:0x455259 [ 254.310215] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 254.317913] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 [ 254.325179] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 2018/04/10 10:27:42 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x500]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) [ 254.332433] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 [ 254.339685] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 254.346941] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000012 2018/04/10 10:27:43 executing program 2 (fault-call:5 fault-nth:19): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) 2018/04/10 10:27:43 executing program 1: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x202}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000071100000000000000000000000002710881e57b300d816aaa2000000000015126504c63938f4cff149046677483e7a922b86399f7ece19280cb61e6f4fb9a1abb5e915e96785e49ca277294a50cca5def2a8c66f29d2a39d6bca0cbd89ece44cf1586e08a8fdc3431f300b29ff77db2e9f9baa6e73ac6c41742e4edb61a23be4a466b1ce8d4aa6f8158a094e5dd1348b00ffffffffffffff0f8e12c5e27f3ee60a771a0779eedd78f04b4e40f965738ffc3540c500cf3706f7f765a9f789d1e9d6a535efb58dfd3f1476"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x2, 0x40087447, 0x705000, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@dev, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f0000000000)=0xe8) ioprio_get$uid(0x3, r2) 2018/04/10 10:27:43 executing program 0: r0 = socket$inet6_sctp(0xa, 0x800000000000005, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:43 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x4840, 0x40) readlinkat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=""/4096, 0x1000) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000001140)='./file0\x00', &(0x7f00000010c0)="74f8d4420500", 0x0, &(0x7f00000011c0)="07147def5b840995eb954e7251b845a31740300c33f9d818a2278ab8282d257bf19aa25b14ac5d532eab874adb139aa0c2cc28e1b0536e468a9b59bc75504b2cb06af6a7ce0f3207") r1 = syz_open_dev$admmidi(&(0x7f0000001180)='/dev/admmidi#\x00', 0xbd, 0x81) ioctl$KDGKBTYPE(r1, 0x4b33, &(0x7f0000001100)) umount2(&(0x7f00000075c0)='./file0\x00', 0x0) 2018/04/10 10:27:43 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000000)={{0xa, 0x4e20, 0x7, @mcast1={0xff, 0x1, [], 0x1}, 0x731}, {0xa, 0x4e21, 0x2, @empty, 0x6}, 0x8, [0x1, 0x5, 0x3f, 0x243, 0x3f, 0x80, 0x9, 0xff]}, 0x5c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:43 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x6]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:27:43 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]]}, 0x178) 2018/04/10 10:27:43 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x9, 0xc80) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000200)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) accept$netrom(r0, 0x0, &(0x7f0000000380)) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(r2) [ 255.331938] FAULT_INJECTION: forcing a failure. [ 255.331938] name failslab, interval 1, probability 0, space 0, times 0 [ 255.343311] CPU: 1 PID: 18528 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 255.350247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 255.359864] Call Trace: [ 255.363142] dump_stack+0x1b9/0x294 [ 255.366762] ? dump_stack_print_info.cold.2+0x52/0x52 [ 255.371938] ? perf_trace_lock_acquire+0xe3/0x980 [ 255.376766] ? __save_stack_trace+0x7e/0xd0 [ 255.381081] should_fail.cold.4+0xa/0x1a [ 255.385133] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 255.390225] ? save_stack+0x43/0xd0 [ 255.393839] ? kasan_kmalloc+0xc4/0xe0 [ 255.397719] ? kmem_cache_alloc_trace+0x152/0x780 [ 255.402549] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 255.407896] ? __list_lru_init+0x456/0x790 [ 255.412117] ? sget_userns+0x6d9/0xf20 [ 255.415991] ? graph_lock+0x170/0x170 [ 255.419780] ? do_mount+0x564/0x3070 [ 255.423477] ? ksys_mount+0x12d/0x140 [ 255.427298] ? SyS_mount+0x35/0x50 [ 255.430826] ? do_syscall_64+0x29e/0x9d0 [ 255.434874] ? find_held_lock+0x36/0x1c0 [ 255.438935] ? __lock_is_held+0xb5/0x140 [ 255.442992] ? check_same_owner+0x320/0x320 [ 255.447309] ? rcu_note_context_switch+0x710/0x710 [ 255.452229] __should_failslab+0x124/0x180 [ 255.456453] should_failslab+0x9/0x14 [ 255.460325] kmem_cache_alloc_trace+0x2cb/0x780 [ 255.464976] ? __kmalloc_node+0x33/0x70 [ 255.468935] ? __kmalloc_node+0x33/0x70 [ 255.472928] __memcg_init_list_lru_node+0x17d/0x2c0 [ 255.477940] ? kvfree_rcu+0x20/0x20 [ 255.481553] ? __kmalloc_node+0x47/0x70 [ 255.485520] __list_lru_init+0x456/0x790 [ 255.489572] ? list_lru_destroy+0x4c0/0x4c0 [ 255.493881] ? mark_held_locks+0xc9/0x160 [ 255.498025] ? __raw_spin_lock_init+0x1c/0x100 [ 255.502598] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 255.507602] ? __lockdep_init_map+0x105/0x590 [ 255.512087] ? lockdep_init_map+0x9/0x10 [ 255.516135] sget_userns+0x6d9/0xf20 [ 255.519837] ? set_anon_super+0x20/0x20 [ 255.523799] ? get_empty_filp.cold.7+0x3e/0x3e [ 255.528369] ? destroy_unused_super.part.9+0x100/0x100 [ 255.533645] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 255.538652] ? kasan_check_read+0x11/0x20 [ 255.542790] ? rcu_pm_notify+0xc0/0xc0 [ 255.546664] ? trace_hardirqs_off+0xd/0x10 [ 255.550888] ? cap_capable+0x1f9/0x260 [ 255.554765] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 255.560288] ? security_capable+0x99/0xc0 [ 255.564426] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 255.569949] ? ns_capable_common+0x13f/0x170 [ 255.574347] mount_ns+0x8f/0x1d0 [ 255.577701] ? rpc_pipe_release+0xb70/0xb70 [ 255.582020] rpc_mount+0x9e/0xd0 [ 255.585379] mount_fs+0xae/0x328 [ 255.588739] vfs_kern_mount.part.34+0xd4/0x4d0 [ 255.593309] ? may_umount+0xb0/0xb0 [ 255.596925] ? _raw_read_unlock+0x22/0x30 [ 255.601057] ? __get_fs_type+0x97/0xc0 [ 255.604932] do_mount+0x564/0x3070 [ 255.608459] ? do_raw_spin_unlock+0x9e/0x2e0 [ 255.612855] ? copy_mount_string+0x40/0x40 [ 255.617072] ? rcu_pm_notify+0xc0/0xc0 [ 255.620950] ? copy_mount_options+0x5f/0x380 [ 255.625349] ? rcu_read_lock_sched_held+0x108/0x120 [ 255.630354] ? kmem_cache_alloc_trace+0x616/0x780 [ 255.635188] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 255.640715] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 255.646241] ? copy_mount_options+0x285/0x380 [ 255.650723] ksys_mount+0x12d/0x140 [ 255.654337] SyS_mount+0x35/0x50 [ 255.657688] ? ksys_mount+0x140/0x140 [ 255.661477] do_syscall_64+0x29e/0x9d0 [ 255.665350] ? vmalloc_sync_all+0x30/0x30 [ 255.669483] ? _raw_spin_unlock_irq+0x27/0x70 [ 255.673966] ? finish_task_switch+0x1ca/0x820 [ 255.678448] ? syscall_return_slowpath+0x5c0/0x5c0 [ 255.683368] ? syscall_return_slowpath+0x30f/0x5c0 [ 255.688289] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 255.693643] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 255.698486] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 255.703662] RIP: 0033:0x455259 [ 255.706841] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 255.714543] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 [ 255.721805] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 2018/04/10 10:27:44 executing program 1: r0 = socket(0x10, 0x2, 0xc) getsockopt$inet_dccp_int(r0, 0x21, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0x4) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000a6b000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0xd1) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dsp\x00', 0x400, 0x0) ioctl$DRM_IOCTL_GET_STATS(r1, 0x80f86406, &(0x7f0000000200)=""/195) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000040)={0x0, @broadcast, @multicast1}, &(0x7f0000000080)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @multicast1, @dev}, &(0x7f0000000340)=0xc) write(r0, &(0x7f0000000100)="1f0000000104fffffd3b54c007490000f30501000b000600000423ca0000cf", 0x1f) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000180)={'lo\x00', @ifru_map={0x3, 0x2, 0x8000, 0x4f9, 0x0, 0xa5}}) [ 255.729073] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 [ 255.736329] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 255.743586] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000013 2018/04/10 10:27:44 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x9c, &(0x7f0000000000)=[@in6={0xa, 0x4e20, 0x80, @dev={0xfe, 0x80, [], 0xe}, 0x1000}, @in6={0xa, 0x4e20, 0x10001, @local={0xfe, 0x80, [], 0xaa}, 0xa28}, @in6={0xa, 0x4e23, 0x8, @dev={0xfe, 0x80, [], 0x15}, 0x6}, @in6={0xa, 0x4e23, 0x7, @dev={0xfe, 0x80, [], 0x16}}, @in6={0xa, 0x4e21, 0xac, @mcast1={0xff, 0x1, [], 0x1}}, @in={0x2, 0x4e23, @multicast1=0xe0000001}]}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000001c0)={r1, 0xfff, 0x9, [0x2, 0xe9dd, 0x4, 0x1f, 0x800, 0x4, 0x9, 0x0, 0x80000001]}, &(0x7f0000000200)=0x1a) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:44 executing program 0: r0 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0xfffffffffffffffc, 0x4000) setsockopt$packet_buf(r0, 0x107, 0xd, &(0x7f0000000100)="e096932454", 0x5) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r1, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:44 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:27:44 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]]}, 0x178) 2018/04/10 10:27:44 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb630000000000000006fdc24e95e12aa7748f9f393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x215}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x2, 0x2, 0x400000, &(0x7f0000000000)) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) umount2(&(0x7f00000075c0)='./file0\x00', 0x0) [ 255.822674] netlink: 3 bytes leftover after parsing attributes in process `syz-executor1'. [ 255.899304] netlink: 'syz-executor1': attribute type 6 has an invalid length. 2018/04/10 10:27:44 executing program 2 (fault-call:5 fault-nth:20): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) [ 255.954822] netlink: 3 bytes leftover after parsing attributes in process `syz-executor1'. [ 255.967821] netlink: 'syz-executor1': attribute type 6 has an invalid length. [ 256.005564] FAULT_INJECTION: forcing a failure. [ 256.005564] name failslab, interval 1, probability 0, space 0, times 0 [ 256.016957] CPU: 1 PID: 18568 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 256.023893] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 256.033256] Call Trace: [ 256.035857] dump_stack+0x1b9/0x294 [ 256.039501] ? dump_stack_print_info.cold.2+0x52/0x52 [ 256.044706] ? perf_trace_lock_acquire+0xe3/0x980 [ 256.049566] ? perf_trace_lock+0x900/0x900 [ 256.053821] should_fail.cold.4+0xa/0x1a [ 256.057901] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 256.063023] ? print_usage_bug+0xc0/0xc0 [ 256.067092] ? graph_lock+0x170/0x170 [ 256.070883] ? lock_downgrade+0x8e0/0x8e0 [ 256.075032] ? __irqentry_text_end+0x1f8218/0x1f9628 [ 256.080130] ? find_held_lock+0x36/0x1c0 [ 256.084179] ? __lock_is_held+0xb5/0x140 [ 256.088227] ? __irqentry_text_end+0x1f8218/0x1f9628 [ 256.093326] ? check_same_owner+0x320/0x320 [ 256.097636] ? __might_sleep+0x95/0x190 [ 256.101599] ? rcu_note_context_switch+0x710/0x710 [ 256.106522] __should_failslab+0x124/0x180 [ 256.110833] should_failslab+0x9/0x14 [ 256.114617] __kmalloc+0x2c8/0x760 [ 256.118146] ? __kmalloc_node+0x47/0x70 [ 256.122108] ? __list_lru_init+0xdd/0x790 [ 256.126245] __list_lru_init+0xdd/0x790 [ 256.130210] ? list_lru_destroy+0x4c0/0x4c0 [ 256.134518] ? mark_held_locks+0xc9/0x160 [ 256.138658] ? __raw_spin_lock_init+0x1c/0x100 [ 256.143228] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 256.148410] ? lockdep_init_map+0x9/0x10 [ 256.152460] sget_userns+0x706/0xf20 [ 256.156245] ? set_anon_super+0x20/0x20 [ 256.160210] ? get_empty_filp.cold.7+0x3e/0x3e [ 256.164778] ? destroy_unused_super.part.9+0x100/0x100 [ 256.170047] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 256.175056] ? kasan_check_read+0x11/0x20 [ 256.179192] ? rcu_pm_notify+0xc0/0xc0 [ 256.183065] ? trace_hardirqs_off+0xd/0x10 [ 256.187286] ? cap_capable+0x1f9/0x260 [ 256.191161] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 256.196683] ? security_capable+0x99/0xc0 [ 256.200824] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 256.206345] ? ns_capable_common+0x13f/0x170 [ 256.210743] mount_ns+0x8f/0x1d0 [ 256.214095] ? rpc_pipe_release+0xb70/0xb70 [ 256.218404] rpc_mount+0x9e/0xd0 [ 256.221758] mount_fs+0xae/0x328 [ 256.225114] vfs_kern_mount.part.34+0xd4/0x4d0 [ 256.229695] ? may_umount+0xb0/0xb0 [ 256.233312] ? _raw_read_unlock+0x22/0x30 [ 256.237444] ? __get_fs_type+0x97/0xc0 [ 256.241320] do_mount+0x564/0x3070 [ 256.244850] ? copy_mount_string+0x40/0x40 [ 256.249069] ? rcu_pm_notify+0xc0/0xc0 [ 256.252950] ? copy_mount_options+0x5f/0x380 [ 256.257345] ? rcu_read_lock_sched_held+0x108/0x120 [ 256.262346] ? kmem_cache_alloc_trace+0x616/0x780 [ 256.267182] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 256.272712] ? _copy_from_user+0xdf/0x150 [ 256.276849] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 256.282372] ? copy_mount_options+0x285/0x380 [ 256.286855] ksys_mount+0x12d/0x140 [ 256.290469] SyS_mount+0x35/0x50 [ 256.293818] ? ksys_mount+0x140/0x140 [ 256.297606] do_syscall_64+0x29e/0x9d0 [ 256.301482] ? vmalloc_sync_all+0x30/0x30 [ 256.305613] ? _raw_spin_unlock_irq+0x27/0x70 [ 256.310102] ? finish_task_switch+0x1ca/0x820 [ 256.314589] ? syscall_return_slowpath+0x5c0/0x5c0 [ 256.319508] ? syscall_return_slowpath+0x30f/0x5c0 [ 256.324427] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 256.329781] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 256.334620] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 256.339802] RIP: 0033:0x455259 [ 256.342982] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 256.350678] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 [ 256.357930] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 [ 256.365188] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 [ 256.372443] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 256.379697] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000014 2018/04/10 10:27:44 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]]}, 0x178) 2018/04/10 10:27:44 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getcwd(&(0x7f0000000000)=""/252, 0xfc) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:44 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x3, 0xaa0, @loopback={0x0, 0x1}, 0x2}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:44 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x400000000000000]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:27:44 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'tunl0\x00', &(0x7f0000000000)=@ethtool_stats={0x1d}}) 2018/04/10 10:27:44 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x9, 0xc80) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000200)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) accept$netrom(r0, 0x0, &(0x7f0000000380)) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(r2) 2018/04/10 10:27:44 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) umount2(&(0x7f00000075c0)='./file0\x00', 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) fstat(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getgid() chown(&(0x7f0000000040)='./file0\x00', r1, r2) getpgrp(r0) 2018/04/10 10:27:44 executing program 2 (fault-call:5 fault-nth:21): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) [ 256.554692] FAULT_INJECTION: forcing a failure. [ 256.554692] name failslab, interval 1, probability 0, space 0, times 0 [ 256.566202] CPU: 0 PID: 18594 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 256.573133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 256.582490] Call Trace: [ 256.585091] dump_stack+0x1b9/0x294 [ 256.588743] ? dump_stack_print_info.cold.2+0x52/0x52 [ 256.593953] ? perf_trace_lock_acquire+0xe3/0x980 [ 256.598807] ? __save_stack_trace+0x7e/0xd0 [ 256.603156] should_fail.cold.4+0xa/0x1a [ 256.607237] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 256.612353] ? save_stack+0x43/0xd0 [ 256.615994] ? kasan_kmalloc+0xc4/0xe0 [ 256.619895] ? kmem_cache_alloc_trace+0x152/0x780 [ 256.624755] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 256.629955] ? __list_lru_init+0x456/0x790 [ 256.634204] ? sget_userns+0x6d9/0xf20 [ 256.638116] ? graph_lock+0x170/0x170 [ 256.641928] ? do_mount+0x564/0x3070 [ 256.645647] ? ksys_mount+0x12d/0x140 [ 256.649459] ? SyS_mount+0x35/0x50 [ 256.653012] ? do_syscall_64+0x29e/0x9d0 [ 256.657087] ? find_held_lock+0x36/0x1c0 [ 256.661172] ? __lock_is_held+0xb5/0x140 [ 256.665257] ? check_same_owner+0x320/0x320 [ 256.669595] ? rcu_note_context_switch+0x710/0x710 [ 256.674543] __should_failslab+0x124/0x180 [ 256.678793] should_failslab+0x9/0x14 [ 256.682601] kmem_cache_alloc_trace+0x2cb/0x780 [ 256.687284] ? __kmalloc_node+0x33/0x70 [ 256.691353] ? __kmalloc_node+0x33/0x70 [ 256.695361] ? rcu_read_lock_sched_held+0x108/0x120 [ 256.700411] __memcg_init_list_lru_node+0x17d/0x2c0 [ 256.705527] ? kvfree_rcu+0x20/0x20 [ 256.709162] ? __kmalloc_node+0x47/0x70 [ 256.713153] __list_lru_init+0x456/0x790 [ 256.717228] ? list_lru_destroy+0x4c0/0x4c0 [ 256.721560] ? mark_held_locks+0xc9/0x160 [ 256.725726] ? __raw_spin_lock_init+0x1c/0x100 [ 256.730315] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 256.735334] ? __lockdep_init_map+0x105/0x590 [ 256.739836] ? lockdep_init_map+0x9/0x10 [ 256.743910] sget_userns+0x6d9/0xf20 [ 256.747627] ? set_anon_super+0x20/0x20 [ 256.751614] ? get_empty_filp.cold.7+0x3e/0x3e [ 256.756223] ? destroy_unused_super.part.9+0x100/0x100 [ 256.761511] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 256.766543] ? kasan_check_read+0x11/0x20 [ 256.770704] ? rcu_pm_notify+0xc0/0xc0 [ 256.774597] ? trace_hardirqs_off+0xd/0x10 [ 256.778843] ? cap_capable+0x1f9/0x260 [ 256.782745] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 256.788290] ? security_capable+0x99/0xc0 [ 256.792483] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 256.798028] ? ns_capable_common+0x13f/0x170 [ 256.802450] mount_ns+0x8f/0x1d0 [ 256.805824] ? rpc_pipe_release+0xb70/0xb70 [ 256.810162] rpc_mount+0x9e/0xd0 [ 256.813546] mount_fs+0xae/0x328 [ 256.816925] vfs_kern_mount.part.34+0xd4/0x4d0 [ 256.821517] ? may_umount+0xb0/0xb0 [ 256.825150] ? _raw_read_unlock+0x22/0x30 [ 256.829304] ? __get_fs_type+0x97/0xc0 [ 256.833202] do_mount+0x564/0x3070 [ 256.836753] ? do_raw_spin_unlock+0x9e/0x2e0 [ 256.841172] ? copy_mount_string+0x40/0x40 [ 256.845412] ? rcu_pm_notify+0xc0/0xc0 [ 256.849313] ? copy_mount_options+0x5f/0x380 2018/04/10 10:27:44 executing program 1: r0 = socket$inet6(0xa, 0x80001, 0x0) recvfrom$inet6(r0, &(0x7f0000000180)=""/113, 0x71, 0x40, &(0x7f0000000200)={0xa, 0x4e23, 0x9, @dev={0xfe, 0x80}, 0xf6e}, 0x1c) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000000)={0x0, 0x1, 0x3f}, &(0x7f0000000040)=0x8) sysfs$3(0x3) fcntl$setflags(r0, 0x2, 0x1) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000080)={0x32c6bd92, 0xfffffffffffff800, 0x8005, 0x7f, 0x3, 0x3f, 0x20, 0x1c00000000, r1}, 0x20) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x9, 0x24, 0x4, 0x81, 0x5, 0x5, 0x5, 0x9, r1}, 0x20) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f00000003c0)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x4, [{{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}, {{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}]}, 0x290) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f00000000c0), &(0x7f0000000100)=0x10) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000a83000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000184000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x108) 2018/04/10 10:27:44 executing program 4: r0 = socket(0x2, 0xf, 0xbe8) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x4e22}, {0x306, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x22, {0x2, 0x4e24, @broadcast=0xffffffff}, 'irlan0\x00'}) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r1, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) pipe(&(0x7f0000000080)={0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r1, &(0x7f00000000c0)={0x80000010}) 2018/04/10 10:27:45 executing program 0: r0 = socket$inet6_sctp(0xa, 0xffffffffffffffff, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000000)={'ip6gre0\x00', {0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}}) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) getsockopt$inet6_int(r0, 0x29, 0x46, &(0x7f0000000040), &(0x7f0000000080)=0x4) 2018/04/10 10:27:45 executing program 1: pipe2(&(0x7f0000989000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x8000000032, 0xffffffffffffffff, 0x3c) r2 = userfaultfd(0x803) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000180)={0xaa, 0x4c}) statx(r1, &(0x7f0000000000)='./file0\x00', 0x0, 0x80, &(0x7f0000000480)) r3 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @time=@time={0x77359400}}], 0x227) munmap(&(0x7f0000012000/0x1000)=nil, 0x1000) dup2(r0, r2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000000)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000340)={0x0, @in={{0x2, 0x4e20, @multicast1=0xe0000001}}, [0xff, 0x7, 0x800, 0x100, 0x3, 0x1, 0x24000000000, 0x101, 0x3f, 0x5, 0xd5, 0x6, 0x200, 0x1ff, 0x81]}, &(0x7f0000000440)=0x100) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'syz_tun\x00', 0x0}) r7 = socket$nl_route(0x10, 0x3, 0x0) arch_prctl(0x1004, &(0x7f00000002c0)="12071f37cfe87cd3365c5b6662b26e653c79171184f2ed58322e8472075b2914f92ae8a2") sendmsg$nl_route(r7, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2040001}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3400000011000000000000000b00000083c56e1f60b908bcedc61a8500000000", @ANYRES32=r6, @ANYBLOB="401870a82b2940f54471f4ec9d000000000000000000000000000000"], 0x34}, 0x1}, 0x40000) write(r1, &(0x7f00000000c0)="fdec755dc804ec665179f07282941267fef42fe3f9fdfc5f19f4e9f38cb11775d852e2ecd2284dd3111e346abe8862c2152f5d4443611bad390183ca680780e503d33f246a1ae6874b46950a8e02b64ea2", 0x51) gettid() 2018/04/10 10:27:45 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_emit_ethernet(0xa9, &(0x7f0000000040)={@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, [{[{0x9100, 0x1, 0x10001}], {0x8100, 0x9, 0x1}}], {@generic={0x88f7, "563d9fd67c54552f1ab4f70fe57b6ada06c4873d34fa8b629db0901e0ddbb2a7cf0be5c1a5f66441c8b16f63b9ddc8a4ff773075d51035d62a43abb8c1a888c72b9484be3a730fa2431981208f3ad0e7a925829a38913787297f1e75dce5f2b21a6a2be80c1e91f649960dc5c128994b3a7b2205e7362d42abfb278958bc868c4c363bd91f0afdb0112208096ac4a43e7f8820"}}}, &(0x7f0000000100)={0x0, 0x3, [0xe32, 0x1f1, 0x9ac, 0xc0f]}) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:45 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000100)}, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e21, @rand_addr=0x1}}}, &(0x7f0000000280)=0x84) getsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000002c0)=@assoc_id=r3, &(0x7f0000000300)=0x4) poll(&(0x7f0000000000)=[{r1, 0x40}, {r0, 0x2010}], 0x2, 0x6) 2018/04/10 10:27:45 executing program 4: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) r1 = socket$inet6(0xa, 0x80001, 0x8010000400000084) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="a700000001800000cc4d4f2ba27c04f07cffdf9e4aa31b723585a9626b0dc0f7198c6dec0180d8463d7f9ac65e2baed5e1e1191e81e604000000d906c15e216137ab6788ff75fb387bc43b318f23f5d94bb27902054096cec307e33a08ba0dc38ddb3ac03127195fdd006a45d340ccca42637fb35d699cd879978c3c8717ae059213613c3cf092a3a69baf78145005c05069a4422a64b1eb85ab39f855ffb1a13448273c5688f3f740abd188a600"], 0x0) bind$inet6(r1, &(0x7f00001c1000)={0xa, 0x4e20}, 0x1c) r2 = socket$netlink(0x10, 0x3, 0x4) listen(r1, 0xc) fcntl$dupfd(r2, 0x0, r2) writev(r2, &(0x7f000051c000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a84470080ffe0064e200000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:45 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]]}, 0x178) [ 256.853728] ? rcu_read_lock_sched_held+0x108/0x120 [ 256.858747] ? kmem_cache_alloc_trace+0x616/0x780 [ 256.863599] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 256.869596] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 256.869613] ? copy_mount_options+0x285/0x380 [ 256.869631] ksys_mount+0x12d/0x140 [ 256.869647] SyS_mount+0x35/0x50 [ 256.869659] ? ksys_mount+0x140/0x140 [ 256.869675] do_syscall_64+0x29e/0x9d0 [ 256.869688] ? vmalloc_sync_all+0x30/0x30 [ 256.869703] ? _raw_spin_unlock_irq+0x27/0x70 [ 256.869719] ? finish_task_switch+0x1ca/0x820 [ 256.869736] ? syscall_return_slowpath+0x5c0/0x5c0 [ 256.869753] ? syscall_return_slowpath+0x30f/0x5c0 [ 256.869774] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 256.869795] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 256.869818] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 256.869829] RIP: 0033:0x455259 [ 256.869837] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 256.869854] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 [ 256.869864] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 [ 256.869873] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 [ 256.869882] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 256.869891] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000015 2018/04/10 10:27:45 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000040)={0x0, 0x0, 0x57, 0x0, 0x6, 0x1ff, 0x6503, 0x80000000, {0x0, @in6={{0xa, 0x4e24, 0x81, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0x8}}, 0xfff, 0xff, 0x1, 0xdd0, 0x5}}, &(0x7f0000000100)=0xb0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000001c0)={r1, 0x1000, "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"}, &(0x7f0000001200)=0x1008) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000000)={r2, 0x8}, 0x8) 2018/04/10 10:27:45 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x1000000]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:27:45 executing program 2 (fault-call:5 fault-nth:22): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) 2018/04/10 10:27:45 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x84) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) umount2(&(0x7f00000075c0)='./file0\x00', 0x0) socketpair(0x11, 0xa, 0x5, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) 2018/04/10 10:27:45 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]]}, 0x178) 2018/04/10 10:27:45 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000)=0xd2, 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) listen(r0, 0x0) 2018/04/10 10:27:45 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req={0x2, 0x20, 0x100000001, 0xd4}, 0xd) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f00000000c0)={0x4, 0x7, 0x71, 0xbc}, 0x10) bind$packet(r0, &(0x7f00004a9000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa], 0xffffffffffffffff}}, 0x0) close(r0) 2018/04/10 10:27:45 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x9, 0xc80) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000200)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(r2) [ 257.461727] FAULT_INJECTION: forcing a failure. [ 257.461727] name failslab, interval 1, probability 0, space 0, times 0 [ 257.473419] CPU: 1 PID: 18658 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 257.480438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 257.489799] Call Trace: [ 257.492383] dump_stack+0x1b9/0x294 [ 257.496001] ? dump_stack_print_info.cold.2+0x52/0x52 [ 257.501188] ? perf_trace_lock_acquire+0xe3/0x980 [ 257.506106] ? perf_trace_lock+0x900/0x900 [ 257.510333] should_fail.cold.4+0xa/0x1a [ 257.514387] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 257.519478] ? print_usage_bug+0xc0/0xc0 [ 257.523537] ? graph_lock+0x170/0x170 [ 257.527323] ? lock_downgrade+0x8e0/0x8e0 [ 257.531473] ? ieee80211_recalc_smps_chanctx+0xf10/0x13f0 [ 257.537009] ? find_held_lock+0x36/0x1c0 [ 257.541065] ? __lock_is_held+0xb5/0x140 [ 257.545111] ? ieee80211_recalc_smps_chanctx+0xf10/0x13f0 [ 257.550646] ? check_same_owner+0x320/0x320 [ 257.554957] ? __might_sleep+0x95/0x190 [ 257.558915] ? rcu_note_context_switch+0x710/0x710 [ 257.563833] __should_failslab+0x124/0x180 [ 257.568059] should_failslab+0x9/0x14 [ 257.571847] __kmalloc+0x2c8/0x760 [ 257.575387] ? __kmalloc_node+0x47/0x70 [ 257.579355] ? __list_lru_init+0xdd/0x790 [ 257.583496] __list_lru_init+0xdd/0x790 [ 257.587469] ? list_lru_destroy+0x4c0/0x4c0 [ 257.591776] ? mark_held_locks+0xc9/0x160 [ 257.595914] ? __raw_spin_lock_init+0x1c/0x100 [ 257.600484] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 257.605491] ? lockdep_init_map+0x9/0x10 [ 257.609547] sget_userns+0x706/0xf20 [ 257.613244] ? set_anon_super+0x20/0x20 [ 257.617209] ? get_empty_filp.cold.7+0x3e/0x3e [ 257.621865] ? destroy_unused_super.part.9+0x100/0x100 [ 257.627141] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 257.632148] ? kasan_check_read+0x11/0x20 [ 257.636285] ? rcu_pm_notify+0xc0/0xc0 [ 257.640160] ? trace_hardirqs_off+0xd/0x10 [ 257.644384] ? cap_capable+0x1f9/0x260 [ 257.648265] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 257.653787] ? security_capable+0x99/0xc0 [ 257.657921] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 257.663441] ? ns_capable_common+0x13f/0x170 [ 257.667926] mount_ns+0x8f/0x1d0 [ 257.671278] ? rpc_pipe_release+0xb70/0xb70 [ 257.675584] rpc_mount+0x9e/0xd0 [ 257.678936] mount_fs+0xae/0x328 [ 257.682300] vfs_kern_mount.part.34+0xd4/0x4d0 [ 257.686874] ? may_umount+0xb0/0xb0 [ 257.690487] ? _raw_read_unlock+0x22/0x30 [ 257.694621] ? __get_fs_type+0x97/0xc0 [ 257.698496] do_mount+0x564/0x3070 [ 257.702030] ? do_raw_spin_unlock+0x9e/0x2e0 [ 257.706429] ? copy_mount_string+0x40/0x40 [ 257.710648] ? rcu_pm_notify+0xc0/0xc0 [ 257.714528] ? copy_mount_options+0x5f/0x380 [ 257.718925] ? rcu_read_lock_sched_held+0x108/0x120 [ 257.723929] ? kmem_cache_alloc_trace+0x616/0x780 [ 257.728791] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 257.734316] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 257.739843] ? copy_mount_options+0x285/0x380 [ 257.744328] ksys_mount+0x12d/0x140 [ 257.747950] SyS_mount+0x35/0x50 [ 257.751298] ? ksys_mount+0x140/0x140 [ 257.755085] do_syscall_64+0x29e/0x9d0 [ 257.758955] ? vmalloc_sync_all+0x30/0x30 [ 257.763089] ? _raw_spin_unlock_irq+0x27/0x70 [ 257.767569] ? finish_task_switch+0x1ca/0x820 [ 257.772053] ? syscall_return_slowpath+0x5c0/0x5c0 [ 257.777148] ? syscall_return_slowpath+0x30f/0x5c0 [ 257.782069] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 257.787422] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 257.792258] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 257.797432] RIP: 0033:0x455259 [ 257.800604] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 257.808299] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 [ 257.815554] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 [ 257.822810] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 [ 257.830065] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 257.837320] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000016 2018/04/10 10:27:46 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0x8) socketpair(0x0, 0x2, 0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_VSOCK_SET_RUNNING(r3, 0x4004af61, &(0x7f0000000040)=0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@mcast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000000080)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f00000002c0)={r1, @in6={{0xa, 0x4e21, 0xffffffffffffff80, @ipv4={[], [0xff, 0xff], @rand_addr=0x7fffffff}, 0x2}}}, &(0x7f00000000c0)=0x84) r5 = syz_genetlink_get_family_id$fou(&(0x7f0000000380)='fou\x00') sendmsg$FOU_CMD_GET(r3, &(0x7f0000000480)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x5c, r5, 0x10, 0x70bd2d, 0x25dfdbfc, {0x3}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e22}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e23}, @FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_AF={0x8, 0x2}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x89}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x2f}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20048000}, 0x40) epoll_create(0x9) ioctl$TUNSETOWNER(r3, 0x400454cc, r4) 2018/04/10 10:27:46 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f00000002c0)='/dev/vcs#\x00', 0x4, 0x4002) perf_event_open$cgroup(&(0x7f0000000500)={0x0, 0x70, 0x400, 0x4, 0x3ff, 0xf17, 0x0, 0x0, 0x2040, 0xc, 0x7, 0x4, 0x0, 0x1, 0x3, 0x3, 0x20000000000000, 0x6, 0x19, 0xb4, 0xae72, 0x0, 0xc2, 0x0, 0x4c, 0x2, 0x3, 0x100, 0x4, 0x1, 0x5, 0x3, 0x934, 0xffffffff, 0xfff, 0xbee, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0), 0x4}, 0x0, 0x2, 0x0, 0x5, 0x5038, 0x0, 0x2cb5ce56}, r0, 0xb, r0, 0x1) mmap(&(0x7f000035d000/0x2000)=nil, 0x2000, 0x1, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000080)={{}, {{@in6}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f0000000180)=0xe8) getuid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={r0, 0x0, 0x1, 0x3, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}, 0x20) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, &(0x7f0000000240), &(0x7f0000000280)=0x4) r1 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x0, 0x40000000000000) ioctl$KVM_GET_XCRS(r0, 0x8188aea6, &(0x7f0000000440)=ANY=[@ANYBLOB="060000000100000007000000000000000100008000000000000000000000000001000080000000000900000000000000040000000000000002000000000000000400000000000000ed000000000000000600008410d4f48fb8f48e2e4b4b0b5c2b00000000000100"]) r2 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuset.memory_pressure\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000300)={0x0, 0x200000000}, &(0x7f0000000380)=0x8) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000340)) connect$ax25(r0, &(0x7f0000000000)={0x3, {"e36659e5f3c811"}}, 0x10) syz_open_dev$urandom(&(0x7f00000001c0)='/dev/urandom\x00', 0x0, 0x200000) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f000035dffc)) 2018/04/10 10:27:46 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]]}, 0x178) 2018/04/10 10:27:46 executing program 2 (fault-call:5 fault-nth:23): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) 2018/04/10 10:27:46 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x10) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x82100, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f0000000100)={{0x49a, 0x7, 0x2, 0xdd0, 0x1, 0xfffffffffffff673}, 0xa055, 0xf6, 0x6, 0x4, 0x7, "39cf87cb10972363c9ec4b364d5b2031fd9b769fb2fef5b28c811b2a75cef066413064eb78b035da73c96a80c875d927bbc436e7d37cafc083d11a67bb656b99efc499c93733f153552f026688b95252a3125f9986b2f1b4e0f3c78fd4c4111d848770134b12d40eec355f8868ae751e0f65aa3462987891856366b1a2b07925"}) syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x1000, 0x400000) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) 2018/04/10 10:27:46 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) pwrite64(r0, &(0x7f0000000040)="3400471dc1509b29a63a1f424eb4dc89c3afa64dda7ef6ec2ed7e039c8c73f136c9e577a1f32aefc5b6e7ef3b233211628ce19c30563758559168a873ffa5c78b3e5743d8d3630e6cf47d0427c1703cd436ab9b75f4f20ac046b7672c3df3483b89d6132525603eefe58fedd0250c7eee7c8ec6df47c6e9841", 0x79, 0x0) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) r1 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x10001, 0x40000) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r1, 0x80dc5521, &(0x7f00000001c0)=""/130) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$setown(r0, 0x8, r2) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:46 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:27:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) socket$alg(0x26, 0x5, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = socket$inet_dccp(0x2, 0x6, 0x0) accept$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0x14) setsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f0000000180)={@rand_addr=0x1722, @loopback=0x7f000001, r3}, 0xc) bind$alg(r0, &(0x7f0000d36000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c582", 0x5) r4 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000001f40)="f938adf620d9a290da1f18b9e1ed0151e426c6e91d79b733cdee29a86ee07a9a50f8bbf444aca57c861b7e4a5e05639ea0398419017588a55e8b197ca24021fcdd3691acfbba4f184ee99493bfd9497d513609ce300257e4d2da29cfdab98ae1220d3a0fe7dc8ae1", 0x68}], 0x1}, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x200, 0x0) recvmsg(r4, &(0x7f0000001400)={&(0x7f0000001140)=@generic, 0x80, &(0x7f00000013c0)=[{&(0x7f00000000c0)=""/103, 0x67}, {&(0x7f00000014c0)=""/135, 0x87}], 0x2}, 0x0) [ 258.150892] FAULT_INJECTION: forcing a failure. [ 258.150892] name failslab, interval 1, probability 0, space 0, times 0 [ 258.162237] CPU: 0 PID: 18697 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 258.169172] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 258.178529] Call Trace: [ 258.181130] dump_stack+0x1b9/0x294 [ 258.184776] ? dump_stack_print_info.cold.2+0x52/0x52 [ 258.189982] ? perf_trace_lock_acquire+0xe3/0x980 [ 258.194838] ? __save_stack_trace+0x7e/0xd0 [ 258.199174] should_fail.cold.4+0xa/0x1a [ 258.203231] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 258.208410] ? save_stack+0x43/0xd0 [ 258.212030] ? kasan_kmalloc+0xc4/0xe0 [ 258.215902] ? kmem_cache_alloc_trace+0x152/0x780 [ 258.220740] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 258.225917] ? __list_lru_init+0x456/0x790 [ 258.230139] ? sget_userns+0x706/0xf20 [ 258.234105] ? graph_lock+0x170/0x170 [ 258.237894] ? do_mount+0x564/0x3070 [ 258.241594] ? ksys_mount+0x12d/0x140 [ 258.245552] ? SyS_mount+0x35/0x50 [ 258.249087] ? do_syscall_64+0x29e/0x9d0 [ 258.253145] ? find_held_lock+0x36/0x1c0 [ 258.257200] ? __lock_is_held+0xb5/0x140 [ 258.261265] ? check_same_owner+0x320/0x320 [ 258.265581] ? rcu_note_context_switch+0x710/0x710 [ 258.270509] __should_failslab+0x124/0x180 [ 258.274735] should_failslab+0x9/0x14 [ 258.278526] kmem_cache_alloc_trace+0x2cb/0x780 [ 258.283184] ? __kmalloc_node+0x33/0x70 [ 258.287145] ? __kmalloc_node+0x33/0x70 [ 258.291111] ? rcu_read_lock_sched_held+0x108/0x120 [ 258.296125] __memcg_init_list_lru_node+0x17d/0x2c0 [ 258.301133] ? kvfree_rcu+0x20/0x20 [ 258.304753] ? __kmalloc_node+0x47/0x70 [ 258.308723] __list_lru_init+0x456/0x790 [ 258.312778] ? list_lru_destroy+0x4c0/0x4c0 [ 258.317089] ? mark_held_locks+0xc9/0x160 [ 258.321226] ? __raw_spin_lock_init+0x1c/0x100 [ 258.325797] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 258.330804] ? lockdep_init_map+0x9/0x10 [ 258.334858] sget_userns+0x706/0xf20 [ 258.338563] ? set_anon_super+0x20/0x20 [ 258.342533] ? get_empty_filp.cold.7+0x3e/0x3e [ 258.347101] ? destroy_unused_super.part.9+0x100/0x100 [ 258.352372] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 258.357380] ? kasan_check_read+0x11/0x20 [ 258.361520] ? rcu_pm_notify+0xc0/0xc0 [ 258.365397] ? trace_hardirqs_off+0xd/0x10 [ 258.369620] ? cap_capable+0x1f9/0x260 [ 258.373502] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 258.379036] ? security_capable+0x99/0xc0 [ 258.383176] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 258.388701] ? ns_capable_common+0x13f/0x170 [ 258.393100] mount_ns+0x8f/0x1d0 [ 258.396462] ? rpc_pipe_release+0xb70/0xb70 [ 258.400772] rpc_mount+0x9e/0xd0 [ 258.404128] mount_fs+0xae/0x328 [ 258.407491] vfs_kern_mount.part.34+0xd4/0x4d0 [ 258.412066] ? may_umount+0xb0/0xb0 [ 258.415682] ? _raw_read_unlock+0x22/0x30 [ 258.419820] ? __get_fs_type+0x97/0xc0 [ 258.423697] do_mount+0x564/0x3070 [ 258.427234] ? copy_mount_string+0x40/0x40 [ 258.431455] ? rcu_pm_notify+0xc0/0xc0 [ 258.435339] ? copy_mount_options+0x5f/0x380 [ 258.439852] ? rcu_read_lock_sched_held+0x108/0x120 [ 258.444855] ? kmem_cache_alloc_trace+0x616/0x780 [ 258.449695] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 258.455229] ? copy_mount_options+0x285/0x380 [ 258.459827] ksys_mount+0x12d/0x140 [ 258.463442] SyS_mount+0x35/0x50 [ 258.466796] ? ksys_mount+0x140/0x140 [ 258.470588] do_syscall_64+0x29e/0x9d0 [ 258.474471] ? vmalloc_sync_all+0x30/0x30 [ 258.478608] ? kasan_check_write+0x14/0x20 [ 258.482921] ? syscall_return_slowpath+0x5c0/0x5c0 [ 258.487857] ? syscall_return_slowpath+0x30f/0x5c0 [ 258.492787] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 258.498144] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 258.502988] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 258.508164] RIP: 0033:0x455259 [ 258.511339] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 258.519039] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 [ 258.526294] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 [ 258.533548] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 [ 258.540804] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 258.548059] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000017 2018/04/10 10:27:46 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x9, 0xc80) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000200)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(r2) 2018/04/10 10:27:46 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]]}, 0x178) 2018/04/10 10:27:46 executing program 2 (fault-call:5 fault-nth:24): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) 2018/04/10 10:27:46 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) r0 = getpid() getpgid(r0) umount2(&(0x7f00000075c0)='./file0\x00', 0x0) 2018/04/10 10:27:46 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x100000001, 0x408002) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f00000001c0)={0x2e, @empty, 0x4e24, 0x0, 'sed\x00', 0x0, 0x1000000000000, 0x56}, 0x2c) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x3942, 0x101000) syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x70e, 0x20800) getsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000040)=0x80000001, &(0x7f0000000080)=0x4) splice(r0, &(0x7f0000000240), r0, &(0x7f0000000280), 0x1, 0x4) ioctl$TIOCLINUX3(r2, 0x541c, &(0x7f0000000200)=0x3) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140)={0x0, 0x8}, &(0x7f0000000180)=0xfffffffffffffd31) 2018/04/10 10:27:46 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:27:46 executing program 1: r0 = inotify_init1(0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x89b0, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={'erspan0\x00', {0x2, 0x4e21, @multicast2=0xe0000002}}) ioctl$int_in(r0, 0x5452, &(0x7f000001a000)=0x81) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}}, 0xb2, 0x8}, &(0x7f0000000140)=0x90) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000180)={r2, @in={{0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}}, [0x2, 0x5e, 0x2, 0x80000001, 0x1, 0x70fe, 0x7fffffff, 0x401, 0x7, 0x81, 0xfffffffffffff430, 0x7, 0x0, 0x9, 0xff]}, &(0x7f0000000280)=0x100) 2018/04/10 10:27:46 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000180)={'filter\x00', 0x0, 0x3, 0x7b, [], 0x6, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {}], &(0x7f0000000100)=""/123}, &(0x7f0000000240)=0x78) dup3(r0, r0, 0x80000) socketpair$inet(0x2, 0x800, 0x4cf, &(0x7f0000000440)) r1 = syz_open_dev$usbmon(&(0x7f00000004c0)='/dev/usbmon#\x00', 0x81, 0x10000) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000480)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0xe) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x40000, 0x8) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r2, 0x4008af23, &(0x7f0000000280)={0x3, 0x1}) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000002c0)=@assoc_value={0x0, 0x8}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000340)={r3, @in6={{0xa, 0x4e20, 0x7, @mcast2={0xff, 0x2, [], 0x1}, 0x3}}}, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000000)=0x8) [ 258.667990] FAULT_INJECTION: forcing a failure. [ 258.667990] name failslab, interval 1, probability 0, space 0, times 0 [ 258.679315] CPU: 1 PID: 18738 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 258.686251] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 258.695609] Call Trace: [ 258.698211] dump_stack+0x1b9/0x294 [ 258.701858] ? dump_stack_print_info.cold.2+0x52/0x52 [ 258.707062] ? perf_trace_lock_acquire+0xe3/0x980 [ 258.711921] ? rcu_bh_force_quiescent_state+0x20/0x20 2018/04/10 10:27:47 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x3, 0x400, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000000)=0x8) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet(r2, &(0x7f0000000100)="37b5a43f0aa864069ef877b49eefb40875071f8c20b7a83e6c81a63d77384142aa4e7279d5db7bcf87ab087a47d1f101ccfc", 0x32, 0x0, &(0x7f0000000180)={0x2, 0x4e23, @rand_addr=0x1}, 0x10) ioctl$KVM_SET_VCPU_EVENTS(r1, 0x4040aea0, &(0x7f0000000040)={0x10000, 0xc, 0x2, 0x0, 0x2e, 0x5, 0x10001, 0x9000000000000, 0xfffffffffffffff7, 0x545, 0x3ff, 0x8, 0x0, 0xb4, 0x1, 0x6, 0x800, 0x3, 0xff}) ioctl$sock_ipx_SIOCAIPXITFCRT(r1, 0x89e0, &(0x7f0000000200)=0x3ff) 2018/04/10 10:27:47 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]]}, 0x178) [ 258.717134] should_fail.cold.4+0xa/0x1a [ 258.721218] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 258.726343] ? unwind_get_return_address+0x61/0xa0 [ 258.731289] ? __save_stack_trace+0x7e/0xd0 [ 258.735626] ? graph_lock+0x170/0x170 [ 258.739450] ? find_held_lock+0x36/0x1c0 [ 258.743529] ? __lock_is_held+0xb5/0x140 [ 258.747614] ? check_same_owner+0x320/0x320 [ 258.751949] ? rcu_note_context_switch+0x710/0x710 [ 258.756895] __should_failslab+0x124/0x180 [ 258.761145] should_failslab+0x9/0x14 2018/04/10 10:27:47 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) stat(&(0x7f0000000040)='./file1\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = getegid() lchown(&(0x7f0000000000)='./file0\x00', r0, r1) umount2(&(0x7f00000075c0)='./file0\x00', 0x0) r2 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x200) close(r2) syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000180)='./file1\x00', 0x8c2, 0x0, &(0x7f0000000380), 0x1, &(0x7f0000000400)={[{@delalloc='delalloc', 0x2c}, {@grpjquota='grpjquota=', 0x2c}, {@data_writeback='data=writeback', 0x2c}, {@nombcache='nombcache', 0x2c}, {@usrjquota='usrjquota=', 0x2c}, {@nobarrier='nobarrier', 0x2c}, {@bsddf='bsddf', 0x2c}, {@orlov='orlov', 0x2c}, {@min_batch_time={'min_batch_time', 0x3d, [0x34, 0x3f, 0x39]}, 0x2c}]}) syz_mount_image$minix(&(0x7f0000000480)='minix\x00', &(0x7f00000004c0)='./file1\x00', 0x3, 0x3, &(0x7f00000006c0)=[{&(0x7f0000000500)="1e20a0de799f4c2799a52e9b3557", 0xe, 0x4}, {&(0x7f0000000540)="31e75849c07fd3203be9e25a986cb2e0fdcdf8ab2e9575f8edbbcfaf1948cbb8b636e3565e2d9a4e3f9e44bb9146f47e65ba3cf90ec75ada4a8d5ea6a53b7d8f2700ea3cf48d3bfab30f8fa50e63724826f1b0472259fe574056a43d2193f35bb1f260229aae6bbfd825d06b5dfdbd434b2031ddcbc577366d7d417f9a879ec80eeecfd2e4712a2d316cef24c41fc8fbd7256158b2cf28de292a89ba0b5920219487909ed6aa9f9721", 0xa9, 0x1000}, {&(0x7f0000000600)="8ed1b4771922b8aec74769758c1331e97e3d3786aa6ea47f87f4663de236b070eb8acc14ce2fb343ab4541c29f82abf4341c5f72f9051d2b94629035584fad5395164be7c2fea7e9e16cb4d6e89f84376842ee06f4fb94ff41334b9133145f19ef1907da0ae019bf7e324d12724b2d3ff053a52e6c157b92e6c926789fa2314ce7c9dace03a7a6e57fccfd", 0x8b, 0x5}], 0x0, 0x0) [ 258.764956] kmem_cache_alloc_trace+0x2cb/0x780 [ 258.769634] ? __kmalloc_node+0x33/0x70 [ 258.773619] ? __kmalloc_node+0x33/0x70 [ 258.777609] ? rcu_read_lock_sched_held+0x108/0x120 [ 258.782643] __memcg_init_list_lru_node+0x17d/0x2c0 [ 258.787757] ? kvfree_rcu+0x20/0x20 [ 258.791391] ? __kmalloc_node+0x47/0x70 [ 258.795384] __list_lru_init+0x456/0x790 [ 258.799464] ? list_lru_destroy+0x4c0/0x4c0 [ 258.803799] ? mark_held_locks+0xc9/0x160 [ 258.807966] ? __raw_spin_lock_init+0x1c/0x100 [ 258.812561] ? trace_hardirqs_on_caller+0x421/0x5c0 2018/04/10 10:27:47 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000180)=0x8) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7ef7, 0x800) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)={0xaeb, 0xe2b, 0x400, 0x8, 0x6, 0x80, 0x7, 0x9, 0x3, 0x1ff, 0x10001, 0xd39}) ioctl$VHOST_SET_VRING_CALL(r1, 0x4008af21, &(0x7f0000000100)={0x1, r1}) openat(r1, &(0x7f00000000c0)='./file0\x00', 0x102, 0x20) [ 258.817593] ? lockdep_init_map+0x9/0x10 [ 258.821666] sget_userns+0x706/0xf20 [ 258.825388] ? set_anon_super+0x20/0x20 [ 258.829384] ? get_empty_filp.cold.7+0x3e/0x3e [ 258.833986] ? destroy_unused_super.part.9+0x100/0x100 [ 258.839298] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 258.844332] ? kasan_check_read+0x11/0x20 [ 258.848497] ? rcu_pm_notify+0xc0/0xc0 [ 258.852393] ? trace_hardirqs_off+0xd/0x10 [ 258.856650] ? cap_capable+0x1f9/0x260 [ 258.860560] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 2018/04/10 10:27:47 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]]}, 0x178) [ 258.866111] ? security_capable+0x99/0xc0 [ 258.870273] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 258.875820] ? ns_capable_common+0x13f/0x170 [ 258.880242] mount_ns+0x8f/0x1d0 [ 258.883618] ? rpc_pipe_release+0xb70/0xb70 [ 258.887950] rpc_mount+0x9e/0xd0 [ 258.891329] mount_fs+0xae/0x328 [ 258.894711] vfs_kern_mount.part.34+0xd4/0x4d0 [ 258.899304] ? may_umount+0xb0/0xb0 [ 258.902943] ? _raw_read_unlock+0x22/0x30 [ 258.907096] ? __get_fs_type+0x97/0xc0 [ 258.910993] do_mount+0x564/0x3070 [ 258.914580] ? do_raw_spin_unlock+0x9e/0x2e0 2018/04/10 10:27:47 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000d0fff5)='/dev/audio\x00', 0x0, 0x0) perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x70, 0x1e2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000200)) prctl$getreaper(0x13, &(0x7f0000000040)) [ 258.914601] ? copy_mount_string+0x40/0x40 [ 258.923245] ? rcu_pm_notify+0xc0/0xc0 [ 258.927155] ? copy_mount_options+0x5f/0x380 [ 258.931573] ? rcu_read_lock_sched_held+0x108/0x120 [ 258.936599] ? kmem_cache_alloc_trace+0x616/0x780 [ 258.942332] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 2018/04/10 10:27:47 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0xffffffff, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f0000000040)={0xffff, 0x8, 0x3805fb56}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}, 0x8}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:47 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) [ 258.942354] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 258.942372] ? copy_mount_options+0x285/0x380 [ 258.942391] ksys_mount+0x12d/0x140 [ 258.942407] SyS_mount+0x35/0x50 [ 258.942425] ? ksys_mount+0x140/0x140 [ 258.942443] do_syscall_64+0x29e/0x9d0 [ 258.942457] ? vmalloc_sync_all+0x30/0x30 [ 258.942473] ? _raw_spin_unlock_irq+0x27/0x70 [ 258.942490] ? finish_task_switch+0x1ca/0x820 [ 258.942508] ? syscall_return_slowpath+0x5c0/0x5c0 [ 258.942525] ? syscall_return_slowpath+0x30f/0x5c0 [ 258.942547] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 258.942568] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 258.942591] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 258.942603] RIP: 0033:0x455259 [ 258.942611] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 258.942628] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 [ 258.942637] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 [ 258.942647] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 [ 258.942655] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 258.942664] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000018 [ 258.994825] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 259.023961] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop5. [ 259.059921] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 2018/04/10 10:27:47 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]]}, 0x178) 2018/04/10 10:27:47 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000480)='./file0\x00', &(0x7f0000000440)='reiserfs\x00', 0x0, &(0x7f0000000400)="9c7926333d79e000b9586bdecf") umount2(&(0x7f00000075c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_adj\x00') read$eventfd(r0, &(0x7f00000000c0), 0x7) ioctl$VHOST_GET_VRING_ENDIAN(r0, 0x4008af14, &(0x7f0000000040)={0x3, 0x168b}) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000500)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000200)=0xf7) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000240)={0x0, 0x28, "5d65cf024c8f4da27575988cdafa8ce405a238a949d4999362ae8f9058bb125934114d80e5254886"}, &(0x7f0000000280)=0x30) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000002c0)={r1, 0x7, 0x41f4, 0xcad, 0xff, 0x8, 0x7, 0x0, {r2, @in6={{0xa, 0x4e22, 0x5, @remote={0xfe, 0x80, [], 0xbb}, 0x9}}, 0x5, 0x3, 0xffffffff00000001, 0x6}}, &(0x7f0000000380)=0xb0) 2018/04/10 10:27:47 executing program 1: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) chroot(&(0x7f0000000080)='./file0/f.le0\x00') r0 = open(&(0x7f0000000780)='./file0/f.le0\x00', 0x3fffa, 0x0) utime(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={0x6, 0x949f}) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000180)={0x0, 0xce, "1586ac91b34ca7795bebe9defa2558e365356bedfd5e8508298685510d5003ea8e91776b80e66c965ecef2b1ea6755a77013efe0ce382f7e1f9630daebaf5f72f58944b2836b68f113a93f56f59f58d83c0f48bf185b94c61c526be83abf1c00fe1f3c018285d6f1b247d157580d0d800d52c0a10fe0db8f9d99a83547a1746d9e050d6a8a727964b2abf42106a150573c86b2a3c3a598d416e511c69e53a0ea89eb0389db513b7165c4d3138ddac4e6d850621bbf9986bcd14d223082bb0534679e4564879b86bb29d57002d190"}, &(0x7f0000000280)=0xd6) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r1, 0x40, 0x8}, &(0x7f0000000300)=0xc) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000340)) 2018/04/10 10:27:47 executing program 2 (fault-call:5 fault-nth:25): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) 2018/04/10 10:27:47 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x100, 0x2) 2018/04/10 10:27:47 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) r1 = syz_open_dev$dspn(&(0x7f0000000340)='/dev/dsp#\x00', 0x200, 0x400) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x1000008}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x30, r2, 0x4, 0x70bd2b, 0x25dfdbfd, {0x5}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x84a7}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x4080}, 0x0) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:47 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x9, 0xc80) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000200)) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(r1) 2018/04/10 10:27:47 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) [ 259.567607] FAULT_INJECTION: forcing a failure. [ 259.567607] name failslab, interval 1, probability 0, space 0, times 0 [ 259.578938] CPU: 1 PID: 18805 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 259.585881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 259.595246] Call Trace: [ 259.597854] dump_stack+0x1b9/0x294 [ 259.601499] ? dump_stack_print_info.cold.2+0x52/0x52 [ 259.606702] ? perf_trace_lock_acquire+0xe3/0x980 [ 259.611559] ? __save_stack_trace+0x7e/0xd0 2018/04/10 10:27:47 executing program 0: setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x40000, 0x0) accept4$inet6(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c, 0x80800) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) ioctl$DRM_IOCTL_SET_MASTER(r0, 0x641e) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) [ 259.615902] should_fail.cold.4+0xa/0x1a [ 259.619984] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 259.625165] ? save_stack+0x43/0xd0 [ 259.628796] ? kasan_kmalloc+0xc4/0xe0 [ 259.632690] ? kmem_cache_alloc_trace+0x152/0x780 [ 259.637546] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 259.642756] ? __list_lru_init+0x456/0x790 [ 259.647014] ? sget_userns+0x706/0xf20 [ 259.650919] ? graph_lock+0x170/0x170 [ 259.654755] ? do_mount+0x564/0x3070 [ 259.658473] ? ksys_mount+0x12d/0x140 [ 259.662283] ? SyS_mount+0x35/0x50 2018/04/10 10:27:48 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) modify_ldt$read(0x0, &(0x7f00000001c0)=""/9, 0xfffffffffffffd90) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000040)=0x3b) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000080)={0x3, 0xffffffffffff8001, 0x1, 0x8, 0xfffffffffffffffc, 0x4, 0x9, 0x0, r1}, 0x20) r2 = socket$inet6(0xa, 0x1, 0x800000000000b) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x400000004}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f00000000c0)={r1, 0x12, "bd4fab02f2cf9f6f4fc8750f53abbef9c93e"}, &(0x7f0000000100)=0x1a) sendmmsg(r2, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f0000003780), 0x0, &(0x7f00000037c0)}}, {{&(0x7f0000003940)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x80, &(0x7f0000003c40), 0x0, &(0x7f0000003c80)}}], 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) [ 259.665842] ? do_syscall_64+0x29e/0x9d0 [ 259.669917] ? find_held_lock+0x36/0x1c0 [ 259.673998] ? __lock_is_held+0xb5/0x140 [ 259.678082] ? check_same_owner+0x320/0x320 [ 259.682418] ? rcu_note_context_switch+0x710/0x710 [ 259.687371] __should_failslab+0x124/0x180 [ 259.691617] should_failslab+0x9/0x14 [ 259.695433] kmem_cache_alloc_trace+0x2cb/0x780 [ 259.700111] ? __kmalloc_node+0x33/0x70 [ 259.704092] ? __kmalloc_node+0x33/0x70 [ 259.708083] ? rcu_read_lock_sched_held+0x108/0x120 [ 259.713125] __memcg_init_list_lru_node+0x17d/0x2c0 [ 259.718156] ? kvfree_rcu+0x20/0x20 [ 259.721798] ? __kmalloc_node+0x47/0x70 [ 259.725796] __list_lru_init+0x456/0x790 [ 259.729877] ? list_lru_destroy+0x4c0/0x4c0 [ 259.734204] ? mark_held_locks+0xc9/0x160 [ 259.738375] ? __raw_spin_lock_init+0x1c/0x100 [ 259.742970] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 259.748003] ? lockdep_init_map+0x9/0x10 [ 259.752070] sget_userns+0x706/0xf20 [ 259.755797] ? set_anon_super+0x20/0x20 [ 259.759778] ? get_empty_filp.cold.7+0x3e/0x3e 2018/04/10 10:27:48 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0xfffffffffffffffd, @local={0xfe, 0x80, [], 0xaa}}, 0x92) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:48 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in6={0xa, 0x4e21, 0x400, @remote={0xfe, 0x80, [], 0xbb}, 0x9d}, @in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x1}], 0x38) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) delete_module(&(0x7f0000000000)='selinuxsystemcpuset=\x00', 0x800) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000180)={'ifb0\x00', 0x200}) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000000c0)={0x0, 0x80000000, 0x30}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000040), &(0x7f0000000080)=0x4) [ 259.764371] ? destroy_unused_super.part.9+0x100/0x100 [ 259.769669] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 259.774878] ? kasan_check_read+0x11/0x20 [ 259.779037] ? rcu_pm_notify+0xc0/0xc0 [ 259.782934] ? trace_hardirqs_off+0xd/0x10 [ 259.787179] ? cap_capable+0x1f9/0x260 [ 259.791093] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 259.796639] ? security_capable+0x99/0xc0 [ 259.800798] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 259.806352] ? ns_capable_common+0x13f/0x170 [ 259.810770] mount_ns+0x8f/0x1d0 [ 259.814143] ? rpc_pipe_release+0xb70/0xb70 2018/04/10 10:27:48 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e24, 0x8000, @loopback={0x0, 0x1}, 0x7fffffff}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 259.818473] rpc_mount+0x9e/0xd0 [ 259.821848] mount_fs+0xae/0x328 [ 259.825230] vfs_kern_mount.part.34+0xd4/0x4d0 [ 259.829819] ? may_umount+0xb0/0xb0 [ 259.833711] ? _raw_read_unlock+0x22/0x30 [ 259.837866] ? __get_fs_type+0x97/0xc0 [ 259.841780] do_mount+0x564/0x3070 [ 259.845330] ? copy_mount_string+0x40/0x40 [ 259.849573] ? rcu_pm_notify+0xc0/0xc0 [ 259.853480] ? copy_mount_options+0x5f/0x380 [ 259.857903] ? rcu_read_lock_sched_held+0x108/0x120 [ 259.862929] ? kmem_cache_alloc_trace+0x616/0x780 [ 259.867784] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 259.873335] ? _copy_from_user+0xdf/0x150 [ 259.877511] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 259.883064] ? copy_mount_options+0x285/0x380 [ 259.887742] ksys_mount+0x12d/0x140 [ 259.891376] SyS_mount+0x35/0x50 [ 259.894762] ? ksys_mount+0x140/0x140 [ 259.898577] do_syscall_64+0x29e/0x9d0 [ 259.902469] ? vmalloc_sync_all+0x30/0x30 [ 259.906629] ? _raw_spin_unlock_irq+0x27/0x70 [ 259.911122] ? finish_task_switch+0x1ca/0x820 [ 259.915622] ? syscall_return_slowpath+0x5c0/0x5c0 [ 259.920548] ? syscall_return_slowpath+0x30f/0x5c0 [ 259.925482] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 259.930848] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 259.935689] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 259.940881] RIP: 0033:0x455259 [ 259.944067] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 259.951759] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 [ 259.959019] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 [ 259.966282] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 [ 259.973546] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 259.980809] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000019 2018/04/10 10:27:48 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) socket$inet(0x2, 0x0, 0x10001) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:48 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]]}, 0x178) 2018/04/10 10:27:48 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) umount2(&(0x7f00000075c0)='./file0\x00', 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') r0 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x20, 0x800) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000100)={0x401, 0x911, 0x2, 0x7, 0x80d4, 0x7}) 2018/04/10 10:27:48 executing program 1: seccomp(0x0, 0x0, &(0x7f0000001680)={0x2, &(0x7f0000000000)=[{0x0, 0xffffffffffffffff}, {0x0, 0x0, 0x5}]}) r0 = socket$pppoe(0x18, 0x1, 0x0) fcntl$addseals(r0, 0x409, 0x2) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x20000, 0x0) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0x4018aebd, &(0x7f0000000000)) fcntl$notify(r2, 0x402, 0x2) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x40, 0x0) syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x6, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f0000000080)={0x0, 0x1, 0x3, 0x0, 0x3ff, 0x2f5, 0x90, 0x1, 0x9, 0xcb, 0x400, 0x7, 0x0, 0x6a0a08d5, 0x1, 0x8, 0x7, 0x7f, 0x40}) 2018/04/10 10:27:48 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:27:48 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0xffffffea) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dsp\x00', 0x40, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f0000000600)={'filter\x00', 0x4}, 0x68) readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/5, 0x5}, {&(0x7f0000000040)=""/175, 0xaf}, {&(0x7f00000001c0)=""/196, 0xc4}, {&(0x7f00000002c0)=""/165, 0xa5}, {&(0x7f0000000100)=""/24, 0x18}, {&(0x7f0000000380)=""/232, 0xe8}, {&(0x7f0000000480)=""/118, 0x76}, {&(0x7f0000000500)=""/6, 0x6}], 0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:48 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x9, 0xc80) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000200)) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(r1) 2018/04/10 10:27:48 executing program 2 (fault-call:5 fault-nth:26): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) [ 260.534510] FAULT_INJECTION: forcing a failure. [ 260.534510] name failslab, interval 1, probability 0, space 0, times 0 [ 260.545889] CPU: 1 PID: 18861 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 260.552825] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 260.562185] Call Trace: [ 260.564788] dump_stack+0x1b9/0x294 [ 260.568435] ? dump_stack_print_info.cold.2+0x52/0x52 [ 260.573648] ? perf_trace_lock_acquire+0xe3/0x980 [ 260.578508] ? __save_stack_trace+0x7e/0xd0 [ 260.582853] should_fail.cold.4+0xa/0x1a [ 260.586931] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 260.592040] ? save_stack+0x43/0xd0 [ 260.595673] ? kasan_kmalloc+0xc4/0xe0 [ 260.599548] ? kmem_cache_alloc_trace+0x152/0x780 [ 260.604379] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 260.609553] ? __list_lru_init+0x456/0x790 [ 260.613773] ? sget_userns+0x706/0xf20 [ 260.617652] ? graph_lock+0x170/0x170 [ 260.621441] ? do_mount+0x564/0x3070 [ 260.625140] ? ksys_mount+0x12d/0x140 [ 260.628927] ? SyS_mount+0x35/0x50 [ 260.632457] ? do_syscall_64+0x29e/0x9d0 [ 260.636510] ? find_held_lock+0x36/0x1c0 [ 260.640564] ? __lock_is_held+0xb5/0x140 [ 260.644623] ? check_same_owner+0x320/0x320 [ 260.648935] ? rcu_note_context_switch+0x710/0x710 [ 260.653862] __should_failslab+0x124/0x180 [ 260.658090] should_failslab+0x9/0x14 [ 260.661879] kmem_cache_alloc_trace+0x2cb/0x780 [ 260.666533] ? __kmalloc_node+0x33/0x70 [ 260.670496] ? __kmalloc_node+0x33/0x70 [ 260.674461] ? rcu_read_lock_sched_held+0x108/0x120 [ 260.679486] __memcg_init_list_lru_node+0x17d/0x2c0 [ 260.684498] ? kvfree_rcu+0x20/0x20 [ 260.688113] ? __kmalloc_node+0x47/0x70 [ 260.692082] __list_lru_init+0x456/0x790 [ 260.696136] ? list_lru_destroy+0x4c0/0x4c0 [ 260.700447] ? mark_held_locks+0xc9/0x160 [ 260.704590] ? __raw_spin_lock_init+0x1c/0x100 [ 260.709164] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 260.714174] ? lockdep_init_map+0x9/0x10 [ 260.718228] sget_userns+0x706/0xf20 [ 260.721927] ? set_anon_super+0x20/0x20 [ 260.725891] ? get_empty_filp.cold.7+0x3e/0x3e [ 260.730461] ? destroy_unused_super.part.9+0x100/0x100 [ 260.735729] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 260.740734] ? kasan_check_read+0x11/0x20 [ 260.744874] ? rcu_pm_notify+0xc0/0xc0 [ 260.748753] ? cap_capable+0x1f9/0x260 [ 260.752635] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 260.758164] ? security_capable+0x99/0xc0 [ 260.762303] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 260.767829] ? ns_capable_common+0x13f/0x170 [ 260.772229] mount_ns+0x8f/0x1d0 [ 260.775583] ? rpc_pipe_release+0xb70/0xb70 [ 260.779901] rpc_mount+0x9e/0xd0 [ 260.783256] mount_fs+0xae/0x328 [ 260.786621] vfs_kern_mount.part.34+0xd4/0x4d0 [ 260.791195] ? may_umount+0xb0/0xb0 [ 260.794811] ? _raw_read_unlock+0x22/0x30 [ 260.798945] ? __get_fs_type+0x97/0xc0 [ 260.802826] do_mount+0x564/0x3070 [ 260.806357] ? copy_mount_string+0x40/0x40 [ 260.810581] ? rcu_pm_notify+0xc0/0xc0 [ 260.814467] ? copy_mount_options+0x5f/0x380 [ 260.818865] ? rcu_read_lock_sched_held+0x108/0x120 [ 260.823874] ? kmem_cache_alloc_trace+0x616/0x780 [ 260.828708] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 260.834235] ? _copy_from_user+0xdf/0x150 [ 260.838376] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 260.843902] ? copy_mount_options+0x285/0x380 [ 260.848391] ksys_mount+0x12d/0x140 [ 260.852010] SyS_mount+0x35/0x50 [ 260.855370] ? ksys_mount+0x140/0x140 [ 260.859162] do_syscall_64+0x29e/0x9d0 [ 260.863045] ? vmalloc_sync_all+0x30/0x30 [ 260.867181] ? _raw_spin_unlock_irq+0x27/0x70 [ 260.871665] ? finish_task_switch+0x1ca/0x820 [ 260.876150] ? syscall_return_slowpath+0x5c0/0x5c0 [ 260.881070] ? syscall_return_slowpath+0x30f/0x5c0 [ 260.885994] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 260.891366] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 260.896204] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 260.901378] RIP: 0033:0x455259 [ 260.904552] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 260.912251] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 [ 260.919513] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 [ 260.926771] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 2018/04/10 10:27:49 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) umount2(&(0x7f00000075c0)='./file0\x00', 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x24100, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@broadcast, @in6}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000040)=0xe8) ioctl$DRM_IOCTL_AGP_RELEASE(r0, 0x6431) 2018/04/10 10:27:49 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]]}, 0x178) 2018/04/10 10:27:49 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) [ 260.934030] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 260.941285] R13: 00000000000003fb R14: 00000000006f9028 R15: 000000000000001a 2018/04/10 10:27:49 executing program 2 (fault-call:5 fault-nth:27): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) 2018/04/10 10:27:49 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) fcntl$setstatus(r0, 0x4, 0x6000) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000000)={'dummy0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f00000000c0)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@dev={0xac, 0x14, 0x14, 0x11}, @in=@broadcast=0xffffffff, 0x4e21, 0x3f, 0x4e22, 0x1cd, 0xa, 0xa0, 0xa0, 0x2b, 0x0, r3}, {0x1, 0x2, 0x9, 0x2, 0x4, 0x200, 0x0, 0x5}, {0xffffffff, 0x2, 0x7fff, 0x400}, 0x2, 0x6e6bbf, 0x3, 0x1, 0x1, 0x2}, {{@in6=@loopback={0x0, 0x1}, 0x4d6, 0x7e}, 0x2, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0x3505, 0x5, 0xede16f197b2facb5, 0x3, 0x1, 0x400, 0x5}}, 0xe8) ioctl$DRM_IOCTL_INFO_BUFS(r2, 0xc0106418, &(0x7f0000000080)={0x4, 0x6, 0x5, 0x9, 0x8, 0x401}) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:49 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=ANY=[]) sendmsg$inet_sctp(r0, &(0x7f0000000080)={&(0x7f00000000c0)=@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x8000}, 0x1) sync_file_range(r0, 0x0, 0x4, 0x1) getsockname$packet(r0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000580)=0x14) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000000180)={0xaaaaaaaaaaaa9ce}) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000680)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in6=@loopback={0x0, 0x1}, 0x4e22, 0x4e0, 0x0, 0x2d077274, 0xb, 0x20, 0x20, 0x0, r1, r2}, {0x4, 0x3f, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x100000000, 0x1}, {0x0, 0xfffffffffffffffc, 0x7, 0x7}, 0x7, 0x6e6bb0, 0x2, 0x0, 0x0, 0x3}, {{@in6=@mcast2={0xff, 0x2, [], 0x1}, 0x4d4}, 0xa, @in, 0x3506, 0x3, 0x3, 0x1000, 0x2, 0x6, 0x7fffffff}}, 0xe8) memfd_create(&(0x7f0000000140)="6d696d655f74797065da70726f63776c616e31403a766d6e657430656d30726d643573756d73797374656d7070703000", 0x0) ftruncate(r0, 0x8000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000a61000)='/dev/ptmx\x00', 0x801, 0x0) modify_ldt$write(0x1, &(0x7f0000000100)={0x1, 0x100000, 0x1000, 0x9, 0x0, 0x0, 0x100000001, 0x3, 0x3, 0x101}, 0x10) sendfile(r3, r0, &(0x7f0000335ff8), 0xffffffff) ioctl$TCSETSF(r3, 0x5404, &(0x7f0000000040)={0xffffffffffff8000, 0xff, 0x1000, 0x0, 0x7, 0x0, 0x0, 0x7fffffff, 0xd3, 0x5046, 0x6}) r4 = syz_open_dev$sg(&(0x7f0000000280)='/dev/sg#\x00', 0x5, 0x400) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f00000001c0), &(0x7f00000002c0)=0x8) 2018/04/10 10:27:49 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x3, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000000)=@generic={0x7ff, 0x7f, 0x7f}) r2 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x3ff, 0x101000) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x4e20}], 0x10) connect$inet6(r1, &(0x7f00008c0000)={0xa, 0x0, 0xffffffffffffffff, @loopback={0x0, 0x1}, 0xdae}, 0x19f) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:49 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x89) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) umount2(&(0x7f0000000000)='./file0\x00', 0x86eabed1638f91b8) [ 261.139498] FAULT_INJECTION: forcing a failure. [ 261.139498] name failslab, interval 1, probability 0, space 0, times 0 [ 261.150900] CPU: 0 PID: 18890 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 261.157836] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 261.167205] Call Trace: [ 261.169807] dump_stack+0x1b9/0x294 [ 261.173449] ? dump_stack_print_info.cold.2+0x52/0x52 [ 261.178656] ? perf_trace_lock_acquire+0xe3/0x980 [ 261.183512] ? __save_stack_trace+0x7e/0xd0 [ 261.187858] should_fail.cold.4+0xa/0x1a [ 261.191935] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 261.197050] ? save_stack+0x43/0xd0 [ 261.200686] ? kasan_kmalloc+0xc4/0xe0 [ 261.204577] ? kmem_cache_alloc_trace+0x152/0x780 [ 261.209426] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 261.214618] ? __list_lru_init+0x456/0x790 [ 261.218858] ? sget_userns+0x706/0xf20 [ 261.222763] ? graph_lock+0x170/0x170 [ 261.226581] ? do_mount+0x564/0x3070 [ 261.230301] ? ksys_mount+0x12d/0x140 [ 261.234108] ? SyS_mount+0x35/0x50 [ 261.237662] ? do_syscall_64+0x29e/0x9d0 [ 261.241744] ? find_held_lock+0x36/0x1c0 [ 261.245824] ? __lock_is_held+0xb5/0x140 [ 261.249909] ? check_same_owner+0x320/0x320 [ 261.254244] ? rcu_note_context_switch+0x710/0x710 [ 261.259193] __should_failslab+0x124/0x180 [ 261.263441] should_failslab+0x9/0x14 [ 261.267254] kmem_cache_alloc_trace+0x2cb/0x780 [ 261.271910] ? __kmalloc_node+0x33/0x70 [ 261.275870] ? __kmalloc_node+0x33/0x70 [ 261.279838] ? rcu_read_lock_sched_held+0x108/0x120 [ 261.284850] __memcg_init_list_lru_node+0x17d/0x2c0 [ 261.289861] ? kvfree_rcu+0x20/0x20 [ 261.293477] ? __kmalloc_node+0x47/0x70 [ 261.297447] __list_lru_init+0x456/0x790 [ 261.301503] ? list_lru_destroy+0x4c0/0x4c0 [ 261.305823] ? mark_held_locks+0xc9/0x160 [ 261.309961] ? __raw_spin_lock_init+0x1c/0x100 [ 261.314535] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 261.319550] ? lockdep_init_map+0x9/0x10 [ 261.323602] sget_userns+0x706/0xf20 [ 261.327300] ? set_anon_super+0x20/0x20 [ 261.331265] ? get_empty_filp.cold.7+0x3e/0x3e [ 261.335836] ? destroy_unused_super.part.9+0x100/0x100 [ 261.341105] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 261.346113] ? kasan_check_read+0x11/0x20 [ 261.350249] ? rcu_pm_notify+0xc0/0xc0 [ 261.354126] ? trace_hardirqs_off+0xd/0x10 [ 261.358351] ? cap_capable+0x1f9/0x260 [ 261.362240] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 261.367762] ? security_capable+0x99/0xc0 [ 261.371902] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 261.377425] ? ns_capable_common+0x13f/0x170 [ 261.381826] mount_ns+0x8f/0x1d0 [ 261.385179] ? rpc_pipe_release+0xb70/0xb70 [ 261.389489] rpc_mount+0x9e/0xd0 [ 261.392847] mount_fs+0xae/0x328 [ 261.396217] vfs_kern_mount.part.34+0xd4/0x4d0 [ 261.400791] ? may_umount+0xb0/0xb0 [ 261.404408] ? _raw_read_unlock+0x22/0x30 [ 261.408544] ? __get_fs_type+0x97/0xc0 [ 261.412424] do_mount+0x564/0x3070 [ 261.415956] ? do_raw_spin_unlock+0x9e/0x2e0 [ 261.420358] ? copy_mount_string+0x40/0x40 [ 261.424582] ? rcu_pm_notify+0xc0/0xc0 [ 261.428466] ? copy_mount_options+0x5f/0x380 [ 261.432861] ? rcu_read_lock_sched_held+0x108/0x120 [ 261.437870] ? kmem_cache_alloc_trace+0x616/0x780 [ 261.442709] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 261.448252] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 261.453780] ? copy_mount_options+0x285/0x380 [ 261.458269] ksys_mount+0x12d/0x140 [ 261.461888] SyS_mount+0x35/0x50 [ 261.465241] ? ksys_mount+0x140/0x140 [ 261.469035] do_syscall_64+0x29e/0x9d0 [ 261.472910] ? vmalloc_sync_all+0x30/0x30 [ 261.477046] ? _raw_spin_unlock_irq+0x27/0x70 [ 261.481533] ? finish_task_switch+0x1ca/0x820 [ 261.486025] ? syscall_return_slowpath+0x5c0/0x5c0 [ 261.490946] ? syscall_return_slowpath+0x30f/0x5c0 [ 261.495870] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 261.501231] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 261.506068] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 261.511248] RIP: 0033:0x455259 [ 261.514424] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 261.522122] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 [ 261.529380] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 2018/04/10 10:27:49 executing program 1: syz_emit_ethernet(0x2e, &(0x7f0000a15f5e)={@link_local={0x1, 0x80, 0xc2}, @dev={[0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1=0xe0000001}, @igmp={0x11, 0x0, 0x0, @empty, "b3000000"}}}}}, &(0x7f00003b5000)={0x0, 0x8000000, [0xfffffffffffffffd, 0xc4f]}) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x5, 0x8000) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'erspan0\x00', 0x200}) 2018/04/10 10:27:49 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4), 0x0) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0xffffffffffffff3d) 2018/04/10 10:27:49 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]]}, 0x178) 2018/04/10 10:27:49 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x9, 0xc80) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000200)) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(r1) [ 261.536638] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 [ 261.543891] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 261.551147] R13: 00000000000003fb R14: 00000000006f9028 R15: 000000000000001b 2018/04/10 10:27:50 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='reiserfs\x00', 0x40830, &(0x7f000000a000)) umount2(&(0x7f00000075c0)='./file0\x00', 0x0) 2018/04/10 10:27:50 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:27:50 executing program 1: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={"6966623000faffffffffffffff00", 0x4001}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'ifb0\x00', 0xa201}) io_setup(0x469, &(0x7f0000000180)=0x0) io_submit(r2, 0x1, &(0x7f00000016c0)=[&(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000380)="a6bc1ed9", 0x4, 0x100}]) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) 2018/04/10 10:27:50 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:50 executing program 2 (fault-call:5 fault-nth:28): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) 2018/04/10 10:27:50 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) fcntl$setflags(r0, 0x2, 0x1) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:50 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x9, 0xc80) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(r0) 2018/04/10 10:27:50 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]]}, 0x178) [ 262.570753] FAULT_INJECTION: forcing a failure. [ 262.570753] name failslab, interval 1, probability 0, space 0, times 0 [ 262.582075] CPU: 0 PID: 18942 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 262.589007] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 262.598369] Call Trace: [ 262.600972] dump_stack+0x1b9/0x294 [ 262.604616] ? dump_stack_print_info.cold.2+0x52/0x52 [ 262.609827] ? perf_trace_lock_acquire+0xe3/0x980 [ 262.614687] ? __save_stack_trace+0x7e/0xd0 [ 262.619042] should_fail.cold.4+0xa/0x1a [ 262.623121] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 262.628244] ? save_stack+0x43/0xd0 [ 262.631883] ? kasan_kmalloc+0xc4/0xe0 [ 262.635782] ? kmem_cache_alloc_trace+0x152/0x780 [ 262.640639] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 262.645840] ? __list_lru_init+0x456/0x790 [ 262.650086] ? sget_userns+0x706/0xf20 [ 262.653987] ? graph_lock+0x170/0x170 [ 262.657794] ? do_mount+0x564/0x3070 [ 262.661517] ? ksys_mount+0x12d/0x140 [ 262.665327] ? SyS_mount+0x35/0x50 [ 262.668877] ? do_syscall_64+0x29e/0x9d0 [ 262.672955] ? find_held_lock+0x36/0x1c0 [ 262.677029] ? __lock_is_held+0xb5/0x140 [ 262.681097] ? check_same_owner+0x320/0x320 [ 262.685410] ? rcu_note_context_switch+0x710/0x710 [ 262.690335] __should_failslab+0x124/0x180 [ 262.694565] should_failslab+0x9/0x14 [ 262.698355] kmem_cache_alloc_trace+0x2cb/0x780 [ 262.703017] ? __kmalloc_node+0x33/0x70 [ 262.706986] ? __kmalloc_node+0x33/0x70 [ 262.710959] ? rcu_read_lock_sched_held+0x108/0x120 [ 262.715980] __memcg_init_list_lru_node+0x17d/0x2c0 [ 262.720991] ? kvfree_rcu+0x20/0x20 [ 262.724610] ? __kmalloc_node+0x47/0x70 [ 262.728584] __list_lru_init+0x456/0x790 [ 262.732648] ? list_lru_destroy+0x4c0/0x4c0 [ 262.736959] ? mark_held_locks+0xc9/0x160 [ 262.741098] ? __raw_spin_lock_init+0x1c/0x100 [ 262.745673] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 262.750683] ? lockdep_init_map+0x9/0x10 [ 262.754735] sget_userns+0x706/0xf20 [ 262.758436] ? set_anon_super+0x20/0x20 [ 262.762401] ? get_empty_filp.cold.7+0x3e/0x3e [ 262.766971] ? destroy_unused_super.part.9+0x100/0x100 [ 262.772241] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 262.777248] ? kasan_check_read+0x11/0x20 [ 262.781386] ? rcu_pm_notify+0xc0/0xc0 [ 262.785257] ? trace_hardirqs_off+0xd/0x10 [ 262.789480] ? cap_capable+0x1f9/0x260 [ 262.793362] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 262.798890] ? security_capable+0x99/0xc0 [ 262.803033] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 262.808562] ? ns_capable_common+0x13f/0x170 [ 262.812963] mount_ns+0x8f/0x1d0 [ 262.816322] ? rpc_pipe_release+0xb70/0xb70 [ 262.820635] rpc_mount+0x9e/0xd0 [ 262.823995] mount_fs+0xae/0x328 [ 262.827357] vfs_kern_mount.part.34+0xd4/0x4d0 [ 262.831933] ? may_umount+0xb0/0xb0 [ 262.835549] ? _raw_read_unlock+0x22/0x30 [ 262.839682] ? __get_fs_type+0x97/0xc0 [ 262.843563] do_mount+0x564/0x3070 [ 262.847096] ? copy_mount_string+0x40/0x40 [ 262.851322] ? rcu_pm_notify+0xc0/0xc0 [ 262.855204] ? copy_mount_options+0x5f/0x380 [ 262.859604] ? rcu_read_lock_sched_held+0x108/0x120 [ 262.864618] ? kmem_cache_alloc_trace+0x616/0x780 [ 262.869453] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 262.875240] ? _copy_from_user+0xdf/0x150 [ 262.879381] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 262.884910] ? copy_mount_options+0x285/0x380 [ 262.889398] ksys_mount+0x12d/0x140 [ 262.893021] SyS_mount+0x35/0x50 [ 262.896376] ? ksys_mount+0x140/0x140 [ 262.900163] do_syscall_64+0x29e/0x9d0 [ 262.904036] ? vmalloc_sync_all+0x30/0x30 [ 262.908170] ? _raw_spin_unlock_irq+0x27/0x70 [ 262.912654] ? finish_task_switch+0x1ca/0x820 [ 262.917138] ? syscall_return_slowpath+0x5c0/0x5c0 [ 262.922055] ? syscall_return_slowpath+0x30f/0x5c0 [ 262.926977] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 262.932333] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 262.937171] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 262.942344] RIP: 0033:0x455259 [ 262.945520] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 262.953214] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 [ 262.960469] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 2018/04/10 10:27:50 executing program 0: r0 = socket(0x11, 0x4000000000080003, 0x0) setsockopt(r0, 0x107, 0xc, &(0x7f0000000040), 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r1, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000140)={0x0, 0xfffffffffffffffd}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="e682a1abafca2920a984c678a1a6030000c600000000000000235d75b210dee9973518dbfd7ec60c0000000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000080)=0x14) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000040)={r2, 0x8}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000000)=0x319, 0x4) 2018/04/10 10:27:50 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x3, 'ip6tnl0\x00', 0x2}, 0x18) umount2(&(0x7f00000075c0)='./file0\x00', 0x0) [ 262.967737] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 [ 262.974992] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 262.982253] R13: 00000000000003fb R14: 00000000006f9028 R15: 000000000000001c 2018/04/10 10:27:51 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x600400, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:51 executing program 1: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x202}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x4, 0x5460, 0x6f2000, &(0x7f00000001c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x100000001, 0x1000, 0xfffffffffffff7e2, 0xc, r0, 0x1}, 0x2c) 2018/04/10 10:27:51 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4), 0xffffffffffffff6d) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}, 0x100000000}, 0x51) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:51 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:27:51 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) r0 = geteuid() fstat(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000000)='./file0\x00', r0, r1) umount2(&(0x7f00000075c0)='./file0\x00', 0x0) 2018/04/10 10:27:51 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]]}, 0x178) 2018/04/10 10:27:51 executing program 2 (fault-call:5 fault-nth:29): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) [ 263.211835] FAULT_INJECTION: forcing a failure. [ 263.211835] name failslab, interval 1, probability 0, space 0, times 0 [ 263.223241] CPU: 1 PID: 18987 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 263.230175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 263.239532] Call Trace: [ 263.242134] dump_stack+0x1b9/0x294 [ 263.245956] ? dump_stack_print_info.cold.2+0x52/0x52 [ 263.251163] ? perf_trace_lock_acquire+0xe3/0x980 [ 263.256020] ? __save_stack_trace+0x7e/0xd0 [ 263.260369] should_fail.cold.4+0xa/0x1a [ 263.264453] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 263.269580] ? save_stack+0x43/0xd0 [ 263.273219] ? kasan_kmalloc+0xc4/0xe0 [ 263.277119] ? kmem_cache_alloc_trace+0x152/0x780 [ 263.281978] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 263.287177] ? __list_lru_init+0x456/0x790 [ 263.291416] ? sget_userns+0x706/0xf20 [ 263.295299] ? graph_lock+0x170/0x170 [ 263.299090] ? do_mount+0x564/0x3070 [ 263.302788] ? ksys_mount+0x12d/0x140 [ 263.306576] ? SyS_mount+0x35/0x50 [ 263.310116] ? do_syscall_64+0x29e/0x9d0 [ 263.314165] ? find_held_lock+0x36/0x1c0 [ 263.318219] ? __lock_is_held+0xb5/0x140 [ 263.322280] ? check_same_owner+0x320/0x320 [ 263.326591] ? rcu_note_context_switch+0x710/0x710 [ 263.331516] __should_failslab+0x124/0x180 [ 263.335741] should_failslab+0x9/0x14 [ 263.339531] kmem_cache_alloc_trace+0x2cb/0x780 [ 263.344186] ? __kmalloc_node+0x33/0x70 [ 263.348144] ? __kmalloc_node+0x33/0x70 [ 263.352108] ? rcu_read_lock_sched_held+0x108/0x120 [ 263.357119] __memcg_init_list_lru_node+0x17d/0x2c0 [ 263.362940] ? kvfree_rcu+0x20/0x20 [ 263.366555] ? __kmalloc_node+0x47/0x70 [ 263.370526] __list_lru_init+0x456/0x790 [ 263.374580] ? list_lru_destroy+0x4c0/0x4c0 [ 263.378888] ? mark_held_locks+0xc9/0x160 [ 263.383032] ? __raw_spin_lock_init+0x1c/0x100 [ 263.387607] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 263.392617] ? lockdep_init_map+0x9/0x10 [ 263.396673] sget_userns+0x706/0xf20 [ 263.400372] ? set_anon_super+0x20/0x20 [ 263.404340] ? get_empty_filp.cold.7+0x3e/0x3e [ 263.408912] ? destroy_unused_super.part.9+0x100/0x100 [ 263.414178] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 263.419182] ? kasan_check_read+0x11/0x20 [ 263.423320] ? rcu_pm_notify+0xc0/0xc0 [ 263.427194] ? trace_hardirqs_off+0xd/0x10 [ 263.431420] ? cap_capable+0x1f9/0x260 [ 263.435301] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 263.440831] ? security_capable+0x99/0xc0 [ 263.444970] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 263.450494] ? ns_capable_common+0x13f/0x170 [ 263.454895] mount_ns+0x8f/0x1d0 [ 263.458250] ? rpc_pipe_release+0xb70/0xb70 [ 263.462560] rpc_mount+0x9e/0xd0 [ 263.465917] mount_fs+0xae/0x328 [ 263.469276] vfs_kern_mount.part.34+0xd4/0x4d0 [ 263.473846] ? may_umount+0xb0/0xb0 [ 263.477461] ? _raw_read_unlock+0x22/0x30 [ 263.481600] ? __get_fs_type+0x97/0xc0 [ 263.485486] do_mount+0x564/0x3070 [ 263.489022] ? copy_mount_string+0x40/0x40 [ 263.493250] ? rcu_pm_notify+0xc0/0xc0 [ 263.497138] ? copy_mount_options+0x5f/0x380 [ 263.501537] ? rcu_read_lock_sched_held+0x108/0x120 [ 263.506546] ? kmem_cache_alloc_trace+0x616/0x780 [ 263.511383] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 263.516912] ? _copy_from_user+0xdf/0x150 [ 263.521059] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 263.526593] ? copy_mount_options+0x285/0x380 [ 263.531094] ksys_mount+0x12d/0x140 [ 263.534712] SyS_mount+0x35/0x50 [ 263.538067] ? ksys_mount+0x140/0x140 [ 263.541857] do_syscall_64+0x29e/0x9d0 [ 263.545733] ? vmalloc_sync_all+0x30/0x30 [ 263.549870] ? _raw_spin_unlock_irq+0x27/0x70 [ 263.554355] ? finish_task_switch+0x1ca/0x820 [ 263.558841] ? syscall_return_slowpath+0x5c0/0x5c0 [ 263.563761] ? syscall_return_slowpath+0x30f/0x5c0 [ 263.568684] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 263.574046] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 263.578889] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 263.584069] RIP: 0033:0x455259 [ 263.587247] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 263.594949] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 [ 263.602206] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 [ 263.609477] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 [ 263.616734] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 263.623993] R13: 00000000000003fb R14: 00000000006f9028 R15: 000000000000001d 2018/04/10 10:27:52 executing program 1: r0 = memfd_create(&(0x7f0000000000)='posix_acl_access{Y\x00', 0xfffffffffffeffff) lseek(r0, 0x7ffffffffffffffc, 0x0) sendfile(r0, r0, &(0x7f00000000c0), 0x4) 2018/04/10 10:27:52 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getrusage(0x1, &(0x7f00000000c0)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @dev={0xfe, 0x80, [], 0xe}}, 0x1c) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), &(0x7f0000000280)=0x4) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000340)={0x0, 0x18000000000}, &(0x7f0000000380)=0x335) r2 = dup2(r0, r0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f00000001c0)={0x3, 0xd3f6, 0x165f, 0x9, 0x49c664e5, 0x684d}) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f00000003c0)={r1, 0x2}, &(0x7f0000000300)=0x218) r3 = semget(0x1, 0x4, 0x834) semctl$SEM_STAT(r3, 0x7, 0x12, &(0x7f0000000400)=""/170) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000002c0)) ioctl$TUNSETSNDBUF(r4, 0x400454d4, &(0x7f0000000080)=0x2) ioctl$TIOCLINUX6(r4, 0x541c, &(0x7f0000000040)={0x6, 0x5}) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000180)=0x6, 0x4) 2018/04/10 10:27:52 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) utimes(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={{0x77359400}, {0x0, 0x2710}}) umount2(&(0x7f00000075c0)='./file0\x00', 0x0) 2018/04/10 10:27:52 executing program 0: r0 = memfd_create(&(0x7f0000000080)="6d696d655f7479706573797374656d6c6fef626465762d76626f786e6574306d643573756d00", 0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f00000000c0)={0x0, 0x8, 0x9, [0x8, 0x9, 0x1, 0x61d7, 0x0, 0x8001, 0x7, 0x100000001, 0x9]}, &(0x7f0000000100)=0x1a) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000001c0)=@sack_info={r1, 0x7, 0x8000}, 0xc) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r2, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000000)={0x6, r2}) setsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000040)=@int=0x3, 0x4) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:52 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:27:52 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]]}, 0x178) 2018/04/10 10:27:52 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(r0) 2018/04/10 10:27:52 executing program 2 (fault-call:5 fault-nth:30): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) 2018/04/10 10:27:52 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x8, 0x1) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f00000000c0)=r2) ioctl$KVM_SET_DEVICE_ATTR(r1, 0x4018aee1, &(0x7f00000001c0)={0x0, 0x401, 0x1c29, &(0x7f0000000100)}) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) [ 263.950324] FAULT_INJECTION: forcing a failure. [ 263.950324] name failslab, interval 1, probability 0, space 0, times 0 [ 263.961655] CPU: 1 PID: 19018 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 263.968587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 263.977942] Call Trace: [ 263.980543] dump_stack+0x1b9/0x294 [ 263.984183] ? dump_stack_print_info.cold.2+0x52/0x52 [ 263.989381] ? perf_trace_lock_acquire+0xe3/0x980 [ 263.994233] ? __save_stack_trace+0x7e/0xd0 2018/04/10 10:27:52 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]]}, 0x178) [ 263.998579] should_fail.cold.4+0xa/0x1a [ 264.002662] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 264.007811] ? save_stack+0x43/0xd0 [ 264.011486] ? kasan_kmalloc+0xc4/0xe0 [ 264.015387] ? kmem_cache_alloc_trace+0x152/0x780 [ 264.020245] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 264.025451] ? __list_lru_init+0x456/0x790 [ 264.029702] ? sget_userns+0x706/0xf20 [ 264.033611] ? graph_lock+0x170/0x170 [ 264.037420] ? do_mount+0x564/0x3070 [ 264.041143] ? ksys_mount+0x12d/0x140 [ 264.044952] ? SyS_mount+0x35/0x50 2018/04/10 10:27:52 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) [ 264.048504] ? do_syscall_64+0x29e/0x9d0 [ 264.052582] ? find_held_lock+0x36/0x1c0 [ 264.056662] ? __lock_is_held+0xb5/0x140 [ 264.060750] ? check_same_owner+0x320/0x320 [ 264.065089] ? rcu_note_context_switch+0x710/0x710 [ 264.070043] __should_failslab+0x124/0x180 [ 264.074295] should_failslab+0x9/0x14 [ 264.078109] kmem_cache_alloc_trace+0x2cb/0x780 [ 264.082786] ? __kmalloc_node+0x33/0x70 [ 264.086771] ? __kmalloc_node+0x33/0x70 [ 264.090762] ? rcu_read_lock_sched_held+0x108/0x120 [ 264.095810] __memcg_init_list_lru_node+0x17d/0x2c0 [ 264.100850] ? kvfree_rcu+0x20/0x20 [ 264.104495] ? __kmalloc_node+0x47/0x70 [ 264.108491] __list_lru_init+0x456/0x790 [ 264.112571] ? list_lru_destroy+0x4c0/0x4c0 [ 264.116907] ? mark_held_locks+0xc9/0x160 [ 264.121075] ? __raw_spin_lock_init+0x1c/0x100 [ 264.125670] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 264.130700] ? lockdep_init_map+0x9/0x10 [ 264.134771] sget_userns+0x706/0xf20 [ 264.138490] ? set_anon_super+0x20/0x20 [ 264.142472] ? get_empty_filp.cold.7+0x3e/0x3e [ 264.147062] ? destroy_unused_super.part.9+0x100/0x100 [ 264.152348] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 264.157379] ? kasan_check_read+0x11/0x20 [ 264.161553] ? rcu_pm_notify+0xc0/0xc0 [ 264.165451] ? trace_hardirqs_off+0xd/0x10 [ 264.169708] ? cap_capable+0x1f9/0x260 [ 264.173610] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 264.179159] ? security_capable+0x99/0xc0 [ 264.183320] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 264.188867] ? ns_capable_common+0x13f/0x170 [ 264.193284] mount_ns+0x8f/0x1d0 [ 264.196657] ? rpc_pipe_release+0xb70/0xb70 [ 264.200986] rpc_mount+0x9e/0xd0 [ 264.204372] mount_fs+0xae/0x328 [ 264.207756] vfs_kern_mount.part.34+0xd4/0x4d0 [ 264.212348] ? may_umount+0xb0/0xb0 [ 264.215983] ? _raw_read_unlock+0x22/0x30 [ 264.220147] ? __get_fs_type+0x97/0xc0 [ 264.224135] do_mount+0x564/0x3070 [ 264.227685] ? copy_mount_string+0x40/0x40 [ 264.231926] ? rcu_pm_notify+0xc0/0xc0 [ 264.235831] ? copy_mount_options+0x5f/0x380 [ 264.240248] ? rcu_read_lock_sched_held+0x108/0x120 [ 264.245276] ? kmem_cache_alloc_trace+0x616/0x780 [ 264.250135] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 264.255684] ? _copy_from_user+0xdf/0x150 [ 264.259846] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 264.265398] ? copy_mount_options+0x285/0x380 [ 264.269909] ksys_mount+0x12d/0x140 [ 264.273545] SyS_mount+0x35/0x50 [ 264.276914] ? ksys_mount+0x140/0x140 [ 264.280728] do_syscall_64+0x29e/0x9d0 [ 264.284619] ? vmalloc_sync_all+0x30/0x30 [ 264.288775] ? _raw_spin_unlock_irq+0x27/0x70 [ 264.293279] ? finish_task_switch+0x1ca/0x820 [ 264.297780] ? syscall_return_slowpath+0x5c0/0x5c0 [ 264.302701] ? syscall_return_slowpath+0x30f/0x5c0 [ 264.307624] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 264.312981] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 264.317820] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 264.322996] RIP: 0033:0x455259 [ 264.326174] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 264.333869] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 [ 264.341127] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 [ 264.348382] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 [ 264.355637] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 264.362892] R13: 00000000000003fb R14: 00000000006f9028 R15: 000000000000001e 2018/04/10 10:27:53 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/autofs\x00', 0x400, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}], 0x10) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = request_key(&(0x7f0000000200)='user\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000000)='%GPLem1\x00', 0xfffffffffffffffc) keyctl$set_timeout(0xf, r2, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f00000001c0)=0x8) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/psched\x00') accept$ipx(r3, &(0x7f00000000c0), &(0x7f0000000180)=0x10) 2018/04/10 10:27:53 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]]}, 0x178) 2018/04/10 10:27:53 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x8001, 0x200000) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f0000000040)=0x101) umount2(&(0x7f00000075c0)='./file0\x00', 0x0) 2018/04/10 10:27:53 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x3, 0x1) bind$llc(r1, &(0x7f0000000100)={0x1a, 0x33f, 0x0, 0x3, 0x1, 0xdb, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x16}}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) socketpair(0xa, 0x0, 0x8, &(0x7f0000000000)) 2018/04/10 10:27:53 executing program 1: mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x18071, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000040)=0x8, 0x4) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000080)=@generic={0x2, 0x3, 0x9}) remap_file_pages(&(0x7f0000002000/0x5000)=nil, 0x5000, 0x0, 0x0, 0x0) 2018/04/10 10:27:53 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:27:53 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(r0) 2018/04/10 10:27:53 executing program 2 (fault-call:5 fault-nth:31): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) [ 264.900738] FAULT_INJECTION: forcing a failure. [ 264.900738] name failslab, interval 1, probability 0, space 0, times 0 [ 264.912072] CPU: 1 PID: 19065 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 264.919013] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 264.928374] Call Trace: [ 264.930979] dump_stack+0x1b9/0x294 [ 264.934622] ? dump_stack_print_info.cold.2+0x52/0x52 [ 264.939850] ? perf_trace_lock_acquire+0xe3/0x980 [ 264.944706] ? __save_stack_trace+0x7e/0xd0 [ 264.949046] should_fail.cold.4+0xa/0x1a [ 264.953127] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 264.958245] ? save_stack+0x43/0xd0 [ 264.961884] ? kasan_kmalloc+0xc4/0xe0 [ 264.965781] ? kmem_cache_alloc_trace+0x152/0x780 [ 264.970638] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 264.975838] ? __list_lru_init+0x456/0x790 [ 264.980084] ? sget_userns+0x706/0xf20 [ 264.983998] ? graph_lock+0x170/0x170 [ 264.987811] ? do_mount+0x564/0x3070 [ 264.991531] ? ksys_mount+0x12d/0x140 [ 264.995338] ? SyS_mount+0x35/0x50 2018/04/10 10:27:53 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x10000, 0x0) ioctl$KVM_NMI(r1, 0xae9a) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) r2 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x4040) ioctl$EVIOCGRAB(r2, 0x40044590, &(0x7f00000000c0)=0x1) bind$llc(r2, &(0x7f0000000200)={0x1a, 0x31f, 0xfff, 0x0, 0x10000, 0xa000000000, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), &(0x7f0000000040)=0x4) r3 = add_key(&(0x7f0000000240)='cifs.spnego\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x3}, &(0x7f00000002c0)="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", 0x1000, 0xfffffffffffffffd) keyctl$get_security(0x11, r3, &(0x7f00000012c0)=""/178, 0xb2) 2018/04/10 10:27:53 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(r0) [ 264.998887] ? do_syscall_64+0x29e/0x9d0 [ 265.002966] ? find_held_lock+0x36/0x1c0 [ 265.007053] ? __lock_is_held+0xb5/0x140 [ 265.011145] ? check_same_owner+0x320/0x320 [ 265.015480] ? rcu_note_context_switch+0x710/0x710 [ 265.020422] __should_failslab+0x124/0x180 [ 265.024677] should_failslab+0x9/0x14 [ 265.028491] kmem_cache_alloc_trace+0x2cb/0x780 [ 265.033171] ? __kmalloc_node+0x33/0x70 [ 265.037219] ? __kmalloc_node+0x33/0x70 [ 265.041220] ? rcu_read_lock_sched_held+0x108/0x120 [ 265.046256] __memcg_init_list_lru_node+0x17d/0x2c0 2018/04/10 10:27:53 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]]}, 0x178) 2018/04/10 10:27:53 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(r0) 2018/04/10 10:27:53 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_tables_names\x00') ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f0000000080)={r0, r0, 0x101, 0x3, &(0x7f0000000040)="b16b7c42ab7a5797a4d574fa13fe01", 0x0, 0x6, 0x81fe, 0x4, 0x9, 0x3, 0x80000001, "f85d680b09470c20a6fd6d40654815ce5801c2925125b43d4e1a8a481f770c75cd1e5ee535d64d7abf60f688e612cefee6b135cd476e61e9a145355f728cb41e82b5d91dfe20aa6d7b628bb1ae6bc891952584018e817210556c7859d2afd4f7ceed301e7ec790b8f5176af810cd48770715322da41e648f5c6606f3fa22f20b"}) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f00000001c0), 0x4) [ 265.051288] ? kvfree_rcu+0x20/0x20 [ 265.054924] ? __kmalloc_node+0x47/0x70 [ 265.058921] __list_lru_init+0x456/0x790 [ 265.063007] ? list_lru_destroy+0x4c0/0x4c0 [ 265.067340] ? mark_held_locks+0xc9/0x160 [ 265.071501] ? __raw_spin_lock_init+0x1c/0x100 [ 265.076092] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 265.081119] ? lockdep_init_map+0x9/0x10 [ 265.085190] sget_userns+0x706/0xf20 [ 265.088905] ? set_anon_super+0x20/0x20 [ 265.092888] ? get_empty_filp.cold.7+0x3e/0x3e [ 265.097479] ? destroy_unused_super.part.9+0x100/0x100 [ 265.102769] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 265.107800] ? kasan_check_read+0x11/0x20 [ 265.111968] ? rcu_pm_notify+0xc0/0xc0 [ 265.115865] ? trace_hardirqs_off+0xd/0x10 [ 265.120108] ? cap_capable+0x1f9/0x260 [ 265.124011] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 265.129558] ? security_capable+0x99/0xc0 [ 265.133723] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 265.139274] ? ns_capable_common+0x13f/0x170 [ 265.143721] mount_ns+0x8f/0x1d0 [ 265.147091] ? rpc_pipe_release+0xb70/0xb70 [ 265.151426] rpc_mount+0x9e/0xd0 [ 265.154810] mount_fs+0xae/0x328 [ 265.158195] vfs_kern_mount.part.34+0xd4/0x4d0 [ 265.162793] ? may_umount+0xb0/0xb0 [ 265.166436] ? _raw_read_unlock+0x22/0x30 [ 265.170592] ? __get_fs_type+0x97/0xc0 [ 265.174494] do_mount+0x564/0x3070 [ 265.178047] ? copy_mount_string+0x40/0x40 [ 265.182291] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 265.187326] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 265.192106] ? retint_kernel+0x10/0x10 [ 265.196010] ? copy_mount_options+0x1f0/0x380 2018/04/10 10:27:53 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]]}, 0x178) 2018/04/10 10:27:53 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(r0) [ 265.200518] ? copy_mount_options+0x206/0x380 [ 265.205026] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 265.210575] ? copy_mount_options+0x285/0x380 [ 265.215086] ksys_mount+0x12d/0x140 [ 265.218733] SyS_mount+0x35/0x50 [ 265.222114] ? ksys_mount+0x140/0x140 [ 265.225933] do_syscall_64+0x29e/0x9d0 [ 265.229829] ? vmalloc_sync_all+0x30/0x30 [ 265.234020] ? _raw_spin_unlock_irq+0x27/0x70 [ 265.238614] ? finish_task_switch+0x1ca/0x820 [ 265.243126] ? syscall_return_slowpath+0x5c0/0x5c0 [ 265.248069] ? syscall_return_slowpath+0x30f/0x5c0 [ 265.253020] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 265.258412] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 265.263275] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 265.268468] RIP: 0033:0x455259 [ 265.271664] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 265.279376] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 [ 265.286645] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 [ 265.293902] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 2018/04/10 10:27:53 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) rt_sigpending(&(0x7f0000000040), 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x480000, 0x0) ioctl$KVM_SET_SREGS(r1, 0x4138ae84, &(0x7f00000001c0)={{0xd000, 0x1, 0xe, 0x2, 0x6, 0x3, 0x7, 0x84d2, 0xfffffffffffffc01, 0xab1, 0x3, 0x20}, {0x100000, 0x6000, 0x0, 0x2, 0x8001, 0x3f93, 0xfffffffffffffffc, 0x9, 0x23c, 0x3, 0x8000, 0x200}, {0x4, 0x2, 0xe, 0x6, 0x17, 0x7, 0x6, 0x7, 0x1ff, 0x4, 0x7fff, 0x8}, {0xf000, 0x6000, 0x8, 0x0, 0x3, 0x7, 0x9, 0x53eb, 0x7ff, 0x2, 0x9, 0x1}, {0x0, 0x4000, 0x8, 0x6, 0xa5, 0x6, 0x100000000, 0x80000000, 0x3, 0x6, 0x2}, {0x6000, 0x0, 0xc, 0x80, 0x800, 0x7, 0x5, 0x80, 0x8, 0x7, 0x8000, 0x1f}, {0x0, 0x1002, 0xf, 0xa5caa1c, 0xffffffffffff21bc, 0x1f, 0x742, 0x46c, 0xacd9, 0xffffffffffffffff, 0xfe6, 0x40}, {0x100000, 0x0, 0x3, 0x9, 0xc52, 0x1ff, 0x6, 0x2, 0x37bb, 0x7, 0x5, 0x1f}, {0x1000, 0xf000}, {0x1f000, 0xf000}, 0x20000000, 0x0, 0x0, 0x280, 0xc, 0x1001, 0x5000, [0x2, 0x5, 0x6, 0xf619]}) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:53 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/autofs\x00', 0x400, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}], 0x10) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = request_key(&(0x7f0000000200)='user\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000000)='%GPLem1\x00', 0xfffffffffffffffc) keyctl$set_timeout(0xf, r2, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f00000001c0)=0x8) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/psched\x00') accept$ipx(r3, &(0x7f00000000c0), &(0x7f0000000180)=0x10) [ 265.301162] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 265.308420] R13: 00000000000003fb R14: 00000000006f9028 R15: 000000000000001f 2018/04/10 10:27:53 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2000, 0x10) ioctl$TIOCSCTTY(r1, 0x540e, 0xfffffffffffffffe) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VT_WAITACTIVE(r2, 0x5607) 2018/04/10 10:27:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x8, &(0x7f0000000640)=[{&(0x7f00000000c0)="3d5cff88fee3ea40fdc72432907aba7432169440c976b44a081d8a188d22f62afec41f4387ac01e3409ff57cc8fd0945c0d6a54ca1eab04b543fa2cd3b3d181ced39463d78608dce48782a15582b58feeb32eff6928ed5b683fdffa49fb316fa2685f8f5826ac20218b23703f669e5f05c79ea6a3d1b0be97da4d8e6141337e0834f76521c7be03872c0a4d7145ee28432d2d9a88cf364901440560b83ff59b2d4453613acee43e1c3f06436", 0xac, 0x6}, {&(0x7f0000000180)="ffebfc92cbb3b66a300cd7664dbe3a35d849bbe732b614bc2d5958510cba40abaf2510c22e4d06579a1a1fc75a97d3a4224f256ef4e4fbe70effbd5039d8e1e6c5ec26297bd04b4a001c29fa6655a9b4d6458f62e278ec46a281aaf9db3f34e3dd4cf3d2ab0a0399323384d7738d3c2199d5de440b96af6c2f483b47e692945c31fc92d9f6a20bc35e91f521e902a9e326bba3e447a337ebf5a3a553662d", 0x9e, 0xf55}, {&(0x7f0000000240)="f3b3a1adb5b665f24c53c44d88064ae0f15f25afa669c9692191ed19ca63e3120122edf18357c2ebdb7edcfee142dfa2689bf574c82b46449189896a4f40867e9eabc83af9ff2b0e1e1dc7acd0eac51b88910aa6917fd44365d54c1e8f7a5818c8a637a20babac6f62f4c4a9968e4457a77a04ff903257bd68eb08767675b8e450f4220a", 0x84, 0xffff}, {&(0x7f0000000300)="59034d43c57534e80fb0ad50a60d084ee3834a968db491b964e4b64c56c520b1f24e025903c58fa34ad46e61206822a301cd55ee8377b9d47c3aaacfe392abac2658500ebca4c25ed82f10067807bf671cc44892c4ffed014c85b5b2c795f1c1642b53280c95652c9f154cb39892fc1367e4d42ffafd7736ffa48a08ba82d465af1dd95cb6832d5c21e8cdf93316c979979023d5f87e821bdaa42ee8ada83eeffd0a03d88ec920f637432e67387c698c493682816fa3d90e90b6648d8209ea163898b9b194f6d62038", 0xc9, 0xffffffffffff7fff}, {&(0x7f0000000400)="e8c5c0284520a1b704cd38e83f0e20a72d8f1bbf101c93682496d9a010d09214331c3ebc8d3ce01382cd108466e8aee8365cbb6553048eab7e3437e9bbb25a6e44a34f49748d9be3f6e36453fb4c2fa773afcd24", 0x54, 0x5}, {&(0x7f0000000480), 0x0, 0x5}, {&(0x7f00000004c0)="b93266db2bdd62850a46abdc4f545916898348dcc9c58fbde559f4f354dafa2cb0eb28db6c1df5abd433569e76b44c18ac5792825026d92e6c7b9fedbf6d92af7554443590cc8249ca22f827f5df8b532a76b1a5f6527533876855ae547f70b2b60b903b5aa1ea5d0966ce115bd50f46fd521d34c669ad6e0060e54082359208ce616a84eb09f9e0275423db61b0308121782415f6403c9ae8e77efd780a28711cad6436a38cd79dd7", 0xa9, 0x6}, {&(0x7f0000000580)="ac35d924e5d7eb8a6a21265e26010a7103ba2eb109b093745553ff15b69ef11271b79bb8333056682757135699efb5293567d408839f4c03bab99d51ff958c9c1f89cd3559ef050c6f265bb8b1718bc788c03c5505c7de159e75e5aafcfcee7aa90160ad6adbbc10b9427331b353c6ca12fbda786ae74171ea4c422242bcaedd477075605dc47bcea3fc7b405fec5a3797af390b233cb50b8f7bc240c09fb1bc940979", 0xa3}], 0x8000, &(0x7f0000000700)={[{@data_journal='data=journal', 0x2c}, {@orlov='orlov', 0x2c}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}, 0x2c}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, [0x30, 0x32, 0x0, 0x3f, 0x39, 0x2d, 0x3d, 0x78]}, 0x2c}, {@init_itable='init_itable', 0x2c}, {@oldalloc='oldalloc', 0x2c}, {@sysvgroups='sysvgroups', 0x2c}, {@dax='dax', 0x2c}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, [0x36, 0x38, 0x31, 0x34, 0x0]}, 0x2c}]}) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) umount2(&(0x7f00000075c0)='./file0\x00', 0x0) 2018/04/10 10:27:53 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:27:53 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/autofs\x00', 0x400, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}], 0x10) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = request_key(&(0x7f0000000200)='user\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000000)='%GPLem1\x00', 0xfffffffffffffffc) keyctl$set_timeout(0xf, r2, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f00000001c0)=0x8) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/psched\x00') accept$ipx(r3, &(0x7f00000000c0), &(0x7f0000000180)=0x10) 2018/04/10 10:27:53 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]]}, 0x178) 2018/04/10 10:27:53 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(r0) 2018/04/10 10:27:53 executing program 2 (fault-call:5 fault-nth:32): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) 2018/04/10 10:27:53 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)=0x0) ptrace$getenv(0x4201, r1, 0x7fff, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) [ 265.548827] FAULT_INJECTION: forcing a failure. [ 265.548827] name failslab, interval 1, probability 0, space 0, times 0 [ 265.560256] CPU: 1 PID: 19125 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 265.567185] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.576542] Call Trace: [ 265.579153] dump_stack+0x1b9/0x294 [ 265.582807] ? dump_stack_print_info.cold.2+0x52/0x52 [ 265.588012] ? __save_stack_trace+0x7e/0xd0 [ 265.592351] should_fail.cold.4+0xa/0x1a [ 265.596416] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 265.601518] ? save_stack+0x43/0xd0 [ 265.605135] ? kasan_kmalloc+0xc4/0xe0 [ 265.609100] ? kmem_cache_alloc_trace+0x152/0x780 [ 265.613931] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 265.619109] ? __list_lru_init+0x456/0x790 [ 265.623331] ? sget_userns+0x706/0xf20 [ 265.627210] ? graph_lock+0x170/0x170 [ 265.630998] ? do_mount+0x564/0x3070 [ 265.634701] ? ksys_mount+0x12d/0x140 [ 265.638486] ? SyS_mount+0x35/0x50 [ 265.642048] ? do_syscall_64+0x29e/0x9d0 [ 265.646101] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 265.651456] ? find_held_lock+0x36/0x1c0 [ 265.655510] ? __lock_is_held+0xb5/0x140 [ 265.659574] ? check_same_owner+0x320/0x320 [ 265.663887] ? rcu_note_context_switch+0x710/0x710 [ 265.668816] __should_failslab+0x124/0x180 [ 265.673048] should_failslab+0x9/0x14 [ 265.676833] kmem_cache_alloc_trace+0x2cb/0x780 [ 265.681488] ? __kmalloc_node+0x33/0x70 [ 265.685449] ? __kmalloc_node+0x33/0x70 [ 265.689471] ? rcu_read_lock_sched_held+0x108/0x120 [ 265.694488] __memcg_init_list_lru_node+0x17d/0x2c0 [ 265.699495] ? kvfree_rcu+0x20/0x20 [ 265.703111] ? __kmalloc_node+0x47/0x70 [ 265.707084] __list_lru_init+0x456/0x790 [ 265.711138] ? list_lru_destroy+0x4c0/0x4c0 [ 265.715457] ? mark_held_locks+0xc9/0x160 [ 265.719597] ? __raw_spin_lock_init+0x1c/0x100 [ 265.724169] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 265.729178] ? lockdep_init_map+0x9/0x10 [ 265.733233] sget_userns+0x706/0xf20 [ 265.736933] ? set_anon_super+0x20/0x20 [ 265.740917] ? get_empty_filp.cold.7+0x3e/0x3e [ 265.745490] ? destroy_unused_super.part.9+0x100/0x100 [ 265.750759] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 265.755769] ? kasan_check_read+0x11/0x20 [ 265.759912] ? rcu_pm_notify+0xc0/0xc0 [ 265.763793] ? trace_hardirqs_off+0xd/0x10 [ 265.768028] ? cap_capable+0x1f9/0x260 [ 265.771917] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 265.777442] ? security_capable+0x99/0xc0 [ 265.781604] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 265.787131] ? ns_capable_common+0x13f/0x170 [ 265.791536] mount_ns+0x8f/0x1d0 [ 265.794894] ? rpc_pipe_release+0xb70/0xb70 [ 265.799210] rpc_mount+0x9e/0xd0 [ 265.802568] mount_fs+0xae/0x328 [ 265.805930] vfs_kern_mount.part.34+0xd4/0x4d0 [ 265.810502] ? may_umount+0xb0/0xb0 [ 265.814121] ? _raw_read_unlock+0x22/0x30 [ 265.818255] ? __get_fs_type+0x97/0xc0 [ 265.822139] do_mount+0x564/0x3070 [ 265.825675] ? copy_mount_string+0x40/0x40 [ 265.829902] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 265.834651] ? retint_kernel+0x10/0x10 [ 265.838536] ? copy_mount_options+0x213/0x380 [ 265.843028] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 265.848561] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 265.854085] ? copy_mount_options+0x285/0x380 [ 265.858571] ksys_mount+0x12d/0x140 [ 265.862188] SyS_mount+0x35/0x50 [ 265.865542] ? ksys_mount+0x140/0x140 [ 265.869335] do_syscall_64+0x29e/0x9d0 [ 265.873217] ? vmalloc_sync_all+0x30/0x30 [ 265.877370] ? _raw_spin_unlock_irq+0x27/0x70 [ 265.881854] ? finish_task_switch+0x1ca/0x820 [ 265.886348] ? syscall_return_slowpath+0x5c0/0x5c0 [ 265.891268] ? syscall_return_slowpath+0x30f/0x5c0 [ 265.896194] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 265.901552] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 265.906391] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 265.911575] RIP: 0033:0x455259 [ 265.914751] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 265.922449] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 [ 265.929705] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 [ 265.936960] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 [ 265.944216] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 265.951479] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000020 2018/04/10 10:27:54 executing program 4: setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x2000, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000080)={0xffffffffffffffff}) getsockname$packet(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000200)=0x14) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='auxv\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000500)=0x14) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f00000001c0)={@dev={0xfe, 0x80, [], 0x14}, r2}, 0xfffffffffffffec4) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x7d, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000040)={r3, 0x3800000000}, 0x8) 2018/04/10 10:27:54 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(r0) 2018/04/10 10:27:54 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]]}, 0x178) 2018/04/10 10:27:54 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='tmpfs\x00', 0x0, &(0x7f000000a000)) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000000)={0x3, 0xffffffffffffffff, 0x1}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, &(0x7f00000000c0)="c7812e58a700b290b853cece9d16ff1574db49f8d200e8d7a2bd8b7c7e43e82895f3273e9141c10cccb4d91d40b0284ee2e6fccbdea4d83135d5bf4efd9df7e185e54af57a7a91bc113d5f43f8bf9132f417dbfb65225b463a344e85bacc8f03adc63f1c3aa7bbcf928652f8979c01ae006eb63fcb6f75ecef1e842bddf4161d22ebbfbfd4ea5f5ec48661ce3cab1c01ab467d5edf8e2fbb8e45b31698ab055b75c76f5545b23a60aa3756c7db6f240d36648a8ab73009307279f75e4fda54a888ace94e", &(0x7f00000001c0)=""/112}, 0x18) umount2(&(0x7f00000075c0)='./file0\x00', 0x0) 2018/04/10 10:27:54 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000080)={0x0, 0x6, 0x4}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000100)={0x0, 0x5d1}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000200)={r1}, &(0x7f0000000000)=0x8) 2018/04/10 10:27:54 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/autofs\x00', 0x400, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}], 0x10) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = request_key(&(0x7f0000000200)='user\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000000)='%GPLem1\x00', 0xfffffffffffffffc) keyctl$set_timeout(0xf, r2, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f00000001c0)=0x8) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/psched\x00') accept$ipx(r3, &(0x7f00000000c0), &(0x7f0000000180)=0x10) 2018/04/10 10:27:54 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:27:54 executing program 2 (fault-call:5 fault-nth:33): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) [ 266.150442] FAULT_INJECTION: forcing a failure. [ 266.150442] name failslab, interval 1, probability 0, space 0, times 0 [ 266.162128] CPU: 1 PID: 19158 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 266.169064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 266.178426] Call Trace: [ 266.181031] dump_stack+0x1b9/0x294 [ 266.184674] ? dump_stack_print_info.cold.2+0x52/0x52 [ 266.189883] ? graph_lock+0x170/0x170 [ 266.193693] ? __kmalloc+0x14e/0x760 [ 266.197422] ? register_shrinker+0x121/0x300 [ 266.201836] ? sget_userns+0xc78/0xf20 [ 266.205754] ? mount_ns+0x8f/0x1d0 [ 266.209385] should_fail.cold.4+0xa/0x1a [ 266.213447] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 266.218546] ? find_held_lock+0x36/0x1c0 [ 266.222609] ? graph_lock+0x170/0x170 [ 266.226406] ? find_held_lock+0x36/0x1c0 [ 266.230458] ? __lock_is_held+0xb5/0x140 [ 266.234524] ? check_same_owner+0x320/0x320 [ 266.238834] ? down_read+0x1b0/0x1b0 [ 266.242549] ? rcu_note_context_switch+0x710/0x710 [ 266.247470] ? register_shrinker+0x121/0x300 [ 266.251875] __should_failslab+0x124/0x180 [ 266.256100] should_failslab+0x9/0x14 [ 266.259887] kmem_cache_alloc+0x2af/0x760 [ 266.264037] ? rpc_i_callback+0x30/0x30 [ 266.268003] rpc_alloc_inode+0x1a/0x20 [ 266.271889] alloc_inode+0x63/0x190 [ 266.275516] new_inode_pseudo+0x69/0x1a0 [ 266.279565] ? prune_icache_sb+0x1a0/0x1a0 [ 266.283804] ? kasan_check_read+0x11/0x20 [ 266.287941] ? rcu_is_watching+0x85/0x140 [ 266.292079] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 266.297260] new_inode+0x1c/0x40 [ 266.300628] rpc_get_inode+0x1e/0x1f0 [ 266.304426] rpc_fill_super+0x377/0xbb0 [ 266.308404] ? cap_capable+0x1f9/0x260 [ 266.312282] ? rpc_pipe_release+0xb70/0xb70 [ 266.316598] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 266.322122] ? security_capable+0x99/0xc0 [ 266.326261] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 266.331788] ? ns_capable_common+0x13f/0x170 [ 266.336189] mount_ns+0x12a/0x1d0 [ 266.339631] ? rpc_pipe_release+0xb70/0xb70 [ 266.343943] rpc_mount+0x9e/0xd0 [ 266.347298] mount_fs+0xae/0x328 [ 266.350662] vfs_kern_mount.part.34+0xd4/0x4d0 [ 266.355235] ? may_umount+0xb0/0xb0 [ 266.358855] ? _raw_read_unlock+0x22/0x30 [ 266.362992] ? __get_fs_type+0x97/0xc0 [ 266.366875] do_mount+0x564/0x3070 [ 266.370411] ? copy_mount_string+0x40/0x40 [ 266.374637] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 266.379388] ? retint_kernel+0x10/0x10 [ 266.383275] ? copy_mount_options+0x1f0/0x380 [ 266.387850] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 266.392684] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 266.398212] ? copy_mount_options+0x285/0x380 [ 266.402701] ksys_mount+0x12d/0x140 [ 266.406316] SyS_mount+0x35/0x50 [ 266.409671] ? ksys_mount+0x140/0x140 [ 266.413463] do_syscall_64+0x29e/0x9d0 [ 266.417338] ? vmalloc_sync_all+0x30/0x30 [ 266.421472] ? _raw_spin_unlock_irq+0x27/0x70 [ 266.425957] ? finish_task_switch+0x1ca/0x820 [ 266.430441] ? syscall_return_slowpath+0x5c0/0x5c0 [ 266.435362] ? syscall_return_slowpath+0x30f/0x5c0 [ 266.440287] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 266.445643] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 266.450480] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 266.455657] RIP: 0033:0x455259 [ 266.458836] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 266.466534] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 [ 266.473789] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 [ 266.481043] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 [ 266.488300] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 2018/04/10 10:27:54 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x0, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(r0) 2018/04/10 10:27:54 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]]}, 0x178) [ 266.495564] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000021 2018/04/10 10:27:54 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000e5a000)='/dev/binder#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x20011, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000007fd0)={0x44, 0x0, &(0x7f000000df48)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000005fe8), &(0x7f0000206000)}}], 0x0, 0x0, &(0x7f000084b000)}) r1 = syz_open_dev$binder(&(0x7f000067cff3)='/dev/binder#\x00', 0x0, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x200000, 0x0) ioctl$KDMKTONE(r2, 0x4b30, 0x1) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000300)={0x78, 0x0, &(0x7f00000001c0)=[@clear_death={0x400c630f, 0x3}, @enter_looper={0x630c}, @request_death={0x400c630e, 0x0, 0x4}, @transaction={0x40406300, {0x4, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x20, &(0x7f0000000140), &(0x7f0000000180)=[0x20, 0x38, 0x38, 0x0]}}, @release={0x40046306, 0x3}, @release={0x40046306, 0x2}], 0xa6, 0x0, &(0x7f0000000240)="ef2019aedaf7cf85203f123fc773a4c2e79c8225bea3cd3074efb0128626af5dd674da3001c2f4a21e680a1aa13a360910dcf571f9a1f47db59b391bfeb89c18fe0d4612973e32db206f1a0d3f7a5d3f80bb8f81583c9dbc1d1e8155660028a050544ae8613c2280d4f4a9b2d3ac5a5f6d69cd3bdf7be12cd72af9ab39a9949a51bdb2a8bf047987017af49668a8abb6846ca99732ff1042570e0f1038338e38bdcc157d6ffa"}) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x40000, 0x0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r3, 0x400443c9, &(0x7f0000000100)={{0x40000000000000, 0x8, 0x9, 0x8fe7, 0x2, 0x3}, 0xf984}) ppoll(&(0x7f0000000000)=[{r0, 0x4400}, {r1, 0x18}, {r1, 0x1000}, {r1, 0x1000}, {r1, 0x8018}], 0x5, &(0x7f0000000040)={0x0, 0x1c9c380}, &(0x7f0000000080)={0x41}, 0x8) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00003cb000)={0x4c, 0x0, &(0x7f00001e9000)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000495000), &(0x7f00000fd000)}, 0x10000}}], 0x0, 0x0, &(0x7f00002f6000)}) 2018/04/10 10:27:54 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) socketpair(0x4, 0x80007, 0xad5, &(0x7f0000000080)={0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @empty, @broadcast}, &(0x7f0000000200)=0xc) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000240)={@remote, 0x0}, &(0x7f0000000280)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001000)={'ip6gretap0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f00000011c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001180)={&(0x7f0000001040)={0x10c, r2, 0x608, 0x70bd25, 0x25dfdbfe, {0x2}, [{{0x8, 0x1, r3}, {0xf0, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r4}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8, 0x3, 0xe}, {0x8, 0x4, 0x101}}, {0x8, 0x6, r5}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0xa8b}}}]}}]}, 0x10c}, 0x1, 0x0, 0x0, 0x800}, 0x80) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000), &(0x7f0000000040)=0xb) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:54 executing program 0: r0 = epoll_create1(0x80000) ioctl$fiemap(r0, 0xc020660b, &(0x7f0000000240)={0x0, 0x4, 0x2, 0xffffffffffff3533, 0x3, [{0x100000000, 0x7ff, 0x221, 0x0, 0x0, 0x400}, {0x7, 0xb824, 0x5, 0x0, 0x0, 0x2803}, {0x2, 0x7, 0x0, 0x0, 0x0, 0x800}]}) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) mknod(&(0x7f00000001c0)='./file0\x00', 0x1085, 0x1) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) r2 = semget(0x3, 0x4, 0x0) semctl$GETVAL(r2, 0x0, 0xc, &(0x7f0000000000)=""/215) r3 = socket(0x15, 0x2, 0x80000001) connect$inet6(r1, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0x8) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f0000000100)=0x2) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000200)={r4, 0x2}, 0x8) pause() 2018/04/10 10:27:54 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000040), 0x5d8a91c8d2e1b2a3) 2018/04/10 10:27:54 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x0, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(r0) [ 266.633682] binder: 19176:19177 ioctl c0306201 20000300 returned -14 2018/04/10 10:27:55 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]]}, 0x178) 2018/04/10 10:27:55 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x0, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(r0) [ 266.675744] binder_alloc: 19176: binder_alloc_buf size 65536 failed, no address space [ 266.683869] binder_alloc: allocated: 8 (num: 1 largest: 8), free: 8184 (num: 1 largest: 8184) [ 266.692627] binder: 19176:19177 transaction failed 29201/-28, size 0-0 line 2963 2018/04/10 10:27:55 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat\x00') preadv(r0, &(0x7f00000014c0)=[{&(0x7f0000001400)=""/160, 0xa0}], 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x1ff, 0x1, 0xff, 0xb3e, 0x0, 0xffffffffffffffff, 0x8201, 0x2, 0x3, 0x8, 0x10000, 0x9, 0xfffffffffffffffa, 0x1, 0x0, 0x10001, 0x8, 0x6, 0x1, 0xfab, 0x5, 0x2, 0x3, 0x4, 0xf8, 0x7, 0xd8, 0xfffffffffffffffd, 0x101, 0x9, 0x5, 0x6, 0x9, 0x6, 0x1000000000000000, 0x1, 0x0, 0xde, 0x6, @perf_config_ext={0xfffffffffffff21e, 0x80000001}, 0xc0, 0x2, 0x80000000, 0x4, 0x101, 0xa3, 0x3}, r1, 0x2, r0, 0x8) [ 266.716997] binder: BINDER_SET_CONTEXT_MGR already set 2018/04/10 10:27:55 executing program 4: setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) io_setup(0xfff, &(0x7f0000000000)=0x0) io_destroy(r0) connect$inet6(0xffffffffffffffff, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:55 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(r0) [ 266.746635] binder_alloc: 19176: binder_alloc_buf, no vma [ 266.752321] binder: 19176:19177 transaction failed 29189/-3, size 0-0 line 2963 [ 266.756997] binder: 19176:19193 ioctl 40046207 0 returned -16 [ 266.878696] binder: 19176:19177 ioctl c0306201 20000300 returned -14 [ 266.934907] binder: undelivered TRANSACTION_ERROR: 29189 [ 266.943271] binder: release 19176:19177 transaction 10 out, still active [ 266.950511] binder: undelivered TRANSACTION_COMPLETE [ 266.955700] binder: send failed reply for transaction 10, target dead [ 266.962385] binder: undelivered TRANSACTION_ERROR: 29201 2018/04/10 10:27:55 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:27:55 executing program 2 (fault-call:5 fault-nth:34): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) 2018/04/10 10:27:55 executing program 1: socketpair(0x1e, 0x3, 0xc04, &(0x7f0000000140)={0x0, 0x0}) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f0000000040)=0x8) recvmsg(r0, &(0x7f0000000000)={&(0x7f0000000300)=@sco, 0x80, &(0x7f0000000180), 0x17d}, 0x0) 2018/04/10 10:27:55 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]]}, 0x178) 2018/04/10 10:27:55 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(r0) 2018/04/10 10:27:55 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:55 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x4, 0x121400) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000001c0)={0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r2, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x404380, 0x0) epoll_wait(r3, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}], 0x6, 0x7) 2018/04/10 10:27:55 executing program 5: mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000080)={0x0, {{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x88) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000), 0x0) [ 267.647502] FAULT_INJECTION: forcing a failure. [ 267.647502] name failslab, interval 1, probability 0, space 0, times 0 [ 267.658869] CPU: 1 PID: 19228 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 267.666256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.666268] Call Trace: [ 267.666292] dump_stack+0x1b9/0x294 [ 267.666313] ? dump_stack_print_info.cold.2+0x52/0x52 [ 267.666334] ? perf_trace_lock_acquire+0xe3/0x980 [ 267.666362] should_fail.cold.4+0xa/0x1a [ 267.666384] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 267.666405] ? __save_stack_trace+0x7e/0xd0 [ 267.666425] ? graph_lock+0x170/0x170 [ 267.666444] ? __raw_spin_lock_init+0x1c/0x100 [ 267.666461] ? find_held_lock+0x36/0x1c0 [ 267.666480] ? __lock_is_held+0xb5/0x140 [ 267.666509] ? check_same_owner+0x320/0x320 [ 267.666528] ? rcu_note_context_switch+0x710/0x710 [ 267.666552] __should_failslab+0x124/0x180 [ 267.666569] should_failslab+0x9/0x14 [ 267.666582] kmem_cache_alloc+0x2af/0x760 [ 267.666600] ? lock_downgrade+0x8e0/0x8e0 [ 267.666621] __d_alloc+0xc1/0xc00 [ 267.666642] ? shrink_dcache_for_umount+0x290/0x290 [ 267.666655] ? mark_held_locks+0xc9/0x160 [ 267.666674] ? current_kernel_time64+0x242/0x2f0 [ 267.666691] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 267.666709] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 267.666725] ? current_kernel_time64+0x1f4/0x2f0 [ 267.666751] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 267.666768] ? timespec_trunc+0xe7/0x170 [ 267.666786] ? put_itimerspec64+0x310/0x310 [ 267.666800] ? evict_inodes+0x5f0/0x5f0 [ 267.666816] ? rcu_is_watching+0x85/0x140 [ 267.666839] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 267.666861] d_make_root+0x42/0x90 [ 267.666879] rpc_fill_super+0x37f/0xbb0 [ 267.666900] ? cap_capable+0x1f9/0x260 [ 267.666915] ? rpc_pipe_release+0xb70/0xb70 [ 267.666935] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 267.666949] ? security_capable+0x99/0xc0 [ 267.666968] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 267.666983] ? ns_capable_common+0x13f/0x170 [ 267.667002] mount_ns+0x12a/0x1d0 [ 267.667014] ? rpc_pipe_release+0xb70/0xb70 [ 267.667031] rpc_mount+0x9e/0xd0 [ 267.667048] mount_fs+0xae/0x328 [ 267.667071] vfs_kern_mount.part.34+0xd4/0x4d0 [ 267.667090] ? may_umount+0xb0/0xb0 [ 267.667107] ? _raw_read_unlock+0x22/0x30 [ 267.667122] ? __get_fs_type+0x97/0xc0 [ 267.667141] do_mount+0x564/0x3070 [ 267.667162] ? copy_mount_string+0x40/0x40 [ 267.667176] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 267.667194] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 267.667216] ? retint_kernel+0x10/0x10 [ 267.667240] ? copy_mount_options+0x1f0/0x380 [ 267.667257] ? copy_mount_options+0x202/0x380 [ 267.667273] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 267.667289] ? copy_mount_options+0x285/0x380 [ 267.667308] ksys_mount+0x12d/0x140 [ 267.667324] SyS_mount+0x35/0x50 [ 267.667337] ? ksys_mount+0x140/0x140 [ 267.667354] do_syscall_64+0x29e/0x9d0 [ 267.667368] ? vmalloc_sync_all+0x30/0x30 [ 267.667382] ? _raw_spin_unlock_irq+0x27/0x70 [ 267.667397] ? finish_task_switch+0x1ca/0x820 [ 267.667415] ? syscall_return_slowpath+0x5c0/0x5c0 [ 267.667432] ? syscall_return_slowpath+0x30f/0x5c0 [ 267.667454] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 267.667475] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 267.667499] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 267.667511] RIP: 0033:0x455259 2018/04/10 10:27:56 executing program 1: r0 = syz_open_dev$tun(&(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000001c0)={'bcsh0\x00', 0x12}) r1 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8943, &(0x7f0000000180)={'bcsh0\x00'}) getsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000440), &(0x7f0000000400)=0x36105bbec72a1526) r2 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x7fffffff, 0x800) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0xffffffffffffff7f}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000280)=@assoc_value={r3, 0x6}, 0x8) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040), &(0x7f0000000080), 0x8) 2018/04/10 10:27:56 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(r0) 2018/04/10 10:27:56 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='clear_refs\x00') getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000240)=0x6, &(0x7f0000000280)=0x2) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) sendmsg$rds(r1, &(0x7f0000002b00)={&(0x7f00000002c0)={0x2, 0x4e24}, 0x10, &(0x7f00000016c0)=[{&(0x7f0000000300)=""/188, 0xbc}, {&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/240, 0xf0}, {&(0x7f0000000540)=""/81, 0x51}, {&(0x7f00000005c0)=""/26, 0x1a}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000001600)=""/101, 0x65}, {&(0x7f0000001680)=""/52, 0x34}], 0x8, &(0x7f0000002a80)=ANY=[@ANYBLOB="480000000000000014010000010000000300000008000000", @ANYPTR=&(0x7f0000001740)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='j\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000002a00)=ANY=[@ANYPTR=&(0x7f00000017c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="1000000000160000", @ANYPTR=&(0x7f00000027c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='^\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000002840)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='w\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000028c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB=' \x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000002900)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="cb00000000000000"], @ANYBLOB="050000000000000022000000000000000400000000000000"], 0x48, 0x40000}, 0x80) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000002b40)={0x2, 0x4e24, @broadcast=0xffffffff}, 0x10) r2 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x2, 0x80480) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f00000001c0)=r2) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) r3 = semget$private(0x0, 0x4, 0x0) semctl$IPC_INFO(r3, 0x2, 0x3, &(0x7f0000000000)=""/227) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:56 executing program 0: r0 = socket$inet6_sctp(0xa, 0x6, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:56 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:27:56 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x4, 0x84400) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r1, 0xc08c5336, &(0x7f00000000c0)={0xfffffffffffffffa, 0x6, 0x101, 'queue1\x00', 0xfffffffeffffffff}) sendmsg$nl_route(r0, &(0x7f00009e7000)={&(0x7f000077a000)={0x10}, 0xc, &(0x7f0000746000)={&(0x7f0000000280)=@getlink={0x28, 0x12, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8, 0x13}]}, 0x28}, 0x1}, 0x0) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000440)) socketpair$inet6(0xa, 0x3, 0xf1, &(0x7f0000000040)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f00000001c0)=0xe8) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000bc0)=0x0, &(0x7f0000000c40), &(0x7f0000000cc0)) ioctl$KVM_KVMCLOCK_CTRL(r1, 0xaead) fstat(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000b40)=@filter={'filter\x00', 0xe, 0x5, 0x5f8, [0x0, 0x20000540, 0x200006e8, 0x200008e8], 0x0, &(0x7f0000000180), &(0x7f0000000540)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x1d, 0x2, 0xf9, 'yam0\x00', 'vcan0\x00', 'ip_vti0\x00', 'syzkaller1\x00', @random="e5911201e179", [0xff, 0x0, 0x0, 0x0, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x10}, [0x0, 0xff, 0xff], 0x70, 0xa0, 0xd8}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7}}}]}, @common=@dnat={'dnat\x00', 0x10, {{@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x10}}}}, {{{0xb, 0x4, 0x0, 'ifb0\x00', 'gre0\x00', 'eql\x00', 'tunl0\x00', @link_local={0x1, 0x80, 0xc2}, [0xff, 0xff, 0xff, 0x0, 0xff], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8, {{0x1}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x15, 0x80ff, 'bpq0\x00', 'ip6gretap0\x00', 'gretap0\x00', 'ipddp0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [0xff, 0xff, 0x0, 0x0, 0x0, 0xff], @empty, [0x0, 0xff, 0x0, 0x0, 0xff, 0xff], 0xa0, 0xa0, 0x1d0, [@vlan={'vlan\x00', 0x8, {{0x2, 0x5, 0x0, 0xd88ad46c6fd0c057, 0x2}}}]}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0xa45, 'system_u:object_r:framebuf_device_t:s0\x00'}}}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x2, [{{{0x1b, 0x4, 0x60f9, 'syzkaller1\x00', 'vlan0\x00', 'eql\x00', 'gre0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff], 0xc0, 0xc0, 0xf8, [@ipvs={'ipvs\x00', 0x28, {{@ipv4, [0xff0000ff, 0xffffff00, 0xffffffff, 0xff000000], 0x4e24, 0x2, 0x5, 0x4e21, 0x2, 0x3c}}}]}}, @common=@dnat={'dnat\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0xffffffffffffffff}}}}, {{{0x0, 0x4, 0x60, 'ifb0\x00', 'teql0\x00', 'erspan0\x00', 'team0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0xff, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, [0x0, 0xff], 0xf0, 0xf0, 0x128, [@owner={'owner\x00', 0x18, {{r2, r3, r4, r5, 0x2, 0x6}}}, @mark_m={'mark_m\x00', 0x18, {{0x1f, 0x1ff, 0x2, 0x1}}}]}}, @common=@dnat={'dnat\x00', 0x10, {{@empty, 0xfffffffffffffffc}}}}]}]}, 0x670) syz_open_dev$random(&(0x7f0000000000)='/dev/random\x00', 0x0, 0x10000) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000240)={{&(0x7f0000ffc000/0x3000)=nil, 0x3000}, 0x2}) 2018/04/10 10:27:56 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]]}, 0x178) 2018/04/10 10:27:56 executing program 2 (fault-call:5 fault-nth:35): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) [ 267.667520] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 267.667536] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 [ 267.667546] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 [ 267.667555] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 [ 267.667565] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 267.667574] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000022 [ 268.177147] FAULT_INJECTION: forcing a failure. [ 268.177147] name failslab, interval 1, probability 0, space 0, times 0 [ 268.188769] CPU: 1 PID: 19260 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 268.195716] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.205069] Call Trace: [ 268.207671] dump_stack+0x1b9/0x294 [ 268.211318] ? dump_stack_print_info.cold.2+0x52/0x52 [ 268.216523] ? perf_trace_lock_acquire+0xe3/0x980 [ 268.221393] should_fail.cold.4+0xa/0x1a [ 268.225472] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 268.230597] ? graph_lock+0x170/0x170 [ 268.234417] ? find_held_lock+0x36/0x1c0 [ 268.238493] ? __lock_is_held+0xb5/0x140 [ 268.242582] ? check_same_owner+0x320/0x320 [ 268.246917] ? rcu_note_context_switch+0x710/0x710 [ 268.251849] ? lock_downgrade+0x8e0/0x8e0 [ 268.255994] __should_failslab+0x124/0x180 [ 268.260220] should_failslab+0x9/0x14 [ 268.264005] kmem_cache_alloc+0x2af/0x760 [ 268.268156] __d_alloc+0xc1/0xc00 [ 268.271604] ? shrink_dcache_for_umount+0x290/0x290 [ 268.276611] ? d_alloc_parallel+0x1e80/0x1e80 [ 268.281095] ? lock_release+0xa10/0xa10 [ 268.285057] ? mark_held_locks+0xc9/0x160 [ 268.289192] ? d_lookup+0x254/0x330 [ 268.292811] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 268.297812] ? d_lookup+0x219/0x330 [ 268.301426] d_alloc+0x8e/0x370 [ 268.304699] ? __d_alloc+0xc00/0xc00 [ 268.308403] ? full_name_hash+0xc0/0x100 [ 268.312461] __rpc_lookup_create_exclusive+0x18b/0x1e0 [ 268.317727] ? down_write+0x87/0x120 [ 268.321427] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 268.325644] ? down_read+0x1b0/0x1b0 [ 268.329347] ? kasan_check_write+0x14/0x20 [ 268.333574] rpc_populate.constprop.16+0x99/0x390 [ 268.338412] rpc_fill_super+0x3c9/0xbb0 [ 268.342377] ? cap_capable+0x1f9/0x260 [ 268.346250] ? rpc_pipe_release+0xb70/0xb70 [ 268.350561] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 268.356086] ? security_capable+0x99/0xc0 [ 268.360224] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 268.365748] ? ns_capable_common+0x13f/0x170 [ 268.370147] mount_ns+0x12a/0x1d0 [ 268.373587] ? rpc_pipe_release+0xb70/0xb70 [ 268.377898] rpc_mount+0x9e/0xd0 [ 268.381253] mount_fs+0xae/0x328 [ 268.384613] vfs_kern_mount.part.34+0xd4/0x4d0 [ 268.389186] ? may_umount+0xb0/0xb0 [ 268.392798] ? _raw_read_unlock+0x22/0x30 [ 268.396935] ? __get_fs_type+0x97/0xc0 [ 268.400813] do_mount+0x564/0x3070 [ 268.404343] ? copy_mount_string+0x40/0x40 [ 268.408566] ? rcu_pm_notify+0xc0/0xc0 [ 268.412450] ? copy_mount_options+0x5f/0x380 [ 268.416846] ? rcu_read_lock_sched_held+0x108/0x120 [ 268.421847] ? kmem_cache_alloc_trace+0x616/0x780 [ 268.426685] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 268.432210] ? _copy_from_user+0xdf/0x150 [ 268.436359] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 268.441885] ? copy_mount_options+0x285/0x380 [ 268.446369] ksys_mount+0x12d/0x140 [ 268.449982] SyS_mount+0x35/0x50 [ 268.453334] ? ksys_mount+0x140/0x140 [ 268.457127] do_syscall_64+0x29e/0x9d0 [ 268.460998] ? vmalloc_sync_all+0x30/0x30 [ 268.465139] ? _raw_spin_unlock_irq+0x27/0x70 [ 268.469619] ? finish_task_switch+0x1ca/0x820 [ 268.474103] ? syscall_return_slowpath+0x5c0/0x5c0 [ 268.479028] ? syscall_return_slowpath+0x30f/0x5c0 [ 268.483953] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 268.489306] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 268.494140] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 268.499315] RIP: 0033:0x455259 [ 268.502488] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 268.510183] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 [ 268.517437] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 2018/04/10 10:27:56 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(r0) 2018/04/10 10:27:56 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101000, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f00000001c0)=0xe8) connect$packet(r1, &(0x7f0000000200)={0x11, 0x1, r2, 0x1, 0xfffffffffffff7fa, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x14) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:56 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) [ 268.524704] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 [ 268.531959] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 268.539398] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000023 [ 268.546881] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/04/10 10:27:57 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]]}, 0x178) 2018/04/10 10:27:57 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00004ca000)={&(0x7f0000690000)={0x1c, 0x1, 0x206, 0x1, 0x0, 0x0, {}, [@nested={0x8, 0x1, [@generic="06"]}]}, 0x1c}, 0x1}, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer\x00', 0x400, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x58, r2, 0x200, 0x70bd2b, 0x25dfdbfc, {0xa}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x800}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x6}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1f}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5}]}]}, 0x58}, 0x1, 0x0, 0x0, 0xc4}, 0x4000080) 2018/04/10 10:27:57 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000000580)={'nouuid,'}) 2018/04/10 10:27:57 executing program 2 (fault-call:5 fault-nth:36): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) 2018/04/10 10:27:57 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(r0) 2018/04/10 10:27:57 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7, 0x0) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x5, &(0x7f0000000040)=[{0x6, 0xc0000, 0x80000000, 0x1a7}, {0xc0, 0x3, 0x8a, 0x1f}, {0x4, 0x20, 0xfffffffffffffc00, 0xfffffffffffffff7}, {0x401, 0x9, 0x15e, 0x1}, {0x5, 0xf970, 0xf0b8, 0x2bb}]}, 0x10) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 268.736854] netlink: 'syz-executor1': attribute type 1 has an invalid length. [ 268.781075] FAULT_INJECTION: forcing a failure. [ 268.781075] name failslab, interval 1, probability 0, space 0, times 0 [ 268.792429] CPU: 1 PID: 19308 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 268.799361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.808723] Call Trace: [ 268.811328] dump_stack+0x1b9/0x294 [ 268.814975] ? dump_stack_print_info.cold.2+0x52/0x52 [ 268.820177] ? perf_trace_lock_acquire+0xe3/0x980 [ 268.825031] ? graph_lock+0x170/0x170 [ 268.828853] should_fail.cold.4+0xa/0x1a [ 268.832939] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 268.838058] ? perf_trace_lock+0x900/0x900 [ 268.842308] ? graph_lock+0x170/0x170 [ 268.846121] ? graph_lock+0x170/0x170 [ 268.849929] ? find_held_lock+0x36/0x1c0 [ 268.854001] ? __lock_is_held+0xb5/0x140 [ 268.858089] ? check_same_owner+0x320/0x320 [ 268.862425] ? rcu_note_context_switch+0x710/0x710 [ 268.867373] __should_failslab+0x124/0x180 [ 268.871619] should_failslab+0x9/0x14 [ 268.875435] kmem_cache_alloc+0x2af/0x760 [ 268.879597] ? rpc_i_callback+0x30/0x30 [ 268.883580] rpc_alloc_inode+0x1a/0x20 [ 268.887474] alloc_inode+0x63/0x190 [ 268.891110] new_inode_pseudo+0x69/0x1a0 [ 268.895175] ? prune_icache_sb+0x1a0/0x1a0 [ 268.899417] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 268.904014] ? kasan_check_write+0x14/0x20 [ 268.908261] ? do_raw_spin_lock+0xc1/0x200 [ 268.912506] new_inode+0x1c/0x40 [ 268.915891] rpc_get_inode+0x1e/0x1f0 [ 268.919699] ? d_drop+0x5a/0x70 [ 268.922989] __rpc_create_common+0x5d/0x190 [ 268.927325] rpc_populate.constprop.16+0x11f/0x390 [ 268.932269] rpc_fill_super+0x3c9/0xbb0 [ 268.936255] ? cap_capable+0x1f9/0x260 [ 268.940153] ? rpc_pipe_release+0xb70/0xb70 [ 268.944488] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 268.950031] ? security_capable+0x99/0xc0 [ 268.954187] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 268.959733] ? ns_capable_common+0x13f/0x170 [ 268.964144] mount_ns+0x12a/0x1d0 [ 268.967603] ? rpc_pipe_release+0xb70/0xb70 [ 268.971946] rpc_mount+0x9e/0xd0 [ 268.975318] mount_fs+0xae/0x328 [ 268.978693] vfs_kern_mount.part.34+0xd4/0x4d0 [ 268.983286] ? may_umount+0xb0/0xb0 [ 268.986921] ? _raw_read_unlock+0x22/0x30 [ 268.991073] ? __get_fs_type+0x97/0xc0 [ 268.994973] do_mount+0x564/0x3070 [ 268.998520] ? copy_mount_string+0x40/0x40 [ 269.002757] ? rcu_pm_notify+0xc0/0xc0 [ 269.006663] ? copy_mount_options+0x5f/0x380 [ 269.011082] ? rcu_read_lock_sched_held+0x108/0x120 [ 269.016106] ? kmem_cache_alloc_trace+0x616/0x780 [ 269.020965] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 269.026511] ? _copy_from_user+0xdf/0x150 2018/04/10 10:27:57 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) write$binfmt_script(r0, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'syzkaller\x00'}, {0x20, "6481"}, {0x20, 'bdev+user.&vmnet1proc'}, {0x20}], 0xa, "c13bf0ca704c33befd8975626c4618984f6c2817c44623bac94b99b076176309a55bdde513203c0e713ad23e678db727a5d73c2c62fbe58dbb54e8feb9d349f1caa1d2604c3ceaed8b3138269e75d160488e45395461a52e4800e660ba930cf3e3c05105c84c110aaa98900d4041049a524586c66878d6ab644d2c995526ae41a7bbc4e722f3883abf51e1f1c487afae28f75a68204a2f8a26b708d4659f2b776d16558b4d266542a7a0cb18e40f77f5a21874e8132fdcec892dfada89d61f132d517464410855fc566a57"}, 0xfb) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x10, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000061100800000000000000000000000000950000000000000047dd8d3fe5bac2efe2fb90b35386b0dfa070f0159f465fa836ee32bfc926453e01bf974251756da37a5b42758e25a460b37d96c74654ed822518a0a7a36bd402a9d0d4ac1255b9db287cb174fbb82e6a96eca52220d97a0306707f25d767"], &(0x7f0000000000)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000000040)=""/251}, 0x48) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:57 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(r0) 2018/04/10 10:27:57 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@proc={0x10}, 0x80, &(0x7f0000002000)=[{&(0x7f0000cdefab)="5500000018007fafb72d1cb2a4a280930206000000a843096c2623692500080021000c00000000000000002028f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91d4", 0x55}], 0x1, &(0x7f0000528000)}, 0x0) setsockopt$sock_void(r0, 0x1, 0x24, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f0000000080)={r0, 0x2}) 2018/04/10 10:27:57 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]]}, 0x178) 2018/04/10 10:27:57 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) socket(0x10, 0x80000, 0x1) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:57 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000600)={{{@in=@multicast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000000700)=0xe8) bind$can_raw(r0, &(0x7f0000000740)={0x1d, r2}, 0x10) write$evdev(r0, &(0x7f00000000c0)=[{{0x0, 0x2710}}, {}, {{0x0, 0x2710}}, {}, {{0x77359400}}, {{0x0, 0x7530}}], 0xffbb) close(r0) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000180)=@hci, 0xc, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/33, 0x21}], 0x1, &(0x7f0000000400)=""/251, 0xfb}, 0x0) 2018/04/10 10:27:57 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(r0) 2018/04/10 10:27:57 executing program 0: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x181000, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x81, @loopback={0x0, 0x1}, 0x2}, @in6={0xa, 0x4e24, 0x80000000, @mcast1={0xff, 0x1, [], 0x1}, 0x2}], 0x38) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:57 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$l2tp(0x18, 0x1, 0x1) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r1, 0x111, 0x2, 0x1, 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={0x0, 0x3f}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140)={r2}, &(0x7f0000000180)=0x8) [ 269.030677] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 269.036217] ? copy_mount_options+0x285/0x380 [ 269.040718] ksys_mount+0x12d/0x140 [ 269.044353] SyS_mount+0x35/0x50 [ 269.047725] ? ksys_mount+0x140/0x140 [ 269.051534] do_syscall_64+0x29e/0x9d0 [ 269.055426] ? vmalloc_sync_all+0x30/0x30 [ 269.059584] ? _raw_spin_unlock_irq+0x27/0x70 [ 269.064104] ? finish_task_switch+0x1ca/0x820 [ 269.068612] ? syscall_return_slowpath+0x5c0/0x5c0 [ 269.073557] ? syscall_return_slowpath+0x30f/0x5c0 [ 269.078500] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 269.083875] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 269.088731] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 269.093939] RIP: 0033:0x455259 [ 269.097133] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 269.104847] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 [ 269.112128] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 [ 269.119394] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 [ 269.126660] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 269.133930] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000024 [ 269.141350] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry lockd [ 269.164934] netlink: 'syz-executor1': attribute type 1 has an invalid length. 2018/04/10 10:27:57 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:27:57 executing program 2 (fault-call:5 fault-nth:37): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) 2018/04/10 10:27:57 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]]}, 0x178) 2018/04/10 10:27:57 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net\x00') connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0xd4b, {0x6, 0xfffffffffffffe74, 0x8, 0x80000004, 0xa44, 0x9}, 0x8, 0xfffffffffffffffd}, 0xe) readv(r0, &(0x7f0000000540)=[{&(0x7f0000002400)=""/4096, 0x1000}], 0x1) 2018/04/10 10:27:57 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(r0) 2018/04/10 10:27:57 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000000), &(0x7f0000000040)=0x4) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)=0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@multicast1}}, &(0x7f00000000c0)=0xe8) fstat(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={r1, r2, r3}, 0xc) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:57 executing program 4: clock_gettime(0xffffffffffffffff, &(0x7f0000002ac0)={0x0, 0x0}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r2, &(0x7f0000002e00), 0x3, 0x10001, &(0x7f0000002e40)={r0, r1+10000000}) shutdown(0xffffffffffffffff, 0x1) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000000)=0x2, 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r3, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r3, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:57 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000b", 0x10) r2 = accept$inet6(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, @local}, &(0x7f0000000040)=0x1c) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000140)={@ipv4={[], [0xff, 0xff]}, 0x5a, r3}) sendmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000003a40)=[{&(0x7f000000a4c0)="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", 0x3c2}], 0x1, &(0x7f0000006f40)}}], 0x1, 0x8000) sendmmsg$alg(r1, &(0x7f0000002c80)=[{0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000200)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000740)=@can, 0x80, &(0x7f0000000980), 0x0, &(0x7f00000009c0)=""/69, 0x45}, 0x0) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000240)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @ipv4}}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000001700)=""/4096, 0x1000}], 0x1, &(0x7f0000000340)=""/80, 0x50}, 0x0) [ 269.271674] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / [ 269.383465] FAULT_INJECTION: forcing a failure. [ 269.383465] name failslab, interval 1, probability 0, space 0, times 0 [ 269.394834] CPU: 0 PID: 19367 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 269.401765] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.411296] Call Trace: [ 269.413897] dump_stack+0x1b9/0x294 [ 269.417541] ? dump_stack_print_info.cold.2+0x52/0x52 [ 269.422745] ? perf_trace_lock_acquire+0xe3/0x980 [ 269.427603] ? graph_lock+0x170/0x170 [ 269.431429] should_fail.cold.4+0xa/0x1a [ 269.435507] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 269.440632] ? perf_trace_lock+0x900/0x900 [ 269.444880] ? graph_lock+0x170/0x170 [ 269.448698] ? graph_lock+0x170/0x170 [ 269.452516] ? find_held_lock+0x36/0x1c0 [ 269.456593] ? __lock_is_held+0xb5/0x140 [ 269.460683] ? check_same_owner+0x320/0x320 [ 269.465021] ? rcu_note_context_switch+0x710/0x710 [ 269.469970] __should_failslab+0x124/0x180 [ 269.474217] should_failslab+0x9/0x14 [ 269.478027] kmem_cache_alloc+0x2af/0x760 [ 269.482195] ? rpc_i_callback+0x30/0x30 [ 269.486177] rpc_alloc_inode+0x1a/0x20 [ 269.490075] alloc_inode+0x63/0x190 [ 269.493711] new_inode_pseudo+0x69/0x1a0 [ 269.497784] ? prune_icache_sb+0x1a0/0x1a0 [ 269.502027] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 269.506623] ? kasan_check_write+0x14/0x20 [ 269.510864] ? do_raw_spin_lock+0xc1/0x200 [ 269.515120] new_inode+0x1c/0x40 [ 269.518492] rpc_get_inode+0x1e/0x1f0 [ 269.522305] ? d_drop+0x5a/0x70 [ 269.525597] __rpc_create_common+0x5d/0x190 [ 269.530825] rpc_populate.constprop.16+0x11f/0x390 [ 269.535776] rpc_fill_super+0x3c9/0xbb0 [ 269.539763] ? cap_capable+0x1f9/0x260 [ 269.543662] ? rpc_pipe_release+0xb70/0xb70 [ 269.548010] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 269.553557] ? security_capable+0x99/0xc0 [ 269.557720] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 269.563262] ? ns_capable_common+0x13f/0x170 [ 269.568027] mount_ns+0x12a/0x1d0 [ 269.571500] ? rpc_pipe_release+0xb70/0xb70 [ 269.575837] rpc_mount+0x9e/0xd0 [ 269.579217] mount_fs+0xae/0x328 [ 269.582596] vfs_kern_mount.part.34+0xd4/0x4d0 [ 269.587191] ? may_umount+0xb0/0xb0 [ 269.590831] ? _raw_read_unlock+0x22/0x30 [ 269.594981] ? __get_fs_type+0x97/0xc0 [ 269.598877] do_mount+0x564/0x3070 [ 269.602425] ? copy_mount_string+0x40/0x40 [ 269.606665] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 269.611430] ? retint_kernel+0x10/0x10 [ 269.615332] ? copy_mount_options+0x1e3/0x380 [ 269.619839] ? __sanitizer_cov_trace_const_cmp8+0x19/0x20 [ 269.625386] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 269.631027] ? copy_mount_options+0x285/0x380 [ 269.634687] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 269.635532] ksys_mount+0x12d/0x140 [ 269.643969] ntfs: (device loop5): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 269.647554] SyS_mount+0x35/0x50 [ 269.647572] ? ksys_mount+0x140/0x140 [ 269.659622] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. [ 269.662956] do_syscall_64+0x29e/0x9d0 [ 269.662974] ? vmalloc_sync_all+0x30/0x30 2018/04/10 10:27:57 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='umd=$']) mkdir(&(0x7f0000ac6000)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='tracefs\x00', 0x0, &(0x7f0000000300)) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.stat\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) 2018/04/10 10:27:57 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r0, &(0x7f0000006940)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000006900)={0xffffffff}, 0x2}}, 0x20) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x7f, "8f5130f2643181f5f0fd95248c7e7cb2a54fdbd2903a4c52076027ac94ea6b4ecf403bcea1ba2d3e516b05770d67398a56fddd212f875710c1801dbbb38a4fa8a1a6c3e3d0dd578452720b796051185d8580a445891ab98a0e5b1cb65f0faaa5302a1fc10a6f57a3170a683926b340379cc8bd30cd5765ed487e72219bac7d"}, &(0x7f00000000c0)=0x87) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={r2, @in6={{0xa, 0x4e24, 0xffffffffffffff80, @loopback={0x0, 0x1}, 0x1}}, 0x9, 0x400, 0x1, 0x3, 0x100000001}, &(0x7f00000001c0)=0x98) write$rdma_cm(r0, &(0x7f0000006980)=@set_option={0xe, 0x0, 0xfa00, @id_afonly={&(0x7f0000006740), r1, 0x0, 0x2}}, 0x18) 2018/04/10 10:27:57 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000080)="844ceb4076896ec27393007e8d53", 0xe, 0xfffffffffffffff8) r2 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0xa, r1, &(0x7f0000000280)='encrypted\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x1}, r2) r3 = request_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000240)='#wlan1\x00', 0xfffffffffffffffa) keyctl$search(0xa, r1, &(0x7f00000000c0)='big_key\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x0}, r3) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:57 executing program 1: socketpair$inet6(0xa, 0x7, 0xe7, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setns(r1, 0x4000000) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040)=0x2, 0x4) r2 = socket$bt_cmtp(0x1f, 0x3, 0x5) r3 = socket$bt_cmtp(0x1f, 0x3, 0x5) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r5, 0xc0a85322, &(0x7f00000000c0)) r6 = getegid() r7 = getgid() setregid(r6, r7) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r5, 0xc0a85320, &(0x7f0000000180)={{0x100000000, 0x3}, 'port1\x00', 0x20, 0x101400, 0x8001, 0x6, 0x1, 0x9, 0xfffffffffffffffa, 0x0, 0x5}) setgroups(0x3, &(0x7f0000000240)=[r6, r6, r7]) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r5, 0x800448d2, &(0x7f0000000600)={0x6, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}]}) mknod(&(0x7f0000000640)='./file0\x00', 0x8030, 0x7fff) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r4, 0xc058534b, &(0x7f0000000680)={0x10000, 0x7, 0xffffffff, 0x80000001, 0x4, 0x5}) setsockopt$inet6_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000700)="ba07c5e607cd5054b70d85ad32b9942c1a5beb2af680fda9b3867caf502feb6af57e98812781a21a85ee65aed574cb8ab2dbdc0f5683c2e3bf9a7f579494058c690a9bbfaa1f13c975b23808a0223e31e04a813ac1443db360a62a6dadfd1d116e59fc1501cbb85f92d50d492db59c8d6c8eaae1cae1", 0x76) r8 = gettid() ioctl$EVIOCSABS0(r5, 0x401845c0, &(0x7f0000000780)={0x80, 0x9, 0x4, 0x0, 0x1ff, 0x5}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_ZERO(r4, 0x0, 0x48f, &(0x7f0000000800)={0x6f, @multicast2=0xe0000002, 0x4e24, 0x0, 'rr\x00', 0x1, 0x6, 0x77}, 0x2c) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000940)={'rose0\x00', &(0x7f0000000840)=@ethtool_rxnfc={0x0, 0x1f, 0x2, {0xd, @usr_ip6_spec={@dev={0xfe, 0x80, [], 0x17}, @mcast2={0xff, 0x2, [], 0x1}, 0x5, 0x1, 0x8}, {"b870", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x9, 0x8, [0x1]}, @ah_ip4_spec={@broadcast=0xffffffff, @local={0xac, 0x14, 0x14, 0xaa}, 0x5, 0x62}, {'eW', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x12}, 0x8, 0x7fffffff, [0x80000001, 0xfffffffeffffffff]}, 0x6, 0x9}, 0x3, [0x10000, 0x0, 0x9]}}) ioctl$int_out(r3, 0x5462, &(0x7f0000000980)) ptrace$setregs(0xf, r8, 0x5d4, &(0x7f00000009c0)="2a1a9359e0d0ff1165ca536fdf69535f9bb6") r10 = syz_genetlink_get_family_id$team(&(0x7f0000000a40)='team\x00') accept(r1, &(0x7f0000000a80)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000b00)=0x80) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000c80)=0xe8) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000cc0)={@broadcast, @broadcast, 0x0}, &(0x7f0000000d00)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000f40)={'erspan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000001040)={'team0\x00', 0x0}) getsockname$packet(r4, &(0x7f00000010c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000001100)=0x14) getsockname$packet(r5, &(0x7f0000001140)={0x0, 0x0, 0x0}, &(0x7f0000001180)=0x14) accept4$packet(r5, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000001200)=0x14, 0x80800) getpeername$packet(r5, &(0x7f0000001240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000001280)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r9, 0x29, 0x23, &(0x7f00000012c0)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f00000013c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r9, 0x29, 0x23, &(0x7f0000002a80)={{{@in=@broadcast, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@remote}}, &(0x7f0000002b80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000002bc0)={'vcan0\x00', 0x0}) getsockopt$inet_mreqn(r5, 0x0, 0x27, &(0x7f0000002c00)={@empty, @local, 0x0}, &(0x7f0000002c40)=0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000003700)={0x0, @broadcast, @broadcast}, &(0x7f0000003740)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000003780)={{{@in=@multicast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000003880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f00000038c0)={{{@in6=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f00000039c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000003ac0)={{{@in6=@dev, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000003bc0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000003c00)={{{@in=@broadcast, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000003d00)=0xe8) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000003d40)={0x0, @remote, @multicast2}, &(0x7f0000003d80)=0xc) accept(r4, &(0x7f0000003dc0)=@hci={0x0, 0x0}, &(0x7f0000003e40)=0x80) accept4$packet(r2, &(0x7f0000008300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000008340)=0x14, 0x80000) sendmsg$TEAM_CMD_NOOP(r3, &(0x7f0000008b00)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x10200}, 0xc, &(0x7f0000008ac0)={&(0x7f0000008380)={0x708, r10, 0x800, 0x70bd27, 0x25dfdbff, {}, [{{0x8, 0x1, r11}, {0x208, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r12}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8, 0x3, 0x5}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8, 0x3, 0xb}, {0x1c, 0x4, [{0x1, 0x6, 0x1, 0x6}, {0x4, 0x1, 0x6, 0x40}, {0x40, 0x4, 0x7fffffff, 0x8}]}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0xbae3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0xffff}}, {0x8, 0x6, r13}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8, 0x3, 0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8, 0x3, 0x5}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r14}, {0xcc, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8, 0x3, 0x5}, {0xc, 0x4, 'hash\x00'}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8, 0x3, 0x5}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x4}}, {0x8, 0x7}}}]}}, {{0x8, 0x1, r15}, {0x80, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r16}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8, 0x3, 0xe}, {0x8, 0x4, 0x800}}, {0x8, 0x6, r17}}}]}}, {{0x8, 0x1, r18}, {0x1e4, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r19}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r20}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8, 0x3, 0xe}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r21}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r22}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8, 0x3, 0x5}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8, 0x3, 0x5}, {0x10, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r23}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r24}, {0x88, 0x2, [{0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8, 0x3, 0x5}, {0x14, 0x4, 'activebackup\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r25}}, {0x8, 0x7}}}]}}, {{0x8, 0x1, r26}, {0xbc, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x7fffffff}}, {0x8, 0x6, r27}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r28}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r29}}}]}}, {{0x8, 0x1, r30}, {0x40, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r31}}}]}}]}, 0x708}, 0x1, 0x0, 0x0, 0x1}, 0x1) 2018/04/10 10:27:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) accept4$inet(r1, &(0x7f0000000000)={0x0, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x80000) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@local={0xfe, 0x80, [], 0xaa}, 0x0, 0xffffffffffffffd, 0x1, 0x1, 0x1, 0x401}, 0xf) 2018/04/10 10:27:57 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x8, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:57 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x17, &(0x7f0000000140)=0x6, 0x4) perf_event_open(&(0x7f0000223000)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000140), 0x0, 0xfffffffffffffe00}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) 2018/04/10 10:27:57 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0xfffffffffffffc77) munlockall() connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) [ 269.681583] ? _raw_spin_unlock_irq+0x27/0x70 [ 269.686092] ? finish_task_switch+0x1ca/0x820 [ 269.690605] ? syscall_return_slowpath+0x5c0/0x5c0 [ 269.695545] ? syscall_return_slowpath+0x30f/0x5c0 [ 269.700491] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 269.705865] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 269.710728] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 269.715920] RIP: 0033:0x455259 [ 269.719115] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 269.726831] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 [ 269.734111] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 [ 269.741384] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 [ 269.748657] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 269.755934] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000025 [ 269.763538] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry mount [ 269.847727] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/04/10 10:27:58 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:27:58 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x4000, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000040)={r1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r2, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:58 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]]}, 0x178) 2018/04/10 10:27:58 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(r0) 2018/04/10 10:27:58 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x17, &(0x7f0000000140)=0x6, 0x4) perf_event_open(&(0x7f0000223000)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000140), 0x0, 0xfffffffffffffe00}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) 2018/04/10 10:27:58 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) r1 = socket(0x1d, 0x6, 0x5) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}, 0x800}, 0x130) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:58 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000400)='/dev/hwrng\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040), 0xa190e214d30704e2, 0x0) 2018/04/10 10:27:58 executing program 2 (fault-call:5 fault-nth:38): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) [ 269.968156] FAULT_INJECTION: forcing a failure. [ 269.968156] name failslab, interval 1, probability 0, space 0, times 0 [ 269.978162] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 269.979476] CPU: 0 PID: 19420 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 269.987860] ntfs: (device loop5): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 269.994750] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.994756] Call Trace: [ 269.994781] dump_stack+0x1b9/0x294 [ 269.994799] ? dump_stack_print_info.cold.2+0x52/0x52 [ 269.994821] ? perf_trace_lock_acquire+0xe3/0x980 [ 270.006871] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. [ 270.016201] ? graph_lock+0x170/0x170 [ 270.016225] should_fail.cold.4+0xa/0x1a [ 270.016243] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 270.052192] ? perf_trace_lock+0x900/0x900 [ 270.056440] ? graph_lock+0x170/0x170 [ 270.060254] ? graph_lock+0x170/0x170 [ 270.064070] ? find_held_lock+0x36/0x1c0 2018/04/10 10:27:58 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='net/dev_snmp6\x00') pkey_mprotect(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) getdents64(r0, &(0x7f0000000df0)=""/528, 0xff95) [ 270.068149] ? __lock_is_held+0xb5/0x140 [ 270.072233] ? check_same_owner+0x320/0x320 [ 270.076569] ? rcu_note_context_switch+0x710/0x710 [ 270.080573] can: request_module (can-proto-5) failed. [ 270.081507] __should_failslab+0x124/0x180 [ 270.081527] should_failslab+0x9/0x14 [ 270.081541] kmem_cache_alloc+0x2af/0x760 [ 270.081559] ? rpc_i_callback+0x30/0x30 [ 270.081576] rpc_alloc_inode+0x1a/0x20 [ 270.106722] alloc_inode+0x63/0x190 [ 270.110360] new_inode_pseudo+0x69/0x1a0 [ 270.114429] ? prune_icache_sb+0x1a0/0x1a0 [ 270.118676] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 270.123268] ? kasan_check_write+0x14/0x20 [ 270.127516] ? do_raw_spin_lock+0xc1/0x200 [ 270.131761] new_inode+0x1c/0x40 [ 270.135133] rpc_get_inode+0x1e/0x1f0 [ 270.138941] ? d_drop+0x5a/0x70 [ 270.142225] __rpc_create_common+0x5d/0x190 [ 270.146554] rpc_populate.constprop.16+0x11f/0x390 [ 270.151498] rpc_fill_super+0x3c9/0xbb0 [ 270.154447] can: request_module (can-proto-5) failed. [ 270.155474] ? cap_capable+0x1f9/0x260 [ 270.155493] ? rpc_pipe_release+0xb70/0xb70 [ 270.155511] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 270.155529] ? security_capable+0x99/0xc0 [ 270.178641] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 270.184189] ? ns_capable_common+0x13f/0x170 [ 270.188607] mount_ns+0x12a/0x1d0 [ 270.192075] ? rpc_pipe_release+0xb70/0xb70 [ 270.196405] rpc_mount+0x9e/0xd0 [ 270.199782] mount_fs+0xae/0x328 [ 270.203165] vfs_kern_mount.part.34+0xd4/0x4d0 [ 270.207756] ? may_umount+0xb0/0xb0 [ 270.211391] ? _raw_read_unlock+0x22/0x30 [ 270.215546] ? __get_fs_type+0x97/0xc0 [ 270.219446] do_mount+0x564/0x3070 [ 270.223008] ? copy_mount_string+0x40/0x40 [ 270.227258] ? rcu_pm_notify+0xc0/0xc0 [ 270.231164] ? copy_mount_options+0x5f/0x380 [ 270.235589] ? rcu_read_lock_sched_held+0x108/0x120 [ 270.240607] ? kmem_cache_alloc_trace+0x616/0x780 [ 270.245462] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 270.251007] ? _copy_from_user+0xdf/0x150 [ 270.255176] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 270.260722] ? copy_mount_options+0x285/0x380 [ 270.265230] ksys_mount+0x12d/0x140 [ 270.268867] SyS_mount+0x35/0x50 [ 270.272242] ? ksys_mount+0x140/0x140 [ 270.276058] do_syscall_64+0x29e/0x9d0 [ 270.279955] ? vmalloc_sync_all+0x30/0x30 [ 270.284109] ? _raw_spin_unlock_irq+0x27/0x70 [ 270.288616] ? finish_task_switch+0x1ca/0x820 [ 270.293124] ? syscall_return_slowpath+0x5c0/0x5c0 [ 270.298068] ? syscall_return_slowpath+0x30f/0x5c0 [ 270.302998] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 270.308362] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 270.313209] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 270.318381] RIP: 0033:0x455259 [ 270.321550] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 270.329241] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 [ 270.336495] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 [ 270.343749] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 [ 270.351003] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 270.358268] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000026 [ 270.365750] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry mount [ 270.374853] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/04/10 10:27:58 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:27:58 executing program 1: r0 = syz_open_dev$tun(&(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x3) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"d202b999cf8500000000006309000010", 0x102}) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x1, 0x32, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000080)) 2018/04/10 10:27:58 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) prctl$setname(0xf, &(0x7f0000000000)='vboxnet0em1*vmnet1\x00') getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:27:58 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(r0) 2018/04/10 10:27:58 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]]}, 0x178) 2018/04/10 10:27:58 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000ff0)={0x28, 0x0, 0x0, @hyper}, 0xf) pwritev(r0, &(0x7f00000001c0)=[{&(0x7f0000001000)="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", 0x1000}, {&(0x7f0000000000)="ca3101ddb2bd8d86de6d86331c65d5374a4b2ecaa8a23b0e97a223bacc0cc0fff2a4b9d6c690a8fb6781a71f8ce74ad33ee6ae852a11f4f928d7c12b53bfc9b5a0a77a951a45c884606332491b", 0x4d}, {&(0x7f0000000080)="1d8a30d5335b8d95610f3dee042b347c185155ecffd6164f097bce446a328e67d1b58af97aaece8f07eab31c206abdad4306e7080fb74524e1082e5bac9531ee76104c1b8cf85902b4e368e73eeb9bed93111ec2e401440f5d8305fd7107a3dd23c992b1199d6f02f7f92e821edf77ca4b5770b8badbfd005c0c7ecda0e017", 0x7f}, {&(0x7f0000000100)="a4e9d15820b975149fc3252525bd04e9ee057bbfe5de1bf488dbcca140842734b343515c6127d9f0e37a9a9354e40f5b7bfdf2ec04246030bf982349741346faa58920972b946907081f8941b1a682a05c82ae50757aae4a4febf94699ef486ee96abb2e63712e9517ef7ab9c85a2c78310ab1f50092ac3ead69fa2eb88ba147414a9da35404fe1f5cab010fcaff3c359205", 0x92}], 0x4, 0x0) 2018/04/10 10:27:58 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000001c0)={r1, 0xa7, "dc105457b2f5ecb4d67f92f13f6fc6ac463259698412a8e0d548be92d1a91ac11d6d5b1f0320fd6e82ce627f9cdcb933f53990681538980ba2c2ce0000d984855ba61964888a294e44778f99ca06de0350521cdf8e4aeaf2280ef9c2ae7c0b5e1c3a299c3ed6539a343d336d3d625fbb7baa9df5a67502ca175f8c366a20b73e0272fcc483c0e0092c535b491cdd394d35b9e13d44d776a4ac89d223b7152290e2b09a3758fb74"}, &(0x7f0000000100)=0xaf) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x4000, 0x0) ioctl$KVM_GET_REGS(r2, 0x8090ae81, &(0x7f0000000040)) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000280)) 2018/04/10 10:27:58 executing program 2 (fault-call:5 fault-nth:39): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) 2018/04/10 10:27:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="2c00000013000108000000000002000000000000", @ANYRES32=r1, @ANYBLOB="00000000000000000c0001000000000000000000"], 0x2c}, 0x1}, 0x0) [ 270.514810] FAULT_INJECTION: forcing a failure. [ 270.514810] name failslab, interval 1, probability 0, space 0, times 0 [ 270.526166] CPU: 0 PID: 19473 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 270.533096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 270.542448] Call Trace: [ 270.545049] dump_stack+0x1b9/0x294 [ 270.548697] ? dump_stack_print_info.cold.2+0x52/0x52 [ 270.553903] ? perf_trace_lock_acquire+0xe3/0x980 [ 270.558762] should_fail.cold.4+0xa/0x1a 2018/04/10 10:27:58 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000040)=0x10) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r0, 0x800455d1, &(0x7f00000000c0)=""/255) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x800) 2018/04/10 10:27:58 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]]}, 0x178) [ 270.562832] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 270.567948] ? graph_lock+0x170/0x170 [ 270.571766] ? debug_check_no_locks_freed+0x310/0x310 [ 270.576976] ? find_held_lock+0x36/0x1c0 [ 270.581055] ? __lock_is_held+0xb5/0x140 [ 270.585142] ? check_same_owner+0x320/0x320 [ 270.589477] ? rcu_note_context_switch+0x710/0x710 [ 270.594415] ? lock_downgrade+0x8e0/0x8e0 [ 270.598580] __should_failslab+0x124/0x180 [ 270.602825] should_failslab+0x9/0x14 [ 270.606632] kmem_cache_alloc+0x2af/0x760 [ 270.610802] __d_alloc+0xc1/0xc00 [ 270.614275] ? shrink_dcache_for_umount+0x290/0x290 [ 270.619313] ? d_alloc_parallel+0x1e80/0x1e80 [ 270.623821] ? lock_release+0xa10/0xa10 [ 270.627808] ? mark_held_locks+0xc9/0x160 [ 270.631967] ? d_lookup+0x254/0x330 [ 270.635620] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 270.640644] ? d_lookup+0x219/0x330 [ 270.644289] d_alloc+0x8e/0x370 [ 270.647588] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 270.653141] ? __d_alloc+0xc00/0xc00 [ 270.656864] ? full_name_hash+0xc0/0x100 [ 270.660950] __rpc_lookup_create_exclusive+0x18b/0x1e0 [ 270.666237] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 270.670495] rpc_populate.constprop.16+0x99/0x390 [ 270.675356] rpc_fill_super+0x3c9/0xbb0 [ 270.679346] ? cap_capable+0x1f9/0x260 [ 270.683243] ? rpc_pipe_release+0xb70/0xb70 [ 270.687578] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 270.693121] ? security_capable+0x99/0xc0 [ 270.697281] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 270.702828] ? ns_capable_common+0x13f/0x170 [ 270.707248] mount_ns+0x12a/0x1d0 [ 270.710707] ? rpc_pipe_release+0xb70/0xb70 [ 270.715038] rpc_mount+0x9e/0xd0 [ 270.718415] mount_fs+0xae/0x328 [ 270.721783] vfs_kern_mount.part.34+0xd4/0x4d0 [ 270.726353] ? may_umount+0xb0/0xb0 [ 270.729967] ? _raw_read_unlock+0x22/0x30 [ 270.734100] ? __get_fs_type+0x97/0xc0 [ 270.737977] do_mount+0x564/0x3070 [ 270.741510] ? do_raw_spin_unlock+0x9e/0x2e0 [ 270.745930] ? copy_mount_string+0x40/0x40 [ 270.750178] ? rcu_pm_notify+0xc0/0xc0 [ 270.754064] ? copy_mount_options+0x5f/0x380 [ 270.758464] ? rcu_read_lock_sched_held+0x108/0x120 [ 270.763471] ? kmem_cache_alloc_trace+0x616/0x780 [ 270.768306] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 270.773844] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 270.779367] ? copy_mount_options+0x285/0x380 [ 270.783857] ksys_mount+0x12d/0x140 [ 270.787472] SyS_mount+0x35/0x50 [ 270.790822] ? ksys_mount+0x140/0x140 [ 270.794626] do_syscall_64+0x29e/0x9d0 [ 270.798498] ? vmalloc_sync_all+0x30/0x30 [ 270.802636] ? _raw_spin_unlock_irq+0x27/0x70 [ 270.807121] ? finish_task_switch+0x1ca/0x820 [ 270.811605] ? syscall_return_slowpath+0x5c0/0x5c0 [ 270.816524] ? syscall_return_slowpath+0x30f/0x5c0 [ 270.821445] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 270.826801] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 270.831637] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 270.836808] RIP: 0033:0x455259 [ 270.839981] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 270.847686] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 [ 270.854942] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 2018/04/10 10:27:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0x0, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) r1 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x5, 0x2000) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x4}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000000c0)={r2, @in6={{0xa, 0x4e21, 0x10000, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0x52}}}, 0x84) fcntl$setsig(r0, 0xa, 0x18) dup2(r1, r0) 2018/04/10 10:27:59 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0xe7, "dfaae4bbeb74c768141854a032f8b658304c1ef0af6e26ce5027c44997fe8d9fc29c2396b179b5fe555f448e9887b2925bd3cf330a646b8f621cd5bc8b799d1fc704bd67f61904d5d52aafc5da76aeea3f938dfc64a2c4873a8c40a6ff64c339cb81c0a41810078d2b5e48e9ac67ee59cbb690056ac64e4082f3dabaa85a1002d3da15122ad584c687bba50c2176c56ce14bbcd05de6ccb09c2fd6e880d8cc3ae6c7cabde4183a5464202677953eb95b04836a489d822623a92fb164a08b09cea9bb44f0e2b2ee61d930c274972907c43affd4c5b9e3acd917605bb3cf248b0425eb5ae59b29ae"}, &(0x7f0000000100)=0xef) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000001c0)={r1, 0x57, 0x30}, &(0x7f0000000200)=0xc) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000240)=@assoc_value={r1, 0x2b6a}, 0x8) [ 270.862201] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 [ 270.869462] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 270.876718] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000027 2018/04/10 10:27:59 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x8000001, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0xfffffffffffffffc, 0x200) write$cgroup_pid(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='35'], 0x2) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x208000, 0x0) setns(r1, 0xc000000) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) 2018/04/10 10:27:59 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(r0) 2018/04/10 10:27:59 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]]}, 0x178) [ 270.912496] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / [ 270.963613] sctp: [Deprecated]: syz-executor4 (pid 19492) Use of struct sctp_assoc_value in delayed_ack socket option. [ 270.963613] Use struct sctp_sack_info instead 2018/04/10 10:27:59 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:27:59 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x80000000, 0x4440) sendmsg$nl_crypto(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="f80000001100100027bd7000fcdbdf2577703338342d67656e6572696300000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000200000000000000000000008000100f9ffffff08000100000000000800010008000000c91993061ee03fbc738ab547eab750b8cc55e03382f20eafeff3ab31a78bd462598b212c67573766293a1d60270fe2c3450e2ca4795619fb1e13d3dc512dbb7885647d8dc3274e1436619e41e7d224b31114d6125ac9d49ce5fb6d8634ec82cbee5747da15616dbe3e69285b15398f765ecd6988c5b802bfe48631d7f457ba4d4ad1d2fe1bd3b9051c90943a104fa68e839e85a32762decc80a8241af2ba97a36e029431bb1e3aadad3daafab2797b699018adf3740c"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x4004080) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00') writev(r1, &(0x7f0000000100)=[{&(0x7f0000000080)='+0', 0x2}], 0x1) 2018/04/10 10:27:59 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(r0) 2018/04/10 10:27:59 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000002000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000019fe0)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) signalfd(r0, &(0x7f0000000100)={0x9}, 0x8) fcntl$setown(r0, 0x8, r1) r2 = memfd_create(&(0x7f0000000040)='-.[vmnet0^\x00', 0x0) pwritev(r2, &(0x7f0000000000)=[{&(0x7f0000012000)="ca", 0x1}], 0x1, 0x0) lseek(r2, 0x0, 0x4) ftruncate(r2, 0x0) close(r0) userfaultfd(0x80000) 2018/04/10 10:27:59 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000140)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f0000000000)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0x17d}], 0x2, &(0x7f000000c000)=""/105, 0x69}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x2000000000000044, &(0x7f0000002000)=ANY=[@ANYBLOB="180000000000003300168a6a1e845a31e68fa3aa0000000000000000000000009500000000000000"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195, 0x40f00}, 0x48) r1 = dup3(r0, r0, 0x80000) sendmsg$key(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000005c0)={0x2, 0x15, 0x80, 0x6, 0x19, 0x0, 0x70bd29, 0x25dfdbfe, [@sadb_x_kmaddress={0x8, 0x19, 0x0, @in6={0xa, 0x4e22, 0x3ff, @dev={0xfe, 0x80, [], 0x18}, 0x7}, @in6={0xa, 0x4e20, 0x9, @local={0xfe, 0x80, [], 0xaa}, 0x7}}, @sadb_x_policy={0x8, 0x12, 0x0, 0x6, 0x0, 0x6e6bb5, 0xc87, {0x6, 0x2b, 0x80000000, 0x3, 0x0, 0x0, 0x0, @in=@broadcast=0xffffffff, @in6=@remote={0xfe, 0x80, [], 0xbb}}}, @sadb_x_sa2={0x2, 0x13, 0x7, 0x0, 0x0, 0x70bd28, 0x3507}, @sadb_x_nat_t_type={0x1, 0x14, 0x100000001}, @sadb_ident={0x2, 0xb, 0x1ff, 0x0, 0x3}, @sadb_spirange={0x2, 0x10, 0x4d6, 0x4d3}]}, 0xc8}, 0x1}, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x81, 0x0) ioctl$KDSETKEYCODE(r2, 0x4b4d, &(0x7f0000000200)={0x5, 0x5}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x6e, &(0x7f0000000080)="3447f36cbc3563f8dee5d01dbcef", &(0x7f00000000c0)=""/110}, 0x28) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@remote, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in=@rand_addr, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000004c0)={{{@in=@loopback=0x7f000001, @in6=@ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}, 0x4e20, 0x0, 0x4e23, 0x200, 0xa, 0x20, 0x80, 0x67, r3, r4}, {0x2, 0x6, 0x5, 0x3, 0x7, 0x4, 0x3, 0x55}, {0x6, 0x1000, 0x4, 0x100000000}, 0x7, 0x6e6bb9, 0x3, 0x0, 0x2}, {{@in, 0x4d5, 0xff}, 0xa, @in6, 0x34ff, 0x1, 0x3, 0x909a, 0x1, 0x3, 0x611}}, 0xe8) [ 271.056846] sctp: [Deprecated]: syz-executor4 (pid 19508) Use of struct sctp_assoc_value in delayed_ack socket option. [ 271.056846] Use struct sctp_sack_info instead 2018/04/10 10:28:00 executing program 2 (fault-call:5 fault-nth:40): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) 2018/04/10 10:28:00 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]]}, 0x178) 2018/04/10 10:28:00 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000002000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000019fe0)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) signalfd(r0, &(0x7f0000000100)={0x9}, 0x8) fcntl$setown(r0, 0x8, r1) r2 = memfd_create(&(0x7f0000000040)='-.[vmnet0^\x00', 0x0) pwritev(r2, &(0x7f0000000000)=[{&(0x7f0000012000)="ca", 0x1}], 0x1, 0x0) lseek(r2, 0x0, 0x4) ftruncate(r2, 0x0) close(r0) userfaultfd(0x80000) 2018/04/10 10:28:00 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2), 0x0) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(r0) 2018/04/10 10:28:00 executing program 5: rename(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)='./file0\x00') r0 = socket(0x2, 0x2, 0x0) r1 = epoll_create1(0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000001200)) fcntl$getownex(r0, 0x10, &(0x7f0000000040)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000578ff4)) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x100, &(0x7f0000000080)='./file0\x00', r2, &(0x7f0000000180)="7cfc2f68114b1e4eb332ceac418a17e2147d3cc1d39371982573b9656c7b6475cc335eb297b2fb2ce86acff60c56b30aefe01fa79698dbbd3dfe5e72a550f54512e044085da4a91e7a9bb5a22deda9ac183a9f811bad3258f2cfb84c7b809fefefb408f3329947fc628dfb1d312b707396ef69eeebb437026c29a51e3399747857bf59ce56a5d126242f2f7886f4aed2875fc7ce04d56096a533165798d499489e70a217b742259037ddd99315782fd3358249dc00abd99f39958e22b4a1290c2331df625c3698c2f566343ea9647365e4e851863ddbbb38c6a503502879f6dddff503a70b9149aa9bfecb1141f0c0d51bebed68316d093563bc8963f11cf8fe913693a19109b2eed0222faabadc4b44eb4b1405f42af7758b4ce48682109a3e2bc2d6d3a552ce6de36ffb4362ce0ca4f10a2628e0e4996ce12d97860a60ab98d024c523f60f9cf9ad21ef69ce9268984c32dfcbd77f76705933165dee74eaff406c9f4512f581788a0fbe0b59b2f97a710711f2408d3fc924a1c902e8e6ed0e6d12d78f5ed1aab3587adb0cf38f6cce00db529d68f342f034d8229c993f989ce10b458b8b83cbfa72fa17e1402bd1af6c2f349b584a4b56a17de21e312fd4bb3ee83c4ce9096c79b77250ced738c93a32b267e50860acf8e47df31d22b5dd00b0ef14ba6e90589fee3cb3fa5d8d38480a5774be4cdbf89cecdb49d3aef00c786658cc425de6d256b06503f1f691784f05c7c05e8b27781ee56a6d858a036e92cfd176be7a19ce9280ed6a492c42430fc2648f06ab02c53d0a46042f49548a34a0a6b52e671bbc805ec642fe76f19d578d519e623818f7d8b833ed61ba906ee5957c9af016f5ce2aa327df58e80557ff7c7d2e73d8848da6eb44752b87be27c5add0baa8a53bba2834f497d5589bf0dcee8dba6e28398ee7b2b7ec805de9d57eaf45e3b0421211bd8ce97a508a42ebb1d7818d6039bddbbdc92a469261e01bc06475226735a047aee39d9b134aa1a26aaba7d72800200bd8a35d9083684bb021fa8b80be8ada87d02713f57912d088656078be1990ce27fed205934ccef7d6d7b8ac6f2b00726b307ac56e5f4bddc342fbb034cdee36860beb3f88b792209d9c81e52a1c9423ea6e851aa916e9fd68537a2057b39a36519537833d93c3221f2304c60c9a97f4ac603cd65745200a2aa5208e0ee69c7050203ce729341b6fef2f8e21f2306cea06c7fae7dea73e06d55930aa818e1a0e6b597688ae6268824382c15250d4c5a7f17115e787d8f9936219cfd3f99b8d3ea89b55cc7aa2360434c100b4b0b07ec4323c08a120bb13c68221b08e11ba2fb8826bf1a34769c474412c1e77c69f56bb3565cd8836a0455b5a8cc8756863f4746a6b4fad9f83fa37af107d833735f9aad464527e698412d41ab1fc4c29e9b1cdcabba84ab08fb8ab6c6970a503499c5bc899f8eae6d478a0a74306ed48c7764cc80cae5de49f8f1f99012b38fc1ed65ab03e7e3b0e5ff05c5ad04fe8ca327d401ccfec7838cbccc6fe18438fdbc644f2d540d1eb7e9b20fb6a297b798458759090983c86a906362d8390feecd16bcd6ec6018540d91fc594bef5f64e7f7e57e409ec31686c69aaad98a52ba768fca8e9a0ec46e1d2daa5ac9206e65058fcd68ae4fbb81917d12d84c803bf850260b64abf076198caf193d45bc2139f16e9c8759dea70f603db4c81ab179e4a7f28b0fde32693d0fb2f6e1b74bda94cea9f23e46121aa42b3bd5e6d20075d831e0d9eae9c9e60e783f81feb149e9e37f15f6f8791861b3ffec76ee753c9f7e0fc6bfbc38b57a5239a3bd1a45d44eafd063d07771892c43f7c48b493600bb829547d67bdfbacaa49702f40318a44a90260fc3ee233539b0fbf76aba17d555bd0a6550c051043e2e1f14b9c552c5e9101a86b946bf1a84564374c93f7d223d6eaa585cbe1c00b5eaae5f5e3f96f7f4033babfa2547ab2400ef86c3f63303fdb206b13a142538e06da7f5667130012c6835b0232fa7fd870847595fdc4d097ccf2ebf0f083eb21d2105f38dc5729e891cd6b9ed1076afbef8bcce5608303e9e305cf83d4cf3d98d24e9d41e122dbdcc21fd99a361b575aaf413364b2b29e3510fa21af4615557709321bad51c086f0db561eab4b474af26ada89b9fc53ad14524fe87024a1c39a283cfa118df0090357089a2b247e2e7cfaec8d5faf13d17bbbb19d5df83ddde51afadfc2a30e202981208c49f2d1294b5949cd6a66f04208c7e03859a7134686d10593d14bc5527aa185b95822d7c0b98e9370aaf708be9c04944b45c65d05e9922c39b0ec3a3ad9101fb11bd294ee6f68424a74157dfa9ab73c51911a5292f9ee4e6ee8c89a338028a553e853be113f073fa64b1d652c43a2a149a0f5073a50c3ee1f959168ee4b10514b6080811c27a77c1695655fe728d56339390c9709f03cc8aa92791e79fa3862842768debb6f003fb747ee7ac707832a1c8284d6089d3c811cd81044b9858669f6f83a2b110e91210448311ac44575deb7d5f50a4eac8a35cb1d8d5816c0b36938b0e5c28c34902b1747933808a74ed7304b2907a5c24df61cfb7b24d17ac8a550c1415a5f8828ceb83d2fc4167dad9f2d2bf78e708932dc42ec567a8ee03fb940a7e1399961c5cfcc02b99e8e495a9ef0b51cad2f65dd28ce424f544da9990bd153bddff0c9280f74ed434d46f302659d19d9cd4098b9d9718aa6a0c1a39c173990734da52e08adc5198946ef8f50cefb60ed6401f421f88a42a149c4bd444a0dde0be6b080b5fb3bb38d648bc535b5d71741418c7ad18c72fa8fd4de275b9022db8d874a49fe3435eaf6aa5e541aa3752669bb6cc24a7f951e5bef8d8d8adf2d4e7c03af7822b116199de1dc86787159e77b254ce31ef159e09f5b035613e17c88dc5f063d37561b2ca09141f9c683ec0c80235a5e822e6df9696f14cac72871666780615403805aceae1959e175e95597d697d169ba447c0afdb5b4f2d4cc4b79724280db64bb963f40038fe02f27296548a5d3c19dc0e159f2c3a2e652f5ca15334b2929526a877e5520cf085a3769ca919ac40bc407d117fc6377c7138fae8feb02199ae28644d87ae9a88984d471e0a3b9d376349c7f10dfdcc091150a261d38ae1d908792a3814b5fe5c8529090d33c11d042aceeab28edc73d9be4e7d1a9ab2fb1f5bd1c018777896e9563ad213d2d1f8039986c1dfd85292a87fa6e8bc9e47afa7401f0cbb28487322f2ed37f2356b75372664247a8828b2cedd7c4d2da68984df3603487be3f8783d8b94d1a8920e54f4206e2e9954b1a8b795b4aaa55ea3b925a9d3a765c74307698f5e3aaf53d6f1e9dd520586b13679fe04b6ce18fc2e7a5628abe8cad25c1fb2ad08ca14084c0ee0b102fd8249756c3434a68d80f27d5d964edb5077592fb6af0bd8240f31cd80d76206e6602a2269a97adabf8aa24f122edd97c4500dc13e1246641baa61d5c8c4b7724739a5309c9e842c57b53193c1a9846009e39ae6e261b2f05bf43cb6714fab856d4f2d598097fd424e34db22cdaf95121dbef7533bb40018100aa77ecc76ace2fa6a828392d0bad9c3d948ad34e88e65d85a64475b97a55f5cf792de66f1c6c8c336cfc4844777a3cb18b0a0638086ea1f5d40c0d5161a3afdb131cf5131f80d22e16921eaedf69dc28a7106b2f4e773bccdf3faa6ea61cd170141057fedcd93359d14b01bd0178223227f8ece7404eec3af64cefed1751a5535db50fcbc354e39e2c0928180f0b4d147ea08bfe26612c5c79b5d85089c63774583281335c925aaf70e4a6c532192ee9a7737e2c10f77a3d141cfc0810810242ce42f55add31558742b69005b5f0b1bb2ce89e37f0070e63b49de3eaf9106c2ac4f8edfeb859275a91fc50547810f91bf38ef591666540d52a12a5a064b73dee74e877379e012339d852edfacfcfaf11ecad9186a9f012082191d0c2b2df1e7de14e5e498225666d65820506ce857c1307284b76f7ae100d7ecce21196080a0fed9cda48e5f61ac9e29c4aa9364874598743cdead13b8259a6a001b4118d8a1956c791a4c7ba943951096a316915a89b558f0bcb00cda5e6dd587e30ecd4f74588df4b5f4d829694bc8179dcc5dc237fbcf502032bf8dba2deb38d01d15c25d63564f0ce04084bc1a7944152abd3718c5f94c4dcd19708b723a15b3fbb16c3242616921c023150e5507cbbdc537c639205b6e858e49cbe03ac04b2bbd64292f23fedd7a9471fe032fa0b60263461e97b5299d251eb6d609dec8c674112fb51ed38cc9b6cb1d5cb437851ad3d4e10afe812650b65111b462415eb3412611089552e4839dcfece64ad5c2a5bb905775b72961e69f79082c39f1cd3a92036d444bfdf6f3c462f4d8302e317d562e6bbeb58c21a76d39a06d2093f16578aaab7491fd1730a37b900e22b81dfcd0c61aecb1fa329151a8b25403b7dc6c2e5865ee422c83bfe27388c0011e2269df6aa2886834f8e1754ceef786aa1c9d3da7f74b7379cb1092184fd26f134fd626d6aad85cde7a0933e453fd52a015102e76f7d44869db793a1b604f0d903245f5cb7de48eb1c13fed26bee6b4632406ad32ef9d0c0471582acacc83beb0cd41dc1c623571093cbebfd0b747c5ae8d35be9ed6cd642add4cd2fe4461dd1819352995a41e5f861b6f9ab632c12df5f745abdbe51537e2b08c0e99767a289daa5f1ea0213ccb63dcd7f29e40c32184a3f1555c972a2206b831c2150b8dd549b6c2821302fef384dd401a3ab6f23ad1489b83a1923a960403a5215d5bd3faa5c2c11265a59c835cc62fab428cc0903bd52a27feb802bac6e0273973ff192a5bd82cd916a0372ec4a14b1f5d6489a7fddc53734feb438741f2ad7fc4be8b95b07eb730923f4cd3e7a699cda5c0657cd9136b174faf5c7dc9478455bf9da7926336b826cfc18189915a882936e5beace3282554c31af23d1cb68724c55018327c7ab1d2faf51788cb64a18ada4886a199f9ad6ee1eecf98c748399f005563523ee292607bc5ef935d772b09ec6ecfe4073ddd30db01e650c0ff3d2fbdcb311625c1b51ae3921e358341360a585556b4f8e8c60c72c95050ca31477c749c43e2d23aa6649b7b3edf4ba3dd5088fb155cae102ad3a1d811d2804e940b27876b39bffc1c6074ac90cbbc64c9f64311be15495913e7237e3aef77d063ef8838d79652e180ca8f747f2c2cad7f9031a0291ae7967a20366afc3515b875be143594b7e97b3271defea0dfb8e96fe72031df2f8715e751dc16d149eb285a156db3f32d9ac5f421222c5156a06aa92d0813915f6edf65009cbe03ae1d414d0bb206e6ccdf4cf78ff75b7327360e3bd403bcd6b24f19a869ca46789153ebf6b9cabcb799f170107409ca4b9e02d08c2df30da813675f110958400e496ed6a1366a3b6c60165d2398aebf90a821f0ec63ee948f943a2c6ee7fa70ae22b6eb7bf0d6dc0417824ab4e27eb83a599d78f11823bc51f27007f9353b68df59bc9876cb94fac82d75e349c087b027a7edefd94a3df8a56130f597f85589d4737c3873536cbd4a4bcfa877b4185039aecc5fd2f2305b6a5c3a4436ed61a99675d46e7f949bbf8572c1ba189d33356e711265d2a0651660760074fed4141984b4e36e1acd32f42c74f258285cf7789a3e000ac3ac922e442ef2c4ede2e934e72836d7a41d1c114dfd379bb87ba0d3dcd85f58609a604baee49922c0377b4ad2b529e37e00829f429730f64a3aa9172a5037eda9ac8a303980bd5c8750135") sendto$inet(r0, &(0x7f0000007000), 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) 2018/04/10 10:28:00 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:28:00 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000040)=ANY=[@ANYBLOB="0f2b"], &(0x7f0000000240)=0x1) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000de9000)=[@text32={0x20, &(0x7f0000f59fc6)="0fc75fedc4c3c968fb6c0f9cfbb9040100c00f3266b842008ee80f230064672ec015dec4e245bea5d41e6082f9440f20c03506000000440f22c0", 0x3a}], 0x0, 0x0, &(0x7f0000000180), 0x1ba) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/10 10:28:00 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x7c08, 0x5, &(0x7f0000001240)=[{&(0x7f0000000080)="4c4a63dd55b75efd33cbf721c088e5f7c7fbc9", 0x13, 0x1f}, {&(0x7f00000001c0)="844f8a0cd603a5bef561d22b656938516fa20f5d112a9a3256002b4c045b7c93d31bcde2230791fcd9af80a6e27b0a4b89017be60f567f37989d2a1a9f8120d5a9353151bd1c6442c2fcb5453dbb7844e67afb2a8957e3295869a74baa6edc8a2f0bde73fbb3fd8619c49440a98434655ea2db9f9c94c60b26a36ada739eba61f9e736ca4138b2ab157a08a367b7205188a2460c6a9796c59937bef4dcfc8475bc62da0946faf2d02129c38afd14fd5a3c72e16739b62076a8e3b43645d7c337a7586b98b99d2378d630fe438c1e1d141683da7fb4882b5daea9d7bbe5fc2460a4853f93bb7f288f89835f73239be9c68a967cf6c8608203441a998fd4a1e055ca45779d0888a9ab63098b32aaf8041f1c2c70ca1b1151efa3f0680990759b53b759b1bdda309f821101e5e7377822e5a7eb706e151cbde92d26cd705650a2d89cb1c6c47d0de41ef934c0c0cb19371f2a0879bfea45cef69e95cce850a22608a7024fb7b602f503f15d270e42c373b25f59baa44e7162e8c6ad5190a54b48bb9febe2819e0158ffd6a7630ff283a6478c58302076a9270c76cc0a0d0d2e0660d37c7d01b4c5a89898744cd11fb1804bfd7808e62bbcbf5fb16de693e7e3e0aef66c48cae812835a5c6fae711b5e12189cc87fe32ef7567e7d599a47e00f4441bd46343e1f4092fa066aedc89d98ea8639d447b32ae587edca8857252d0748c2ddeaf22fc5edec862930757e2afe4f7611e6f2b6a547353d6cd0410f1b81db1abc39823e7ace210521e8d39917918dea282a5ef3e3f7bc5e5ec44476a3aaa76f44c07b84bb5f7f9a3ee585caa42247c3982497bd8c78d7b551306a51c9c816bc6eb51450c28f03c35870c1315289f395aab76060e151344b031da92b69bf5746cd2d3cdeabdf6e3b974654330caf97d2bd1bd1f1d71d38f09d00c1039013584f7dbda9ee3cdbebe9092c1147c88573eddbcea7065898ef01023fbff63ffb3caf56dbec039a2843d92346ae8f181c483f51d20be55fae1da9fdc74a210fd5c00bffd392c01be0a26cf885fd02ff0060cde403539fd5b6052b31c55ec9c4220da7e814de8dae1db5a9178d1254392b628434be522be6e664946ade66ba56ee36f7cf7d7fac53c8c00c6d6a13ce2e3896f29e96b837c7a62bd0aef9a3b8963bf2327067bd1a730c8645e1bd3768128c703106c1b644e53e63c4b5d8745a6b8477110810c2a04536243abedc621549cde733e8df7f3061147fa6b4c07a52a6eeddaaef5c743a9181d3464ce804e1a38ca4ff323e9c52fa69c99c6264b7aa84ae87338483e04fffbc3c32255dc18c1dc8328257f77d93330ad18a7fd51462eaef8d1af02b865d094e9be05f294d02bab2ae9c09117f3a75fc10098775d653da60d7e82a3353aae6b8aef35061d63ca4b51d4c642ff3096943ec193803930b3105613349610408647e4f9d9f7e977d7b446e0b20f1fa094a6e7c6716fd20fa381ad958f17d893a3e6940c104194f82196806d2c04e60ada3aa473d6608b2f4dd737a5338d3d4d87759a0323a9bc1415080c12c06b71be8fffbfa50ce39e2646f5a4f4d1cf8f07c31d1c48df42a579f58bbfb89f8fbc667e77b73900b00eb7e9625e8a36d6a1df9fe8319a18f885a91e334d806d54e4f58314de0310b905fa78b4bfbe8bfadc258b179040882e72e5bcccc7220581b416cc7d6728d628faf8a543484a1386c47402336ce2afa400767ebdd8438d1508b67ae3e999ffd0954b7c111f97cca46ef2b1ae438a750dba9e30272339504fc252bc81fa84cf41165674ffd059b0a0d1d2fe4542cf545494a5c90a4f23c02f1685da0538051dd5f75d679b7f4c4e60cf494328d47a0adc48c381681592a2afd62e8e95b133e884e3a5f57d97405a6520e7c8e461640c3630bb1f53d405e578c72aa8e7d85d2f8986485645e28aa40e545c906b4a411dde08d1b8fd1df830c6e24d76395662f6b5be5ad8d8eb3ca0678a81930a887e1fa1fce1ab72c17873a25a2e49f2a54c89a3240f1ccd666486d9268c364b893c2ee42f87134fc7c01a976f1a796153eb9e0f7419ae044de7b301abc87a2eb11316ac5a5f8583c676c80b79ca955a3dc83eb7492ae55c9887495468a1de98285e58701eaf84365112bba6698ea95e4809a0c07862d928aa5b819e44c25e70551cea9b69e832f82805c9288a1513ab6dfaccb5aac354b1ebee267884e72ab3c34df7a2a622f882753fed6664669914297cf1584176799ee69845e7ea749a0974f63a05e8bdf147526d835995c77bf7a5f4e43576e3cb657708abf5c94d729dd1b25508f16dfc9d269489b3aef9037831bba0efedbc636692ad00096a86241a3566a48baddff169461731867264bc377e6edeaac14ab8d3180505a0ffe193e405d8e635b7491718e026d00897a67be5e0961fbd1a768cb834a99fa9af323795ba232e437969a56dbced677f681a402167b1d3155443b1e41e0d4d79eb19b2d6e446c0b450676e22ecf5dc2e59ebc6ac9b49076e7a976433e4ed1d97cbf4a6499ec02823a6352f904aafed45a5113fc5992b45e5941f3b7b323b8c9dac8c48709e1d9edd3c29813d0579032f3effdb145db32e8cee1234182a31e44c692614ec9eae8aabe671ad9cd846e8184a9706849e3447506c6dbdd191031e653c941ccec70a5988eb3ffe0a894727b28ba342ba92ff885c5658f97be97505490cf221d7f23c87f9a37f1478f9455ce637e91be54e2dfb9831935d88a9a07c626e3b491d9b7a951f55d0ae9ce8fd8dccdba8d97c3125527c8e1d8f09a3942534652811b626fe74188ed3639ab0757071f7256b9df8a0d8ecae524290aa5d54f1f10b24c8af8763d0070fb6835c91afa798251c68137de9e4c36d34d49773df02ba80375fe8ba3d36f58dd72c040f847cb24555fa253cdf9c3d54396d880da1890e1f4ff0e8afc7a03519a2f1f20a46f66841e68648ccc4e7f8117619b44ecd6bd11d980362b6233d2c7258952ad5e84ddb02745ce64f6f030ecfaa47f869d52cda99175b9178dfa1389f55d5d76a2b987a404f8ab983b0044c3fe1e9f8bfcfaca9a66705f88a922e7f5eeb7ebbc6db79bfa6064b54e384d9601d1e0b014f3d376ac1f290db8833d44632eaafe63d0a1239ea22ef128fb01bf31146159584f3470a4e36bb2e862e53da8aaaa59e3d47d42d68a04371d7ee61d4f239f637b08edb081b3fa0f4ad3c86bc9fbb88a7dbe3c756ad4293278e22351acfd2de9862329f993c19124109a3a13dda8614fb678c66b9266627e5f87747ad72460bc593b933bee9db002d43704905e2c1f64aff7d19a34e40b7b2bbc52be3f6fdb10f4f8422001b18dacd0971255f6644631f907d1757a7ba334c7a14adc480a63d82387db432814c132d1e6315383e6fe4f7d5af7a4e1a5eb086d76e63b0741a981153f7d824c2c0dd985850ec2ddd6cf752fbef0eac74cab4c917178040b36705b09003349fd482a4f9df8f7b5b1db9f641e95777de614690c512d89041f4048bb2f49236b646b8e9e97c089b4bf11bdf5ccd477efa5d08c9aaa6e284acd3f6842aa38644d64f40927009c181e0e96b334b94a6b6b413f07ddef0357e2a1a186529244e41f2afcade1dcc9d7805b95ccbcc162f1e3872a84a37937631becce439a9209be19ecaec9d165a11061b110cf6713615a0592a77d3b0f6302eab48736c53afe17e14c806f03f168bcc3baa8a5a42aef72c572c833c48b6fe3492843aebd6ee9327a78ef7a2fd79b11a2babbcba4d16b52ff9987b614ffcbaa07971abe7f2a96ead998e0b37505e77938d63761c92685a501a0b49099a5d40590da3f721362067b01c44883d6afc5433f2994891eba8edee37142168e468d29e3af555a25017162200f5cce809a4c4113f97d9ebe5ee9d1c86f5d1627da97054cb3ddb048f2c79e125515301544cd551d39852b24af61d35eadc9a9575f4d321aefee47c7278cc0188b6a4dc0602c48bb104ba0e922346783c159eed6dcdd890995bdef250cf6d296c7f2dc6d065f750bc69727266f104c94a3f0e5e64f4bbe5f8550744b6f0011dbb98db7c70fd8cecbe56d12b483767482b576b3e7e615ba68c0e7912bc854e8058603ec445ec682c1f28a9364363554c5e0da6ed9b64c15e8c61a7824df64a7409c498a8b4c045b0833b67e6d76fb311fbea45bdf3257a6b8a8b14755c269a6a7b32d616031b829fbf520706b1b347cf57d677c4a78f9a28c4a8d6dada595d206f83274e87477e1acc9aea5d780f91643c6fa643bf681884854a2ffb3fedb6c1df47d369cace85ae2238253e006e2b2665f0061c186bcd16054aae03525e2abd1a6d81947505702e4f58f52655c9e0aa72cf4779fede93167fb5807d03346a0ccee50f885976592481a52b3bcf983e67866548d86db2eaa424b2fd9d25ed45db189ad17e5826869ccf538852d95db6c531bc16aa6cb66bb6f6d6cc0a4f868959e7e63578fb1bd9515fd8da3538eb9386f300ba7667cc1e16f8f3524266ef44e4073aaacd37ac6adc6f996828b86396a39e71a859aee4eee108f6a7bb96c8edd7ea02da74d47ee1a60614e567244342f186fe7f1edd01401513fa3dedf544eaef4e5f79653e6899b5c4815323e18f7946b8eaf4773b31e7e78c6882dcf6e6bd2ae247970692370b95e7fb56c2539a4dd0dd28517dc70b27934229596b6e781e377aee2d71187cafbfbf5ddc89ac304c61d13bd665fd5793ab13a4fb554d7bfbf1903fb7512eb2ffd2ae59a1765ba040f10290577d21c9cb24526cb9aa58398963b8d9669d154304ce3c77654883432320b7a32047732b58259bb3cffacba56f3f8be6981cad31421cbbb0d55e3d960eb57f76c3a336c3ac62ad2edb2af4a614f00620d78adc5f1cda706b75c9436ba89f2315890fc1f382533176ee1f28c971523c69fe29472bd1ad47ea11eff2fe01093f453158d620257db47f2791ec72d3ab61b5c2b50b352d6f3dbd3081414a9138fcf53d04d9ffb726277c03a11a3c03731b5183a94780f27b22f45f5a4ca9f8a90538059a2c1ca296210c70b2e8ee04c903a33e5489499ae6e559201b2ea637761de2b2d4f0a29574589628b6e2f960bbf5088a6dad7b7260460df27354ded02851468376c93737751cde44e16412621038d5fa124bb767fd6c87aaca08736fff53cef58f08d2591a08ea8ab7a6be003d9e3947a55ce359978e90ea25c4ac5fd20ec35086fb4047b1d24c3de8929792cd9a7eff2d199ff83e17c86a9ac3330d9b654ef9453dc6f3418d7df89bb68946b129f483e136589051a6b9c9c77cdf9ea31e43145adfb2d2d88403e461767c47e8ff74ce2c64bf8175569eb4608d8009d6bc1c2c2a71294c1652900f9760862ea86397c274b134dc26bf8f94bc04b0df91f4b3ab229e26620b61cabfe6132a81e2abefacda191dc2a8ab066395063bdf8bc772c20b65d95eaed123372550099585c58757f13d9a5869f5bbba1a365c4019a6e97fc5af9562fed8c8dae96a01f9c27ff84d15bdc4dd2f7073a0987ba1e33f388a53c12d634aba16b5f3093226badaed81300dfbb8921877e56436f7e32fd179749f350cf09e7d3c79e62791b0adf011b6148f39eb12f61b83c29988d388955df1fc10e6d4b45aaad172b2d45ca6b674cbec0e8842853fc8f2b67bded9ba0e645a4c070c8e7e3c1566b4957cdc0f1a89a66fb19c11df9e99596222077521b76fb317f4f001223ea421b9b9169280000783a708799df3cc81c85942f3092551bdfca7946833881d9d9daebd85761", 0x1000, 0x1}, {&(0x7f00000000c0)="e7fd3a9f583aaa2d41423b127ed38830a3e9b8727d2a85007d9d741418a37dd3083389c5c0", 0x25, 0x9}, {&(0x7f0000000100)="28b029c21f0e4b08fd5f95cd44649df6b7b3a92b746920085f32813179352bb0efa75826932505afe2", 0x29, 0x81}, {&(0x7f00000011c0)="276eedd0ab85a300346c111bf79acc8cd905630b0912cfaae909c573058af14da03d24ca07f50d47b3efd4af671e8ff36952cddc671603fc4506526abeae3c17b581437d85ed220d2459b8b36344c0a857a4ae4e0e16c9e1a43aa5d39df174837ac0f98fa6625fcccff9c7931ccb", 0x6e, 0x4}], 0x8042, &(0x7f00000012c0)={[{@nobarrier='nobarrier', 0x2c}]}) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) syz_mount_image$reiserfs(&(0x7f0000001300)='reiserfs\x00', &(0x7f0000001340)='./file0/file0\x00', 0x8000, 0x4, &(0x7f0000002640)=[{&(0x7f0000001380)="0c8e4df7cdf813a7a640fcc39ca4f4641dddded08953ec767551b8d1429216f104dbca5315857bde9f5211f2c0d1325e6199d429bb3e215ec3325e001b0835d7da4b8f68ca99b2c6ba9051e9e99b62a4d774d66cd1b701f7ab5519525ebd42f166d30eda8ad6250a31e3632153566eea74f9b86f50905f49f863cc5660c3269a48244b669672b533a6c212b44ff7250158183db090b22a668bad2b37072560e59c971d2037e29ad5618575cf04458f773badaa293a0d0b364f8d0d89f1a2c5bcf2931ab1308f8d6d55eddb1e11f399bb578469d72f9d4838e7aa24059b090bcd6e10c8988d36276b3273e29efccdfd", 0xef, 0x20}, {&(0x7f0000001480)="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", 0x1000, 0x5}, {&(0x7f0000002480)="a6a3a175f916f132da6128dab625561ef9d7e45b3645c3deac1c7ed7fc196c5d41f9bbc007a2c6426e334d332805b8d2e162fef1e08e4738019784a999eb2f48dae2eb96a78fac6318dc6970912d153870bd048a90e3d5f5ac74e0ac2a9aedc294f32d8dfd217b5ad89d3afd205de849fa8171c9511050596103ca9552a4419e4d348a359a383255f9f04e7f246eddd5dc36486a0ababc0eedd7a1de175bef30ba8d3c385c34e027f17821a644ada8a76667a658f95cd08ee5797fc014f5a2", 0xbf, 0x1}, {&(0x7f0000002540)="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", 0xfe, 0xffffffff}], 0x0, &(0x7f00000026c0)={[{@data_ordered='data=ordered', 0x2c}, {@hash_rupasov='hash=rupasov', 0x2c}]}) [ 271.996880] FAULT_INJECTION: forcing a failure. [ 271.996880] name failslab, interval 1, probability 0, space 0, times 0 [ 272.008195] CPU: 0 PID: 19545 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 272.015127] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 272.024480] Call Trace: [ 272.027066] dump_stack+0x1b9/0x294 [ 272.030690] ? dump_stack_print_info.cold.2+0x52/0x52 [ 272.035870] ? perf_trace_lock_acquire+0xe3/0x980 [ 272.040706] ? graph_lock+0x170/0x170 [ 272.044497] should_fail.cold.4+0xa/0x1a [ 272.048548] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 272.053641] ? perf_trace_lock+0x900/0x900 [ 272.057861] ? graph_lock+0x170/0x170 [ 272.061647] ? graph_lock+0x170/0x170 [ 272.065434] ? find_held_lock+0x36/0x1c0 [ 272.069480] ? __lock_is_held+0xb5/0x140 [ 272.073537] ? check_same_owner+0x320/0x320 [ 272.078027] ? rcu_note_context_switch+0x710/0x710 [ 272.082947] __should_failslab+0x124/0x180 [ 272.087168] should_failslab+0x9/0x14 [ 272.090953] kmem_cache_alloc+0x2af/0x760 [ 272.095092] ? rpc_i_callback+0x30/0x30 [ 272.099054] rpc_alloc_inode+0x1a/0x20 [ 272.102922] alloc_inode+0x63/0x190 [ 272.106535] new_inode_pseudo+0x69/0x1a0 [ 272.110577] ? prune_icache_sb+0x1a0/0x1a0 [ 272.114793] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 272.119359] ? kasan_check_write+0x14/0x20 [ 272.123574] ? do_raw_spin_lock+0xc1/0x200 [ 272.127795] new_inode+0x1c/0x40 [ 272.131145] rpc_get_inode+0x1e/0x1f0 [ 272.134926] ? d_drop+0x5a/0x70 [ 272.138187] __rpc_create_common+0x5d/0x190 [ 272.142493] rpc_populate.constprop.16+0x11f/0x390 [ 272.147412] rpc_fill_super+0x3c9/0xbb0 [ 272.151376] ? cap_capable+0x1f9/0x260 [ 272.155253] ? rpc_pipe_release+0xb70/0xb70 [ 272.159564] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 272.165086] ? security_capable+0x99/0xc0 [ 272.169222] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 272.174751] ? ns_capable_common+0x13f/0x170 [ 272.179148] mount_ns+0x12a/0x1d0 [ 272.182585] ? rpc_pipe_release+0xb70/0xb70 [ 272.186898] rpc_mount+0x9e/0xd0 [ 272.190255] mount_fs+0xae/0x328 [ 272.193615] vfs_kern_mount.part.34+0xd4/0x4d0 [ 272.198184] ? may_umount+0xb0/0xb0 [ 272.201800] ? _raw_read_unlock+0x22/0x30 [ 272.205938] ? __get_fs_type+0x97/0xc0 [ 272.209824] do_mount+0x564/0x3070 [ 272.213354] ? copy_mount_string+0x40/0x40 [ 272.217574] ? rcu_pm_notify+0xc0/0xc0 [ 272.221454] ? copy_mount_options+0x5f/0x380 [ 272.225852] ? rcu_read_lock_sched_held+0x108/0x120 [ 272.230851] ? kmem_cache_alloc_trace+0x616/0x780 [ 272.235683] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 272.241214] ? _copy_from_user+0xdf/0x150 [ 272.245352] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 272.250882] ? copy_mount_options+0x285/0x380 [ 272.255365] ksys_mount+0x12d/0x140 [ 272.258982] SyS_mount+0x35/0x50 [ 272.262332] ? ksys_mount+0x140/0x140 [ 272.266120] do_syscall_64+0x29e/0x9d0 [ 272.269997] ? vmalloc_sync_all+0x30/0x30 [ 272.274134] ? _raw_spin_unlock_irq+0x27/0x70 [ 272.278615] ? finish_task_switch+0x1ca/0x820 [ 272.283097] ? syscall_return_slowpath+0x5c0/0x5c0 [ 272.288015] ? syscall_return_slowpath+0x30f/0x5c0 [ 272.292937] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 272.298298] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 272.303129] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 272.308301] RIP: 0033:0x455259 [ 272.311473] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 272.319163] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 [ 272.326414] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 [ 272.333668] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 [ 272.340919] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 2018/04/10 10:28:00 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) [ 272.348174] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000028 [ 272.355572] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry nfs 2018/04/10 10:28:00 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2), 0x0) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(r0) 2018/04/10 10:28:00 executing program 5: capset(&(0x7f0000fb2000)={0x19980330}, &(0x7f00000001c0)) r0 = socket$netlink(0x10, 0x3, 0xf) writev(r0, &(0x7f0000312ff0)=[{&(0x7f0000000080)="480000001400190d090043eafd068c560affffffffe006004543984fb2bff49a3326a6ffffffff00000000bc5603ca00000fff890000000309ff5bff87c3e4cb6b716c0123b261a2", 0x48}], 0x1) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)=0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000040)=0xd3a3, 0x8) ptrace(0x8, r1) 2018/04/10 10:28:00 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]]}, 0x178) [ 272.435979] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "hash=rupasov" 2018/04/10 10:28:00 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2), 0x0) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x104002) unlink(&(0x7f0000000080)='./control/file1\x00') close(r0) 2018/04/10 10:28:00 executing program 0: r0 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x3, 0x40) setsockopt$sock_int(r0, 0x1, 0x3f, &(0x7f0000000040)=0x2, 0x4) socketpair$unix(0x1, 0x400000000002, 0x0, &(0x7f0000634000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x14200, 0x0) bind$unix(r2, &(0x7f0000000440)=@file={0x1, './file0\x00'}, 0x6e) ioctl$TCSETAW(r1, 0x5407, &(0x7f00000000c0)={0x5605, 0x1, 0x1, 0x100000001, 0x6, 0x5, 0xfffffffffffffff8, 0x400, 0xfc6, 0x6}) sendmmsg$unix(r2, &(0x7f0000003f00)=[{&(0x7f0000000280)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003640)}], 0x1, 0x0) 2018/04/10 10:28:00 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:28:00 executing program 4: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) r1 = msgget$private(0x0, 0x88) msgsnd(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0200000000000000c793231ea4160d59d1fe2747c3e8e2bc8c91b6886ab64037ff6271b75bd074d119a214ec4447aad27bb25f6d3781a32701fbd21d743c0c972ab264867c52287c2a1f876e17e9be40af33d7cbc8d42a47fe0068938cec6167941866438b639e1abfda5c098c9cf1a84adea7e1a3deb61549895bb4ade155fff09e8a04f37a9e40059689079647e9168b8f30663bf50f7d57200e9e217fe4cca9aec022d28b161b83f80f1ea5c57741b4cb8b95864649bea65d1300e0d0a88d16e98d220b0000000000"], 0xb3, 0x800) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x121) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r2, 0xc08c5336, &(0x7f00000001c0)={0x4, 0x401, 0x1ff, 'queue1\x00', 0x7fff}) [ 272.664123] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/04/10 10:28:01 executing program 2 (fault-call:5 fault-nth:41): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) 2018/04/10 10:28:01 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000015000)='/dev/input/mice\x00', 0x0, 0x82) write(r0, &(0x7f000000afc3)="dc", 0x1) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000005c80)=ANY=[@ANYRES32=0x0, @ANYBLOB="32000000752eb229155d428c7af5ba75ec85ab5aa241d5ad1dfe1d9ea857f50fa46518356a3c9e4d78c8c562513995b2c8b5e9b8012ad17c5fa1edb1847e0cfa9027627c4fef568a75b34576"], &(0x7f0000000080)=0x2) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000140)={r1, 0xc3, "ef684948a6fe44bdafb950aef8d2eefb4dbb6791c3880f0a543b93530bcdc9450b343a560fad1b4356f57df3ef3d7f5a8d32aa7f506f3b6c4e4e989ee47913b5708a90d83820abaf711cec10792eeaba976bba46a69cf0be2207ec415edf7a35dec7b0ee9d1b80a66f42360683dbd12bf5d57c5b3ac2696b9e0f653b41d7dc90404d70d6716959c421ec5bf363a6a15a8b381afea515304101406662e446d72d124317e66bade66a8cd89ba388860eb8b1e538d4f4a6cf1ee0259336022e7d66e3ae9f"}, &(0x7f00000000c0)=0xcb) ftruncate(r0, 0x9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x1, '}'}, &(0x7f0000000100)=0x9) readv(r0, &(0x7f0000000000), 0x1) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000040)={{0x3}, 0x21}, 0x10) sendmmsg$nfc_llcp(r0, &(0x7f0000005a40)=[{&(0x7f0000000240)={0x27, 0x0, 0x1, 0x7, 0x10001, 0xa5, "7f2d95d7af930bba9f60aa727ce5c2a46c2a8e17105ebd3b0a1611c06d5a7398f7d8511f4c5755db7aca75fde4eca0b3f09dc2c3cb828cd66ed039950bef12", 0x2c}, 0x60, &(0x7f00000006c0)=[{&(0x7f00000004c0)="0d3b036ec93dcc556cf62cd1d82e2c03f5de7595af8d2badc55a37be00b8854c948d508e863c27d19b7d", 0x2a}], 0x1, &(0x7f0000000740)={0x60, 0x0, 0x47, "8b0aec236273d40207f9bda59d6b533932d3b504c1e91d77674112ce13c6bed59fd6ce2a21b53aa3896af4d09be5b6f100590f433fe99108e6128540309dd642cc9e4799f6fbfcfc60"}, 0x60, 0x4000000}, {&(0x7f0000000e00)={0x27, 0x1, 0x1, 0x7, 0x2, 0x5, "edd76dde7c916948c5aa09f36a334335ca14b52730d66e8fdb02bede4ef6d430c22bd1aebcf141cda67df79bb5e5933674f813008a5ed46fdd4995e7606a3c", 0x1f}, 0x60, &(0x7f0000003200)=[{&(0x7f0000000f00)="28452883", 0x4}, {&(0x7f0000001f40)="fc09ddefe62d0d7da59137f83c8cbf41fff6f29e160d9b735f0c33c4859e7061e1dd983db46541294b615fe517c40ed2d8b57b5bce0890afb163d15e7beb5b9fc868aec7ac95f2dc362f", 0x4a}, {&(0x7f0000002040)="86ea34c1930015d4e4146b9f77e32ce0a3fbe19b8f20440edac8b951700243c161df72b46b0326e43ff0083b53514f02197c8e6e84824afed4bf4cf182412a25508a4d709c8cf3ff6dde5ee2dbfd391d5f5a8ffe80841a5c4065f2c3a7d9a7da916eccfb3a23df79f6dc44d1d1111c764c9ba5b749c8113835169eeaa4766c78bce9072cd918cb9eb005d77aea1771672cbbd3dbb875f26fde8ff477342521c5", 0xa0}, {&(0x7f0000002200)="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", 0x1000}], 0x4, &(0x7f0000003280)={0xc0, 0x0, 0xf8000000000000, "753894095efff26d23cec0dd97283c06ff61ba37e1f5cdbacb95cf4067b3bcc7ab1e8669c96b5f56fd004f2bf2b0bd539e0cd89ab5a068b0774413f5aed99927db4079ccc9d65c939bd40a23e41d8fe61194ca9b3444c013ab8ab7a548a36b990e976d0aaf85d3cac2dced4cb48f6c4b9ea185b8c970a568a3772e272dec1e08ed93c3eb5327727cf01f9928dc914b360d95f11c6cb0e7c1f45252f7be80164b9dc7e3919dca1f805a60d892decb67"}, 0xc0, 0x48840}, {&(0x7f0000004940)={0x27, 0x1, 0x1, 0x7, 0x20, 0x1f, "6847407680b77fb5c5723c6e59548ebaa8319dcaede33c81e710dbcac3b465a68e0d90ce06f521193d4d55cc26800cebdd3c27b5b8a3e690023e4323b5dd16", 0x17}, 0x60, &(0x7f0000004bc0)=[{&(0x7f0000004ac0)="c1f66b74f877f5dc556b8f1706e53ca4aadb1fd9297daba99590d426db18c574bb55ac450d1e21551388abe62c42501c0d2bab97f033fb497a75d181d3a86ce236e989c77302aeb4ce0d28763271ecc61d93354bfd6ec81148d49504d2a351baec38c4df16d4fc037f27530452fead10ced6f5a9a714b90a73375f3faedc67726c84ec79782d77c3df55e17acbacaeaa78187cf0e8b5fd318287b034fa4ccae1496089974f384e9daf8ab2ff9e768d61353c15e6f66a09b28b6184968a1def4a2258171685de2a222e1c85da8cdf6496ccc5f090be35c8fed64ed5b425d33bb1054597e4b825", 0xe6}], 0x1}, {&(0x7f0000005040)={0x27, 0x1, 0x2, 0x7, 0x101, 0x4, "0dd3befe238aaa41116606bd12cda212ac6f4a36a31e3258283bf847c23bec2bd53c5cf6ef37d22cf121c68c9e39730795fd71471dcd1bdfdf7e69b6b5341e", 0x18}, 0x60, &(0x7f0000005180), 0x0, &(0x7f00000051c0)=ANY=[@ANYBLOB="f80000000000000000000000040000006dff7300cbe941045838490931b8d8e4a2d291724baf20fec2fba8d60c96353aa8c8a1ea6fd6707d23ab269d0f604bfa36f696e75946126e1d56dd84077f0569cb95b1bd90387dcdf3e2e50d02f8b9241999eff60b9ad82e0aa96b5eda1b6215f4a7bb40a95e9c8ace0ec07b0c472e089c287b261e65b812d6e844900f3b526c1eedc6e4ade084b2e576c07d0200000000000000093c18ce543a764250e96bd020fb9ae9d3eccbc2cf7db74ca23036f2781dbb7bcca8bd0ee360f4e11ea0dba791905a827e27716eae60517ed2f8788fb8895ed055f548691c430000000000000000000000000000"], 0xf8, 0x8000}, {&(0x7f0000005400)={0x27, 0x0, 0x2, 0x7, 0x2, 0xffffffffffffffff, "e2ccb2b8bfe5736380eca6454fe772430bad7bae627d3d5183f7be2b122d30270389c3cc5e007389d592ef383a36adc36a1bc989fc59126ed5876ec9ce31e8", 0x7}, 0x60, &(0x7f0000005740)=[{&(0x7f0000005500)="b5d5f0", 0x3}, {&(0x7f0000005640)="9187774c84d23fc17ab1f06d978282f132eee9aaddec727b61de3eb0c44cc68003e184c4c8f77a40679d02261a694ba91e102be7d7ebc08a6ee580c9d0df094f2c57847ec17912683be186eeaad5fd860151922e8d56ae9bf9568ad3e16a3b6413577737042609495da9fe00c1fabc2b0611de334c51af23339cc5c17937e58de460a9c3d94e39fb", 0x88}], 0x2, &(0x7f00000057c0)={0x18, 0x11, 0x77, "a3e0394484ef4f"}, 0x18, 0x4}], 0x5, 0x40) [ 272.780935] FAULT_INJECTION: forcing a failure. [ 272.780935] name failslab, interval 1, probability 0, space 0, times 0 [ 272.792234] CPU: 0 PID: 19612 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 272.799165] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 272.808520] Call Trace: [ 272.811116] dump_stack+0x1b9/0x294 [ 272.814758] ? dump_stack_print_info.cold.2+0x52/0x52 [ 272.819968] should_fail.cold.4+0xa/0x1a [ 272.824046] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 272.829169] ? graph_lock+0x170/0x170 [ 272.832979] ? __lock_acquire+0x7f5/0x5130 [ 272.837210] ? debug_check_no_locks_freed+0x310/0x310 [ 272.842383] ? find_held_lock+0x36/0x1c0 [ 272.846436] ? __lock_is_held+0xb5/0x140 [ 272.850511] ? check_same_owner+0x320/0x320 [ 272.854830] ? rcu_note_context_switch+0x710/0x710 [ 272.859749] ? lock_downgrade+0x8e0/0x8e0 [ 272.863876] ? lockdep_init_map+0x9/0x10 [ 272.867922] __should_failslab+0x124/0x180 [ 272.872142] should_failslab+0x9/0x14 [ 272.875934] kmem_cache_alloc+0x2af/0x760 [ 272.880099] __d_alloc+0xc1/0xc00 [ 272.883564] ? shrink_dcache_for_umount+0x290/0x290 [ 272.888585] ? d_alloc_parallel+0x1e80/0x1e80 [ 272.893086] ? lock_release+0xa10/0xa10 [ 272.897067] ? mark_held_locks+0xc9/0x160 [ 272.901211] ? d_lookup+0x254/0x330 [ 272.904835] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 272.909884] ? d_lookup+0x219/0x330 [ 272.913498] d_alloc+0x8e/0x370 [ 272.916763] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 272.922283] ? __d_alloc+0xc00/0xc00 [ 272.925976] ? full_name_hash+0xc0/0x100 [ 272.930035] __rpc_lookup_create_exclusive+0x18b/0x1e0 [ 272.935298] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 272.939529] rpc_populate.constprop.16+0x99/0x390 [ 272.944368] rpc_fill_super+0x3c9/0xbb0 [ 272.948335] ? cap_capable+0x1f9/0x260 [ 272.952212] ? rpc_pipe_release+0xb70/0xb70 [ 272.956518] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 272.962042] ? security_capable+0x99/0xc0 [ 272.966172] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 272.971694] ? ns_capable_common+0x13f/0x170 [ 272.976084] mount_ns+0x12a/0x1d0 [ 272.979519] ? rpc_pipe_release+0xb70/0xb70 [ 272.983824] rpc_mount+0x9e/0xd0 [ 272.987172] mount_fs+0xae/0x328 [ 272.990520] vfs_kern_mount.part.34+0xd4/0x4d0 [ 272.995083] ? may_umount+0xb0/0xb0 [ 272.998689] ? _raw_read_unlock+0x22/0x30 [ 273.002816] ? __get_fs_type+0x97/0xc0 [ 273.006694] do_mount+0x564/0x3070 [ 273.010219] ? copy_mount_string+0x40/0x40 [ 273.014440] ? rcu_pm_notify+0xc0/0xc0 [ 273.018313] ? copy_mount_options+0x5f/0x380 [ 273.022706] ? rcu_read_lock_sched_held+0x108/0x120 [ 273.027705] ? kmem_cache_alloc_trace+0x616/0x780 [ 273.032534] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 273.038062] ? _copy_from_user+0xdf/0x150 [ 273.042199] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 273.047720] ? copy_mount_options+0x285/0x380 [ 273.052204] ksys_mount+0x12d/0x140 [ 273.055814] SyS_mount+0x35/0x50 [ 273.059169] ? ksys_mount+0x140/0x140 [ 273.062963] do_syscall_64+0x29e/0x9d0 [ 273.066857] ? vmalloc_sync_all+0x30/0x30 [ 273.070988] ? _raw_spin_unlock_irq+0x27/0x70 [ 273.075479] ? finish_task_switch+0x1ca/0x820 [ 273.079959] ? syscall_return_slowpath+0x5c0/0x5c0 [ 273.084872] ? syscall_return_slowpath+0x30f/0x5c0 [ 273.089783] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 273.095138] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 273.099974] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 273.105158] RIP: 0033:0x455259 [ 273.108328] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 273.116024] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 [ 273.123285] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 2018/04/10 10:28:01 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000002000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000019fe0)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) signalfd(r0, &(0x7f0000000100)={0x9}, 0x8) fcntl$setown(r0, 0x8, r1) r2 = memfd_create(&(0x7f0000000040)='-.[vmnet0^\x00', 0x0) pwritev(r2, &(0x7f0000000000)=[{&(0x7f0000012000)="ca", 0x1}], 0x1, 0x0) lseek(r2, 0x0, 0x4) ftruncate(r2, 0x0) close(r0) userfaultfd(0x80000) 2018/04/10 10:28:01 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x4400, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000140)={&(0x7f00000000c0)=[0x4, 0x10000, 0x6], 0x3, 0xf65, 0x7, 0x91a, 0x2, 0x2, {0x6, 0x0, 0x6, 0x0, 0x4, 0x8ad, 0xaa1c0, 0x7f, 0x81, 0x8e1c, 0x2, 0x648, 0xffffffff, 0x8, "abf20128eee97e6e0e0f2b1ef02e5b7ac8fcb994226c832ab8a7d395e9ab9160"}}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000240)=""/147) getsockopt$packet_int(r0, 0x107, 0x17, &(0x7f0000000080), &(0x7f0000000300)=0x4) r1 = socket$netlink(0x10, 0x3, 0x13) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000023ff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="140000002500ff8a00000000000000000400000035d458e12410300f77f1e1193a3511cdc63d23df4faff15aa75efe61c9ff519745b03721e0c9e96c5052c9eebc2e4630632e9737efe2ba503490791de0afc3896864330a319a7bcdaf47dd98823a2a7c24e7cd12bfff3f066be448025e43607fa457a907d53f357de820"], 0x14}, 0x1}, 0x0) 2018/04/10 10:28:01 executing program 2 (fault-call:5 fault-nth:42): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) 2018/04/10 10:28:01 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]]}, 0x178) 2018/04/10 10:28:01 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x1}) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:28:01 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000080)='./control/file1\x00') close(r0) 2018/04/10 10:28:01 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:28:01 executing program 0: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000000)=0x3, 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x10) sendto$inet(r0, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) sendto$inet(r2, &(0x7f00004fb000)='7', 0x1, 0x0, &(0x7f000033b000)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) close(r0) sendto$inet(r2, &(0x7f0000000200)='K', 0x1, 0x0, &(0x7f0000000300)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) close(r1) [ 273.130537] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 [ 273.137786] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 273.145042] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000029 [ 273.153393] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / [ 273.234642] FAULT_INJECTION: forcing a failure. [ 273.234642] name failslab, interval 1, probability 0, space 0, times 0 [ 273.246049] CPU: 0 PID: 19633 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 273.252983] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 273.262338] Call Trace: [ 273.264939] dump_stack+0x1b9/0x294 [ 273.268580] ? dump_stack_print_info.cold.2+0x52/0x52 [ 273.273787] ? perf_trace_lock_acquire+0xe3/0x980 [ 273.278649] ? graph_lock+0x170/0x170 2018/04/10 10:28:01 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}, 0x9}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:28:01 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) r1 = memfd_create(&(0x7f0000000040)='!]\x00', 0x1) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r1, &(0x7f0000000100)="c3e95359"}, 0x10) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000000180)) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000289fa8)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad5664a3239dafb6c5820faeb995298992ea54c7beef9f5d", 0x18) accept$alg(r0, 0x0, 0x0) r3 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000e4b000)=0x0) sendmsg$alg(r3, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000000)="f9e3a127be1d0953084fab7d2701417e1d4a010731", 0x15}], 0x1, &(0x7f00000000c0)=[@assoc={0x18, 0x117, 0x4, 0x5}], 0x18}, 0x0) io_submit(r4, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f000007d000)="b3", 0x1}]) [ 273.282470] should_fail.cold.4+0xa/0x1a [ 273.286547] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 273.291663] ? perf_trace_lock+0x900/0x900 [ 273.295919] ? graph_lock+0x170/0x170 [ 273.299732] ? graph_lock+0x170/0x170 [ 273.303545] ? find_held_lock+0x36/0x1c0 [ 273.307619] ? __lock_is_held+0xb5/0x140 [ 273.311707] ? check_same_owner+0x320/0x320 [ 273.316039] ? rcu_note_context_switch+0x710/0x710 [ 273.320987] __should_failslab+0x124/0x180 [ 273.325240] should_failslab+0x9/0x14 [ 273.329054] kmem_cache_alloc+0x2af/0x760 [ 273.333216] ? rpc_i_callback+0x30/0x30 [ 273.337204] rpc_alloc_inode+0x1a/0x20 [ 273.341100] alloc_inode+0x63/0x190 [ 273.344735] new_inode_pseudo+0x69/0x1a0 [ 273.348808] ? prune_icache_sb+0x1a0/0x1a0 [ 273.353051] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 273.357646] ? kasan_check_write+0x14/0x20 [ 273.361895] ? do_raw_spin_lock+0xc1/0x200 [ 273.366149] new_inode+0x1c/0x40 [ 273.369521] rpc_get_inode+0x1e/0x1f0 [ 273.373327] ? d_drop+0x5a/0x70 [ 273.376619] __rpc_create_common+0x5d/0x190 2018/04/10 10:28:01 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]]}, 0x178) [ 273.380959] rpc_populate.constprop.16+0x11f/0x390 [ 273.385909] rpc_fill_super+0x3c9/0xbb0 [ 273.389896] ? cap_capable+0x1f9/0x260 [ 273.393804] ? rpc_pipe_release+0xb70/0xb70 [ 273.398143] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 273.403690] ? security_capable+0x99/0xc0 [ 273.407850] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 273.413395] ? ns_capable_common+0x13f/0x170 [ 273.417823] mount_ns+0x12a/0x1d0 [ 273.421285] ? rpc_pipe_release+0xb70/0xb70 [ 273.425614] rpc_mount+0x9e/0xd0 [ 273.428986] mount_fs+0xae/0x328 2018/04/10 10:28:01 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/hwrng\x00', 0x40000, 0x0) bind$rds(r2, &(0x7f0000000800)={0x2, 0x4e22}, 0x10) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000300)="c16a00012e260f01ca0f300f350f20e06635000100000f22e066b8ef0000000f23c80f21f866350c00e0000f23f80f21976766c7442400a56c05676766c7442402af3f00006766c744240600000000670f011424b8f1008ee80faeaf0100", 0x5e}], 0x1, 0x0, &(0x7f0000000100), 0x0) ioctl$KVM_GET_DIRTY_LOG(0xffffffffffffffff, 0x4010ae42, &(0x7f0000000040)={0x10200, 0x0, &(0x7f0000016000/0x2000)=nil}) r3 = accept(0xffffffffffffffff, &(0x7f0000000140)=@nfc_llcp, &(0x7f0000000200)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000280)=0x14) setsockopt$bt_l2cap_L2CAP_LM(r3, 0x6, 0x3, &(0x7f0000000380)=0x22, 0x4) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x10001, 0x80000) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000005000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000400)="baf80c66b8f5e29b8266efbafc0cb04cee0f21a90f22570fe2a2880b230f0f009678002e0f01cbba4300ec0f01cf66b8c63554fa0f23c00f21f86635030006000f23f8", 0x43}], 0x1, 0x0, &(0x7f0000000480), 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x64, &(0x7f00000006c0)=0xffffffff, 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000009c0)={r2, &(0x7f0000000840)="840488211c65055d9f63380ae26792bb796b8a85c0db286b892349a2cad37a60bc4916088d441b08d866e2303e0905d7e1e8959c99c441a97eafda2c97bf38d92719a89f3b15142cbd08c7cc705db771eda1ce6707d7c4162155d31d9cbba22b6267d97d9d5107c4f6a4b3b7bce6ea9d28c6d88cb0315ecfdf31278bf1509a6d38794d757ce62fbc315c8168db6604f674ceb67082e16cb18b571a5f23c102a7d8951712eaccd774d10dd0215ab69250f817547d0b9f93c0e8b444067d1af01cf7267964d683b8faa2c6f40b76b24ea9167398ec4aa10c641f1cfce0d04ed515ae0036d62cd4081c20d4e6c53536567a9d67", &(0x7f0000000940)="d08a660d8b6b5bc01ff8bf4d96ea32d1f8129463d99f75df18e4c25b60adc4439591ffe1c242eaa127842a7690c76a38ca81a2bac9cc95fd92ff75b75298114f1ffcc7c92caba87de3a9e73f", 0x1}, 0x20) getsockname(r3, &(0x7f0000000700)=@sco, &(0x7f0000000780)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000480)={{{@in6=@ipv4={[], [], @remote}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f00000002c0)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000580)={{{@in=@multicast1=0xe0000001, @in6=@loopback={0x0, 0x1}, 0x4e24, 0x401, 0x4e23, 0x4, 0xa, 0x20, 0x20, 0x76, r4, r6}, {0x0, 0xfff, 0x8, 0x3, 0x5, 0x1f, 0x7, 0x9}, {0x2, 0x9, 0x2, 0x1}, 0x7fff, 0x6e6bb6, 0x1, 0x1, 0x3}, {{@in6=@loopback={0x0, 0x1}, 0x4d6, 0x3c}, 0xa, @in=@local={0xac, 0x14, 0x14, 0xaa}, 0x3503, 0x3, 0x1, 0x7, 0x1, 0x200, 0x101}}, 0xe8) ioctl$KVM_SET_IDENTITY_MAP_ADDR(0xffffffffffffffff, 0x4008ae48, &(0x7f0000000080)=0x800004) connect$netrom(r0, &(0x7f00000003c0)=@ax25={0x3, {"eb742ed2480160"}, 0x9}, 0x10) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$PPPOEIOCSFWD(r3, 0x4008b100, &(0x7f0000000680)={0x18, 0x0, {0x4, @empty, 'ipddp0\x00'}}) [ 273.432366] vfs_kern_mount.part.34+0xd4/0x4d0 [ 273.436958] ? may_umount+0xb0/0xb0 [ 273.440585] ? _raw_read_unlock+0x22/0x30 [ 273.444734] ? __get_fs_type+0x97/0xc0 [ 273.448627] do_mount+0x564/0x3070 [ 273.452175] ? copy_mount_string+0x40/0x40 [ 273.456412] ? rcu_pm_notify+0xc0/0xc0 [ 273.460317] ? copy_mount_options+0x5f/0x380 [ 273.464742] ? rcu_read_lock_sched_held+0x108/0x120 [ 273.469766] ? kmem_cache_alloc_trace+0x616/0x780 [ 273.474621] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 273.480162] ? _copy_from_user+0xdf/0x150 [ 273.484328] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 273.489871] ? copy_mount_options+0x285/0x380 [ 273.494376] ksys_mount+0x12d/0x140 [ 273.498012] SyS_mount+0x35/0x50 [ 273.501375] ? ksys_mount+0x140/0x140 [ 273.505166] do_syscall_64+0x29e/0x9d0 [ 273.509041] ? vmalloc_sync_all+0x30/0x30 [ 273.513174] ? _raw_spin_unlock_irq+0x27/0x70 [ 273.517656] ? finish_task_switch+0x1ca/0x820 [ 273.522137] ? syscall_return_slowpath+0x5c0/0x5c0 [ 273.527050] ? syscall_return_slowpath+0x30f/0x5c0 [ 273.532740] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 273.538094] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 273.542926] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 273.548095] RIP: 0033:0x455259 [ 273.551264] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 273.558958] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 [ 273.566208] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 [ 273.573460] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 2018/04/10 10:28:01 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]]}, 0x178) 2018/04/10 10:28:01 executing program 4: r0 = socket$inet6_sctp(0xa, 0x4, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)=ANY=[@ANYBLOB="00f600", @ANYRES32=0x0], &(0x7f0000000040)=0x8) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001280)='/dev/qat_adf_ctl\x00', 0x290203, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f00000012c0)={0x4}) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0x8) r3 = fcntl$dupfd(r0, 0x406, r0) mq_timedreceive(r3, &(0x7f0000000240)=""/4096, 0x1000, 0x2, &(0x7f0000001240)) accept4(r0, &(0x7f0000000080)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000100)=0x80, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={@local={0xfe, 0x80, [], 0xaa}, @remote={0xfe, 0x80, [], 0xbb}, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}, 0x4, 0x10001, 0xfff, 0x400, 0x8000, 0x80200010, r4}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000001300)={0x7, 0x200, 0x800, 0x77a7000000000000, r2}, &(0x7f0000001340)=0x10) [ 273.580710] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 273.587963] R13: 00000000000003fb R14: 00000000006f9028 R15: 000000000000002a [ 273.595500] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry portmap 2018/04/10 10:28:02 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:28:02 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') bind$alg(r0, &(0x7f0000466000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x1fd, 0x4, 0xc6, 0x4, 0x100}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000140)={r2, @in6={{0xa, 0x4e20, 0x3ff, @empty, 0x100000000}}, 0x1, 0x4, 0xfff, 0xd, 0x5755}, &(0x7f0000000200)=0x98) r3 = accept4$alg(r0, 0x0, 0x0, 0x0) sendfile(r3, r1, &(0x7f0000000000), 0x70) syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x8, 0x400) [ 273.657566] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/04/10 10:28:02 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000002000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000019fe0)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) signalfd(r0, &(0x7f0000000100)={0x9}, 0x8) fcntl$setown(r0, 0x8, r1) r2 = memfd_create(&(0x7f0000000040)='-.[vmnet0^\x00', 0x0) pwritev(r2, &(0x7f0000000000)=[{&(0x7f0000012000)="ca", 0x1}], 0x1, 0x0) lseek(r2, 0x0, 0x4) ftruncate(r2, 0x0) close(r0) userfaultfd(0x80000) 2018/04/10 10:28:02 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]]}, 0x178) 2018/04/10 10:28:02 executing program 2 (fault-call:5 fault-nth:43): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) 2018/04/10 10:28:02 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:28:02 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x200000, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000005c0)={0x0, 0xa1}, &(0x7f0000000600)=0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000640)={0x0, 0x2}, &(0x7f0000000680)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e23, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x8000}}, 0x0, 0x8, 0xb7a, 0x8, 0x30}, &(0x7f0000000780)=0x98) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000007c0)={0x0, @in={{0x2, 0x4e23, @multicast1=0xe0000001}}, [0x10001, 0x3, 0x470, 0x8001, 0x3, 0x6, 0x9, 0x3fb, 0xe0000000, 0x400000, 0x0, 0xda, 0x5, 0x9, 0x8]}, &(0x7f00000008c0)=0x100) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000940)={0x0, 0x38, &(0x7f0000000900)=[@in6={0xa, 0x4e23, 0x10000, @loopback={0x0, 0x1}, 0x20}, @in6={0xa, 0x4e24, 0x0, @loopback={0x0, 0x1}, 0xff}]}, &(0x7f0000000980)=0x10) sendmsg$inet_sctp(r1, &(0x7f0000000b40)={&(0x7f0000000bc0)=@in6={0xa, 0x4e22, 0x6, @local={0xfe, 0x80, [], 0xaa}, 0x8}, 0x1c, &(0x7f0000000540)=[{&(0x7f00000001c0)="f379913fc595b49674b4c5308113104e47f9314d831b6c135c30a76a9d259ac5d0cd9346752e158c24699aa7ece244cb888241147aad4c729a795a3e7a72de406535037513d6122bbe03a159ec87f571f40c81cb0ce4f1ff9f46f7ca66004937d252c9b0163a85612dab9d58898e90c9dcc94c83aa208997e27f82de9695b2c189528ed1936d15d47765c97f0ead71256c6ba765d07387f75fb9dc2e9d03d75938d3f9506c84d99bcdb01ef4a134e56cc02006bd23fdfb", 0xb7}, {&(0x7f0000000100)="ca820346ccaea80d488fb1b6492c3a66e8564343420ebfdb6f5d6a490422be251e56", 0x22}, {&(0x7f0000000280)="f4eae64d7db43518b40806114e9113a2aebcbe7b61c1a8d8271b0a9fe4b361ddce0d51f93479e8692d114098cb86b0f80eadddbb5549cf9ff566d27d03ad8472756b07fda1b9eac7545a42da27c90340bb2ad513aa4fdc7099e83144d1fa79b340ea67d16b2ea191e11731bc42509abb27d3f063c98ed24fa9cb40ee712e736913c78d7ccd5899c5fcd5002da358f1756ea5f4aa76e6e3", 0x97}, {&(0x7f0000000340)="c7c4497012034a2c9ae9ec68d5e3e55e7a53be492d2ce8acb2eac496d2d8f75dc4855c6a0dc411e287beccdb6efeb9de6b8210823e389a1fc0e19a8d3587f47746e433b876ad94cc85abc6c82ce541235772e5b877012b78249afbe9cc7f6f6ab2f3e16512380cbaee5693b428b56d4853bef58fcfdee70f24e240348f412e27eec5637a01d55cf2bb1708c1430ad946b45f47596cd9b3", 0x97}, {&(0x7f0000000400)="750f025dac2c1671ed3f4f1291648d96c02cc3370f82ede779e4c96ff8a805abe92f848f4972c7e2980423a794057bef44de047bfbcdfdfe862828b84c07db8f8bb12a132102360a2e2b6c5470864d069c45d12e37c327ff887c52ac4f6ba91344ce327a26745e89cbd69b14140b7e4e7974638d1fb19f23ec2de417fee58ef8236c2e7c509132d114cc1888a79ec6ed171fc70ce5af0a888288fdc4f94b06537ccb4ea77ae3aade0ac9074da538e4579233633d4cc179d97490d111ff3b24966275134bd705cbba3af167970e96de39aded89ba60ec853e2a59aa", 0xdb}, {&(0x7f0000000b80)="e57de05ac13a19f929f53fb378d1bd6ce2be685cb53a85fbc608c2bc76826ea209", 0x21}], 0x6, &(0x7f00000009c0)=[@sndrcv={0x30, 0x84, 0x1, {0x5, 0xff00000, 0x800a, 0xad9, 0x3f, 0x1, 0x4, 0x100, r2}}, @init={0x18, 0x84, 0x0, {0x5, 0x80, 0x7, 0x5}}, @sndrcv={0x30, 0x84, 0x1, {0x5, 0x9, 0x0, 0x80000000, 0x8, 0x2, 0x4, 0x8, r3}}, @sndinfo={0x20, 0x84, 0x2, {0x8, 0x4, 0x2, 0x1, r4}}, @sndinfo={0x20, 0x84, 0x2, {0x8001, 0x1, 0x8, 0x401, r5}}, @sndrcv={0x30, 0x84, 0x1, {0x20, 0x7fff, 0x200, 0x1294, 0xb10, 0x1000, 0x100000000, 0xe, r6}}, @init={0x18, 0x84, 0x0, {0x94, 0x7ff, 0x6, 0x6}}], 0x150, 0x20000000}, 0x4004081) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) r7 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r7, 0x40086200, &(0x7f0000000040)=0x1) 2018/04/10 10:28:02 executing program 5: socket$inet(0x2, 0x80001, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x4, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'%route\x00', 0x20, 0x1, 0x148, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000000), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {}, {0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x5, 0x0, 0x0, '\x00', '\x00', '\x00', '\x00', @random="8cfb285c0744", [], @empty, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}}]}]}, 0x1c0) 2018/04/10 10:28:02 executing program 0: r0 = socket$inet(0x2, 0x5, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000001180)=@broute={'broute\x00', 0x20, 0x2, 0x3f8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000d40], 0x0, &(0x7f0000000240), &(0x7f0000000d40)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'ip6gretap0\x00', 'syz_tun\x00', 'ip6tnl0\x00', "73797a5f74756e00000000000000007f", @link_local={0x1, 0x80, 0xc2}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xa0, 0x138, 0x188, [@cgroup0={'cgroup\x00', 0x8, {{0x0, 0xfff}}}]}, [@common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0xd, 0x0, 0x0, 'syzkaller0\x00', 'tunl0\x00', 'sit0\x00', 'ifb0\x00', @empty, [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x130, 0x190, 0x1e0, [@ip6={'ip6\x00', 0x50, {{@empty, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}}}, @limit={'limit\x00', 0x20}]}, [@common=@CONNSECMARK={'CONNSECMARK\x00', 0x8}, @common=@redirect={'redirect\x00', 0x8}]}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}}]}]}, 0x470) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000001580), 0x0, &(0x7f0000001640)={[{@nls={'nls', 0x3d, 'iso8859-14'}, 0x2c}, {@nls={'nls', 0x3d, 'cp874'}, 0x2c}]}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000000)={0x7fff, 0x1, 0x80000001, 0x6, 0x0}, &(0x7f0000000040)=0x10) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000080)=@sack_info={r1, 0x6, 0x1000}, &(0x7f00000000c0)=0xc) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x8, 0x800) ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431) 2018/04/10 10:28:02 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000080)='./control/file1\x00') close(0xffffffffffffffff) [ 274.141291] hfsplus: unable to change nls mapping [ 274.146281] hfsplus: unable to parse mount options [ 274.187791] FAULT_INJECTION: forcing a failure. [ 274.187791] name failslab, interval 1, probability 0, space 0, times 0 [ 274.199269] CPU: 1 PID: 19695 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 274.206207] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 274.215569] Call Trace: [ 274.218169] dump_stack+0x1b9/0x294 [ 274.221810] ? dump_stack_print_info.cold.2+0x52/0x52 [ 274.227012] ? perf_trace_lock_acquire+0xe3/0x980 [ 274.231877] should_fail.cold.4+0xa/0x1a [ 274.235954] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 274.241077] ? graph_lock+0x170/0x170 [ 274.244891] ? debug_check_no_locks_freed+0x310/0x310 [ 274.250094] ? find_held_lock+0x36/0x1c0 [ 274.254184] ? __lock_is_held+0xb5/0x140 [ 274.258273] ? check_same_owner+0x320/0x320 [ 274.262601] ? rcu_note_context_switch+0x710/0x710 [ 274.267530] ? lock_downgrade+0x8e0/0x8e0 [ 274.271684] __should_failslab+0x124/0x180 [ 274.275908] should_failslab+0x9/0x14 [ 274.279696] kmem_cache_alloc+0x2af/0x760 [ 274.283846] __d_alloc+0xc1/0xc00 [ 274.287293] ? shrink_dcache_for_umount+0x290/0x290 [ 274.292299] ? d_alloc_parallel+0x1e80/0x1e80 [ 274.296788] ? lock_release+0xa10/0xa10 [ 274.300754] ? mark_held_locks+0xc9/0x160 [ 274.304890] ? d_lookup+0x254/0x330 [ 274.308512] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 274.313515] ? d_lookup+0x219/0x330 [ 274.317134] d_alloc+0x8e/0x370 [ 274.320406] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 274.325934] ? __d_alloc+0xc00/0xc00 [ 274.329639] ? full_name_hash+0xc0/0x100 [ 274.333699] __rpc_lookup_create_exclusive+0x18b/0x1e0 [ 274.338980] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 274.343212] rpc_populate.constprop.16+0x99/0x390 [ 274.348066] rpc_fill_super+0x3c9/0xbb0 [ 274.352039] ? cap_capable+0x1f9/0x260 [ 274.355916] ? rpc_pipe_release+0xb70/0xb70 [ 274.360233] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 274.365764] ? security_capable+0x99/0xc0 [ 274.369906] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 274.375474] ? ns_capable_common+0x13f/0x170 [ 274.379875] mount_ns+0x12a/0x1d0 [ 274.383315] ? rpc_pipe_release+0xb70/0xb70 [ 274.387630] rpc_mount+0x9e/0xd0 [ 274.390983] mount_fs+0xae/0x328 [ 274.394343] vfs_kern_mount.part.34+0xd4/0x4d0 [ 274.398924] ? may_umount+0xb0/0xb0 [ 274.402539] ? _raw_read_unlock+0x22/0x30 [ 274.406672] ? __get_fs_type+0x97/0xc0 [ 274.410552] do_mount+0x564/0x3070 [ 274.414085] ? interrupt_entry+0xb1/0xf0 [ 274.418137] ? copy_mount_string+0x40/0x40 [ 274.422362] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 274.427110] ? retint_kernel+0x10/0x10 [ 274.430990] ? copy_mount_options+0x1e3/0x380 [ 274.435476] ? audit_kill_trees+0x430/0x430 [ 274.439789] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 274.445312] ? copy_mount_options+0x285/0x380 [ 274.449826] ksys_mount+0x12d/0x140 [ 274.453445] SyS_mount+0x35/0x50 [ 274.456796] ? ksys_mount+0x140/0x140 [ 274.460586] do_syscall_64+0x29e/0x9d0 [ 274.464460] ? vmalloc_sync_all+0x30/0x30 [ 274.468597] ? _raw_spin_unlock_irq+0x27/0x70 [ 274.473082] ? finish_task_switch+0x1ca/0x820 [ 274.477599] ? syscall_return_slowpath+0x5c0/0x5c0 [ 274.482517] ? syscall_return_slowpath+0x30f/0x5c0 [ 274.487436] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 274.492793] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 274.497630] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 274.502803] RIP: 0033:0x455259 [ 274.505975] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 274.513681] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 [ 274.520937] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 [ 274.528191] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 2018/04/10 10:28:02 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000003c0)={&(0x7f0000000000)={0x14, 0x200022, 0x1, 0x0, 0x0, {0x4}}, 0x14}, 0x1}, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x24, &(0x7f00000001c0)={@broadcast, @rand_addr, 0x0}, &(0x7f0000000200)=0xc) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x20, &(0x7f00000002c0)={@multicast1, @rand_addr, 0x0}, &(0x7f0000000300)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000340)={'team0\x00', 0x0}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000440)={@multicast1, @multicast1, 0x0}, &(0x7f0000000480)=0xc) getpeername$packet(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000540)={{{@in=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000640)=0xe8) clock_gettime(0x0, &(0x7f0000001d40)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000001cc0)=[{{&(0x7f00000008c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000940)=""/248, 0xf8}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000001a40)=""/38, 0x26}], 0x3, &(0x7f0000001ac0)=""/208, 0xd0, 0x3f}, 0x4}, {{0x0, 0x0, &(0x7f0000001c40)=[{&(0x7f0000001bc0)=""/73, 0x49}], 0x1, &(0x7f0000001c80)=""/40, 0x28}, 0x40}], 0x2, 0x21, &(0x7f0000001d80)={r10, r11+10000000}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1d, &(0x7f0000001dc0)={@dev, 0x0}, &(0x7f0000001e00)=0x14) accept4(r0, &(0x7f0000001e40)=@can={0x0, 0x0}, &(0x7f0000001ec0)=0x80, 0x80000) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002200)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000002300)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000002380)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002480)={0x0, @broadcast, @dev}, &(0x7f00000024c0)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x20, &(0x7f0000002500)={@multicast1, @broadcast, 0x0}, &(0x7f0000002540)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000002580)={{{@in6=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f0000002680)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000026c0)={'vcan0\x00', 0x0}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f00000027c0)={@mcast1, 0x0}, &(0x7f0000002800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000002940)={0x0, @remote, @local}, &(0x7f0000002980)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f00000029c0)={@dev, 0x0}, &(0x7f0000002a00)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000003040)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000003000)={&(0x7f0000002a40)={0x5c0, r1, 0x100, 0x70bd26, 0x25dfdbfe, {0x2}, [{{0x8, 0x1, r2}, {0x100, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8, 0x3, 0xe}, {0x8, 0x4, 0x230}}, {0x8, 0x6, r3}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r6}}}]}}, {{0x8, 0x1, r7}, {0x7c, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r8}}, {0x8, 0x7}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x9405}}}]}}, {{0x8, 0x1, r9}, {0x74, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r12}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r13}, {0x84, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8, 0x3, 0xe}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r14}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4}}, {0x8, 0x7}}}]}}, {{0x8, 0x1, r15}, {0x15c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r16}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4}}}]}}, {{0x8, 0x1, r18}, {0x168, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r19}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r20}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x1b5ab156}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r21}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r22}}}]}}, {{0x8, 0x1, r23}, {0x3c, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x2}}}]}}]}, 0x5c0}, 0x1, 0x0, 0x0, 0x4}, 0x20004801) 2018/04/10 10:28:02 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c9, &(0x7f00000004c0)={{0x80, 0x1, 0x3ff, 0x3f, 0x1ff, 0x3f5}, 0x1ff}) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x40, 0x0) sendmsg$nl_netfilter(r2, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)={0x2e8, 0x4, 0x0, 0x200, 0x70bd2b, 0x25dfdbfd, {0x0, 0x0, 0x6}, [@generic="d2a6dd210ab41df01d8b1b415268900a1adc7259d3fc317f6e2b67b3f2ecf091a8b7b4dc8b75d59a791051ac4eb35adbae731a558b5c9e23df48db3f31ce99e598d74e856218f4288824e1b2abb1c967203c19d2020f1311bc0f1793553be9143daf24b9d057b2a6df8ee5318c64140d70e48f3d0c002fc1a9138367721f94c5b9e0e34b1b8d60d3bed766a002f5e4a0cbd77941cabc820b29aba082a2fd4b80d8fda85ab9d79f16fc1945e76ed18bf092330419b63181904dda282e", @nested={0x218, 0x1d, [@generic="d9d66679bbcff4d48f5d31eaefb72003d8ac9476a2779b6fcf8a538045b38b25c8090db24def1c0c316f67209be218403488bcae2fc07179abbd1e5823a66bab2f62bcaa023fa8bbb356670d4c180e225a9e53bb55152afc095a4f937cb25f9ed1825817282d65f9dd861da3e3dffa04c3c0bd75456dd813a2023e", @generic="b6279a39b2d2f963af76e617d5c01d2472dbbe0aaf7c214e75182e08bca333441920893dea063d7c24272a46ab978f4c0c558be90c7790b7263c5e5d68bc467a14f7bafe35315ba706e0957cabec27ccf6a3542b430104c4bd09887e11d39bc1ef7e2c3f0358def0e847130e5a84bd4b254c895b8052861373a404a245a9ea334b51d4e7a1cef9afabbd2799f8da97650fba60b0d59b427576421fdec7dd90b1bff3908332b80cbd6f148cf7f91cd440620880c89374b0e65523819d7764c255cd3d3aae38034ab723790d974f2a1f56ec130c17280c4f13fdefee46ef", @typed={0x8, 0x86, @ipv4=@broadcast=0xffffffff}, @typed={0x8, 0x71, @ipv4=@multicast2=0xe0000002}, @generic="20b27b5a4da4904d0600f626f84cb13efa1daddb9165c648441b9f84d93fbd040c6c498cf4f7cbd14163f84926f0cf89df80320a7b16772f75988eb4a59df8296cb5cfe1fa88220421a6ce9c3ab8c6441201ead177bd47a21837d702d974632940eb786dcb304f3fc11f2b780cf6adb58e242ac498e4d6aad5003a3c5797ad1adafc84c232145515fdcc2b1741b1deeb288014e83282b5ea630cfbe86a084019447176077d43f524c5e279"]}]}, 0x2e8}, 0x1}, 0x4008004) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:28:02 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]]}, 0x178) [ 274.535446] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 274.542701] R13: 00000000000003fb R14: 00000000006f9028 R15: 000000000000002b [ 274.562265] hfsplus: unable to change nls mapping [ 274.567254] hfsplus: unable to parse mount options 2018/04/10 10:28:02 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:28:03 executing program 0: r0 = socket(0x2, 0x3, 0x40000000000000ff) getpeername$netrom(r0, &(0x7f00000006c0)=@full, &(0x7f0000000600)=0x48) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180)=0x1, 0x4) sendto$inet(r0, &(0x7f0000000000)="36000000000040071901000000000000de008859eff71d45", 0x18, 0x0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/cuse\x00', 0x20202, 0x0) ioctl$int_out(r1, 0x5462, &(0x7f0000000100)) bind$netlink(r1, &(0x7f00000005c0)={0x10, 0x0, 0x25dfdc01, 0x9801007}, 0xbd8c108a986d7cf4) getpeername$netrom(r0, &(0x7f00000003c0), &(0x7f0000000400)=0x10) getsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000540), &(0x7f0000000580)=0x4) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000002c0)) getsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000440)=""/134, &(0x7f0000000500)=0x86) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000200)=""/65) bind$netlink(r0, &(0x7f0000000380)={0x10, 0x0, 0x25dfdbfe, 0x20000}, 0xc) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000040)={0x0, 0x7, 0x10, 0x3, 0x2}, &(0x7f0000000080)=0x18) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000300)={[{0x7, 0x5, 0x8, 0x1, 0x0, 0x7e, 0x3, 0xc4e, 0x1, 0xdbf, 0x100000000, 0x1000, 0x4}, {0xfffffffffffffff7, 0x2, 0x6, 0x7, 0x49b, 0xfffffffffffffffd, 0x8, 0x80, 0x1000, 0x7, 0x7, 0x7, 0x5}, {0x8001, 0x1c3a, 0xe22, 0x8, 0xffff, 0x1, 0xfff, 0x4, 0x1, 0xffff, 0x2, 0x3, 0x1}], 0x9}) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000000c0)={0xcf92, 0x7, 0x800b, 0x0, 0x293, 0x4, 0x5, 0x2, r2}, &(0x7f0000000140)=0x20) 2018/04/10 10:28:03 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000000)={0x40, 0x6, 0x3ff, 0xf33e}, 0x6) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x6, &(0x7f0000000040)=[{0xfff, 0xef27, 0x6}, {0xfffffffffffffff8, 0x6, 0x80000001, 0x1}, {0x4, 0xffff, 0x100000000, 0xffffffffffffff01}, {0x3, 0x200, 0x800, 0x7}, {0x0, 0x5, 0xc0f8, 0xff}, {0x3f, 0x8000, 0x10000, 0x2}]}, 0x10) 2018/04/10 10:28:03 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]]}, 0x178) [ 274.649452] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/04/10 10:28:03 executing program 2 (fault-call:5 fault-nth:44): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) [ 274.833116] FAULT_INJECTION: forcing a failure. [ 274.833116] name failslab, interval 1, probability 0, space 0, times 0 [ 274.844455] CPU: 0 PID: 19762 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 274.851389] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 274.860746] Call Trace: [ 274.863340] dump_stack+0x1b9/0x294 [ 274.866975] ? dump_stack_print_info.cold.2+0x52/0x52 [ 274.872167] ? print_usage_bug+0xc0/0xc0 [ 274.876237] ? graph_lock+0x170/0x170 [ 274.880048] should_fail.cold.4+0xa/0x1a [ 274.884104] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 274.889199] ? graph_lock+0x170/0x170 [ 274.892994] ? graph_lock+0x170/0x170 [ 274.896787] ? find_held_lock+0x36/0x1c0 [ 274.900847] ? __lock_is_held+0xb5/0x140 [ 274.904906] ? check_same_owner+0x320/0x320 [ 274.909214] ? rcu_note_context_switch+0x710/0x710 [ 274.914141] __should_failslab+0x124/0x180 [ 274.918370] should_failslab+0x9/0x14 [ 274.922174] kmem_cache_alloc+0x2af/0x760 [ 274.926313] ? rpc_i_callback+0x30/0x30 [ 274.930266] rpc_alloc_inode+0x1a/0x20 [ 274.934142] alloc_inode+0x63/0x190 [ 274.937758] new_inode_pseudo+0x69/0x1a0 [ 274.941804] ? prune_icache_sb+0x1a0/0x1a0 [ 274.946042] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 274.950617] ? kasan_check_write+0x14/0x20 [ 274.954837] ? do_raw_spin_lock+0xc1/0x200 [ 274.959060] new_inode+0x1c/0x40 [ 274.962411] rpc_get_inode+0x1e/0x1f0 [ 274.966202] ? d_drop+0x5a/0x70 [ 274.969484] __rpc_create_common+0x5d/0x190 [ 274.973859] rpc_populate.constprop.16+0x11f/0x390 [ 274.978788] rpc_fill_super+0x3c9/0xbb0 [ 274.982761] ? cap_capable+0x1f9/0x260 [ 274.986635] ? rpc_pipe_release+0xb70/0xb70 [ 274.990941] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 274.996466] ? security_capable+0x99/0xc0 [ 275.000596] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 275.006114] ? ns_capable_common+0x13f/0x170 [ 275.010516] mount_ns+0x12a/0x1d0 [ 275.013952] ? rpc_pipe_release+0xb70/0xb70 [ 275.018256] rpc_mount+0x9e/0xd0 [ 275.021602] mount_fs+0xae/0x328 [ 275.024960] vfs_kern_mount.part.34+0xd4/0x4d0 [ 275.029532] ? may_umount+0xb0/0xb0 [ 275.033143] ? _raw_read_unlock+0x22/0x30 [ 275.037269] ? __get_fs_type+0x97/0xc0 [ 275.041138] do_mount+0x564/0x3070 [ 275.044670] ? copy_mount_string+0x40/0x40 [ 275.048888] ? rcu_pm_notify+0xc0/0xc0 [ 275.052761] ? copy_mount_options+0x5f/0x380 [ 275.057150] ? rcu_read_lock_sched_held+0x108/0x120 [ 275.062151] ? kmem_cache_alloc_trace+0x616/0x780 [ 275.066984] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 275.072503] ? _copy_from_user+0xdf/0x150 [ 275.076643] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 275.082167] ? copy_mount_options+0x285/0x380 [ 275.086644] ksys_mount+0x12d/0x140 [ 275.090256] SyS_mount+0x35/0x50 [ 275.093612] ? ksys_mount+0x140/0x140 [ 275.097404] do_syscall_64+0x29e/0x9d0 [ 275.101287] ? vmalloc_sync_all+0x30/0x30 [ 275.105428] ? _raw_spin_unlock_irq+0x27/0x70 [ 275.109905] ? finish_task_switch+0x1ca/0x820 [ 275.114391] ? syscall_return_slowpath+0x5c0/0x5c0 [ 275.119314] ? syscall_return_slowpath+0x30f/0x5c0 [ 275.124229] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 275.129576] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 275.134414] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 275.139594] RIP: 0033:0x455259 [ 275.142768] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 275.150457] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 [ 275.157715] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 [ 275.164970] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 [ 275.172229] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 2018/04/10 10:28:03 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000002000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000019fe0)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) signalfd(r0, &(0x7f0000000100)={0x9}, 0x8) fcntl$setown(r0, 0x8, r1) r2 = memfd_create(&(0x7f0000000040)='-.[vmnet0^\x00', 0x0) pwritev(r2, &(0x7f0000000000)=[{&(0x7f0000012000)="ca", 0x1}], 0x1, 0x0) lseek(r2, 0x0, 0x4) ftruncate(r2, 0x0) close(r0) 2018/04/10 10:28:03 executing program 5: syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x202}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x13, 0x127e, 0x6f2000, &(0x7f00000003c0)) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x2, 0x8000) ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, &(0x7f0000000180)) 2018/04/10 10:28:03 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x420600, 0x0) recvmsg$netrom(r0, &(0x7f0000000500)={&(0x7f00000000c0)=@ax25={0x3, {"4bcb4ce728d278"}}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000100)="4bb21a86db2c5ea7fb7252ede19a5a132bb34c7c3547ca4f538ab002fc2392b4d4289f599bee0107445cd2f3d5337e36347b76d6a54caa92a73c489629e101817c0a2cdc491bf27a4e44d6a565e1e69776c1cea780eb29f122856e9c9993dd439dc30874a6284d30c0ab1836f283e3bb5dcadae8d80aa14010f6ed6f1081468742e367103bbe6958fbc78b45b132221909041bf7c68658c563b0b94ff7c7518a1899a74d3063bee61ad1e7091e", 0xad}], 0x1, &(0x7f0000000200)=[{0xe0, 0x10e, 0x4, "5ecad4dcb847af09dd7de7273972d329b053d2fbd728e1148b6b6ed53c1c3485a5dc7d84065f4bf4cb1021563b977b792070df65b0229fa32f327269a82b442fc5bbd7df2b8b13f62d62de36b4ff474acde86023786d8573c49f2f25266fec475c4079cf07d1b6513aa4172200ee426c15479527b44bcca8276c15e9faa8522123403da241ab492d366b51a2abad69cb668e017ecc7f5b9ee99556fc66af287de6aa04f69e242e7c81a892c6b9144f0290976586805cef3df061079e06a60a1073ab4c40ba1dfa7483c703a4697ac46b"}, {0x30, 0x3a, 0x0, "5432870d02889504a4456fef99716008f40c5111579b6713b5a3583bb6618c"}, {0x108, 0x0, 0x7, "6d5cd73261751d3e3e9e166d2544201a0207dbc283407b6760748a89ba07b884b8fcff460f495093e96db48383d00b125d140cfb6a5f3cfcdd2c70e964a88593b932abd0ad9772705ec905c757353be605b97c63d302b760b84b4945e60be7650cd99e6764331855e9abed8bcbe3a038eff73eadc4237afd14f97fe148b231e3a091b3d0e3ac48aa0e33d47c9e15f398e0abc50e5f4394f982527975236e810a3050ddb3472da750031b3229c55624f03897e690f8385a30cd25c70e8363a38d419961a91210c3668fbaa38c07ad4e6d459e227339532eeff99ea9f1140d6ca7553b1d606f07b4a34b307ba2ff7dd7dadb49ab50"}, {0xd0, 0x13e, 0x0, "ed81523cec18fafe507ae581f48cf181dc0da34f5b161cd3e8192677210f6554160772185d080a835fce70b049f212027f10feae3169295254afe0333bdb4833bbccac0bd44df478d5a42b5dd4a74ac2577ac3512fad97ae14a495385d3b279305bbe172c412dcdf3548df84bc1910bc3b3808b0c74978be83c4bee70abf50887db673fd9ef9b8ef8b1f6b34175cc1d3a2c20641d57086db7a1c78dbffc1cddaaf6fc0d751225671f7d7b90679bc6d3b696b54c84b39bbf247802842a2"}], 0x2e8, 0x8000}, 0x2000) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x0, 0x4) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x1040000000032, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000001440)=[{&(0x7f0000000000)=""/40, 0x28}], 0x1, 0x0) 2018/04/10 10:28:03 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:28:03 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in={0x2, 0x4e23, @broadcast=0xffffffff}], 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2100, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e22, 0xb43, @empty, 0x80000001}, @in6={0xa, 0x4e24, 0x7, @dev={0xfe, 0x80, [], 0x14}, 0x136}, @in6={0xa, 0x4e20, 0x3, @local={0xfe, 0x80, [], 0xaa}, 0xfffffffffffffff9}, @in6={0xa, 0x4e24, 0x3f, @ipv4={[], [0xff, 0xff]}, 0x101}, @in6={0xa, 0x4e23, 0x200, @loopback={0x0, 0x1}, 0x3}, @in={0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e21, @broadcast=0xffffffff}, @in6={0xa, 0x4e20, 0x5, @loopback={0x0, 0x1}, 0x1}], 0xc8) symlinkat(&(0x7f00000001c0)='./file0\x00', r1, &(0x7f0000000200)='./file0\x00') getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000240)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000280)=0x1c) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000002c0)={r2, 0x6, 0x20}, &(0x7f0000000300)=0xc) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:28:03 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]]}, 0x178) 2018/04/10 10:28:03 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000080)='./control/file1\x00') close(0xffffffffffffffff) 2018/04/10 10:28:03 executing program 2 (fault-call:5 fault-nth:45): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) [ 275.179478] R13: 00000000000003fb R14: 00000000006f9028 R15: 000000000000002c [ 275.187300] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry statd [ 275.215214] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / [ 275.321913] FAULT_INJECTION: forcing a failure. [ 275.321913] name failslab, interval 1, probability 0, space 0, times 0 [ 275.333315] CPU: 0 PID: 19789 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 275.340250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 275.349617] Call Trace: [ 275.352221] dump_stack+0x1b9/0x294 [ 275.355852] ? dump_stack_print_info.cold.2+0x52/0x52 [ 275.361049] ? perf_trace_lock_acquire+0xe3/0x980 [ 275.365893] should_fail.cold.4+0xa/0x1a [ 275.369952] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 275.375049] ? graph_lock+0x170/0x170 [ 275.378835] ? debug_check_no_locks_freed+0x310/0x310 [ 275.384011] ? find_held_lock+0x36/0x1c0 [ 275.388064] ? __lock_is_held+0xb5/0x140 [ 275.392119] ? check_same_owner+0x320/0x320 [ 275.396428] ? rcu_note_context_switch+0x710/0x710 [ 275.401344] ? lock_downgrade+0x8e0/0x8e0 [ 275.405482] __should_failslab+0x124/0x180 [ 275.409702] should_failslab+0x9/0x14 [ 275.413484] kmem_cache_alloc+0x2af/0x760 [ 275.417623] __d_alloc+0xc1/0xc00 [ 275.421067] ? shrink_dcache_for_umount+0x290/0x290 [ 275.426073] ? d_alloc_parallel+0x1e80/0x1e80 [ 275.430554] ? lock_release+0xa10/0xa10 [ 275.434518] ? mark_held_locks+0xc9/0x160 [ 275.438656] ? d_lookup+0x254/0x330 [ 275.442275] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 275.447274] ? d_lookup+0x219/0x330 [ 275.450890] d_alloc+0x8e/0x370 [ 275.454157] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 275.459682] ? __d_alloc+0xc00/0xc00 [ 275.463380] ? full_name_hash+0xc0/0x100 [ 275.467438] __rpc_lookup_create_exclusive+0x18b/0x1e0 [ 275.472703] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 275.476935] rpc_populate.constprop.16+0x99/0x390 [ 275.481769] rpc_fill_super+0x3c9/0xbb0 [ 275.485733] ? cap_capable+0x1f9/0x260 [ 275.489608] ? rpc_pipe_release+0xb70/0xb70 [ 275.493920] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 275.499438] ? security_capable+0x99/0xc0 [ 275.503572] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 275.509094] ? ns_capable_common+0x13f/0x170 [ 275.513492] mount_ns+0x12a/0x1d0 [ 275.516930] ? rpc_pipe_release+0xb70/0xb70 [ 275.521238] rpc_mount+0x9e/0xd0 [ 275.524589] mount_fs+0xae/0x328 [ 275.528850] vfs_kern_mount.part.34+0xd4/0x4d0 [ 275.533419] ? may_umount+0xb0/0xb0 [ 275.537037] ? _raw_read_unlock+0x22/0x30 [ 275.541172] ? __get_fs_type+0x97/0xc0 [ 275.545048] do_mount+0x564/0x3070 [ 275.548587] ? copy_mount_string+0x40/0x40 [ 275.552804] ? rcu_pm_notify+0xc0/0xc0 [ 275.556681] ? copy_mount_options+0x5f/0x380 [ 275.561076] ? rcu_read_lock_sched_held+0x108/0x120 [ 275.566074] ? kmem_cache_alloc_trace+0x616/0x780 [ 275.570910] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 275.576433] ? _copy_from_user+0xdf/0x150 [ 275.580572] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 275.586095] ? copy_mount_options+0x285/0x380 [ 275.590581] ksys_mount+0x12d/0x140 [ 275.594283] SyS_mount+0x35/0x50 [ 275.597635] ? ksys_mount+0x140/0x140 [ 275.601423] do_syscall_64+0x29e/0x9d0 [ 275.605295] ? vmalloc_sync_all+0x30/0x30 [ 275.609428] ? _raw_spin_unlock_irq+0x27/0x70 [ 275.613907] ? finish_task_switch+0x1ca/0x820 [ 275.618408] ? syscall_return_slowpath+0x5c0/0x5c0 [ 275.623327] ? syscall_return_slowpath+0x30f/0x5c0 [ 275.628249] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 275.633604] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 275.638440] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 275.643618] RIP: 0033:0x455259 [ 275.646790] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 275.654483] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 [ 275.661737] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 2018/04/10 10:28:04 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000040)={{0xa, 0x4e23, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x5}, {0xa, 0x4e20, 0x3, @mcast2={0xff, 0x2, [], 0x1}, 0x800}, 0x2, [0xffff, 0x2, 0x30, 0x2, 0xffffffffffff0001, 0x100000000, 0x7, 0x8]}, 0x5c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) fremovexattr(r0, &(0x7f00000000c0)=@random={'osx.', '\\\x00'}) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000000), 0x10) [ 275.668991] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 [ 275.676246] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 275.683501] R13: 00000000000003fb R14: 00000000006f9028 R15: 000000000000002d [ 275.692748] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/04/10 10:28:04 executing program 0: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000001c0), 0x4) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time={0x0, 0x1c9c380}, {}, {}, @time=@time={0x77359400}}], 0x30) r2 = creat(&(0x7f0000000140)='./control/file0\x00', 0x0) unlink(&(0x7f00000000c0)='./control/file0\x00') getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000280)=""/181, &(0x7f0000000200)=0xb5) openat(r1, &(0x7f0000000240)='./control/file0\x00', 0x140, 0x10) mount(&(0x7f0000000040)='./control/file0\x00', &(0x7f0000000080)='./control\x00', &(0x7f0000000100)='xfs\x00', 0x202000, &(0x7f0000000180)) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000480)="ea22684ead76bb37307b79b54bde28d18faae8dfcdbc678a99419c49565bdf73faa9d4089dbc0ef14afa48972bca7d6481dfd1e7d07f53b290b49d55a08c3dd9545208d299db56eb605818eb27fe9c652c284d5e6c558aa09aebbe8ff1e67a72fa0b87e09e95a12ad791557db3d18817a7c57fee47a3c93147", 0x79) close(r0) mount(&(0x7f0000000340)='./control\x00', &(0x7f0000000380)='./control/file0\x00', &(0x7f00000003c0)='nfs4\x00', 0x106c0a, &(0x7f0000000400)="f480004909f55cb864ac6f157c4d327f87466385d99ade24ed6858b7f45d4850207149d904e17b75bb3e8e468887cca045422c0f7aed20c4d609088a75ccb93b7634b437ab029d34087a0196612cfca5f86d6164b9") r3 = gettid() sched_getaffinity(r3, 0x131, &(0x7f0000000500)) 2018/04/10 10:28:04 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:28:04 executing program 2 (fault-call:5 fault-nth:46): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) 2018/04/10 10:28:04 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]]}, 0x178) 2018/04/10 10:28:04 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00005a0000)='attr\x00') getdents64(r0, &(0x7f00007b1000)=""/4096, 0x1000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000000)={0x0, 0x43, "9be3584e25915545f60e0046dffc3e60ab1d02fd3fd7bd4982b91c64aad4c7a3aad37ba88afee9a896d4f02f346f508cbdd61d75ad75779c96d7d8a9acc4921119b14c"}, &(0x7f0000000080)=0x4b) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000000c0)={r1, 0x5}, &(0x7f0000000100)=0x8) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000140)) [ 275.855352] FAULT_INJECTION: forcing a failure. [ 275.855352] name failslab, interval 1, probability 0, space 0, times 0 [ 275.866826] CPU: 1 PID: 19810 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 275.873766] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 275.883122] Call Trace: [ 275.885726] dump_stack+0x1b9/0x294 [ 275.889367] ? dump_stack_print_info.cold.2+0x52/0x52 [ 275.894581] should_fail.cold.4+0xa/0x1a [ 275.898662] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 275.903787] ? graph_lock+0x170/0x170 [ 275.907597] ? __lock_acquire+0x7f5/0x5130 [ 275.911842] ? debug_check_no_locks_freed+0x310/0x310 [ 275.917045] ? find_held_lock+0x36/0x1c0 [ 275.921139] ? __lock_is_held+0xb5/0x140 [ 275.925223] ? check_same_owner+0x320/0x320 [ 275.929561] ? rcu_note_context_switch+0x710/0x710 [ 275.934496] ? lock_downgrade+0x8e0/0x8e0 [ 275.938651] ? lockdep_init_map+0x9/0x10 [ 275.942727] __should_failslab+0x124/0x180 [ 275.946972] should_failslab+0x9/0x14 [ 275.950784] kmem_cache_alloc+0x2af/0x760 [ 275.954951] __d_alloc+0xc1/0xc00 [ 275.958418] ? shrink_dcache_for_umount+0x290/0x290 [ 275.963444] ? d_alloc_parallel+0x1e80/0x1e80 [ 275.967951] ? lock_release+0xa10/0xa10 [ 275.971940] ? mark_held_locks+0xc9/0x160 [ 275.976108] ? d_lookup+0x254/0x330 [ 275.979754] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 275.984780] ? d_lookup+0x219/0x330 [ 275.988426] d_alloc+0x8e/0x370 [ 275.991717] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 275.997271] ? __d_alloc+0xc00/0xc00 [ 276.001015] ? full_name_hash+0xc0/0x100 2018/04/10 10:28:04 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]]}, 0x178) 2018/04/10 10:28:04 executing program 0: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f00000000c0)=0xfffffffffffffffa, 0x4) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000289000)={&(0x7f0000cf1ff4)={0x10}, 0xc, &(0x7f0000058000)={&(0x7f000023f000)=ANY=[@ANYBLOB="84a092adf5bb05c540000000000000fffffff1000c00000000000000000000005b7c589b62290ff8380c2dbedc5e9f17e1a04810d4647cd5291cb4e2bf1603295e78cbe859fe433915ee89501db1c2783ad5baba4c5eeb4ce3d1bb949869c29c4d914d9f26405e66cd4c0003c1700612dbc3080c91745fa158c70d70309f7f1969"], 0x81}, 0x1}, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000289000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f000023f000)=ANY=[@ANYBLOB="840000000000000000000000000000000000ffff"], 0x14}, 0x1}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000020, &(0x7f000023f000)=0xa, 0x20b) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000100)={0xffffffffffffffff}) setsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000140)=0x5, 0x4) [ 276.005104] __rpc_lookup_create_exclusive+0x18b/0x1e0 [ 276.010391] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 276.014649] rpc_populate.constprop.16+0x99/0x390 [ 276.019506] rpc_fill_super+0x3c9/0xbb0 [ 276.023487] ? cap_capable+0x1f9/0x260 [ 276.027377] ? rpc_pipe_release+0xb70/0xb70 [ 276.031709] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 276.037249] ? security_capable+0x99/0xc0 [ 276.041404] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 276.046944] ? ns_capable_common+0x13f/0x170 [ 276.051357] mount_ns+0x12a/0x1d0 [ 276.054815] ? rpc_pipe_release+0xb70/0xb70 [ 276.059144] rpc_mount+0x9e/0xd0 [ 276.062518] mount_fs+0xae/0x328 [ 276.065899] vfs_kern_mount.part.34+0xd4/0x4d0 [ 276.070487] ? may_umount+0xb0/0xb0 [ 276.074106] ? _raw_read_unlock+0x22/0x30 [ 276.078241] ? __get_fs_type+0x97/0xc0 [ 276.082119] do_mount+0x564/0x3070 [ 276.085650] ? copy_mount_string+0x40/0x40 [ 276.089875] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 276.094623] ? retint_kernel+0x10/0x10 [ 276.098510] ? __sanitizer_cov_trace_const_cmp8+0xf/0x20 [ 276.103944] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 276.109469] ? copy_mount_options+0x285/0x380 [ 276.113952] ksys_mount+0x12d/0x140 [ 276.117564] SyS_mount+0x35/0x50 [ 276.120912] ? ksys_mount+0x140/0x140 [ 276.124699] do_syscall_64+0x29e/0x9d0 [ 276.128572] ? vmalloc_sync_all+0x30/0x30 [ 276.132708] ? _raw_spin_unlock_irq+0x27/0x70 [ 276.137191] ? finish_task_switch+0x1ca/0x820 [ 276.141671] ? syscall_return_slowpath+0x5c0/0x5c0 [ 276.146587] ? syscall_return_slowpath+0x30f/0x5c0 [ 276.151505] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 276.156857] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 276.161692] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 276.166867] RIP: 0033:0x455259 [ 276.170042] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 276.177743] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 [ 276.184999] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 [ 276.192260] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 [ 276.199512] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 276.206768] R13: 00000000000003fb R14: 00000000006f9028 R15: 000000000000002e [ 276.220468] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/04/10 10:28:04 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000002000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000019fe0)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) signalfd(r0, &(0x7f0000000100)={0x9}, 0x8) fcntl$setown(r0, 0x8, r1) r2 = memfd_create(&(0x7f0000000040)='-.[vmnet0^\x00', 0x0) pwritev(r2, &(0x7f0000000000)=[{&(0x7f0000012000)="ca", 0x1}], 0x1, 0x0) lseek(r2, 0x0, 0x4) ftruncate(r2, 0x0) 2018/04/10 10:28:04 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x16) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:28:04 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x10) r1 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x8, 0x406040) ioctl$KDSETMODE(r1, 0x4b3a, 0x9) sendmsg$nl_generic(r0, &(0x7f0000023000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x400080000028, 0x100b, 0x0, 0x0, {0x1}, [@typed={0x8, 0x0, @u32=0x3}]}, 0x1c}, 0x1}, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1, 0x0) socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_sctp_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4) 2018/04/10 10:28:04 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]]}, 0x178) 2018/04/10 10:28:04 executing program 5: r0 = socket(0x2, 0x2, 0x0) io_setup(0x25, &(0x7f0000000000)=0x0) r2 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x1ccc, 0x648000) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000200)={0x0, 0x400, 0x0, 0x1, 0x8000, r0, &(0x7f0000000140)="a692dcc9cc6876df498cb7a16cce6a8079310fb8c710b2f1e744da13e6aebeabd95a985ff29a02b05ccc2aca273d7acc30818ef1eae21ff1240ba3820cc230165f7fa7d3d98fbd5d3c6b7ebde6519b8813ede43a31ff73e442dc0d016f24363af300bc291c79b245cb08f086929da9973d75c54378feb723a1644277d48389aa3f7a1c6a31dc8f7dc70e3604213971f72a738ac77e00cd1f2d329455cf1425c1b7f4685273", 0xa5, 0x9, 0x0, 0x0, r2}]) 2018/04/10 10:28:04 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:28:04 executing program 2 (fault-call:5 fault-nth:47): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) 2018/04/10 10:28:04 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000080)='./control/file1\x00') close(0xffffffffffffffff) [ 276.348981] FAULT_INJECTION: forcing a failure. [ 276.348981] name failslab, interval 1, probability 0, space 0, times 0 [ 276.360327] CPU: 0 PID: 19853 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 276.367261] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 276.376614] Call Trace: [ 276.379213] dump_stack+0x1b9/0x294 [ 276.382857] ? dump_stack_print_info.cold.2+0x52/0x52 [ 276.388055] ? perf_trace_lock_acquire+0xe3/0x980 [ 276.392897] should_fail.cold.4+0xa/0x1a [ 276.396950] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 276.402057] ? graph_lock+0x170/0x170 [ 276.405846] ? debug_check_no_locks_freed+0x310/0x310 [ 276.411028] ? find_held_lock+0x36/0x1c0 [ 276.415079] ? __lock_is_held+0xb5/0x140 [ 276.419137] ? check_same_owner+0x320/0x320 [ 276.423447] ? rcu_note_context_switch+0x710/0x710 [ 276.428359] ? lock_downgrade+0x8e0/0x8e0 [ 276.432497] __should_failslab+0x124/0x180 [ 276.436722] should_failslab+0x9/0x14 [ 276.440509] kmem_cache_alloc+0x2af/0x760 [ 276.444655] __d_alloc+0xc1/0xc00 [ 276.448097] ? shrink_dcache_for_umount+0x290/0x290 [ 276.453101] ? d_alloc_parallel+0x1e80/0x1e80 [ 276.457581] ? lock_release+0xa10/0xa10 [ 276.461543] ? mark_held_locks+0xc9/0x160 [ 276.465682] ? d_lookup+0x254/0x330 [ 276.469302] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 276.474303] ? d_lookup+0x219/0x330 [ 276.477920] d_alloc+0x8e/0x370 [ 276.481188] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 276.486709] ? __d_alloc+0xc00/0xc00 [ 276.490409] ? full_name_hash+0xc0/0x100 [ 276.494470] __rpc_lookup_create_exclusive+0x18b/0x1e0 [ 276.499738] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 276.503971] rpc_populate.constprop.16+0x99/0x390 [ 276.508848] rpc_fill_super+0x3c9/0xbb0 [ 276.512815] ? cap_capable+0x1f9/0x260 [ 276.516690] ? rpc_pipe_release+0xb70/0xb70 [ 276.521006] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 276.526534] ? security_capable+0x99/0xc0 [ 276.530676] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 276.536201] ? ns_capable_common+0x13f/0x170 [ 276.540600] mount_ns+0x12a/0x1d0 [ 276.544043] ? rpc_pipe_release+0xb70/0xb70 [ 276.548352] rpc_mount+0x9e/0xd0 [ 276.551709] mount_fs+0xae/0x328 [ 276.555073] vfs_kern_mount.part.34+0xd4/0x4d0 [ 276.559654] ? may_umount+0xb0/0xb0 [ 276.563270] ? _raw_read_unlock+0x22/0x30 [ 276.567406] ? __get_fs_type+0x97/0xc0 [ 276.571284] do_mount+0x564/0x3070 [ 276.574819] ? copy_mount_string+0x40/0x40 [ 276.579043] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 276.583789] ? retint_kernel+0x10/0x10 [ 276.587670] ? copy_mount_options+0x1a1/0x380 [ 276.592151] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 276.596985] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 276.602512] ? copy_mount_options+0x285/0x380 [ 276.606995] ksys_mount+0x12d/0x140 [ 276.610616] SyS_mount+0x35/0x50 [ 276.613966] ? ksys_mount+0x140/0x140 [ 276.617754] do_syscall_64+0x29e/0x9d0 [ 276.621627] ? vmalloc_sync_all+0x30/0x30 [ 276.625760] ? _raw_spin_unlock_irq+0x27/0x70 [ 276.630242] ? finish_task_switch+0x1ca/0x820 [ 276.634727] ? syscall_return_slowpath+0x5c0/0x5c0 [ 276.639644] ? syscall_return_slowpath+0x30f/0x5c0 [ 276.644567] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 276.649923] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 276.654761] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 276.659935] RIP: 0033:0x455259 [ 276.663106] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 276.670802] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 [ 276.678054] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 [ 276.685305] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 [ 276.692562] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 2018/04/10 10:28:05 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0x0) keyctl$session_to_parent(0x12) keyctl$update(0x2, r0, &(0x7f0000000140)="8f4e7aa582915f030052fef4a78e88ca0f76e77c068c4869f77ad1cc5ee8bc43395649703ba1bb2e057afd702dff3f9d7b62c9ed56409958de0c03b2c79ea293d9618954", 0x44) open$dir(&(0x7f00000002c0)="2e2f66696c65302f2f2f3c2e2eeb", 0x40, 0x0) 2018/04/10 10:28:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x1, &(0x7f0000001fe8)=ANY=[@ANYBLOB="0000000000000003cf"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0xc3, &(0x7f0000009f3d)=""/195}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x25}, [@ldst={0x7}], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x437, &(0x7f000000cf3d)=""/195}, 0x48) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000240)=0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000280)=0x0) r4 = getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000003c0)=0xe8) sendmsg$nl_netfilter(r1, &(0x7f0000000bc0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000020}, 0xc, &(0x7f0000000b80)={&(0x7f0000000400)={0x768, 0xe, 0xc, 0x31, 0x70bd26, 0x25dfdbfb, {0x7, 0x0, 0x6}, [@generic="5c82ee6d9d19c561e008d9837fb67babd9042fca1aeeb4b2e5a99fbd7b1afba5f2d54d0aaacb4bc198c0847a993895b0a3ff5222c73528e850a64a4575070df87d31a862f2f170d0c4788beb08e2ed3e2cd49330dc3b9c1000bd332ae0ce3164f51116b44cd403ae0bcf78b4f0122adc11", @typed={0xc, 0x59, @u64}, @typed={0x8, 0x49, @u32=0x1}, @generic="24b41eb20e872f929c97bc5c760a5af81564fce38339d050259d84861cf89ace7c807a5ac8026fc1dbb03687330fff09c7dd18fe42df0b4ff3d204a53cd5d499da78735e0e33fb155a47af1bcb4d66f22cde2e303b239620bdaba9b7353983bd3e4fb7203b82307111c11995824837c7f335cedb004655f714d1c10bbcabdf1da7cf86693553d8a5", @nested={0x348, 0x7a, [@typed={0xa8, 0x8b, @binary="e0cf38f4d046841ba6dcb493aa197dff4b1ebb3682ec0b83724dcb9b3ec5a55e979440be9f39c2fa952a41c3d8414f172a1c9fa5378dcb69aee882e50e35ec57a89383f9ba5963917643dd9a336f04966f129faea21cc28b35f17ed1e9c4894e2a607f692e0dede3696e1626602c0d821bab4fbc7ab08a610ef7e6547a5fcc97c25fbaca6135f9d423b3ed2246d742505d08ac55d1d922d69c5e0f0666d1b5c4cc"}, @typed={0x8, 0x57, @pid=r2}, @generic="dc45523fc1f4c4bd84c245e4d19906f646c49e1185c8f804f7ac198cae6e7da6fd7184b4d41aeb1c95bc14f34cab8b58c7e1ba72af488860b3404f131b979d4dd1b5553daed7b0805b1a596b72", @generic="414a997d9d9896c2bc6ebbe707263288eb24a757dc5816248ae92ace5f580b7748f0b1e86d169952238e9009bd8cfa6d30fbbbb06833430625b94a299baad21b511192fb34c9d63797f3de8b1424ae7e9ead2eb09b210e295bcb308810084b355f451b15adfd27a6ba3a6bd493a0678d61ab3e95455b5f87f625a5986d238e3cfba7841e91eb3382657a1d00c2a22deb2f56", @generic="6f88f0d151a7ba044d1bd632e29c1949e66735fa12d13eb2e02413edcd57683b3a29fcac579d488d6d6dea01faf861c6f1866155411ebbee2b911c5a42a8214a55191da27c333585493df92677cb4db643dcc6cdcb4447034cb55236e0e0fd51ba987c33b8e68ce8f03178c544136370a9ec0ac70b3625b9d9f4fb70707ad4a034b8546e6626f0208a", @typed={0x8, 0x35, @pid=r3}, @generic="b12ec30ead24e5994db49da9a23db764f00440d8fb84cee3c501661aaf4d4dda1016214c1398c094be5a4d197fc522c8d58d50b4b842d9ca7ba7cc3fce216ac88e627999656c5f990269d45f06c623a5d4c0871f38c8463dcfb40dc9c6cac611330614d041b751d1c694459be74492e8bc53670abb5fd5e816cda4fcbdf3f46dd10bc7b850f98461fc9e31495221dab1c0d652608a29b9d9b8f4dd2ae79a8c5b0659ac4500c121d8e01aa9f5f2515317cbd537785ff5e4cc903e319e0ed3494d67abc5494297829010bbbd", @generic="d7ca75b368fe372f16579971af3e0dbd1884d557346771cc0def08bebfcf3bc00f81009d9939af0188f3d55f9e30e0e25c5619fdc5295fe5fa97cc59a2efe7e167887af9b724c2ee74f8b4e452ea7a5893f413c8b4c13416"]}, @nested={0x178, 0x1a, [@generic="a9ade4098254a79be58dd504a46d79a42da3753fa26da729d4b24387bed25235a5fbcbbcf3fd68568f64418f0282d40d07038e44f1136fd87a87291bd75dc145fcdd4b683595dde6ea43c43a95734384dd619065868f5df81f19d95c030f0a1bce326d728a6459f59d06beabfe5f70f71c36d957afce5246", @typed={0x4, 0x28}, @generic="83489425499763a03b5d2849b09c9fd1de5a08d1f16f62964e13fa445569c142f0dfd00bf5b04005afdd64aa8ecd5fe507de993f07b5794ac6de96bdb3eac8de334fdb2a7e6831cc55b6b6db2b34be781e9c985658ada90d5dda8bf62a29429b180ef525c7c164da359233577ad400e1a516caafbf6bf764bdb4be893f4d02f32fbdcc6acd74bb6bac6101526fa844c826c8feada6e95053b1f7cc", @typed={0x8, 0x36, @fd=r0}, @typed={0x4, 0x47, @str}, @generic="6772d94edfff1213d5d9713f94367668b26dd76649f0e428ca54383303c28a5c5d48d0d4921ad33e500b05c45ee7fac6cb9d6c956797dad22467c2c9fd0d85cfa333307e3b6ea2", @typed={0x8, 0x2a, @uid=r4}]}, @generic="fc4da4b6e01f30d9b73254b7084518871e99b26d75db17fbc65f406e5d0663f4c8b7665f733a32f2e6a671175710688d64678553c231c634cc63bbd2f60bdf57de8bcbe28729422c7e95330604ce15acc0f8c5fca9bdab6ba0a61555d3a71d2379ba39fd5837364efd9236184233c9636ed26d7190e32487c843414f9925268b962f55c1b3fef98d794f745904e61002db627da36756a9e10afd034e18da56b1567bee7362b0dc925626047d381d7596649a422f6fdeb35e133b7a3b8d0f1415f04e2ba14239f0305d332a16844a527339cf6639c5090766f7d60276744ad2bd40e67adfb707", @typed={0x8, 0x14, @uid=r5}, @typed={0x8, 0x6a, @ipv4=@rand_addr=0x6}, @generic="faa559c54cfbb6321899ab9f177c91d1864f371a0bd07a0fa0cb79ee5821ac036532e63051579d8e4d3168175bb7ae61d5dd5754547751ad5f25b65a3501264f2a1c4e8cc4e2366f632c18c64860c9a356b18e9cda033d6368cdeb728d3afc2add29432bff3d97e6f6a7de5730cdb774502a232c3c418e072d2fe2d9755e0e89108e2977f6aa1bca0fbbc13c3799da"]}, 0x768}, 0x1, 0x0, 0x0, 0x4000004}, 0x8001) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r0, 0x0, 0xe, 0xf5, &(0x7f0000000040)="7dbde00ac77ecd96df6dbd486267", &(0x7f0000000100)=""/245, 0x9b52}, 0x28) 2018/04/10 10:28:05 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000000), &(0x7f0000000040)=0x8) [ 276.699816] R13: 00000000000003fb R14: 00000000006f9028 R15: 000000000000002f 2018/04/10 10:28:05 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]]}, 0x178) 2018/04/10 10:28:05 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) [ 276.836436] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/04/10 10:28:05 executing program 5: keyctl$setperm(0x5, 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = accept4$llc(0xffffffffffffff9c, &(0x7f0000000080), &(0x7f00000000c0)=0x10, 0x800) bind$llc(r0, &(0x7f0000000100)={0x1a, 0x30d, 0x4, 0x1, 0x10000, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) personality(0x4100001) r1 = socket(0x2, 0x2000000000000005, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x89f0, &(0x7f0000000380)={'bridge0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="0f"]}) 2018/04/10 10:28:05 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 10:28:05 executing program 2 (fault-call:5 fault-nth:48): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) [ 277.035239] FAULT_INJECTION: forcing a failure. [ 277.035239] name failslab, interval 1, probability 0, space 0, times 0 [ 277.046610] CPU: 0 PID: 19898 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 277.053548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 277.062912] Call Trace: [ 277.065524] dump_stack+0x1b9/0x294 [ 277.069170] ? dump_stack_print_info.cold.2+0x52/0x52 [ 277.074545] ? perf_trace_lock_acquire+0xe3/0x980 [ 277.079414] should_fail.cold.4+0xa/0x1a [ 277.083492] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 277.088611] ? zap_class+0x720/0x720 [ 277.092319] ? graph_lock+0x170/0x170 [ 277.096114] ? debug_check_no_locks_freed+0x310/0x310 [ 277.101297] ? find_held_lock+0x36/0x1c0 [ 277.105353] ? __lock_is_held+0xb5/0x140 [ 277.109418] ? check_same_owner+0x320/0x320 [ 277.113734] ? rcu_note_context_switch+0x710/0x710 [ 277.118653] ? lock_downgrade+0x8e0/0x8e0 [ 277.122796] __should_failslab+0x124/0x180 [ 277.127029] should_failslab+0x9/0x14 [ 277.130818] kmem_cache_alloc+0x2af/0x760 [ 277.134971] __d_alloc+0xc1/0xc00 [ 277.138419] ? shrink_dcache_for_umount+0x290/0x290 [ 277.143428] ? d_alloc_parallel+0x1e80/0x1e80 [ 277.147914] ? lock_release+0xa10/0xa10 [ 277.151878] ? mark_held_locks+0xc9/0x160 [ 277.156017] ? d_lookup+0x254/0x330 [ 277.159647] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 277.164649] ? d_lookup+0x219/0x330 [ 277.168267] d_alloc+0x8e/0x370 [ 277.171540] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 277.177074] ? __d_alloc+0xc00/0xc00 [ 277.180777] ? full_name_hash+0xc0/0x100 [ 277.184850] __rpc_lookup_create_exclusive+0x18b/0x1e0 [ 277.190119] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 277.194354] rpc_populate.constprop.16+0x99/0x390 [ 277.199192] rpc_fill_super+0x3c9/0xbb0 [ 277.203156] ? cap_capable+0x1f9/0x260 [ 277.207032] ? rpc_pipe_release+0xb70/0xb70 [ 277.211345] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 277.216870] ? security_capable+0x99/0xc0 [ 277.221014] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 277.226545] ? ns_capable_common+0x13f/0x170 [ 277.230949] mount_ns+0x12a/0x1d0 [ 277.234394] ? rpc_pipe_release+0xb70/0xb70 [ 277.238705] rpc_mount+0x9e/0xd0 [ 277.242061] mount_fs+0xae/0x328 [ 277.245423] vfs_kern_mount.part.34+0xd4/0x4d0 [ 277.249994] ? may_umount+0xb0/0xb0 [ 277.253620] ? _raw_read_unlock+0x22/0x30 [ 277.257755] ? __get_fs_type+0x97/0xc0 [ 277.261633] do_mount+0x564/0x3070 [ 277.265167] ? copy_mount_string+0x40/0x40 [ 277.269389] ? rcu_pm_notify+0xc0/0xc0 [ 277.273274] ? copy_mount_options+0x5f/0x380 [ 277.277672] ? rcu_read_lock_sched_held+0x108/0x120 [ 277.282680] ? kmem_cache_alloc_trace+0x616/0x780 [ 277.287522] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 277.293049] ? _copy_from_user+0xdf/0x150 [ 277.297188] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 277.302717] ? copy_mount_options+0x285/0x380 [ 277.307204] ksys_mount+0x12d/0x140 [ 277.310819] SyS_mount+0x35/0x50 [ 277.314169] ? ksys_mount+0x140/0x140 [ 277.317973] do_syscall_64+0x29e/0x9d0 [ 277.321934] ? vmalloc_sync_all+0x30/0x30 [ 277.326069] ? _raw_spin_unlock_irq+0x27/0x70 [ 277.330551] ? finish_task_switch+0x1ca/0x820 [ 277.335040] ? syscall_return_slowpath+0x5c0/0x5c0 [ 277.339959] ? syscall_return_slowpath+0x30f/0x5c0 [ 277.344882] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 277.350238] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 277.355073] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 277.360259] RIP: 0033:0x455259 [ 277.363441] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 277.371228] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 [ 277.378484] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 [ 277.385740] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 [ 277.392995] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 277.400258] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000030 [ 277.438538] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/04/10 10:28:06 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000002000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000019fe0)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) signalfd(r0, &(0x7f0000000100)={0x9}, 0x8) fcntl$setown(r0, 0x8, r1) r2 = memfd_create(&(0x7f0000000040)='-.[vmnet0^\x00', 0x0) pwritev(r2, &(0x7f0000000000)=[{&(0x7f0000012000)="ca", 0x1}], 0x1, 0x0) lseek(r2, 0x0, 0x4) ftruncate(r2, 0x0) 2018/04/10 10:28:06 executing program 0: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000bc8000)={0xaa, 0xffffffffffffffff}) r1 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) chmod(&(0x7f0000000080)='./file0\x00', 0x0) socketpair$ax25(0x3, 0x3, 0xcc, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f000000f000/0x3000)=nil, 0x3000, 0x2000003, 0x12, r2, 0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9, 0x0) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f00000005c0)) dup2(0xffffffffffffffff, r0) 2018/04/10 10:28:06 executing program 5: ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000000)={0x0, 0xffffffffffffff9c, 0x1}) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000040)={{0x4, @multicast1=0xe0000001, 0x4e20, 0x2, 'lblc\x00', 0x24, 0x6, 0x60}, {@dev={0xac, 0x14, 0x14, 0x17}, 0x4e24, 0x0, 0x94, 0x400, 0xfffffffffffff000}}, 0x44) socketpair$inet(0x1e, 0x80000000000001, 0x0, &(0x7f00000000c0)={0x0, 0xffffffffffffffff}) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000003c0)}}, {{&(0x7f0000000480)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}}}, 0x80, &(0x7f0000000a00)}}], 0x2, 0x1ffffffe) 2018/04/10 10:28:06 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:28:06 executing program 2 (fault-call:5 fault-nth:49): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) 2018/04/10 10:28:06 executing program 3 (fault-call:8 fault-nth:0): mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000080)='./control/file1\x00') close(r0) 2018/04/10 10:28:06 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]]}, 0x178) 2018/04/10 10:28:06 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)=0x8, 0x4) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x8e, 0x8000) accept4$netrom(r1, &(0x7f0000000080), &(0x7f00000000c0)=0x10, 0x80000) [ 277.762732] FAULT_INJECTION: forcing a failure. [ 277.762732] name failslab, interval 1, probability 0, space 0, times 0 [ 277.774137] CPU: 1 PID: 19927 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 277.781075] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 277.790433] Call Trace: [ 277.793034] dump_stack+0x1b9/0x294 [ 277.796677] ? dump_stack_print_info.cold.2+0x52/0x52 [ 277.801880] ? perf_trace_lock_acquire+0xe3/0x980 [ 277.806742] should_fail.cold.4+0xa/0x1a 2018/04/10 10:28:06 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000ee1fa8)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha384\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001000)="a23364fd5e580ef24d71a19dd93fc727", 0x10) r2 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r2, 0x0, 0x0, 0x9) sendfile(r1, r2, &(0x7f0000e64ff8), 0x6) 2018/04/10 10:28:06 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]]}, 0x178) [ 277.810821] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 277.815944] ? graph_lock+0x170/0x170 [ 277.819768] ? debug_check_no_locks_freed+0x310/0x310 [ 277.824976] ? find_held_lock+0x36/0x1c0 [ 277.829050] ? __lock_is_held+0xb5/0x140 [ 277.833125] ? check_same_owner+0x320/0x320 [ 277.837979] ? rcu_note_context_switch+0x710/0x710 [ 277.837998] ? lock_downgrade+0x8e0/0x8e0 [ 277.847085] __should_failslab+0x124/0x180 [ 277.851346] should_failslab+0x9/0x14 [ 277.855163] kmem_cache_alloc+0x2af/0x760 [ 277.859416] __d_alloc+0xc1/0xc00 [ 277.862976] ? shrink_dcache_for_umount+0x290/0x290 [ 277.868009] ? d_alloc_parallel+0x1e80/0x1e80 [ 277.872604] ? lock_release+0xa10/0xa10 [ 277.876591] ? mark_held_locks+0xc9/0x160 [ 277.880749] ? d_lookup+0x254/0x330 [ 277.884407] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 277.884423] ? d_lookup+0x219/0x330 [ 277.884446] d_alloc+0x8e/0x370 [ 277.884462] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 277.884481] ? __d_alloc+0xc00/0xc00 [ 277.905595] ? full_name_hash+0xc0/0x100 [ 277.909665] __rpc_lookup_create_exclusive+0x18b/0x1e0 [ 277.914954] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 277.919206] rpc_populate.constprop.16+0x99/0x390 [ 277.924064] rpc_fill_super+0x3c9/0xbb0 [ 277.928042] ? cap_capable+0x1f9/0x260 [ 277.931941] ? rpc_pipe_release+0xb70/0xb70 [ 277.936273] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 277.941817] ? security_capable+0x99/0xc0 [ 277.945981] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 277.951527] ? ns_capable_common+0x13f/0x170 [ 277.955951] mount_ns+0x12a/0x1d0 [ 277.959417] ? rpc_pipe_release+0xb70/0xb70 2018/04/10 10:28:06 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00004da000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x94}]}, 0x10) r2 = syz_open_dev$dspn(&(0x7f0000000200)='/dev/dsp#\x00', 0x8000c, 0x501) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000100)={0x0}) ioctl$DRM_IOCTL_GEM_CLOSE(r2, 0x40086409, &(0x7f0000000140)={r3}) alarm(0x2) socket$l2tp(0x18, 0x1, 0x1) bind$inet(r1, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xd}}, 0x10) sendto$inet(r1, &(0x7f00009fc000), 0x5fa, 0x8000, &(0x7f0000357000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) sendto$inet(r1, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) 2018/04/10 10:28:06 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x10000, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000080)=[@in={0x2, 0x4e23, @loopback=0x7f000001}, @in6={0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x1a}, 0x6d2d438c}], 0x2c) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00080000ec050000130200001200000000000000000200000001000024d96443e10000001e000000000000000010ec0302000100526549734572334673000000030000000200dffed9", 0x49, 0x10000}], 0x0, &(0x7f0000011400)) syslog(0xe, &(0x7f0000000040), 0x0) [ 277.963744] rpc_mount+0x9e/0xd0 [ 277.967120] mount_fs+0xae/0x328 [ 277.970501] vfs_kern_mount.part.34+0xd4/0x4d0 [ 277.975095] ? may_umount+0xb0/0xb0 [ 277.978729] ? _raw_read_unlock+0x22/0x30 [ 277.982882] ? __get_fs_type+0x97/0xc0 [ 277.986783] do_mount+0x564/0x3070 [ 277.990334] ? do_raw_spin_unlock+0x9e/0x2e0 [ 277.994755] ? copy_mount_string+0x40/0x40 [ 277.998977] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 278.003984] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 278.008734] ? retint_kernel+0x10/0x10 [ 278.012615] ? copy_mount_options+0x1f0/0x380 [ 278.017099] ? copy_mount_options+0x1fd/0x380 [ 278.021583] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 278.027105] ? copy_mount_options+0x285/0x380 [ 278.031588] ksys_mount+0x12d/0x140 [ 278.035204] SyS_mount+0x35/0x50 [ 278.038554] ? ksys_mount+0x140/0x140 [ 278.042344] do_syscall_64+0x29e/0x9d0 [ 278.046220] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 278.051051] ? syscall_return_slowpath+0x5c0/0x5c0 [ 278.055967] ? syscall_return_slowpath+0x30f/0x5c0 [ 278.060887] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 278.066242] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 278.071079] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 278.076257] RIP: 0033:0x455259 [ 278.079428] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 278.087124] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 [ 278.094401] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 [ 278.101655] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 2018/04/10 10:28:06 executing program 4: r0 = socket$inet6_sctp(0xa, 0x200000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) [ 278.108909] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 278.116166] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000031 [ 278.127340] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/04/10 10:28:06 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:28:06 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]]}, 0x178) [ 278.179467] REISERFS warning (device loop0): sh-2012 read_super_block: found unknown format "217" of reiserfs with non-standard magic [ 278.191776] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 2018/04/10 10:28:06 executing program 2 (fault-call:5 fault-nth:50): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) [ 278.303764] REISERFS warning (device loop0): sh-2012 read_super_block: found unknown format "217" of reiserfs with non-standard magic [ 278.313353] FAULT_INJECTION: forcing a failure. [ 278.313353] name failslab, interval 1, probability 0, space 0, times 0 [ 278.316084] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 278.327314] CPU: 1 PID: 19972 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 278.327325] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 278.327330] Call Trace: [ 278.327353] dump_stack+0x1b9/0x294 [ 278.327376] ? dump_stack_print_info.cold.2+0x52/0x52 [ 278.364625] ? perf_trace_lock_acquire+0xe3/0x980 [ 278.369489] ? graph_lock+0x170/0x170 [ 278.373310] should_fail.cold.4+0xa/0x1a [ 278.377393] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 278.382534] ? perf_trace_lock+0x900/0x900 [ 278.386782] ? graph_lock+0x170/0x170 [ 278.390595] ? graph_lock+0x170/0x170 [ 278.394403] ? find_held_lock+0x36/0x1c0 [ 278.398477] ? __lock_is_held+0xb5/0x140 [ 278.402563] ? check_same_owner+0x320/0x320 [ 278.406903] ? rcu_note_context_switch+0x710/0x710 [ 278.411861] __should_failslab+0x124/0x180 [ 278.416112] should_failslab+0x9/0x14 [ 278.419926] kmem_cache_alloc+0x2af/0x760 [ 278.424091] ? rpc_i_callback+0x30/0x30 [ 278.428076] rpc_alloc_inode+0x1a/0x20 [ 278.431971] alloc_inode+0x63/0x190 [ 278.435914] new_inode_pseudo+0x69/0x1a0 [ 278.439983] ? prune_icache_sb+0x1a0/0x1a0 [ 278.444213] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 278.448786] ? kasan_check_write+0x14/0x20 [ 278.453013] ? do_raw_spin_lock+0xc1/0x200 [ 278.457239] new_inode+0x1c/0x40 [ 278.460592] rpc_get_inode+0x1e/0x1f0 [ 278.464377] ? d_drop+0x5a/0x70 [ 278.467643] __rpc_create_common+0x5d/0x190 [ 278.471957] rpc_populate.constprop.16+0x11f/0x390 [ 278.476880] rpc_fill_super+0x3c9/0xbb0 [ 278.480846] ? cap_capable+0x1f9/0x260 [ 278.484719] ? rpc_pipe_release+0xb70/0xb70 [ 278.489038] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 278.494563] ? security_capable+0x99/0xc0 [ 278.498700] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 278.504225] ? ns_capable_common+0x13f/0x170 [ 278.508624] mount_ns+0x12a/0x1d0 [ 278.512066] ? rpc_pipe_release+0xb70/0xb70 [ 278.516413] rpc_mount+0x9e/0xd0 [ 278.519771] mount_fs+0xae/0x328 [ 278.523134] vfs_kern_mount.part.34+0xd4/0x4d0 [ 278.527707] ? may_umount+0xb0/0xb0 [ 278.531321] ? _raw_read_unlock+0x22/0x30 [ 278.535460] ? __get_fs_type+0x97/0xc0 [ 278.539339] do_mount+0x564/0x3070 [ 278.542870] ? do_raw_spin_unlock+0x9e/0x2e0 [ 278.547273] ? copy_mount_string+0x40/0x40 [ 278.551501] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 278.556508] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 278.561257] ? retint_kernel+0x10/0x10 [ 278.565140] ? copy_mount_options+0x1f0/0x380 [ 278.569624] ? copy_mount_options+0x1f6/0x380 [ 278.574105] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 278.579629] ? copy_mount_options+0x285/0x380 [ 278.584117] ksys_mount+0x12d/0x140 [ 278.587737] SyS_mount+0x35/0x50 [ 278.591087] ? ksys_mount+0x140/0x140 [ 278.594878] do_syscall_64+0x29e/0x9d0 [ 278.598757] ? vmalloc_sync_all+0x30/0x30 [ 278.602894] ? _raw_spin_unlock_irq+0x27/0x70 [ 278.607377] ? finish_task_switch+0x1ca/0x820 [ 278.611860] ? syscall_return_slowpath+0x5c0/0x5c0 [ 278.616783] ? syscall_return_slowpath+0x30f/0x5c0 [ 278.621709] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 278.627066] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 278.631904] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 278.637084] RIP: 0033:0x455259 [ 278.640261] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 278.647955] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 [ 278.655209] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 [ 278.662461] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 [ 278.669717] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 278.676972] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000032 [ 278.684338] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry cache [ 278.694507] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / [ 278.714802] FAULT_INJECTION: forcing a failure. [ 278.714802] name failslab, interval 1, probability 0, space 0, times 0 [ 278.726136] CPU: 0 PID: 19982 Comm: syz-executor3 Not tainted 4.16.0+ #15 [ 278.733064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 278.742401] Call Trace: [ 278.744985] dump_stack+0x1b9/0x294 [ 278.748601] ? dump_stack_print_info.cold.2+0x52/0x52 [ 278.753775] ? graph_lock+0x170/0x170 [ 278.757561] should_fail.cold.4+0xa/0x1a [ 278.761602] ? lock_downgrade+0x8e0/0x8e0 [ 278.765734] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 278.770821] ? find_held_lock+0x36/0x1c0 [ 278.774867] ? find_held_lock+0x36/0x1c0 [ 278.778921] ? check_same_owner+0x320/0x320 [ 278.783229] ? rcu_note_context_switch+0x710/0x710 [ 278.788140] ? wait_for_completion+0x870/0x870 [ 278.792706] __should_failslab+0x124/0x180 [ 278.796932] should_failslab+0x9/0x14 [ 278.800716] kmem_cache_alloc+0x2af/0x760 [ 278.804851] getname_flags+0xd0/0x5a0 [ 278.808637] getname+0x19/0x20 [ 278.811810] do_sys_open+0x38e/0x770 [ 278.815512] ? filp_open+0x80/0x80 [ 278.819036] ? mm_fault_error+0x380/0x380 [ 278.823169] ? ksys_ioctl+0x81/0xd0 [ 278.826780] SyS_open+0x2d/0x40 [ 278.830043] ? do_sys_open+0x770/0x770 [ 278.833912] do_syscall_64+0x29e/0x9d0 [ 278.837783] ? vmalloc_sync_all+0x30/0x30 [ 278.841912] ? _raw_spin_unlock_irq+0x27/0x70 [ 278.846390] ? finish_task_switch+0x1ca/0x820 [ 278.850873] ? syscall_return_slowpath+0x5c0/0x5c0 [ 278.855788] ? syscall_return_slowpath+0x30f/0x5c0 [ 278.860703] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 278.866056] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 278.870890] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 278.876057] RIP: 0033:0x40f4b1 [ 278.879228] RSP: 002b:00007f2e6d932800 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 278.886919] RAX: ffffffffffffffda RBX: 00007f2e6d9336d4 RCX: 000000000040f4b1 [ 278.894167] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 00000000004b9b7e [ 278.901416] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 278.908673] R10: 0000000020000180 R11: 0000000000000293 R12: 0000000000000000 2018/04/10 10:28:07 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000002000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000019fe0)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) signalfd(r0, &(0x7f0000000100)={0x9}, 0x8) fcntl$setown(r0, 0x8, r1) r2 = memfd_create(&(0x7f0000000040)='-.[vmnet0^\x00', 0x0) pwritev(r2, &(0x7f0000000000)=[{&(0x7f0000012000)="ca", 0x1}], 0x1, 0x0) lseek(r2, 0x0, 0x4) ftruncate(r2, 0x0) 2018/04/10 10:28:07 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]]}, 0x178) 2018/04/10 10:28:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000f75fc8)={0x0, 0x0, &(0x7f0000805000), 0x0, &(0x7f00002e7000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000080)={0x3, r1}) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r2, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x128, r3, 0x322, 0x70bd2d, 0x25dfdbfc, {0xf}, [@IPVS_CMD_ATTR_DEST={0x40, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x5}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xff}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_SERVICE={0x38, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@local={0xac, 0x14, 0x14, 0xaa}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7f}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_DEST={0x18, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@broadcast=0xffffffff}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_DEST={0x58, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x100000000}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@broadcast=0xffffffff}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x4}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xffffffffffffffff}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}]}]}, 0x128}, 0x1}, 0x4004884) io_setup(0x1, &(0x7f0000f7e000)=0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='nr0\x00', 0x429}) io_submit(r4, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 2018/04/10 10:28:07 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000080)='./control/file1\x00') close(r0) 2018/04/10 10:28:07 executing program 2 (fault-call:5 fault-nth:51): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) 2018/04/10 10:28:07 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[@ANYBLOB="04000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000040)=0x18) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000080)={r1, 0x81}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}], 0x10) lseek(r0, 0x4b, 0x3) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:28:07 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/31, 0x1f}], 0x1) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000387000), 0x4) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) connect$unix(r1, &(0x7f00002ffff6)=@file={0x0, './file0\x00'}, 0xa) 2018/04/10 10:28:07 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) [ 278.915926] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 [ 279.005620] FAULT_INJECTION: forcing a failure. [ 279.005620] name failslab, interval 1, probability 0, space 0, times 0 [ 279.017017] CPU: 1 PID: 19989 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 279.023955] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.033313] Call Trace: [ 279.035915] dump_stack+0x1b9/0x294 [ 279.039560] ? dump_stack_print_info.cold.2+0x52/0x52 [ 279.044768] ? perf_trace_lock_acquire+0xe3/0x980 [ 279.049641] should_fail.cold.4+0xa/0x1a 2018/04/10 10:28:07 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]]}, 0x178) [ 279.053722] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 279.058844] ? graph_lock+0x170/0x170 [ 279.062663] ? debug_check_no_locks_freed+0x310/0x310 [ 279.067872] ? find_held_lock+0x36/0x1c0 [ 279.071951] ? __lock_is_held+0xb5/0x140 [ 279.076033] ? check_same_owner+0x320/0x320 [ 279.080372] ? rcu_note_context_switch+0x710/0x710 [ 279.085309] ? lock_downgrade+0x8e0/0x8e0 [ 279.089476] __should_failslab+0x124/0x180 [ 279.093713] should_failslab+0x9/0x14 [ 279.097511] kmem_cache_alloc+0x2af/0x760 [ 279.101682] __d_alloc+0xc1/0xc00 [ 279.105149] ? shrink_dcache_for_umount+0x290/0x290 [ 279.110177] ? d_alloc_parallel+0x1e80/0x1e80 [ 279.114683] ? lock_release+0xa10/0xa10 [ 279.118670] ? mark_held_locks+0xc9/0x160 [ 279.122826] ? d_lookup+0x254/0x330 [ 279.126473] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 279.131488] ? d_lookup+0x219/0x330 [ 279.135107] d_alloc+0x8e/0x370 [ 279.138378] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 279.143902] ? __d_alloc+0xc00/0xc00 [ 279.147620] ? full_name_hash+0xc0/0x100 [ 279.151676] __rpc_lookup_create_exclusive+0x18b/0x1e0 [ 279.156939] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 279.161170] rpc_populate.constprop.16+0x99/0x390 [ 279.166009] rpc_fill_super+0x3c9/0xbb0 [ 279.169980] ? cap_capable+0x1f9/0x260 [ 279.173856] ? rpc_pipe_release+0xb70/0xb70 [ 279.178170] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 279.183695] ? security_capable+0x99/0xc0 [ 279.187831] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 279.193361] ? ns_capable_common+0x13f/0x170 [ 279.197759] mount_ns+0x12a/0x1d0 [ 279.201200] ? rpc_pipe_release+0xb70/0xb70 [ 279.205509] rpc_mount+0x9e/0xd0 [ 279.208863] mount_fs+0xae/0x328 [ 279.212221] vfs_kern_mount.part.34+0xd4/0x4d0 [ 279.216792] ? may_umount+0xb0/0xb0 [ 279.220409] ? _raw_read_unlock+0x22/0x30 [ 279.224544] ? __get_fs_type+0x97/0xc0 [ 279.228421] do_mount+0x564/0x3070 [ 279.231956] ? copy_mount_string+0x40/0x40 [ 279.236178] ? rcu_pm_notify+0xc0/0xc0 [ 279.240065] ? copy_mount_options+0x5f/0x380 [ 279.244463] ? rcu_read_lock_sched_held+0x108/0x120 [ 279.249468] ? kmem_cache_alloc_trace+0x616/0x780 [ 279.254303] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 279.259830] ? _copy_from_user+0xdf/0x150 [ 279.263974] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 279.269502] ? copy_mount_options+0x285/0x380 [ 279.273990] ksys_mount+0x12d/0x140 [ 279.277608] SyS_mount+0x35/0x50 [ 279.280964] ? ksys_mount+0x140/0x140 [ 279.284756] do_syscall_64+0x29e/0x9d0 [ 279.288630] ? vmalloc_sync_all+0x30/0x30 [ 279.292766] ? _raw_spin_unlock_irq+0x27/0x70 [ 279.297249] ? finish_task_switch+0x1ca/0x820 [ 279.301904] ? syscall_return_slowpath+0x5c0/0x5c0 [ 279.306819] ? syscall_return_slowpath+0x30f/0x5c0 [ 279.311742] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 279.317093] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 279.321931] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 279.327107] RIP: 0033:0x455259 [ 279.330281] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 279.337980] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 [ 279.345235] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 2018/04/10 10:28:07 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:28:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x204000, 0x4) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendmsg$nl_route(r0, &(0x7f0000000640)={&(0x7f00000003c0)={0x10}, 0xc, &(0x7f0000000600)={&(0x7f00000004c0)=@ipv4_newroute={0x2c, 0x18, 0x421, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, [@RTA_ENCAP_TYPE={0x8, 0x15, 0x7}, @RTA_ENCAP={0x8, 0x16, @nested={0x4}}]}, 0x2c}, 0x1}, 0x0) [ 279.352488] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 [ 279.359742] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 279.367633] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000033 [ 279.376386] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/04/10 10:28:07 executing program 2 (fault-call:5 fault-nth:52): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) 2018/04/10 10:28:07 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]]}, 0x178) [ 279.451421] netlink: 'syz-executor0': attribute type 21 has an invalid length. [ 279.478135] netlink: 'syz-executor0': attribute type 21 has an invalid length. [ 279.504849] FAULT_INJECTION: forcing a failure. [ 279.504849] name failslab, interval 1, probability 0, space 0, times 0 [ 279.516242] CPU: 0 PID: 20026 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 279.523174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.534216] Call Trace: [ 279.536819] dump_stack+0x1b9/0x294 [ 279.540470] ? dump_stack_print_info.cold.2+0x52/0x52 [ 279.545680] ? perf_trace_lock_acquire+0xe3/0x980 [ 279.550539] ? graph_lock+0x170/0x170 2018/04/10 10:28:07 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) [ 279.554372] should_fail.cold.4+0xa/0x1a [ 279.558450] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 279.563577] ? perf_trace_lock+0x900/0x900 [ 279.567831] ? graph_lock+0x170/0x170 [ 279.571641] ? graph_lock+0x170/0x170 [ 279.575448] ? find_held_lock+0x36/0x1c0 [ 279.579521] ? __lock_is_held+0xb5/0x140 [ 279.583600] ? check_same_owner+0x320/0x320 [ 279.587913] ? rcu_note_context_switch+0x710/0x710 [ 279.592840] __should_failslab+0x124/0x180 [ 279.597068] should_failslab+0x9/0x14 [ 279.600854] kmem_cache_alloc+0x2af/0x760 [ 279.604995] ? rpc_i_callback+0x30/0x30 [ 279.608962] rpc_alloc_inode+0x1a/0x20 [ 279.612832] alloc_inode+0x63/0x190 [ 279.616451] new_inode_pseudo+0x69/0x1a0 [ 279.620506] ? prune_icache_sb+0x1a0/0x1a0 [ 279.624729] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 279.629299] ? kasan_check_write+0x14/0x20 [ 279.633524] ? do_raw_spin_lock+0xc1/0x200 [ 279.637747] new_inode+0x1c/0x40 [ 279.641103] rpc_get_inode+0x1e/0x1f0 [ 279.644889] ? d_drop+0x5a/0x70 [ 279.648159] __rpc_create_common+0x5d/0x190 [ 279.652474] rpc_populate.constprop.16+0x11f/0x390 [ 279.657400] rpc_fill_super+0x3c9/0xbb0 [ 279.661366] ? cap_capable+0x1f9/0x260 [ 279.665245] ? rpc_pipe_release+0xb70/0xb70 [ 279.669556] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 279.675078] ? security_capable+0x99/0xc0 [ 279.679220] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 279.684745] ? ns_capable_common+0x13f/0x170 [ 279.689147] mount_ns+0x12a/0x1d0 [ 279.692608] ? rpc_pipe_release+0xb70/0xb70 [ 279.696918] rpc_mount+0x9e/0xd0 [ 279.700273] mount_fs+0xae/0x328 [ 279.703634] vfs_kern_mount.part.34+0xd4/0x4d0 [ 279.708205] ? may_umount+0xb0/0xb0 [ 279.711823] ? _raw_read_unlock+0x22/0x30 [ 279.715958] ? __get_fs_type+0x97/0xc0 [ 279.719836] do_mount+0x564/0x3070 [ 279.723366] ? copy_mount_string+0x40/0x40 [ 279.727586] ? rcu_pm_notify+0xc0/0xc0 [ 279.731467] ? copy_mount_options+0x5f/0x380 [ 279.735865] ? rcu_read_lock_sched_held+0x108/0x120 [ 279.740871] ? kmem_cache_alloc_trace+0x616/0x780 [ 279.745706] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 279.751233] ? _copy_from_user+0xdf/0x150 [ 279.755372] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 279.760897] ? copy_mount_options+0x285/0x380 [ 279.765385] ksys_mount+0x12d/0x140 [ 279.769000] SyS_mount+0x35/0x50 [ 279.772354] ? ksys_mount+0x140/0x140 [ 279.776142] do_syscall_64+0x29e/0x9d0 [ 279.780018] ? vmalloc_sync_all+0x30/0x30 [ 279.784160] ? _raw_spin_unlock_irq+0x27/0x70 [ 279.788645] ? finish_task_switch+0x1ca/0x820 [ 279.793129] ? syscall_return_slowpath+0x5c0/0x5c0 [ 279.798045] ? syscall_return_slowpath+0x30f/0x5c0 [ 279.803575] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 279.808933] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 279.813768] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 279.818942] RIP: 0033:0x455259 [ 279.822115] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 279.829811] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 [ 279.837065] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 [ 279.844318] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 2018/04/10 10:28:08 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]]}, 0x178) 2018/04/10 10:28:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x2, 0x301800) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f0000001400)=""/185) sendmmsg$alg(r2, &(0x7f0000001340)=[{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000240)="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", 0xfa}, {&(0x7f0000000140)="0d30cedbba4cf8725b0013f3088bc95ef4657b8ab96e1f14194060598f3416a1b67c10987a9300c6a8079d9823814d9100e84babaf3d1f5be43c8460c180723f6ea8e24720a9a483b4", 0x49}, {&(0x7f0000000380)="1666bd69271f90eeb6d0f4f43c95de27f6abc92594f100548fcd28f4183f29dcbc79487ca7c701fabca7848f4e69df57d98096bc04adab81e12db9110907968bdcdcefdcb50e6f20edf0ea0d01c4310c6202e987bb2ed50865b61913e86dff69b4dba091c818add2a80bbba4ba42e8f6c704f8673e7479809cd58092879fa344773487fb505f77c438f2a849c9c4aa72eaf0e2930b3956c0b24853105c09c34d0c7b7fbd7a294011366376b29792020c67e410d6a6", 0xb5}, {&(0x7f0000000440)="1b77f16ea614d7eece584e07f73e0d8bb75b92c5cd86f41a5a98b3c4b3137a7e79469d06eee6531e313a4f47d6b1d33e09eb012d40c9e6eb0a12e2d659adaecc9b3d7904ccd7e49d60fb8bd3e756fb897eb93e204cefc2212b251509dec89db08b5bcec74bf2a84845089d1e74effcaec3e02039daf6f7bfb41f558e952d9378e3f95d93ba77d7ae2f3ce2f442b0bd0231ba1fa15292ecada8594ea6da29e50e1f9a3b1720fc99c3c951758a53c6ab7b619aa77b9d95b700c791985d00108ed9bfd2de6dba3568775eae7cc3dec884410fc97025e155dcf0acefe511c689ad7391a27a89aa251f1b53221495393a8fe6", 0xf0}, {&(0x7f0000000540)="6dd824f3b8a52c49e0ba0ff128372accf77112d9e10671c3405e9252f4a6f7921ec811fcae1a55813c31bebaa1ea2c975878fdd9e9ee55321d8fb4fbf1cd960b185b1a61d763d2a660de7dab9fd497a82efe9c1b4828c3d813f2bc9df7babcd08577c7a48c55ffc2812d1cf586c96439053792a7f0d61433b0de67d32e193b44caeddb653308a1d53db3bf2b6c0c463e7420ff83fd9557d7a1a3209515df2493367def9eb35c0ff1bd5434b058a0495163c324063ca2c30f17b7cefabad3c4f08f3054b6dbc0ba741b9b1e44c7000a2fc29b94ddbf93bc40da1404c811889666566dbc24", 0xe4}], 0x5, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0x1b0, 0x24000000}, {0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000880)="f2f5062ca14de2779acfc12f91c3079da7eac761dcd77deddb4eec29d4aa96edb8841c70c9516e5008350f81df167d026c31ba78368f18d1067b3c8d3a85a54f76502939b8e7dce97f88330c14add57d70fcaca775177d8c57ac5fe3afe8b378346519aa92560ba3cf9abf0467011e274708d0320e31e0bb2c6a9849881e82a2145ea7e1283bd6d9c7e29a31f89f105fc00456a3bd3d9b77b780c9ae85e78af87f934055049ff6060a52bbf72739ca544b68208f", 0xb4}, {&(0x7f0000000940)="4b54b6ef0557766487b870e9af98f1e236ba8808374227d7f6230602db51be59a4d9d2feb4a680a708f7cdee6360e5ed94998ffea32afdeea0f48f1f77d60c4ffb8d066ab3939a97c4232d6067e7541d00cb840225e4276a18c13621def2956ed6c13a62a4b9fdf3469425335a1e8e5b2d89892db6fbc120b9936e79160f91235958c18b5dae7cbf4b069e98867c500505d47aa38209017d51b900c601c92c4a71e52101a7657236cc1420b2bd31024e5c913ef29bb0952fc812a1ec8a3ecf02a431c02841aab571fc3d08dd38ee879fd9c9a4c5fd265cbaccc1cea0fd393cd689a152330c1b701d960e327e8b18ee2c0593dca9", 0xf4}, {&(0x7f0000000080)="56e5bfd5b153c2c4ba4791131a6fe5256d20813609344e8e97c8", 0x1a}, {&(0x7f0000000a40)="4f07be670893021ebbc5bdebac487cfc6033377219816067d3b9ea03b98532bdcf526a5febaf3abfd2f0ea6181ae45272a1b1996b6de19099221aa144abf62cafd4801f3871b8bbf3412f53a2c5151d4536e88b389e7acf6964a3d74875789067b260e87d1658fe041ab578d3f0c4e0de8ec2a9a6df313442e85f1a8ca4514bf43439d5e0c497eef49702c529cd7503e6eebc5cae5403244ae07f3a3160ec20cb5e23139297ad373ffe8149a08803c38df2a1b6f5a2b1c8096bd5d538f3e52ad66cfa920c03373696fc2556e7da071e044e15237ab020a4312f8d9b62118c00929863f21c9459b060ade2501306cb95d403b8c1303095df43b", 0xf9}, {&(0x7f0000000b40)="541ac5ea60aeda744c268c48c83ed9665dc078835b63e75147868b35177d62a6e627832144defa6530112ae0206c295da74054fde93e9801ef4675a8b9521346ef0177b54f79e51241cf80336572b3b0cb09961418ba029f78580fd4fca8e3aae61d630bd9dc8bb1b08a800bb3f9719cfbce2c305b0430cc8f2fd95d5dcfa40b3d7ad3a5de0c8b1728880ee7a264a55bfdf7c5d21a29f7d637f6d16dab50b15780709da3d54093d0ec34fd0168658cf98811edd0fc6e599c2e2c700ef9a75907a2f53609c5659626dd9014bf8af9accdef77e9971339c37e26e00c3a1201f53ea5738374eb83c6eb54b5fdbb0b0914c1050092fee20bd0ebb258955abcb9", 0xfe}, {&(0x7f00000001c0)="284f8dfdf74fdbec2242cb1cfee1c5", 0xf}, {&(0x7f0000000c40)="56bff6ab89ef842abe23ca50a576c7eefd9a422821610ead02534c04b77a9ce2bcb0247477eb16d54ea738139ef7424bd446e8d992a2b357d4064b590c14d80036928bd0bf5e0b806250b63c99c041489338906320786aa80c5b2e90c166cf562f995f6c0c14fdcb31ebe7de6ce375558100ea00ae6e8fb73e6999304dba058cebbffbcff92522cd06a2187ac30eb9a6bd5990d0632beb5d538190a1bd45ec83d2c172f644c9475ad4e1f497b3a20180df9af44b237ce16e93bc504fa5ffe646ae4444f2b2903093d0a359ed10", 0xcd}], 0x7, 0x0, 0x0, 0x20000000}, {0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000000dc0)="57d6218a6f5efc83822d47db7dc4c2e2d74891d094e7416912fdb7d814c39eb3c53c0a152c2c0959a4cd6318a88bc5dd216b4b474e5f4cb2bc3e19990ba86c5c7b3210455d328c3913fbe5458e6e7a870a7498baaf0c965efc9130befb7dba4efab70cdf1ae9ae43f1c4f873b78da428151fb5b66132fa86250b68f2c521f339aa34ab310daa19f515001e02c11794f44b71bff1334172abf3674cf6d951dd3d6671440ef5120b5408c98bb6a97eea2899af5ed62de723eb4393a90704a00f75b50c67f14d39088a2d74dac33dd1724bd303a3436d287d3985682c", 0xdb}, {&(0x7f0000000ec0)="de9b4e81f679d2dadf95ed094f9ecfad10f6f87cef0c1048f01920f4b03c611a5423507ec9b8b9a2b746bd936ce94c5c07a6d1d22d0d185bdd0a4c35daaeb778209a0276a735c6cd9550a7f60c85c8c6e4c00c0d616a36853b26b0b3ac70594fb2512b734748db5b0dea465f892d9083a3bca51ff959f05297448e2f51a159c8035afe4ef5c84eb86a18a072be963150f95fc51fe669647475a6670c01ec4800b584f3030141f8827d31db4c2ed8bfb2bbcc7c282f5e6955d8fbbf6cddef1b9c033fb555591fc245804629268f4a09a7fec555297c4792b62e25aa4b4b155ffd91577dcb4c07", 0xe6}, {&(0x7f0000000fc0)="784130001b93e0999071cfd4c08dca410376a24b6fbd6efbcd3592c33dabaf9e9bb83f9f55be5ba3464aa8627fc2abbdc2be01d17ea41fcf9710a4670ba74b7ae12066daf93d272115241d76a096bf5cba320acb4d12a7a6edd70afcbd8b6199ec7ec892225e8179eb17deccbd0109a7c22d034af78d6463ba30e389eed0fef2d68acbaf99f21e9e93a403bba4db187fb4fbfa31b520621c2b7e137c4183c84f4f1bc7bc762d1e1d8ae53146dfc55d35f9d42b9d2a97abf5efad250229fb96907dcf4b35701a95d4c593a65f4f489058ce30ed1a66c8e4671e1847af39", 0xdd}, {&(0x7f00000010c0)="9ce2110eba51227d89168b4a29ee14cecedbdf43ba574d4586624cc00c355c627c6472176e44becdeda1ba6d9c81036865d8ff663b680e59028cc91b037ff29b745af98ca269717e858fc18004832fdff11146aba7eb4c98ac8184b01aa78db7bdc916c6cb5c354e9dbac0aa54c6e2d4329dcc64fa840042c8318ad92ade91e3f964445f7ea6104f781838ab0da001f88917250430be2b455f143999d5458fdce93caf3652e8c63a755ab3acd296ff18ef0bf67f7cecfb0d72c1e4", 0xbb}, {&(0x7f0000001180)="745d7dd0c6718e661b017d69c3fd50408a59dfa6599b51a16b2ea63fb78d5cd97ca593f285a1ca3723f25e90b5fcbb876c5f81d1b72e82f7a5c9694825f007eea82aa49e4215907748f64b8723c438400829c753e07040605caaeb80e314d93ff23ccc39e77c520251899e3fe6276ba6769ad0d722cc7f195b8cbe827295be6ede7985e597b34b951427c115ce08f24a61e947736f19656992850d82c54516da23457460373a6d3bf1f5f39772d6ad2d613944e6e3736212e1bc32e0f5378bf65bf9bf4d73cecc808d659ad2", 0xcc}], 0x5, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0xe83}], 0x30, 0x48000}], 0x3, 0x10) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000b", 0x10) sendmmsg$alg(r1, &(0x7f00000014c0)=[{0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=[@op={0x18, 0x117, 0x3, 0x1}], 0xfffffffffffffefc}], 0x1, 0x0) write(r1, &(0x7f0000000340)="791f7dfde0815c48c13197fc2e324deacdee8360e87bd43084d6d6437c203d53", 0x20) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f00000006c0)={0x8}, 0x1) alarm(0x3) recvmsg(r1, &(0x7f0000158000)={&(0x7f00002fffa0)=@nfc_llcp, 0x5c, &(0x7f0000000000)=[{&(0x7f000080f000)=""/4096, 0x1000}], 0x1, &(0x7f0000da2000)}, 0x0) [ 279.851571] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 279.858823] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000034 [ 279.866662] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry gssd [ 279.878091] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/04/10 10:28:08 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000002000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000019fe0)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) signalfd(r0, &(0x7f0000000100)={0x9}, 0x8) fcntl$setown(r0, 0x8, r1) r2 = memfd_create(&(0x7f0000000040)='-.[vmnet0^\x00', 0x0) pwritev(r2, &(0x7f0000000000)=[{&(0x7f0000012000)="ca", 0x1}], 0x1, 0x0) lseek(r2, 0x0, 0x4) close(r0) 2018/04/10 10:28:08 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/31, 0x1f}], 0x1) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000387000), 0x4) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) connect$unix(r1, &(0x7f00002ffff6)=@file={0x0, './file0\x00'}, 0xa) 2018/04/10 10:28:08 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x6}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000001c0)={0x0, 0xffffffff, 0x0, 0x400, 0xa86d, 0x8, 0x68, 0x404d59aa, {0x0, @in={{0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x7, 0x7, 0x2, 0x40, 0x2}}, &(0x7f00000000c0)=0xb0) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x800) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000100)={r1, @in={{0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x8, 0x9, 0x8001, 0x7, 0x45}, &(0x7f0000000400)=0x98) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000300)={0x0, 0x6}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000380)={0x0, 0x401}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f00000002c0)={r3}, &(0x7f0000000280)=0xfffffffffffffedf) 2018/04/10 10:28:08 executing program 2 (fault-call:5 fault-nth:53): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) 2018/04/10 10:28:08 executing program 0: link(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180)='./file0\x00') r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt(r0, 0x1, 0x14, &(0x7f0000e64ff7)="d7fdaf62070179890fddd5a45d3f32e5", 0x10) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x1d) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000080)={0x5, &(0x7f0000000040)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_RM_CTX(r1, 0xc0086421, &(0x7f00000000c0)={r2, 0x3}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cuse\x00', 0x400, 0x0) 2018/04/10 10:28:08 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='//control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000080)='./control/file1\x00') close(r0) 2018/04/10 10:28:08 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:28:08 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]]}, 0x178) [ 280.165666] FAULT_INJECTION: forcing a failure. [ 280.165666] name failslab, interval 1, probability 0, space 0, times 0 [ 280.177047] CPU: 1 PID: 20069 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 280.183987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 280.193349] Call Trace: [ 280.195944] dump_stack+0x1b9/0x294 [ 280.199588] ? dump_stack_print_info.cold.2+0x52/0x52 [ 280.204789] ? print_usage_bug+0xc0/0xc0 [ 280.208866] ? graph_lock+0x170/0x170 [ 280.212686] should_fail.cold.4+0xa/0x1a [ 280.216767] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 280.221890] ? graph_lock+0x170/0x170 [ 280.225701] ? graph_lock+0x170/0x170 [ 280.229514] ? find_held_lock+0x36/0x1c0 [ 280.233589] ? __lock_is_held+0xb5/0x140 [ 280.237673] ? check_same_owner+0x320/0x320 [ 280.242006] ? rcu_note_context_switch+0x710/0x710 [ 280.246951] __should_failslab+0x124/0x180 [ 280.251193] should_failslab+0x9/0x14 [ 280.254989] kmem_cache_alloc+0x2af/0x760 [ 280.259139] ? rpc_i_callback+0x30/0x30 [ 280.263108] rpc_alloc_inode+0x1a/0x20 [ 280.266989] alloc_inode+0x63/0x190 [ 280.270610] new_inode_pseudo+0x69/0x1a0 [ 280.274659] ? prune_icache_sb+0x1a0/0x1a0 [ 280.278883] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 280.283459] ? kasan_check_write+0x14/0x20 [ 280.287853] ? do_raw_spin_lock+0xc1/0x200 [ 280.292081] new_inode+0x1c/0x40 [ 280.295436] rpc_get_inode+0x1e/0x1f0 [ 280.299227] ? d_drop+0x5a/0x70 [ 280.302493] __rpc_create_common+0x5d/0x190 [ 280.306810] rpc_populate.constprop.16+0x11f/0x390 [ 280.311738] rpc_fill_super+0x3c9/0xbb0 [ 280.315723] ? cap_capable+0x1f9/0x260 [ 280.319600] ? rpc_pipe_release+0xb70/0xb70 [ 280.323914] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 280.329438] ? security_capable+0x99/0xc0 [ 280.333578] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 280.339104] ? ns_capable_common+0x13f/0x170 [ 280.343506] mount_ns+0x12a/0x1d0 [ 280.346948] ? rpc_pipe_release+0xb70/0xb70 [ 280.351261] rpc_mount+0x9e/0xd0 [ 280.354618] mount_fs+0xae/0x328 [ 280.357978] vfs_kern_mount.part.34+0xd4/0x4d0 [ 280.362551] ? may_umount+0xb0/0xb0 [ 280.366165] ? _raw_read_unlock+0x22/0x30 [ 280.370304] ? __get_fs_type+0x97/0xc0 [ 280.374199] do_mount+0x564/0x3070 [ 280.377734] ? copy_mount_string+0x40/0x40 [ 280.381960] ? rcu_pm_notify+0xc0/0xc0 [ 280.385843] ? copy_mount_options+0x5f/0x380 [ 280.390239] ? rcu_read_lock_sched_held+0x108/0x120 [ 280.395244] ? kmem_cache_alloc_trace+0x616/0x780 [ 280.400076] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 280.405604] ? _copy_from_user+0xdf/0x150 [ 280.409749] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 280.415271] ? copy_mount_options+0x285/0x380 [ 280.419763] ksys_mount+0x12d/0x140 [ 280.423386] SyS_mount+0x35/0x50 [ 280.426740] ? ksys_mount+0x140/0x140 [ 280.430536] do_syscall_64+0x29e/0x9d0 [ 280.434409] ? vmalloc_sync_all+0x30/0x30 [ 280.438546] ? _raw_spin_unlock_irq+0x27/0x70 [ 280.443040] ? finish_task_switch+0x1ca/0x820 [ 280.447529] ? syscall_return_slowpath+0x5c0/0x5c0 [ 280.452450] ? syscall_return_slowpath+0x30f/0x5c0 [ 280.457371] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 280.462729] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 280.467573] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 280.472749] RIP: 0033:0x455259 [ 280.475924] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 280.483622] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 [ 280.490877] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 [ 280.498132] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 [ 280.505387] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 2018/04/10 10:28:08 executing program 0: mkdir(&(0x7f0000cb3ff8)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chroot(&(0x7f000009a000)='./file0\x00') mount(&(0x7f00005b9ff8)='./file0\x00', &(0x7f0000edaff8)='./file0\x00', &(0x7f0000d9fffa)='msdos\x00', 0x1002, 0x0) chdir(&(0x7f0000cd2ff8)='./file0\x00') r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x200800, 0x0) ioctl$ASHMEM_GET_SIZE(r0, 0x7704, 0x0) umount2(&(0x7f0000000140)='..', 0x2) symlink(&(0x7f0000ed6ffe)='..', &(0x7f0000000040)='../file0\x00') open(&(0x7f0000000100)='../file0/file0\x00', 0x0, 0x0) 2018/04/10 10:28:08 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]]}, 0x178) [ 280.512644] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000035 [ 280.520125] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry gssd [ 280.541339] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/04/10 10:28:08 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:28:08 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000000)={r1, 0x4}, 0x8) 2018/04/10 10:28:08 executing program 2 (fault-call:5 fault-nth:54): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) 2018/04/10 10:28:09 executing program 0: mkdir(&(0x7f0000cb3ff8)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chroot(&(0x7f000009a000)='./file0\x00') mount(&(0x7f00005b9ff8)='./file0\x00', &(0x7f0000edaff8)='./file0\x00', &(0x7f0000d9fffa)='msdos\x00', 0x1002, 0x0) chdir(&(0x7f0000cd2ff8)='./file0\x00') r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x200800, 0x0) ioctl$ASHMEM_GET_SIZE(r0, 0x7704, 0x0) umount2(&(0x7f0000000140)='..', 0x2) symlink(&(0x7f0000ed6ffe)='..', &(0x7f0000000040)='../file0\x00') open(&(0x7f0000000100)='../file0/file0\x00', 0x0, 0x0) 2018/04/10 10:28:09 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]]}, 0x178) [ 280.717562] FAULT_INJECTION: forcing a failure. [ 280.717562] name failslab, interval 1, probability 0, space 0, times 0 [ 280.728977] CPU: 0 PID: 20103 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 280.735919] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 280.745279] Call Trace: [ 280.747889] dump_stack+0x1b9/0x294 [ 280.751544] ? dump_stack_print_info.cold.2+0x52/0x52 [ 280.756758] ? perf_trace_lock_acquire+0xe3/0x980 [ 280.761617] ? graph_lock+0x170/0x170 [ 280.765442] should_fail.cold.4+0xa/0x1a [ 280.769530] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 280.774648] ? zap_class+0x720/0x720 [ 280.778380] ? perf_trace_lock+0x900/0x900 [ 280.782625] ? graph_lock+0x170/0x170 [ 280.786437] ? find_held_lock+0x36/0x1c0 [ 280.790509] ? __lock_is_held+0xb5/0x140 [ 280.794574] ? ieee80211_recalc_smps_chanctx+0xf10/0x13f0 [ 280.800144] ? check_same_owner+0x320/0x320 [ 280.804478] ? rcu_note_context_switch+0x710/0x710 [ 280.809409] __should_failslab+0x124/0x180 [ 280.813632] should_failslab+0x9/0x14 [ 280.817421] kmem_cache_alloc+0x2af/0x760 [ 280.821561] ? rpc_i_callback+0x30/0x30 [ 280.825523] rpc_alloc_inode+0x1a/0x20 [ 280.829400] alloc_inode+0x63/0x190 [ 280.833018] new_inode_pseudo+0x69/0x1a0 [ 280.837072] ? prune_icache_sb+0x1a0/0x1a0 [ 280.841297] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 280.846050] ? kasan_check_write+0x14/0x20 [ 280.850280] ? do_raw_spin_lock+0xc1/0x200 [ 280.854506] new_inode+0x1c/0x40 [ 280.857861] rpc_get_inode+0x1e/0x1f0 [ 280.861652] ? d_drop+0x5a/0x70 [ 280.864920] __rpc_create_common+0x5d/0x190 [ 280.869235] rpc_populate.constprop.16+0x11f/0x390 [ 280.874161] rpc_fill_super+0x4c1/0xbb0 [ 280.878126] ? cap_capable+0x1f9/0x260 [ 280.882001] ? rpc_pipe_release+0xb70/0xb70 [ 280.886322] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 280.891846] ? security_capable+0x99/0xc0 [ 280.895985] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 280.901510] ? ns_capable_common+0x13f/0x170 [ 280.905910] mount_ns+0x12a/0x1d0 [ 280.909352] ? rpc_pipe_release+0xb70/0xb70 [ 280.913671] rpc_mount+0x9e/0xd0 [ 280.917034] mount_fs+0xae/0x328 [ 280.920398] vfs_kern_mount.part.34+0xd4/0x4d0 [ 280.924983] ? may_umount+0xb0/0xb0 [ 280.928600] ? _raw_read_unlock+0x22/0x30 [ 280.932737] ? __get_fs_type+0x97/0xc0 [ 280.936623] do_mount+0x564/0x3070 [ 280.940157] ? copy_mount_string+0x40/0x40 [ 280.944380] ? rcu_pm_notify+0xc0/0xc0 [ 280.948265] ? copy_mount_options+0x5f/0x380 [ 280.952666] ? rcu_read_lock_sched_held+0x108/0x120 [ 280.957675] ? kmem_cache_alloc_trace+0x616/0x780 [ 280.962514] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 280.968043] ? _copy_from_user+0xdf/0x150 [ 280.972190] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 280.977727] ? copy_mount_options+0x285/0x380 [ 280.982736] ksys_mount+0x12d/0x140 [ 280.986354] SyS_mount+0x35/0x50 [ 280.989711] ? ksys_mount+0x140/0x140 [ 280.993504] do_syscall_64+0x29e/0x9d0 [ 280.997381] ? vmalloc_sync_all+0x30/0x30 [ 281.001519] ? _raw_spin_unlock_irq+0x27/0x70 [ 281.006005] ? finish_task_switch+0x1ca/0x820 [ 281.010497] ? syscall_return_slowpath+0x5c0/0x5c0 [ 281.015416] ? syscall_return_slowpath+0x30f/0x5c0 [ 281.020339] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 281.025694] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 281.030536] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 281.035712] RIP: 0033:0x455259 [ 281.038888] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 281.046586] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 [ 281.053843] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 [ 281.061098] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 2018/04/10 10:28:09 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]]}, 0x178) [ 281.068355] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 281.075613] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000036 [ 281.083296] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry clntXX [ 281.100988] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory gssd 2018/04/10 10:28:09 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000002000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000019fe0)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) signalfd(r0, &(0x7f0000000100)={0x9}, 0x8) fcntl$setown(r0, 0x8, r1) r2 = memfd_create(&(0x7f0000000040)='-.[vmnet0^\x00', 0x0) pwritev(r2, &(0x7f0000000000)=[{&(0x7f0000012000)="ca", 0x1}], 0x1, 0x0) lseek(r2, 0x0, 0x4) close(r0) 2018/04/10 10:28:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x1d, &(0x7f0000001040)=""/4096, &(0x7f0000000000)=0x1000) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x484000, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) r2 = dup2(r0, r0) ioctl$TIOCMBIS(r2, 0x5416, &(0x7f0000000080)=0x8) 2018/04/10 10:28:09 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:28:09 executing program 2 (fault-call:5 fault-nth:55): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) 2018/04/10 10:28:09 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/31, 0x1f}], 0x1) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000387000), 0x4) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) connect$unix(r1, &(0x7f00002ffff6)=@file={0x0, './file0\x00'}, 0xa) 2018/04/10 10:28:09 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)="e52f636f6e74726f6c2f66696c653100", 0x0, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000080)='./control/file1\x00') close(r0) 2018/04/10 10:28:09 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]]}, 0x178) 2018/04/10 10:28:09 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000000), &(0x7f0000000040)=0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) [ 281.251008] FAULT_INJECTION: forcing a failure. [ 281.251008] name failslab, interval 1, probability 0, space 0, times 0 [ 281.262360] CPU: 1 PID: 20127 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 281.269290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 281.278650] Call Trace: [ 281.281261] dump_stack+0x1b9/0x294 [ 281.284911] ? dump_stack_print_info.cold.2+0x52/0x52 [ 281.290133] ? perf_trace_lock_acquire+0xe3/0x980 [ 281.294988] ? graph_lock+0x170/0x170 [ 281.298811] should_fail.cold.4+0xa/0x1a [ 281.302890] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 281.308014] ? perf_trace_lock+0x900/0x900 [ 281.312352] ? graph_lock+0x170/0x170 [ 281.316173] ? graph_lock+0x170/0x170 [ 281.319988] ? find_held_lock+0x36/0x1c0 [ 281.324068] ? __lock_is_held+0xb5/0x140 [ 281.328156] ? check_same_owner+0x320/0x320 [ 281.332493] ? rcu_note_context_switch+0x710/0x710 [ 281.337452] __should_failslab+0x124/0x180 [ 281.341707] should_failslab+0x9/0x14 [ 281.345523] kmem_cache_alloc+0x2af/0x760 2018/04/10 10:28:09 executing program 4: r0 = socket$inet6_sctp(0xa, 0x800000000003, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0xfffffffffffffe48) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:28:09 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]]}, 0x178) [ 281.349693] ? rpc_i_callback+0x30/0x30 [ 281.353686] rpc_alloc_inode+0x1a/0x20 [ 281.357584] alloc_inode+0x63/0x190 [ 281.362030] new_inode_pseudo+0x69/0x1a0 [ 281.366115] ? prune_icache_sb+0x1a0/0x1a0 [ 281.370360] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 281.374955] ? kasan_check_write+0x14/0x20 [ 281.379204] ? do_raw_spin_lock+0xc1/0x200 [ 281.383459] new_inode+0x1c/0x40 [ 281.386840] rpc_get_inode+0x1e/0x1f0 [ 281.390653] ? d_drop+0x5a/0x70 [ 281.393950] __rpc_create_common+0x5d/0x190 [ 281.398289] rpc_populate.constprop.16+0x1c6/0x390 [ 281.403249] rpc_fill_super+0x6ae/0xbb0 [ 281.407243] ? rpc_pipe_release+0xb70/0xb70 [ 281.411587] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 281.417138] ? security_capable+0x99/0xc0 [ 281.421303] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 281.426850] ? ns_capable_common+0x13f/0x170 [ 281.431266] mount_ns+0x12a/0x1d0 [ 281.434721] ? rpc_pipe_release+0xb70/0xb70 [ 281.439049] rpc_mount+0x9e/0xd0 [ 281.442422] mount_fs+0xae/0x328 [ 281.445806] vfs_kern_mount.part.34+0xd4/0x4d0 2018/04/10 10:28:09 executing program 4: r0 = memfd_create(&(0x7f0000000280)='^\x00', 0x2) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}}, &(0x7f0000000380)=0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000003c0)={r1, @in6={{0xa, 0x4e22, 0x3, @empty, 0x48ea}}, 0x6, 0x7, 0x4, 0x6}, &(0x7f0000000480)=0x98) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_inet_SIOCGIFDSTADDR(r2, 0x8917, &(0x7f0000000000)={'nr0\x00', {0x2, 0x4e23, @multicast1=0xe0000001}}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r2, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) r3 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x4, 0x105000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYBLOB="360000005364fcebd3251a007da210d7e38e5b58bef72a8fc5211560558e0ff8c870a7edcfee13e185f9e9d58900000000000000000000000000"], &(0x7f00000000c0)=0x3e) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000001c0)={r4, @in6={{0xa, 0x4e24, 0x80, @remote={0xfe, 0x80, [], 0xbb}, 0x235e}}, 0x384, 0x9, 0x9, 0x2, 0x2c}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:28:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x1d, &(0x7f0000001040)=""/4096, &(0x7f0000000000)=0x1000) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x484000, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) r2 = dup2(r0, r0) ioctl$TIOCMBIS(r2, 0x5416, &(0x7f0000000080)=0x8) [ 281.450395] ? may_umount+0xb0/0xb0 [ 281.454025] ? _raw_read_unlock+0x22/0x30 [ 281.458197] ? __get_fs_type+0x97/0xc0 [ 281.462092] do_mount+0x564/0x3070 [ 281.465642] ? copy_mount_string+0x40/0x40 [ 281.469888] ? rcu_pm_notify+0xc0/0xc0 [ 281.473793] ? copy_mount_options+0x5f/0x380 [ 281.478207] ? rcu_read_lock_sched_held+0x108/0x120 [ 281.483230] ? kmem_cache_alloc_trace+0x616/0x780 [ 281.488086] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 281.493630] ? _copy_from_user+0xdf/0x150 [ 281.497793] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 281.503338] ? copy_mount_options+0x285/0x380 [ 281.507845] ksys_mount+0x12d/0x140 [ 281.511476] SyS_mount+0x35/0x50 [ 281.514830] ? ksys_mount+0x140/0x140 [ 281.518620] do_syscall_64+0x29e/0x9d0 [ 281.522493] ? vmalloc_sync_all+0x30/0x30 [ 281.526629] ? _raw_spin_unlock_irq+0x27/0x70 [ 281.531125] ? finish_task_switch+0x1ca/0x820 [ 281.535607] ? syscall_return_slowpath+0x5c0/0x5c0 [ 281.540525] ? syscall_return_slowpath+0x30f/0x5c0 [ 281.545448] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 281.550803] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 281.555658] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 281.560830] RIP: 0033:0x455259 [ 281.564008] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 281.571714] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 [ 281.578972] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 [ 281.586228] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 [ 281.593483] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 2018/04/10 10:28:09 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]]}, 0x178) 2018/04/10 10:28:10 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) [ 281.600737] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000037 [ 281.608200] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry info [ 281.623247] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory clntXX 2018/04/10 10:28:10 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe2(&(0x7f0000000540)={0x0, 0x0}, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r5 = dup3(r4, r3, 0x0) pwritev(r2, &(0x7f00000004c0)=[{&(0x7f0000000080)="42b1daedfeb0a688c7500f5ad743a64fae16b46e0addea45a650913053e19b4e1317c6746c5579fcdc4ead70093854472d1d7c624ee3ecc93bc1a4ecdb9b0fc4740bf12953ec9e444bbccbf06b9fa9b76f8a0556dbd387fffdb0cc6d6c1ca96f5a5d4edbfec917f73629e110f52008479270ca28a362471514d7755677cbd3a477d2b2bf4898e534ba7f03c3eed75e9842f867d7493d6ff8", 0x98}, {&(0x7f0000000140)="8ba89396f422dee27c2865a7b89d3886741d079d375c0c1569a6fc16a8aa80b3a46556bf558770659bc6de30607890f337e74e61", 0x34}, {&(0x7f0000000180)="2bfccd927d454e2776627d4fd8597d5b9ad875d8143d338f311c6958d1b28680a9f64b976f1d5d50fc352f8e9f66c8d4c58c4746653b7e4c3d5fe0f508d4c68cf979eb4828efa5991f3927bd88387dea3591891680eb991d259c881d27aedb5b9b86e592f5faba14cf164f0c0ac1e0272e9d230c318bf8f8e6e96ca0d593ebaf58b562b58342066ed0f57967080290f75516c8860bd2dc1ed083afe726e5fd23686acf1f54b8dd3419cd093cd35954c17f954008041d24ef8156a5", 0xbb}, {&(0x7f0000000240)="43b6c6709cf5e03248848dc511165dddc95dabee628152990ec5c5104dcd1152ea02457a3b655a444f6b209b26af20c9d05ee2b5a652b0eb94c1bc2186eae5de1b90ce9edf0dc87d6cab28eef70893a053b0b382390ee70e1642ccb6636ea7e47a66a9a9", 0x64}, {&(0x7f00000002c0)="77c7482e941347355e65892158d4bf7b1a49cd16ed30294be7ba5f844dfe4b0a1cfcf24b8d704c6e4ffaf7c6dbdc38f5e00db12621ef036c0aa012fb32938f8d6cbd519943f1", 0x46}, {&(0x7f0000000340)="5b2921723af3e760efc884e1213a6b6c54eb9613fd560f98cd0670469293c5171d21ed2c2d6132a2606629cbcdbedf4f50abaf513f0d0a85d363f617826f62b302c9c234113b2fdf3c75ceb4ba83c73e127428a081dffbf78fecf1e65fb02543800a73082ad161c648ccd18dcf4a910281fd8780cc35f4b85c26210dc276ddbb392efb595ca3c91663245c46a24a7c36a541d217f15280cff61232aad69397dc62b1b2bf08a0519f566063a066a8f2baf66afeecf2abe91158257d0ecf00410b013ed89d448c266aab1f80e6661b88653cfb9de52e6d3e657731f27797a0d48ea2a70fe7f4b39a11e84c5d6adc80a833bdb03bb3f2d7a9cb72265bd99c84", 0xfe}, {&(0x7f0000000440)="45641e6d960b0968a1a9f0e0ca5f5a17d00eb0a11b303f7fd00c26d4dd576afa0cbbb46bd9899e56fe0885bd84f173ba1ff1e87a25a74d7acb500bc3ea07e69cd789289987d0972105befd133c1ef780dbb0", 0x52}], 0x7, 0x0) ioctl$KVM_SET_MSRS(r5, 0xc008ae88, &(0x7f0000000040)={0x1, 0x0, [{0x6e0}]}) 2018/04/10 10:28:10 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e21, 0x8, @mcast1={0xff, 0x1, [], 0x1}, 0x2503}, 0x1c) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r1, 0xc0a85322, &(0x7f0000000040)) 2018/04/10 10:28:10 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000002000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000019fe0)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) signalfd(r0, &(0x7f0000000100)={0x9}, 0x8) fcntl$setown(r0, 0x8, r1) r2 = memfd_create(&(0x7f0000000040)='-.[vmnet0^\x00', 0x0) pwritev(r2, &(0x7f0000000000)=[{&(0x7f0000012000)="ca", 0x1}], 0x1, 0x0) lseek(r2, 0x0, 0x4) close(r0) 2018/04/10 10:28:10 executing program 2 (fault-call:5 fault-nth:56): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) 2018/04/10 10:28:10 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]]}, 0x178) 2018/04/10 10:28:10 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000000)=0x8) 2018/04/10 10:28:10 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:28:10 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)="006400ecff0345") getdents64(r0, &(0x7f0000000100)=""/66, 0x42) getdents(r0, &(0x7f00000001c0)=""/249, 0xf9) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x7ff, 0x8}) getdents64(r0, &(0x7f0000000df0)=""/528, 0x7f355eb8) 2018/04/10 10:28:10 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)="2ee5636f6e74726f6c2f66696c653100", 0x0, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000080)='./control/file1\x00') close(r0) 2018/04/10 10:28:10 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setns(r1, 0xc000000) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x3, 0x4}) 2018/04/10 10:28:10 executing program 4: setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) [ 282.342427] FAULT_INJECTION: forcing a failure. [ 282.342427] name failslab, interval 1, probability 0, space 0, times 0 [ 282.353878] CPU: 1 PID: 20211 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 282.360815] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 282.370175] Call Trace: [ 282.372783] dump_stack+0x1b9/0x294 [ 282.376429] ? dump_stack_print_info.cold.2+0x52/0x52 [ 282.381642] ? perf_trace_lock_acquire+0xe3/0x980 [ 282.386497] ? graph_lock+0x170/0x170 2018/04/10 10:28:10 executing program 5: setrlimit(0x40000000000008, &(0x7f00000a3ff0)={0x23, 0x100000000020}) r0 = socket(0x40000000015, 0x5, 0x0) mlock2(&(0x7f0000912000/0x3000)=nil, 0x3000, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4000, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000040)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socket$inet6_dccp(0xa, 0x6, 0x0) setreuid(0x0, r2) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000080)) madvise(&(0x7f0000915000/0x3000)=nil, 0x3000, 0xf) mlock(&(0x7f0000914000/0x2000)=nil, 0x2000) 2018/04/10 10:28:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0xfffffffffffffffe) setsockopt$inet6_tcp_int(r1, 0x6, 0x1b, &(0x7f0000483ffc)=0x1, 0x1fd) sendto$inet6(r0, &(0x7f0000eb9fff), 0xfffffd65, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = accept4(r1, &(0x7f00003ad000)=ANY=[], &(0x7f00008f1ffc), 0x0) getsockopt$inet6_tcp_buf(r2, 0x6, 0x1c, &(0x7f0000000180)=""/106, &(0x7f0000000100)=0x1a2) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x1, 0x0) 2018/04/10 10:28:10 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x4e20, @loopback=0x7f000001}], 0x127) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) r1 = socket$inet(0x2, 0x2, 0x8) setsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000000)=0x80, 0x4) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) [ 282.390324] should_fail.cold.4+0xa/0x1a [ 282.394398] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 282.399517] ? perf_trace_lock+0x900/0x900 [ 282.403762] ? graph_lock+0x170/0x170 [ 282.407574] ? graph_lock+0x170/0x170 [ 282.411387] ? find_held_lock+0x36/0x1c0 [ 282.415461] ? __lock_is_held+0xb5/0x140 [ 282.419545] ? check_same_owner+0x320/0x320 [ 282.423878] ? rcu_note_context_switch+0x710/0x710 [ 282.428823] __should_failslab+0x124/0x180 [ 282.433071] should_failslab+0x9/0x14 [ 282.436877] kmem_cache_alloc+0x2af/0x760 2018/04/10 10:28:10 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x2000, 0x0) bind$ipx(r0, &(0x7f0000000040)={0x4, 0x8, 0x2, "e11d2c497f84", 0x5}, 0x10) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f0000000080)) write$binfmt_misc(r0, &(0x7f00000000c0)={'syz0', "00f94d0cc72df1ea48627b1fa5e5613f0c66487b9036858480785337838f41a01d221d412aa05fbf2735c67b2f01965255dfbcd8d81456a9091a5967315847f5a2e93af031b8a3172277b360e5e945c0f205f1baf101cb8a1b56fe525a29fe61473ada10b5a6d41e6c883ea83b0192e507b80d021d5377fc5527f4fe8e7aa2f948be199f"}, 0x88) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x6c, r1, 0x100, 0x70bd25, 0x25dfdbfc, {0xc}, [@IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x64}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'lo\x00'}]}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1a}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@ipv4={[], [0xff, 0xff]}}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40800) fcntl$getownex(r0, 0x10, &(0x7f0000000300)={0x0, 0x0}) wait4(r2, &(0x7f0000000340), 0x80000004, &(0x7f0000000380)) r3 = memfd_create(&(0x7f0000000440)='\x00', 0x0) chroot(&(0x7f0000000480)='./file0\x00') syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000500)) pwritev(r0, &(0x7f00000005c0)=[{&(0x7f0000000540)="8192a9b629647a2f04ac4bdcbac7008e9bcaf8903bebef6f01dee60fe8676d127778089ae3628f9f33c8abeb5e8e10920e5dedc042ff6a5a3722f0856892df919b961d989097894d465df47814759ea1c45b6200f6649beb8295229ed20ccad9804a1854cc32574c648f528d296992e89ec8a724b5af5b5b98f77363920fb276", 0x80}], 0x1, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000800)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x200800}, 0xc, &(0x7f00000007c0)={&(0x7f0000000680)={0x128, r4, 0x208, 0x70bd2d, 0x25dfdbfb, {0xe}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x19}}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2c}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@broadcast=0xffffffff}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_SERVICE={0x5c, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'fo\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1, 0x1d}}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x32faaef9}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x80000001}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x8}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xff}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xffffffffffffffff}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}]}, 0x128}, 0x1, 0x0, 0x0, 0x40}, 0x40000) connect$netrom(r0, &(0x7f0000000840)=@full={{0x3, {"507969a6baf2ec"}, 0x4}, [{"07043a1770cf87"}, {"cccf4b798bda76"}, {"a384ace606e6e5"}, {"85f02973fae9bf"}, {"89c64d47a0d857"}, {"61cdaf6d5a44b6"}, {"72ac081ca1b3aa"}, {"b18748088abf96"}]}, 0x48) getsockopt$inet_tcp_int(r0, 0x6, 0xe, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$TIOCSTI(r0, 0x5412, 0x8) ioctl$KVM_S390_UCAS_MAP(r0, 0x4018ae50, &(0x7f0000000940)={0xfffffffffffffee7, 0x2025400000000000, 0x1}) gettid() fstatfs(r0, &(0x7f0000000980)=""/251) ioctl$TCSBRKP(r0, 0x5425, 0x81) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000b00)=@req={0x6, 0xffffffff, 0x5, 0x7}, 0x10) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000b40)={@any=0xffffffff}) accept$ax25(r0, &(0x7f0000000b80), &(0x7f0000000bc0)=0x10) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000c00)=0x8, 0x4) r5 = getgid() ioctl$TUNSETGROUP(r3, 0x400454ce, r5) ioctl$TCSBRK(r0, 0x5409, 0x9) [ 282.441038] ? rpc_i_callback+0x30/0x30 [ 282.445024] rpc_alloc_inode+0x1a/0x20 [ 282.448916] alloc_inode+0x63/0x190 [ 282.452553] new_inode_pseudo+0x69/0x1a0 [ 282.456626] ? prune_icache_sb+0x1a0/0x1a0 [ 282.460868] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 282.465462] ? kasan_check_write+0x14/0x20 [ 282.469708] ? do_raw_spin_lock+0xc1/0x200 [ 282.473955] new_inode+0x1c/0x40 [ 282.477330] rpc_get_inode+0x1e/0x1f0 [ 282.481144] ? d_drop+0x5a/0x70 [ 282.484432] __rpc_create_common+0x5d/0x190 [ 282.488768] rpc_populate.constprop.16+0x11f/0x390 [ 282.493730] rpc_fill_super+0x4c1/0xbb0 [ 282.493757] ? cap_capable+0x1f9/0x260 [ 282.501623] ? rpc_pipe_release+0xb70/0xb70 [ 282.505971] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 282.505988] ? security_capable+0x99/0xc0 [ 282.506006] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 282.506022] ? ns_capable_common+0x13f/0x170 [ 282.506040] mount_ns+0x12a/0x1d0 [ 282.506055] ? rpc_pipe_release+0xb70/0xb70 [ 282.506072] rpc_mount+0x9e/0xd0 [ 282.506088] mount_fs+0xae/0x328 [ 282.506112] vfs_kern_mount.part.34+0xd4/0x4d0 [ 282.506131] ? may_umount+0xb0/0xb0 [ 282.506148] ? _raw_read_unlock+0x22/0x30 [ 282.506164] ? __get_fs_type+0x97/0xc0 [ 282.506183] do_mount+0x564/0x3070 [ 282.506204] ? copy_mount_string+0x40/0x40 [ 282.506223] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 282.506245] ? retint_kernel+0x10/0x10 [ 282.506274] ? __sanitizer_cov_trace_const_cmp2+0x20/0x20 [ 282.506291] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 282.506308] ? copy_mount_options+0x285/0x380 [ 282.506326] ksys_mount+0x12d/0x140 [ 282.506343] SyS_mount+0x35/0x50 [ 282.506356] ? ksys_mount+0x140/0x140 [ 282.506374] do_syscall_64+0x29e/0x9d0 [ 282.506387] ? vmalloc_sync_all+0x30/0x30 [ 282.506405] ? kasan_check_write+0x14/0x20 [ 282.611391] ? syscall_return_slowpath+0x5c0/0x5c0 [ 282.616308] ? syscall_return_slowpath+0x30f/0x5c0 [ 282.621230] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 282.626586] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 282.631425] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 282.636601] RIP: 0033:0x455259 2018/04/10 10:28:11 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]]}, 0x178) 2018/04/10 10:28:11 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000340)=ANY=[@ANYBLOB="269cf8f0203c", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000240)=0x8) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000de9000)=[@text32={0x20, &(0x7f0000f59fc6)="0fc75fedc4c3c968fb6c0f9cfbb9040100c00f3266b842008ee80f230064672ec015dec4e245bea5d41e6082f9440f20c03506000000440f22c0", 0x3a}], 0x1, 0x0, &(0x7f0000000180), 0x1ba) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 282.639777] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 282.647472] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 [ 282.654724] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 [ 282.661974] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 [ 282.669225] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 282.676476] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000038 [ 282.683915] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry clntXX 2018/04/10 10:28:11 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e23, @rand_addr=0x10001}}}, &(0x7f00000000c0)=0x84) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000100)={r1, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) [ 282.741267] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory gssd 2018/04/10 10:28:11 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000002000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000019fe0)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) signalfd(r0, &(0x7f0000000100)={0x9}, 0x8) fcntl$setown(r0, 0x8, r1) r2 = memfd_create(&(0x7f0000000040)='-.[vmnet0^\x00', 0x0) lseek(r2, 0x0, 0x4) ftruncate(r2, 0x0) close(r0) 2018/04/10 10:28:11 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:28:11 executing program 2 (fault-call:5 fault-nth:57): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) 2018/04/10 10:28:11 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x3, @loopback={0x0, 0x1}}, 0x1c) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rfkill\x00', 0x28000, 0x0) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f0000000300)='ppp0\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0xbe, "c81880dfdf590d5fe2a6f4c96cb3061a6522818e3ccd9bff37f59746bb0c8e553c19a90f819562fcbc1b955985107dd9f0e4a3fdc269900f7636055b02791f985451ca1ffec31a3e288286f1b24f35c896fa89752d7fe72cb1e6cdc3f66a2d410e443b82bfcca8f1da604dde02f38277a879b37c9855aa71a34131ff7448ab5b0570fd2ebed6c18209616946b7523c15ad686522eec4406ac2dd4408caa97e7452de8b45b689228bf8733f82b1fc13ef89c81c9aabf45a21d53817c1f31d"}, &(0x7f0000000100)=0xc6) ioctl$sock_bt(r1, 0x8906, &(0x7f0000000280)="ab66dd6f63005db69b542a916a21990e897bf0c1f0b262cafa1b7fca6f73aa2cf3dfacb7eb69") setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f00000001c0)={r2, 0x2}, 0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) membarrier(0x2, 0x0) 2018/04/10 10:28:11 executing program 5: r0 = perf_event_open(&(0x7f0000001f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000f1f000/0x2000)=nil, 0x2000, 0xa, 0x11, r0, 0x0) syz_open_dev$vcsn(&(0x7f0000f1fff6)='/dev/vcs#\x00', 0x7, 0x0) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x3) 2018/04/10 10:28:11 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]]}, 0x178) 2018/04/10 10:28:11 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/mcfilter\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000000)={0x0, 0x3c, "ce5b4eb38c0c09f39ccdee79562175286fd5da15338d00a5979488d103ec9b882241baa61079837ace9f0d480632be84c0c91294573d2ae5c5227ebf"}, &(0x7f0000000c80)=0x44) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000cc0)={r1}, &(0x7f0000000d80)=0x8) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000000c0)=0x0) r3 = socket$packet(0x11, 0x3, 0x300) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000dc0)={{{@in6=@mcast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000ec0)=0xe8) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000f00)={'eql\x00', r4}) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000c00)=@filter={'filter\x00', 0xe, 0x5, 0xa78, [0x0, 0x20000180, 0x200002d0, 0x200006e0], 0x0, &(0x7f0000000100), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0xaf0) syz_open_procfs(r2, &(0x7f0000000140)='net/psched\x00') setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000d00)=[@in={0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e22, 0x9, @mcast1={0xff, 0x1, [], 0x1}, 0x3}, @in={0x2, 0x4e21, @multicast1=0xe0000001}, @in={0x2, 0x4e21, @rand_addr=0xa09f}, @in6={0xa, 0x4e20, 0x101, @mcast1={0xff, 0x1, [], 0x1}}], 0x78) 2018/04/10 10:28:11 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./.ontrol/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000080)='./control/file1\x00') close(r0) [ 283.176261] FAULT_INJECTION: forcing a failure. [ 283.176261] name failslab, interval 1, probability 0, space 0, times 0 [ 283.187921] CPU: 0 PID: 20262 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 283.194858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.204217] Call Trace: [ 283.206823] dump_stack+0x1b9/0x294 [ 283.210472] ? dump_stack_print_info.cold.2+0x52/0x52 [ 283.215678] ? perf_trace_lock_acquire+0xe3/0x980 [ 283.220546] should_fail.cold.4+0xa/0x1a [ 283.224622] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 283.229741] ? graph_lock+0x170/0x170 [ 283.233554] ? debug_check_no_locks_freed+0x310/0x310 [ 283.238761] ? find_held_lock+0x36/0x1c0 [ 283.242839] ? __lock_is_held+0xb5/0x140 [ 283.246913] ? check_same_owner+0x320/0x320 [ 283.251225] ? rcu_note_context_switch+0x710/0x710 [ 283.256141] ? lock_downgrade+0x8e0/0x8e0 [ 283.260281] __should_failslab+0x124/0x180 [ 283.264508] should_failslab+0x9/0x14 [ 283.268294] kmem_cache_alloc+0x2af/0x760 [ 283.272437] __d_alloc+0xc1/0xc00 [ 283.275890] ? shrink_dcache_for_umount+0x290/0x290 [ 283.280896] ? d_alloc_parallel+0x1e80/0x1e80 [ 283.285380] ? lock_release+0xa10/0xa10 [ 283.289342] ? mark_held_locks+0xc9/0x160 [ 283.293479] ? d_lookup+0x254/0x330 [ 283.297096] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 283.302099] ? d_lookup+0x219/0x330 [ 283.305724] d_alloc+0x8e/0x370 [ 283.308994] ? __d_alloc+0xc00/0xc00 [ 283.312699] ? full_name_hash+0xc0/0x100 [ 283.316755] __rpc_lookup_create_exclusive+0x18b/0x1e0 [ 283.322029] ? down_write_nested+0x8b/0x120 [ 283.326337] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 283.330559] ? _down_write_nest_lock+0x120/0x120 [ 283.335309] rpc_mkpipe_dentry+0xf6/0x3a0 [ 283.339450] rpc_fill_super+0x6e5/0xbb0 [ 283.343419] ? rpc_pipe_release+0xb70/0xb70 [ 283.347733] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 283.353256] ? security_capable+0x99/0xc0 [ 283.357395] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 283.362930] ? ns_capable_common+0x13f/0x170 [ 283.367330] mount_ns+0x12a/0x1d0 [ 283.370769] ? rpc_pipe_release+0xb70/0xb70 [ 283.375076] rpc_mount+0x9e/0xd0 [ 283.378429] mount_fs+0xae/0x328 [ 283.381792] vfs_kern_mount.part.34+0xd4/0x4d0 [ 283.386363] ? may_umount+0xb0/0xb0 [ 283.389978] ? _raw_read_unlock+0x22/0x30 [ 283.394123] ? __get_fs_type+0x97/0xc0 [ 283.398001] do_mount+0x564/0x3070 [ 283.401541] ? copy_mount_string+0x40/0x40 [ 283.405763] ? rcu_pm_notify+0xc0/0xc0 [ 283.409650] ? copy_mount_options+0x5f/0x380 [ 283.414048] ? rcu_read_lock_sched_held+0x108/0x120 [ 283.419051] ? kmem_cache_alloc_trace+0x616/0x780 [ 283.423891] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 283.429414] ? copy_mount_options+0x285/0x380 [ 283.433901] ksys_mount+0x12d/0x140 [ 283.437519] SyS_mount+0x35/0x50 [ 283.440872] ? ksys_mount+0x140/0x140 [ 283.444663] do_syscall_64+0x29e/0x9d0 [ 283.448536] ? vmalloc_sync_all+0x30/0x30 [ 283.452670] ? _raw_spin_unlock_irq+0x27/0x70 [ 283.457154] ? finish_task_switch+0x1ca/0x820 [ 283.461636] ? syscall_return_slowpath+0x5c0/0x5c0 [ 283.466555] ? syscall_return_slowpath+0x30f/0x5c0 [ 283.471481] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 283.476833] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 283.481669] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 283.486841] RIP: 0033:0x455259 [ 283.490021] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 283.497719] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 [ 283.504976] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 [ 283.512231] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 [ 283.519484] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 283.526738] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000039 2018/04/10 10:28:12 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000002000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000019fe0)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) signalfd(r0, &(0x7f0000000100)={0x9}, 0x8) fcntl$setown(r0, 0x8, r1) pwritev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000012000)="ca", 0x1}], 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x4) ftruncate(0xffffffffffffffff, 0x0) close(r0) 2018/04/10 10:28:12 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@multicast2=0xe0000002, @in6=@local={0xfe, 0x80, [], 0xaa}, 0x4e21, 0x8, 0x4e20, 0x100, 0x2, 0x80, 0x2d7a69070461d526, 0x88, 0x0, r1}, {0x0, 0xa, 0x8, 0x2, 0x200, 0x84a1, 0x5, 0x200}, {0xb4, 0x7, 0x8, 0x1000}, 0x6, 0x6e6bba, 0x2, 0x0, 0x2}, {{@in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, 0x4d4, 0x32}, 0x2, @in=@multicast2=0xe0000002, 0x3505, 0x4, 0x3, 0x8, 0x100000001, 0x10001, 0x71}}, 0xe8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:28:12 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 2018/04/10 10:28:12 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x709000)=nil, 0x709000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000040)='bdev*ppp0\x00', 0x2f15a8ab8ca5e565) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f0000000080)={0x81, 0x0, [0x7, 0x469, 0x59d, 0x1]}) mbind(&(0x7f0000321000/0x3000)=nil, 0x3000, 0x3, &(0x7f0000a66ff8)=0x215, 0x435, 0x2) 2018/04/10 10:28:12 executing program 2 (fault-call:5 fault-nth:58): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) 2018/04/10 10:28:12 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000001c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='.//ontrol/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000080)='./control/file1\x00') close(r0) 2018/04/10 10:28:12 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]]}, 0x178) 2018/04/10 10:28:12 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x202}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x13, 0x5330, 0x6f2000, &(0x7f00000003c0)) 2018/04/10 10:28:12 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000002000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000019fe0)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) signalfd(r0, &(0x7f0000000100)={0x9}, 0x8) r1 = memfd_create(&(0x7f0000000040)='-.[vmnet0^\x00', 0x0) pwritev(r1, &(0x7f0000000000)=[{&(0x7f0000012000)="ca", 0x1}], 0x1, 0x0) lseek(r1, 0x0, 0x4) ftruncate(r1, 0x0) close(r0) [ 284.559650] FAULT_INJECTION: forcing a failure. [ 284.559650] name failslab, interval 1, probability 0, space 0, times 0 [ 284.571098] CPU: 1 PID: 20320 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 284.578038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 284.587398] Call Trace: [ 284.589982] dump_stack+0x1b9/0x294 [ 284.593601] ? dump_stack_print_info.cold.2+0x52/0x52 [ 284.598783] ? perf_trace_lock_acquire+0xe3/0x980 [ 284.603614] ? graph_lock+0x170/0x170 [ 284.607411] should_fail.cold.4+0xa/0x1a [ 284.611470] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 284.616563] ? zap_class+0x720/0x720 [ 284.620268] ? perf_trace_lock+0x900/0x900 [ 284.624493] ? graph_lock+0x170/0x170 [ 284.628292] ? find_held_lock+0x36/0x1c0 [ 284.632347] ? __lock_is_held+0xb5/0x140 [ 284.636409] ? check_same_owner+0x320/0x320 [ 284.640724] ? rcu_note_context_switch+0x710/0x710 [ 284.645647] __should_failslab+0x124/0x180 [ 284.649875] should_failslab+0x9/0x14 [ 284.653661] kmem_cache_alloc+0x2af/0x760 [ 284.657809] ? rpc_i_callback+0x30/0x30 [ 284.661769] rpc_alloc_inode+0x1a/0x20 [ 284.665642] alloc_inode+0x63/0x190 [ 284.669256] new_inode_pseudo+0x69/0x1a0 [ 284.673312] ? prune_icache_sb+0x1a0/0x1a0 [ 284.677542] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 284.682117] ? kasan_check_write+0x14/0x20 [ 284.686339] ? do_raw_spin_lock+0xc1/0x200 [ 284.690602] new_inode+0x1c/0x40 [ 284.693957] rpc_get_inode+0x1e/0x1f0 [ 284.697742] ? d_drop+0x5a/0x70 [ 284.701009] __rpc_create_common+0x5d/0x190 [ 284.705329] rpc_mkpipe_dentry+0x14f/0x3a0 [ 284.709559] rpc_fill_super+0x6e5/0xbb0 [ 284.713524] ? rpc_pipe_release+0xb70/0xb70 [ 284.717839] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 284.723507] ? security_capable+0x99/0xc0 [ 284.727646] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 284.733170] ? ns_capable_common+0x13f/0x170 [ 284.737572] mount_ns+0x12a/0x1d0 [ 284.741014] ? rpc_pipe_release+0xb70/0xb70 [ 284.745332] rpc_mount+0x9e/0xd0 [ 284.748686] mount_fs+0xae/0x328 [ 284.752051] vfs_kern_mount.part.34+0xd4/0x4d0 [ 284.756625] ? may_umount+0xb0/0xb0 [ 284.760242] ? _raw_read_unlock+0x22/0x30 [ 284.764386] ? __get_fs_type+0x97/0xc0 [ 284.768268] do_mount+0x564/0x3070 [ 284.771801] ? copy_mount_string+0x40/0x40 [ 284.776032] ? rcu_pm_notify+0xc0/0xc0 [ 284.779920] ? copy_mount_options+0x5f/0x380 [ 284.784325] ? rcu_read_lock_sched_held+0x108/0x120 [ 284.789327] ? kmem_cache_alloc_trace+0x616/0x780 [ 284.794161] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 284.799683] ? _copy_from_user+0xdf/0x150 [ 284.803914] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 284.809443] ? copy_mount_options+0x285/0x380 [ 284.813937] ksys_mount+0x12d/0x140 [ 284.817552] SyS_mount+0x35/0x50 [ 284.820905] ? ksys_mount+0x140/0x140 [ 284.824696] do_syscall_64+0x29e/0x9d0 [ 284.828570] ? vmalloc_sync_all+0x30/0x30 [ 284.832706] ? _raw_spin_unlock_irq+0x27/0x70 [ 284.837191] ? finish_task_switch+0x1ca/0x820 [ 284.841676] ? syscall_return_slowpath+0x5c0/0x5c0 [ 284.846594] ? syscall_return_slowpath+0x30f/0x5c0 [ 284.851519] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 284.856877] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 284.861716] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 284.866891] RIP: 0033:0x455259 [ 284.870069] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 284.877769] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 [ 284.885031] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 [ 284.892290] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 [ 284.899546] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 2018/04/10 10:28:13 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:28:13 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]]}, 0x178) 2018/04/10 10:28:13 executing program 5: perf_event_open(&(0x7f0000d2af88)={0x2, 0x70, 0xff66, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x2, 0x4) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f00000001c0)={0x2, &(0x7f0000000080)=[{}, {}]}) connect$llc(r0, &(0x7f0000000200)={0x1a, 0x33e, 0x4f, 0x0, 0x3, 0x7, @random="fee34b86fb1f"}, 0x10) 2018/04/10 10:28:13 executing program 7: perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8980, &(0x7f0000000200)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) [ 284.906799] R13: 00000000000003fb R14: 00000000006f9028 R15: 000000000000003a [ 284.914277] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry gssd [ 284.936726] net/sunrpc/rpc_pipe.c: rpc_mkpipe_dentry() failed to create pipe clntXX/gssd (errno = -12) 2018/04/10 10:28:13 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000000c0)='./file1\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000000240)="63189968a303517f708dd7536325e643de47628188c4f57857ed06a05aa8ee4222f3177cb22bad02f340c0349102dc23f523619ff63ca200301057ee5440230f7651605c408050875bf5f8a8c4ce86d4753c19d1602f28ed244e7bc32770738ac535972c321359ecb76b204e89de19cf3f1ffe04cca00ea5dc35e010c551c84b1353d6cefd8ae0703e4fc32b281c7737f06110635cfc1eab942da93e45007cbb58637eab96aa5374b88e9b1d14775cb706474728e65270db733940152eccdf06123ddf628e9d46147b427955f95cc92e3040ae6f", 0xd4}, {&(0x7f0000000400)}], 0x0, &(0x7f00000001c0)) syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f00000008c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB='codepage=864']) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xbb7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000270027000f8", 0x16}], 0x0, &(0x7f0000000e80)=ANY=[]) open$dir(&(0x7f0000000300)="2e2f66696c65302f66696c6530f6", 0x40, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000600)=""/187) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x7f, 0x200000) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 2018/04/10 10:28:13 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]]}, 0x178) 2018/04/10 10:28:13 executing program 4: r0 = socket$inet6_sctp(0xa, 0x2, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/10 10:28:13 executing program 2 (fault-call:5 fault-nth:59): perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair(0x17, 0x0, 0x0, &(0x7f0000000380)) 2018/04/10 10:28:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000000c0)) setsockopt$inet6_tcp_int(r0, 0x6, 0x5, &(0x7f0000d17ffc)=0x5, 0x4) pwritev(r0, &(0x7f0000000240)=[{&(0x7f0000000100)="9faa13297f56a04ecbdeca5369bcb214bc71c06599d9058f374c7d054ffcca008be02d3cbc7be6f8a0662f7d8d3210a7375223e2b334f3d96edd7706f1a6f0f2a8b284f013855b28b5d20fd6dd8a53f15e10eac1b93cd013dd8f5cba5a144f1b6ae10d165c01cb592d8c615f4307", 0x6e}, {&(0x7f0000000180)="de9d7592b27684b771ca968646319eca0b8d54beedd182500793fcee33f7ba455652753afc5e401b636514887933125a8be3f9ca007dbe5ae65ec94cc59bc93b3b16afb0a84986cb26d619eb8f39b2acbbc6de6804f3e5cad23cc5af7b8c2c8dde320484bdf4962d6a4bacc217de0bd1dc64400da446fd56cfec5bb319635719432b5ac3ef253751da047f56acadcc6f6202c523137bdad5c5521412af1f5d", 0x9f}], 0x2, 0x0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000000)={0x0, @loopback, @remote}, &(0x7f0000000040)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'team0\x00', r1}) getsockopt$inet6_tcp_int(r0, 0x6, 0x5, &(0x7f00001dcffc), &(0x7f0000d21ffc)=0x4) [ 285.133434] FAULT_INJECTION: forcing a failure. [ 285.133434] name failslab, interval 1, probability 0, space 0, times 0 [ 285.145136] CPU: 0 PID: 20349 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 285.152072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.161435] Call Trace: [ 285.164050] dump_stack+0x1b9/0x294 [ 285.167703] ? dump_stack_print_info.cold.2+0x52/0x52 [ 285.172908] ? perf_trace_lock_acquire+0xe3/0x980 [ 285.177739] ? print_usage_bug+0xc0/0xc0 [ 285.181796] should_fail.cold.4+0xa/0x1a [ 285.185935] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 285.191037] ? graph_lock+0x170/0x170 [ 285.194829] ? find_held_lock+0x36/0x1c0 [ 285.198892] ? __lock_is_held+0xb5/0x140 [ 285.202952] ? check_same_owner+0x320/0x320 [ 285.207291] ? rcu_note_context_switch+0x710/0x710 [ 285.212208] ? lock_downgrade+0x8e0/0x8e0 [ 285.216347] __should_failslab+0x124/0x180 [ 285.220570] should_failslab+0x9/0x14 [ 285.224363] kmem_cache_alloc+0x2af/0x760 [ 285.228510] __d_alloc+0xc1/0xc00 [ 285.231955] ? shrink_dcache_for_umount+0x290/0x290 [ 285.236960] ? d_alloc_parallel+0x1e80/0x1e80 [ 285.241441] ? lock_release+0xa10/0xa10 [ 285.245406] ? mark_held_locks+0xc9/0x160 [ 285.249538] ? d_lookup+0x254/0x330 [ 285.253155] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 285.258153] ? d_lookup+0x219/0x330 [ 285.261774] d_alloc+0x8e/0x370 [ 285.265046] ? __d_alloc+0xc00/0xc00 [ 285.268745] ? full_name_hash+0xc0/0x100 [ 285.272799] __rpc_lookup_create_exclusive+0x18b/0x1e0 [ 285.278061] ? down_write_nested+0x8b/0x120 [ 285.282367] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 285.286587] ? _down_write_nest_lock+0x120/0x120 [ 285.291328] ? rpc_d_lookup_sb+0x115/0x1a0 [ 285.295553] rpc_mkpipe_dentry+0xf6/0x3a0 [ 285.299694] nfs4blocklayout_register_sb+0x4b/0x70 [ 285.304611] rpc_pipefs_event+0x38d/0x570 [ 285.308746] ? bl_pipe_downcall+0x490/0x490 [ 285.313059] ? rcu_note_context_switch+0x710/0x710 [ 285.317992] notifier_call_chain+0x178/0x380 [ 285.322396] ? unregister_die_notifier+0x20/0x20 [ 285.327139] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 285.332322] ? _raw_spin_unlock+0x22/0x30 [ 285.336468] blocking_notifier_call_chain+0x139/0x170 [ 285.341650] ? srcu_init_notifier_head+0xa0/0xa0 [ 285.346402] rpc_fill_super+0x5a0/0xbb0 [ 285.350371] ? rpc_pipe_release+0xb70/0xb70 [ 285.354686] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 285.360228] ? security_capable+0x99/0xc0 [ 285.364375] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 285.369899] ? ns_capable_common+0x13f/0x170 [ 285.374299] mount_ns+0x12a/0x1d0 [ 285.377743] ? rpc_pipe_release+0xb70/0xb70 [ 285.382054] rpc_mount+0x9e/0xd0 [ 285.385410] mount_fs+0xae/0x328 [ 285.389036] vfs_kern_mount.part.34+0xd4/0x4d0 [ 285.393613] ? may_umount+0xb0/0xb0 [ 285.397227] ? _raw_read_unlock+0x22/0x30 [ 285.401364] ? __get_fs_type+0x97/0xc0 [ 285.405241] do_mount+0x564/0x3070 [ 285.408785] ? copy_mount_string+0x40/0x40 [ 285.413008] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 285.418025] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 285.422775] ? retint_kernel+0x10/0x10 [ 285.426659] ? copy_mount_options+0x1f0/0x380 [ 285.431141] ? copy_mount_options+0x1f6/0x380 [ 285.435626] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 285.441146] ? copy_mount_options+0x285/0x380 [ 285.445628] ksys_mount+0x12d/0x140 [ 285.449243] SyS_mount+0x35/0x50 [ 285.452591] ? ksys_mount+0x140/0x140 [ 285.456379] do_syscall_64+0x29e/0x9d0 [ 285.460251] ? vmalloc_sync_all+0x30/0x30 [ 285.464386] ? _raw_spin_unlock_irq+0x27/0x70 [ 285.468871] ? finish_task_switch+0x1ca/0x820 [ 285.473354] ? syscall_return_slowpath+0x5c0/0x5c0 [ 285.478271] ? syscall_return_slowpath+0x30f/0x5c0 [ 285.483192] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 285.488547] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 285.493384] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 285.498558] RIP: 0033:0x455259 [ 285.501731] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 285.509425] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 [ 285.516681] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 [ 285.523936] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 2018/04/10 10:28:13 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x143101) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x400}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]]}, 0x178) [ 285.531951] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 285.539206] R13: 00000000000003fb R14: 00000000006f9028 R15: 000000000000003b [ 285.572336] FAT-fs (loop0): bogus number of reserved sectors [ 285.578326] FAT-fs (loop0): Can't find a valid FAT filesystem [ 285.622033] list_del corruption. prev->next should be 0000000026a53ec9, but was 00000000b17637a1 [ 285.632341] ------------[ cut here ]------------ [ 285.637109] kernel BUG at lib/list_debug.c:53! [ 285.641757] invalid opcode: 0000 [#1] SMP KASAN [ 285.646419] Dumping ftrace buffer: [ 285.649948] (ftrace buffer empty) [ 285.653652] Modules linked in: [ 285.656852] CPU: 0 PID: 20349 Comm: syz-executor2 Not tainted 4.16.0+ #15 [ 285.663771] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.673137] RIP: 0010:__list_del_entry_valid.cold.1+0x48/0x58 [ 285.679018] RSP: 0018:ffff8801b44bf700 EFLAGS: 00010282 [ 285.684375] RAX: 0000000000000054 RBX: ffff8801838620f0 RCX: 0000000000000000 [ 285.691631] RDX: 0000000000000054 RSI: ffffffff815f8fa1 RDI: ffffed0036897ed6 [ 285.698876] RBP: ffff8801b44bf718 R08: ffff8801b37c2240 R09: ffffed003b604f90 [ 285.706128] R10: ffffed003b604f90 R11: ffff8801db027c87 R12: ffff880183862aa0 [ 285.713395] R13: ffff880183862bf0 R14: ffff8801b44bf7f0 R15: dffffc0000000000 [ 285.720655] FS: 00007f84a5911700(0000) GS:ffff8801db000000(0000) knlGS:0000000000000000 [ 285.728861] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 285.734720] CR2: 00007f101b6e1000 CR3: 00000001cf960000 CR4: 00000000001406f0 [ 285.741972] DR0: 0000000020000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 285.749221] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 00000000000f0602 [ 285.756466] Call Trace: [ 285.759045] __dentry_kill+0x29e/0x770 [ 285.762919] ? check_and_drop+0x1b0/0x1b0 [ 285.767061] ? do_raw_spin_lock+0x200/0x200 [ 285.771377] ? kasan_check_read+0x11/0x20 [ 285.775510] ? rcu_is_watching+0x85/0x140 [ 285.779637] dentry_kill+0xc9/0x5a0 [ 285.783247] dput.part.26+0x648/0x7b0 [ 285.787036] ? shrink_dcache_sb+0x350/0x350 [ 285.791339] ? rpc_show_info+0x4c0/0x4c0 [ 285.795381] dput+0x1f/0x30 [ 285.798293] rpc_fill_super+0x882/0xbb0 [ 285.802244] ? rpc_pipe_release+0xb70/0xb70 [ 285.806550] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 285.812070] ? security_capable+0x99/0xc0 [ 285.816200] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 285.821725] ? ns_capable_common+0x13f/0x170 [ 285.826119] mount_ns+0x12a/0x1d0 [ 285.829558] ? rpc_pipe_release+0xb70/0xb70 [ 285.833855] rpc_mount+0x9e/0xd0 [ 285.837200] mount_fs+0xae/0x328 [ 285.840546] vfs_kern_mount.part.34+0xd4/0x4d0 [ 285.845116] ? may_umount+0xb0/0xb0 [ 285.848733] ? _raw_read_unlock+0x22/0x30 [ 285.852871] ? __get_fs_type+0x97/0xc0 [ 285.856735] do_mount+0x564/0x3070 [ 285.860255] ? copy_mount_string+0x40/0x40 [ 285.864477] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 285.869484] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 285.874220] ? retint_kernel+0x10/0x10 [ 285.878096] ? copy_mount_options+0x1f0/0x380 [ 285.882568] ? copy_mount_options+0x1f6/0x380 [ 285.887044] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 285.892561] ? copy_mount_options+0x285/0x380 [ 285.897044] ksys_mount+0x12d/0x140 [ 285.900658] SyS_mount+0x35/0x50 [ 285.904004] ? ksys_mount+0x140/0x140 [ 285.907807] do_syscall_64+0x29e/0x9d0 [ 285.911684] ? vmalloc_sync_all+0x30/0x30 [ 285.915813] ? _raw_spin_unlock_irq+0x27/0x70 [ 285.920294] ? finish_task_switch+0x1ca/0x820 [ 285.924772] ? syscall_return_slowpath+0x5c0/0x5c0 [ 285.929706] ? syscall_return_slowpath+0x30f/0x5c0 [ 285.934618] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 285.939964] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 285.944791] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 285.949964] RIP: 0033:0x455259 [ 285.953134] RSP: 002b:00007f84a5910c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 285.960827] RAX: ffffffffffffffda RBX: 00007f84a59116d4 RCX: 0000000000455259 [ 285.968075] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 [ 285.975322] RBP: 000000000072bea0 R08: 0000000020000080 R09: 0000000000000000 [ 285.982585] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 285.989834] R13: 00000000000003fb R14: 00000000006f9028 R15: 000000000000003b [ 285.997082] Code: e0 71 d8 87 e8 36 d2 28 fe 0f 0b 48 89 de 48 c7 c7 00 73 d8 87 e8 25 d2 28 fe 0f 0b 48 89 de 48 c7 c7 a0 72 d8 87 e8 14 d2 28 fe <0f> 0b 90 90 90 90 90 90 90 90 90 90 90 90 90 90 55 48 89 e5 41 [ 286.016278] RIP: __list_del_entry_valid.cold.1+0x48/0x58 RSP: ffff8801b44bf700 [ 286.023873] ---[ end trace 9c87916e18b1eedb ]--- [ 286.028672] Kernel panic - not syncing: Fatal exception [ 286.034439] Dumping ftrace buffer: [ 286.037960] (ftrace buffer empty) [ 286.041644] Kernel Offset: disabled [ 286.045245] Rebooting in 86400 seconds..