460962921710e11ac51a3f9fa92e9118c5f0e1d8b2c342"], &(0x7f0000000040)=0x2) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000100)={r7, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000001380)={r5, @in6={{0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0xf}}}, 0x0, 0x7, 0x0, 0x8, 0x92}, &(0x7f0000001440)=0x98) eventfd(0xffffffff80000001) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000001140)={0x4, 0x8001, 0x40, 0xfffffffffffffffd, 0x0}, &(0x7f0000001180)=0x10) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f0000001500)) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000011c0)={0x95e, 0x101, 0x8009, 0x1ff, 0x31386ac8, 0x8, 0x1, 0x7, r8}, 0x20) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x1, 0x1) recvfrom(r1, &(0x7f00000015c0)=""/83, 0x53, 0x120, 0x0, 0x0) symlinkat(&(0x7f0000001080)='./file0\x00', r4, &(0x7f0000001100)='./file0\x00') close(r0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={0xffffffffffffffff, r4, 0x4, 0x3}, 0x10) getsockname$netlink(r1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) 2018/03/31 07:41:42 executing program 4: r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x8, 0x0) getsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000080)=0x7, &(0x7f00000000c0)=0x2) r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = fcntl$getown(r1, 0x9) r3 = perf_event_open(&(0x7f0000220000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x573f}, r2, 0x0, 0xffffffffffffffff, 0x0) r4 = socket(0x11, 0x2, 0x408) setsockopt(r4, 0x107, 0x1, &(0x7f0000dfaff0)="010000000300060000071a00009139cc", 0x10) r5 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0xfffffffffffff800, 0x200) getsockopt$inet_buf(r5, 0x0, 0x3f, &(0x7f0000000140)=""/189, &(0x7f0000000200)=0xbd) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rfkill\x00', 0x40000, 0x0) dup3(r3, r4, 0x0) 2018/03/31 07:41:42 executing program 2: r0 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)="c6cc8e60a78914d500bfeae773ddb642384ef9648af1058f5fbd2fd309524d989e8ca5c3e6e4d185de0489636bb4012cd2281d57a505b82ae678e253ab1603ef18da1e2b4f2acc3c7651ff1c670f5ed1de51a9a5a850687fc0664d9c81b66fefaf800714c085934bd42e3e21ae71d978f3e76fcbfdc2e66adff8be4d85633beb78581bf230f72954dd487c97d06409d3c6e2f7f22be6284a9b", 0x99, 0xfffffffffffffffb) keyctl$describe(0x6, r0, &(0x7f00000002c0)=""/200, 0xc8) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440)={0x0, 0x0, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20202, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x1010, r3, 0x0) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000000580)=ANY=[@ANYBLOB="030000000000000002004e22ac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e24ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000006ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ffffffffffffff000000000000000000000000000000000000000000000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e220000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) pwrite64(r2, &(0x7f00000004c0)="361cf8298589166f6c2d5823c3b913944a09f012cc6a80f1d50171bf0badb6b5ffdeeaef7d6bdec3b31ce16780d2546875ed31070c85d5735d1ca260f2fca2cc539989af5eafe394f9ae07fcd88029971829aeaf797a78f97cd7f8531aeeb62f497a6d2d8c61dc23348ec786a20e624fdf4c5b839bea2dc66b04b7756cc92f852e", 0x81, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0xf15, 0x800, 0x7f, 0x400, 0x800, 0x20, 0x6, {0x0, @in6={{0xa, 0x4e23, 0xa8b, @empty, 0x3ff}}, 0x7, 0x3, 0xffffffffffffffc1, 0x1, 0x1}}, &(0x7f0000000b80)=0xb0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000bc0)={r4, 0x8, 0x5, [0x1, 0x1ff, 0x1ff, 0x100000000, 0x2f7]}, 0x12) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x3c, &(0x7f0000000040)=[@in={0x2, 0x4e20, @multicast1=0xe0000001}, @in6={0xa, 0x4e21, 0x101, @loopback={0x0, 0x1}, 0xfffffffffffffffb}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x10}}]}, &(0x7f0000000480)=0x10) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000a40)={r5, 0x2}, &(0x7f0000000a80)=0x8) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000400)=0xfff, 0x4) fallocate(r3, 0x3, 0x0, 0x81) ppoll(&(0x7f0000000080)=[{r2}, {r1, 0x208}, {r3, 0x28}], 0x3, &(0x7f00000000c0), &(0x7f0000000140)={0x70000000000}, 0x8) 2018/03/31 07:41:42 executing program 7 (fault-call:10 fault-nth:14): r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4900, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000240)=0x4) getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) r1 = dup(0xffffffffffffff9c) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r2 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r2, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r2, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r2, &(0x7f0000000100)=""/65, 0x41) r3 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) fchdir(r2) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(r3, &(0x7f0000000200)='./file1\x00', r2, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r2, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000580)=""/80, 0x50}, {&(0x7f00000008c0)=""/4096, 0x1000}], 0x2, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x20) r5 = syz_open_dev$sndpcmp(&(0x7f00000018c0)='/dev/snd/pcmC#D#p\x00', 0x3, 0x10a00) ioctl$KVM_GET_DEVICE_ATTR(r5, 0x4018aee2, &(0x7f0000001940)={0x0, 0x100, 0x9, &(0x7f0000001900)}) recvfrom$ipx(r4, &(0x7f00000006c0)=""/52, 0x34, 0x100, &(0x7f0000000700)={0x4, 0x9a2, 0x4, "dc108d9d4391", 0x5}, 0x10) renameat(r2, &(0x7f0000001980)='./file1\x00', r5, &(0x7f00000019c0)='./file0/file0\x00') r6 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r6, 0x4, 0x0) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000040), 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r6, &(0x7f0000000200), 0xfffffe08) 2018/03/31 07:41:42 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) inotify_add_watch(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000002, 0x13, r0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x101200, 0x0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x82) 2018/03/31 07:41:42 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00008d6000), 0x4) socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000e00)='/dev/snd/pcmC#D#p\x00', 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000e40)={0x4, 0x7}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000000) clone(0x0, &(0x7f0000000240), &(0x7f0000000000), &(0x7f0000c35ffc), &(0x7f0000b3bfff)) clone(0x0, &(0x7f000052cf69), &(0x7f0000850ffc), &(0x7f0000e9b000), &(0x7f0000000000)) wait4(0x0, 0x0, 0x80000000, &(0x7f0000000080)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000300)={@any=0xffffffff}) io_setup(0x8, &(0x7f00000003c0)=0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000480)='fdinfo\x00') eventfd2(0x81, 0x80000) setsockopt$ax25_int(r3, 0x101, 0x6, &(0x7f0000000dc0)=0x28, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') r4 = dup3(r3, r0, 0x80000) r5 = syz_open_dev$sndmidi(&(0x7f0000000cc0)='/dev/snd/midiC#D#\x00', 0x2, 0x4000) recvfrom$unix(r4, &(0x7f00000005c0)=""/80, 0x50, 0x40000020, &(0x7f0000000640)=@abs={0x1, 0x0, 0x4e23}, 0x6e) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000000180)={{{@in=@multicast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000280)=0xe8) getgroups(0x2, &(0x7f00000002c0)=[0x0, 0x0]) syz_fuse_mount(&(0x7f0000000140)='./file0\x00', 0xa001, r6, r7, 0x7, 0x200800) io_submit(r2, 0x1, &(0x7f0000000d40)=[&(0x7f00000004c0)={0x0, 0x0, 0x0, 0x3, 0x8, r0, &(0x7f0000000400)="2ae88409a36d87b6bf7a305b7780ebb5df6fb10230d25ba065764a09095e620559dc9fb7aa71f820d08d13fd7a46b8d5bd232c1709eb3bbf90", 0x39, 0xab, 0x0, 0x1, r3}]) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x31, 0x3f, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd8e6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x58f}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 2018/03/31 07:41:42 executing program 2: r0 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)="c6cc8e60a78914d500bfeae773ddb642384ef9648af1058f5fbd2fd309524d989e8ca5c3e6e4d185de0489636bb4012cd2281d57a505b82ae678e253ab1603ef18da1e2b4f2acc3c7651ff1c670f5ed1de51a9a5a850687fc0664d9c81b66fefaf800714c085934bd42e3e21ae71d978f3e76fcbfdc2e66adff8be4d85633beb78581bf230f72954dd487c97d06409d3c6e2f7f22be6284a9b", 0x99, 0xfffffffffffffffb) keyctl$describe(0x6, r0, &(0x7f00000002c0)=""/200, 0xc8) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440)={0x0, 0x0, 0xffffffffffffffff}) write(r1, &(0x7f0000000a40)="f95c62252c8f065c0844cd0cd3d509b43811cb4ba6f7628925c72a1765d7c5f593b38851f1700435a76dc1939f883c98595b52fbc480dd9365f8265b1ee3458c50742d1b516bc8ee8505d99b349ef3e9f38edddb0deb7c95da4b06ad79f58bf7d7d9d851946c695c553a8c151614073796125a7976857363eeb724e9c5a8fae58269bceb733c855b389a3a6ad53d448ca6b1be184b077fc0992beefda82a97be5dc4", 0xa2) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20202, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x1010, r3, 0x0) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000000580)=ANY=[@ANYBLOB="030000000000000002004e22ac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e24ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000006ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ffffffffffffff000000000000000000000000000000000000000000000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e220000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) pwrite64(r3, &(0x7f00000004c0)="361cf8298589166f6c2d5823c3b913944a09f012cc6a80f1d50171bf0badb6b5ffdeeaef7d6bdec3b31ce16780d2546875ed31070c85d5735d1ca260f2fca2cc539989af5eafe394f9ae07fcd88029971829aeaf797a78f97cd7f8531aeeb62f497a6d2d8c61dc23348ec786a20e624fdf4c5b839bea2dc66b04b7756cc92f852e", 0x81, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000400)=0xfff, 0x4) fallocate(r3, 0x3, 0x0, 0x81) ppoll(&(0x7f0000000080)=[{r2}, {r1, 0x208}, {r3, 0x28}], 0x3, &(0x7f00000000c0), &(0x7f0000000140)={0x70000000000}, 0x8) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r3, &(0x7f0000000b00)="c93fed0d5ecdc71cb6aaf2522b11008e207803dc305abb1a9e51ab871d5923343e23b00d0cbb95294ea0fd0e72c05d02b18359748ca5aaa1bcf5095376b6c0a974a4bc5d653e6c54e86caddc7320ad4542545af8a522a055f9e778bd8ff1c9a9bd68906972c5136703917970a4cad305311fd3e6b0ca0b808a60b9daa923f1102faf2f36c232e0d019743c987e459de3742eeead213c46bd5e3cf401b5cd30cac77b420231e23b27861cb4fdf8eb2110a1b0055973528964d229f31af9fcf042d8f0a338be775d406c270a3dc57094631cc4aae83c1e89720ff360f9a95fe6aa664263cbaa56c1a898af17d8754c9726db5ad4456a1aa5", &(0x7f0000000040)=""/61}, 0x18) [ 168.388542] FAULT_INJECTION: forcing a failure. [ 168.388542] name failslab, interval 1, probability 0, space 0, times 0 [ 168.399990] CPU: 1 PID: 13628 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #372 [ 168.407352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 168.416699] Call Trace: [ 168.419281] dump_stack+0x194/0x24d [ 168.422912] ? arch_local_irq_restore+0x53/0x53 [ 168.427588] should_fail+0x8c0/0xa40 [ 168.431303] ? kstrdup+0x39/0x70 [ 168.434670] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 168.439769] ? cgroup_mkdir+0x553/0xfc0 [ 168.443737] ? vfs_mkdir+0x390/0x600 [ 168.447447] ? SyS_mkdirat+0x22b/0x2b0 [ 168.451335] ? do_syscall_64+0x281/0x940 [ 168.455396] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 168.460763] ? find_held_lock+0x35/0x1d0 [ 168.464832] ? find_held_lock+0x35/0x1d0 [ 168.468894] ? __lock_is_held+0xb6/0x140 [ 168.472967] ? check_same_owner+0x320/0x320 [ 168.477288] ? rcu_note_context_switch+0x710/0x710 [ 168.482215] ? rcu_read_lock_sched_held+0x108/0x120 [ 168.487234] should_failslab+0xec/0x120 [ 168.491204] kmem_cache_alloc+0x47/0x760 [ 168.495259] ? memcpy+0x45/0x50 [ 168.498543] ? kstrdup+0x59/0x70 [ 168.501912] __kernfs_new_node+0xe2/0x570 [ 168.506057] ? kernfs_dop_revalidate+0x380/0x380 [ 168.510826] ? kasan_check_read+0x11/0x20 [ 168.514973] ? read_word_at_a_time+0x12/0x20 [ 168.519373] ? strscpy+0x186/0x500 [ 168.522902] kernfs_new_node+0x80/0xe0 [ 168.526775] __kernfs_create_file+0x4b/0x320 [ 168.531172] cgroup_addrm_files+0x3c5/0xa70 [ 168.535481] ? cgroup_file_write+0x710/0x710 [ 168.539878] ? getrawmonotonic64+0x460/0x460 [ 168.544268] ? kernfs_active+0x92/0x160 [ 168.548221] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 168.553124] ? cgroup_kn_set_ugid+0x2c7/0x370 [ 168.557943] ? cgroup_file_name+0x1d0/0x1d0 [ 168.562246] css_populate_dir+0x340/0x420 [ 168.566372] cgroup_mkdir+0x553/0xfc0 [ 168.570151] ? __lock_is_held+0xb6/0x140 [ 168.574193] ? cgroup_destroy_locked+0x750/0x750 [ 168.578923] ? rcu_read_lock_sched_held+0x108/0x120 [ 168.583916] ? kmem_cache_free+0x258/0x2a0 [ 168.588126] ? set_nlink+0xc1/0x160 [ 168.591730] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 168.596634] ? generic_permission+0x105/0x3c0 [ 168.601105] ? cgroup_destroy_locked+0x750/0x750 [ 168.605840] kernfs_iop_mkdir+0x153/0x1e0 [ 168.609964] vfs_mkdir+0x390/0x600 [ 168.613481] SyS_mkdirat+0x22b/0x2b0 [ 168.617173] ? SyS_mknod+0x480/0x480 [ 168.620862] ? trace_hardirqs_on+0xd/0x10 [ 168.624986] ? do_syscall_64+0xb7/0x940 [ 168.628936] ? SyS_mknod+0x480/0x480 [ 168.632626] do_syscall_64+0x281/0x940 [ 168.636488] ? vmalloc_sync_all+0x30/0x30 [ 168.640610] ? _raw_spin_unlock_irq+0x27/0x70 [ 168.645080] ? finish_task_switch+0x1c1/0x7e0 [ 168.649553] ? syscall_return_slowpath+0x550/0x550 [ 168.654459] ? syscall_return_slowpath+0x2ac/0x550 [ 168.659370] ? prepare_exit_to_usermode+0x350/0x350 [ 168.664363] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 168.669704] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 168.674527] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 168.679690] RIP: 0033:0x454e79 2018/03/31 07:41:43 executing program 2: r0 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)="c6cc8e60a78914d500bfeae773ddb642384ef9648af1058f5fbd2fd309524d989e8ca5c3e6e4d185de0489636bb4012cd2281d57a505b82ae678e253ab1603ef18da1e2b4f2acc3c7651ff1c670f5ed1de51a9a5a850687fc0664d9c81b66fefaf800714c085934bd42e3e21ae71d978f3e76fcbfdc2e66adff8be4d85633beb78581bf230f72954dd487c97d06409d3c6e2f7f22be6284a9b", 0x99, 0xfffffffffffffffb) keyctl$describe(0x6, r0, &(0x7f00000002c0)=""/200, 0xc8) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440)={0x0, 0x0, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20202, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x1010, r3, 0x0) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000000580)=ANY=[@ANYBLOB="030000000000000002004e22ac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e24ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000006ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ffffffffffffff000000000000000000000000000000000000000000000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e220000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000040)=0x0) move_pages(r4, 0x4, &(0x7f00000003c0)=[&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000480)=[0x3, 0x80000001, 0x5], &(0x7f0000000a40)=[0x0, 0x0], 0x2) pwrite64(r3, &(0x7f00000004c0)="361cf8298589166f6c2d5823c3b913944a09f012cc6a80f1d50171bf0badb6b5ffdeeaef7d6bdec3b31ce16780d2546875ed31070c85d5735d1ca260f2fca2cc539989af5eafe394f9ae07fcd88029971829aeaf797a78f97cd7f8531aeeb62f497a6d2d8c61dc23348ec786a20e624fdf4c5b839bea2dc66b04b7756cc92f852e", 0x81, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000400)=0xfff, 0x4) fallocate(r3, 0x3, 0x0, 0x81) ppoll(&(0x7f0000000080)=[{r2}, {r1, 0x208}, {r3, 0x28}], 0x3, &(0x7f00000000c0), &(0x7f0000000140)={0x70000000000}, 0x8) [ 168.682856] RSP: 002b:00007fe2ad9eac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 168.690541] RAX: ffffffffffffffda RBX: 00007fe2ad9eb6d4 RCX: 0000000000454e79 [ 168.697786] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 168.705037] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 168.712282] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 168.719526] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 000000000000000e [ 168.726883] cgroup: cgroup_addrm_files: failed to add cgroup.controllers, err=-12 2018/03/31 07:41:43 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x8, 0x0) ioctl$DRM_IOCTL_SET_UNIQUE(r0, 0x40106410, &(0x7f0000000100)={0x7e, &(0x7f0000000080)="78425a0782c2045f2ae484d0229aa7d013d2c35bb20db85219dc2e9287140780f24fe1c5cdd4b0d328972137a83405fe6210747218a215161f04fe6433e7f928a37a7ccfc10879cc7eb15e79dd47e1f103c06f1e95ff5746119aa9b3afb41b79efaaa9d16f786fe9725f9e4370deaa6768024e9d048ddaa82e213b1dd2c5"}) r1 = socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000112000)={0x0, 0x0}) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) splice(r1, &(0x7f00004a2ff8), r2, &(0x7f0000000000)=0x800000, 0x3f, 0x0) 2018/03/31 07:41:43 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETSW(r0, 0x5402, &(0x7f00009dc000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00001aa000)=[{&(0x7f00006aaf01)=""/255, 0xff}], 0x1) r2 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x2) r3 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000180)="4d84333445eca8a951986a846c5c47b68503b6b9bfb9194d56959e784903d6fce785e33be7c12ba8fda1307fecc9f8c7791333cef05561e77184f6", 0x3b, 0xfffffffffffffffc) r4 = request_key(&(0x7f0000000200)='logon\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000002c0)='cpuset\x00', 0xfffffffffffffffc) keyctl$unlink(0x9, r3, r4) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f00000000c0)={0xffffffffffffffe1, 0x5, 0x6, 0x3, 0xcbbe, 0x20}) ioctl$KVM_GET_DIRTY_LOG(r2, 0x4010ae42, &(0x7f0000000080)={0x10001, 0x0, &(0x7f0000ffa000/0x3000)=nil}) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)={0x6, 0x10000000, 0x4, 0x9, 0x8, 0x1, 0xd0, 0x800, 0x8, 0x40, 0x1, 0x1}) ioctl$TCSETAW(r0, 0x5407, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7636}) close(r0) 2018/03/31 07:41:43 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={"73697430000000000000000400", 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000040)={@dev={0xfe, 0x80, [], 0xfff}, r1}, 0x14) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000080)=@generic={0x3, 0x0, 0x1}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x480000, 0x1c0) getsockopt$EBT_SO_GET_INFO(r2, 0x0, 0x80, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000180)=0x78) 2018/03/31 07:41:43 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) acct(&(0x7f0000001240)='./file0\x00') setrlimit(0xa, &(0x7f0000000380)={0x4, 0x1}) getsockname(0xffffffffffffff9c, &(0x7f0000001480)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f00000012c0)=0x80) socketpair(0x10, 0x0, 0x8, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000001580)={r3}) r4 = open(&(0x7f00000010c0)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000001300)={0x8, 0x0, 0x6, 0x58a, 0x0}, &(0x7f0000001340)=0x10) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x3052, r3, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f00000001c0)={'bond0\x00', {0x2, 0x4e20, @multicast2=0xe0000002}}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYBLOB="408615824f3f781ae75fcc9554f019621eaccb21d7ca5fb77c06ff41c0d07d78b6de0ed01fa10b1070cb77afb61679a7f893b0c78371e1195ef393dc87b1b329811e67705b9e1bb5dc00c5b14645b010d310e491c159a81b77145882a63f6206ecfb54b4f6b2ddf7963c2b2681ff1aa2dfd55f1e73b02e150e1f8e51e6ae3615336ed2b2b461fccd4ec00311dd4b00cf4316fb4bda9fa1a0a94d01d4db3209cd302a449b841dc10fcc2d63482b979cb70c21ef7000e655a7a1a18b57b6cd06267ef9f582b4783e42e60f460962921710e11ac51a3f9fa92e9118c5f0e1d8b2c342"], &(0x7f0000000040)=0x2) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000100)={r7, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000001380)={r5, @in6={{0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0xf}}}, 0x0, 0x7, 0x0, 0x8, 0x92}, &(0x7f0000001440)=0x98) eventfd(0xffffffff80000001) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000001140)={0x4, 0x8001, 0x40, 0xfffffffffffffffd, 0x0}, &(0x7f0000001180)=0x10) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f0000001500)) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000011c0)={0x95e, 0x101, 0x8009, 0x1ff, 0x31386ac8, 0x8, 0x1, 0x7, r8}, 0x20) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x1, 0x1) recvfrom(r1, &(0x7f00000015c0)=""/83, 0x53, 0x120, 0x0, 0x0) symlinkat(&(0x7f0000001080)='./file0\x00', r4, &(0x7f0000001100)='./file0\x00') close(r0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={r4, 0xffffffffffffffff, 0x4, 0x3}, 0x10) getsockname$netlink(r1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) 2018/03/31 07:41:43 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='io.bfq.weight\x00', 0x2, 0x0) openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) write(r1, &(0x7f0000000300)='5', 0x1) 2018/03/31 07:41:44 executing program 3: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x101641) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f00000000c0)=0x5, 0x4) r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000b89fe4)=@req3={0x10001, 0x0, 0x1, 0x1df9}, 0x1c) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000003c0)={0x10000, 0x6b0e8000000, 0x6, 0x3, 0x7, 0x5, 0x8, 0x2000, 0x7fffffff}, 0xb) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000200)={0x0, 0x9}, &(0x7f0000000240)=0x8) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000500)=0x7, &(0x7f0000000540)=0x4) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f0000000480)=""/66) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000280)={r2, 0xc3, "d6d991d8445494cf06a5bbf2d379227b462e2d6e8ce152d24c9c7c990ca87f1160c105b473793ad8824898876f6c11212a6f26f95159c6f00ef244188cb768ac85dec26e3b5a2686eb4adefd623615836cfbd4091b6835f27ecbb685a5a21e3696c267b0304014282bc93a4c865fdf168843b7adc2806a16061ff3172769cd61a8b856549e5f2ec521051de9d232e520041c126bc421bef84b6ca0531c4a925ac8c1acab255309c1f7578606257369d35da85b8ba76fcd0a03c8330b4acca6630741bc"}, &(0x7f0000000380)=0xcb) pipe2(&(0x7f0000000580), 0x4800) listen(r1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r0, 0x28, &(0x7f0000000140)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r3, 0x8ec, 0x10}, 0xc) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f0000000400)={{0x8, 0xf3b}, {0x1, 0x1}, 0x2, 0x1, 0xfffffffffffffffd}) sendmsg(r1, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000000240), 0x0, &(0x7f00006e9c68)}, 0x0) accept4$nfc_llcp(r1, &(0x7f0000000000), &(0x7f0000000100)=0x60, 0x0) 2018/03/31 07:41:44 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b9bff0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x9, 0x501080) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f00000000c0)={0x101, {{0xa, 0x4e22, 0x1f, @local={0xfe, 0x80, [], 0xaa}, 0x8}}}, 0x88) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffbb, 0x20020003, &(0x7f0000385ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x80) shutdown(r0, 0x1) 2018/03/31 07:41:44 executing program 2: r0 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)="c6cc8e60a78914d500bfeae773ddb642384ef9648af1058f5fbd2fd309524d989e8ca5c3e6e4d185de0489636bb4012cd2281d57a505b82ae678e253ab1603ef18da1e2b4f2acc3c7651ff1c670f5ed1de51a9a5a850687fc0664d9c81b66fefaf800714c085934bd42e3e21ae71d978f3e76fcbfdc2e66adff8be4d85633beb78581bf230f72954dd487c97d06409d3c6e2f7f22be6284a9b", 0x99, 0xfffffffffffffffb) keyctl$describe(0x6, r0, &(0x7f00000002c0)=""/200, 0xc8) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0xd, 0x9, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, [@ldst={0x1, 0x3, 0x6, 0xa, 0x7, 0x40, 0xffffffffffffffff}, @jmp={0x5, 0x1, 0x4, 0x9, 0xa, 0xfffffff0, 0xffffffffffffffff}, @jmp={0x5, 0x87, 0x2, 0x9, 0x8, 0x50}], {0x95}}, &(0x7f0000000040)='GPL\x00', 0xffffffff, 0xdf, &(0x7f0000000600)=""/223, 0x41f00, 0x3d290a6e0b166a4c}, 0x48) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440)={0x0, 0x0, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20202, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x1010, r3, 0x0) r4 = semget(0x3, 0x0, 0x100) semctl$IPC_RMID(r4, 0x0, 0x0) semop(r4, &(0x7f00000003c0)=[{0x4, 0x5}], 0x1) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000000ac0)=ANY=[@ANYBLOB="030000000000000002004e22ac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e24ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000006ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ffffffffffffff000000000000000000000000000000000000000000000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000002004e20ac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e220000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b59c5bc8bab3bc1be0cc9a900d1260e90a39c773e06bafe24f8d5f39c9e4cfc0966ec0945031d27cb95c36b100403540fc52930fc3844106f542c2775c6bc8d64f8cfaaf9675263e6826925beb8b86121db7ff33faf661b9178d33cd6c5f80d9c3a2de0d55f6ca57c78d2deca7d2098eea80f592ef8a06ac2433dced57fcbcfd78"], 0x1) pwrite64(r3, &(0x7f00000004c0)="361cf8298589166f6c2d5823c3b913944a09f012cc6a80f1d50171bf0badb6b5ffdeeaef7d6bdec3b31ce16780d2546875ed31070c85d5735d1ca260f2fca2cc539989af5eafe394f9ae07fcd88029971829aeaf797a78f97cd7f8531aeeb62f497a6d2d8c61dc23348ec786a20e624fdf4c5b839bea2dc66b04b7756cc92f852e", 0x81, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000400)=0xfff, 0x4) fallocate(r3, 0x3, 0x0, 0x81) ppoll(&(0x7f0000000080)=[{r2}, {r1, 0x208}, {r3, 0x28}], 0x3, &(0x7f00000000c0), &(0x7f0000000140)={0x70000000000}, 0x8) 2018/03/31 07:41:44 executing program 7 (fault-call:10 fault-nth:15): r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4900, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000240)=0x4) getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) r1 = dup(0xffffffffffffff9c) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r2 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r2, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r2, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r2, &(0x7f0000000100)=""/65, 0x41) r3 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) fchdir(r2) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(r3, &(0x7f0000000200)='./file1\x00', r2, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r2, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000580)=""/80, 0x50}, {&(0x7f00000008c0)=""/4096, 0x1000}], 0x2, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x20) r5 = syz_open_dev$sndpcmp(&(0x7f00000018c0)='/dev/snd/pcmC#D#p\x00', 0x3, 0x10a00) ioctl$KVM_GET_DEVICE_ATTR(r5, 0x4018aee2, &(0x7f0000001940)={0x0, 0x100, 0x9, &(0x7f0000001900)}) recvfrom$ipx(r4, &(0x7f00000006c0)=""/52, 0x34, 0x100, &(0x7f0000000700)={0x4, 0x9a2, 0x4, "dc108d9d4391", 0x5}, 0x10) renameat(r2, &(0x7f0000001980)='./file1\x00', r5, &(0x7f00000019c0)='./file0/file0\x00') r6 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r6, 0x4, 0x0) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000040), 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r6, &(0x7f0000000200), 0xfffffe08) 2018/03/31 07:41:44 executing program 0: r0 = getpgrp(0x0) r1 = gettid() perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f000058a000)={0x0, 0x0, 0x5}) getpgrp(r0) readv(0xffffffffffffffff, &(0x7f0000001480)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1) r2 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x684f, 0x408002) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r2, 0x111, 0x2, 0x1, 0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e21, 0x9, @empty, 0x9}}, 0x2, 0x80000000, 0x9, 0x8, 0x8}, &(0x7f0000000140)=0x98) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000180)={r3, 0x6}, 0x8) 2018/03/31 07:41:44 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) acct(&(0x7f0000001240)='./file0\x00') setrlimit(0xa, &(0x7f0000000380)={0x4, 0x1}) getsockname(0xffffffffffffff9c, &(0x7f0000001480)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f00000012c0)=0x80) socketpair(0x10, 0x0, 0x8, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000001580)={r3}) r4 = open(&(0x7f00000010c0)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000001300)={0x8, 0x0, 0x6, 0x58a, 0x0}, &(0x7f0000001340)=0x10) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x3052, r3, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f00000001c0)={'bond0\x00', {0x2, 0x4e20, @multicast2=0xe0000002}}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYBLOB="408615824f3f781ae75fcc9554f019621eaccb21d7ca5fb77c06ff41c0d07d78b6de0ed01fa10b1070cb77afb61679a7f893b0c78371e1195ef393dc87b1b329811e67705b9e1bb5dc00c5b14645b010d310e491c159a81b77145882a63f6206ecfb54b4f6b2ddf7963c2b2681ff1aa2dfd55f1e73b02e150e1f8e51e6ae3615336ed2b2b461fccd4ec00311dd4b00cf4316fb4bda9fa1a0a94d01d4db3209cd302a449b841dc10fcc2d63482b979cb70c21ef7000e655a7a1a18b57b6cd06267ef9f582b4783e42e60f460962921710e11ac51a3f9fa92e9118c5f0e1d8b2c342"], &(0x7f0000000040)=0x2) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000100)={r7, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000001380)={r5, @in6={{0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0xf}}}, 0x0, 0x7, 0x0, 0x8, 0x92}, &(0x7f0000001440)=0x98) eventfd(0xffffffff80000001) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000001140)={0x4, 0x8001, 0x40, 0xfffffffffffffffd, 0x0}, &(0x7f0000001180)=0x10) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f0000001500)) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000011c0)={0x95e, 0x101, 0x8009, 0x1ff, 0x31386ac8, 0x8, 0x1, 0x7, r8}, 0x20) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x1, 0x1) recvfrom(r1, &(0x7f00000015c0)=""/83, 0x53, 0x120, 0x0, 0x0) symlinkat(&(0x7f0000001080)='./file0\x00', r4, &(0x7f0000001100)='./file0\x00') close(r0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={r4, 0xffffffffffffffff, 0x4, 0x3}, 0x10) getsockname$netlink(r1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) 2018/03/31 07:41:44 executing program 5: r0 = memfd_create(&(0x7f0000000300)='/dev/vcsa#\x00', 0x1) getsockopt$sock_buf(r0, 0x1, 0x1f, &(0x7f0000000340)=""/75, &(0x7f00000003c0)=0x4b) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r1 = socket(0x100000001e, 0x1, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x0, 0x1) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc058534f, &(0x7f0000000280)={{0x5, 0x5}, 0x1, 0xffffffffffff51c8, 0x7, {0x2}, 0x1}) ioctl$TIOCGWINSZ(r2, 0x5413, &(0x7f0000000200)) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000240)=ANY=[@ANYBLOB="010000000000000002000000000000001b0e000006000000ff01000000000000"]) setsockopt(r1, 0x10f, 0x81, &(0x7f0000000000)="00040000", 0x4) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000400)={0x8, 0x7ff, 0x8, 0x4, 0x1, 0x7, 0x7fff, 0x0, 0x2, 0x0, 0x40, 0x100000000}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e20, 0x51, @remote={0xfe, 0x80, [], 0xbb}, 0x6}}}, &(0x7f0000000100)=0x84) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000140)={r3, 0x9}, &(0x7f0000000180)=0x8) 2018/03/31 07:41:44 executing program 1: mkdir(&(0x7f000084bff8)='./file0\x00', 0x0) r0 = openat$cgroup_int(0xffffffffffffff9c, &(0x7f0000000280)='io.weight\x00', 0x2, 0x0) fadvise64(r0, 0x0, 0x7ff, 0x0) r1 = open(&(0x7f0000862000)='./file0\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x800000000402, r2) exit(0xfffffffffffffffc) openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x280001, 0x0) r4 = creat(&(0x7f0000b13ff2)='./file0/file0\x00', 0x0) r5 = dup3(r3, r1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r3, 0x40a45323, &(0x7f0000000000)={{0xf7, 0x8}, 'port1\x00', 0x40, 0x5, 0x0, 0xa20, 0x9, 0x8, 0x5, 0x0, 0x3, 0xfff}) linkat(r4, &(0x7f00000000c0)='./file0/file0\x00', r5, &(0x7f0000000100)='./file0/file0\x00', 0x0) getpid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000180)=0xc) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) r8 = geteuid() setresuid(r6, r7, r8) [ 169.706097] FAULT_INJECTION: forcing a failure. [ 169.706097] name failslab, interval 1, probability 0, space 0, times 0 [ 169.717378] CPU: 0 PID: 13683 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #372 [ 169.724742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 169.734090] Call Trace: [ 169.736673] dump_stack+0x194/0x24d [ 169.740304] ? arch_local_irq_restore+0x53/0x53 [ 169.744968] ? lock_release+0xa40/0xa40 [ 169.748933] should_fail+0x8c0/0xa40 [ 169.752636] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 169.757723] ? kernfs_add_one+0x50/0x450 [ 169.761767] ? rb_first_postorder+0xa0/0xa0 [ 169.766068] ? kernfs_add_one+0x50/0x450 [ 169.770109] ? save_stack+0x43/0xd0 [ 169.773714] ? kasan_kmalloc+0xad/0xe0 [ 169.777580] ? trace_hardirqs_off+0x10/0x10 [ 169.781883] ? find_held_lock+0x35/0x1d0 [ 169.785929] ? __lock_is_held+0xb6/0x140 [ 169.789979] ? check_same_owner+0x320/0x320 [ 169.794277] ? lock_downgrade+0x980/0x980 [ 169.798406] ? rcu_note_context_switch+0x710/0x710 [ 169.803323] should_failslab+0xec/0x120 [ 169.807281] __kmalloc_track_caller+0x5f/0x760 [ 169.811844] ? idr_alloc_cyclic+0x1d6/0x320 [ 169.816148] ? kstrdup_const+0x39/0x50 [ 169.820018] ? __mutex_unlock_slowpath+0xe9/0xac0 [ 169.824843] kstrdup+0x39/0x70 [ 169.828021] kstrdup_const+0x39/0x50 [ 169.831720] __kernfs_new_node+0xa2/0x570 [ 169.835851] ? kernfs_dop_revalidate+0x380/0x380 [ 169.840597] ? kasan_check_read+0x11/0x20 [ 169.844725] ? read_word_at_a_time+0x12/0x20 [ 169.849109] ? strscpy+0x186/0x500 [ 169.852640] kernfs_new_node+0x80/0xe0 [ 169.856510] __kernfs_create_file+0x4b/0x320 [ 169.860900] cgroup_addrm_files+0x3c5/0xa70 [ 169.865212] ? cgroup_file_write+0x710/0x710 [ 169.869605] ? getrawmonotonic64+0x460/0x460 [ 169.873994] ? kernfs_active+0x92/0x160 [ 169.877955] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 169.882862] ? cgroup_kn_set_ugid+0x2c7/0x370 [ 169.887333] ? cgroup_file_name+0x1d0/0x1d0 [ 169.891642] css_populate_dir+0x340/0x420 [ 169.895769] cgroup_mkdir+0x553/0xfc0 [ 169.899547] ? __lock_is_held+0xb6/0x140 [ 169.903591] ? cgroup_destroy_locked+0x750/0x750 [ 169.908324] ? rcu_read_lock_sched_held+0x108/0x120 [ 169.913320] ? kmem_cache_free+0x258/0x2a0 [ 169.917536] ? set_nlink+0xc1/0x160 [ 169.921143] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 169.926049] ? generic_permission+0x105/0x3c0 [ 169.930522] ? cgroup_destroy_locked+0x750/0x750 [ 169.935258] kernfs_iop_mkdir+0x153/0x1e0 [ 169.939384] vfs_mkdir+0x390/0x600 [ 169.942904] SyS_mkdirat+0x22b/0x2b0 [ 169.946599] ? SyS_mknod+0x480/0x480 [ 169.950290] ? trace_hardirqs_on+0xd/0x10 [ 169.954419] ? do_syscall_64+0xb7/0x940 [ 169.958372] ? SyS_mknod+0x480/0x480 [ 169.962064] do_syscall_64+0x281/0x940 [ 169.965929] ? vmalloc_sync_all+0x30/0x30 [ 169.970055] ? _raw_spin_unlock_irq+0x27/0x70 [ 169.974528] ? finish_task_switch+0x1c1/0x7e0 [ 169.979003] ? syscall_return_slowpath+0x550/0x550 [ 169.983915] ? syscall_return_slowpath+0x2ac/0x550 [ 169.988822] ? prepare_exit_to_usermode+0x350/0x350 [ 169.993820] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 169.999165] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 170.003995] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 170.009169] RIP: 0033:0x454e79 [ 170.012341] RSP: 002b:00007fe2ad9eac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 170.020032] RAX: ffffffffffffffda RBX: 00007fe2ad9eb6d4 RCX: 0000000000454e79 [ 170.027282] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 170.034527] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 170.041771] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 170.049024] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 000000000000000f 2018/03/31 07:41:44 executing program 7 (fault-call:10 fault-nth:16): r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4900, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000240)=0x4) getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) r1 = dup(0xffffffffffffff9c) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r2 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r2, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r2, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r2, &(0x7f0000000100)=""/65, 0x41) r3 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) fchdir(r2) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(r3, &(0x7f0000000200)='./file1\x00', r2, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r2, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000580)=""/80, 0x50}, {&(0x7f00000008c0)=""/4096, 0x1000}], 0x2, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x20) r5 = syz_open_dev$sndpcmp(&(0x7f00000018c0)='/dev/snd/pcmC#D#p\x00', 0x3, 0x10a00) ioctl$KVM_GET_DEVICE_ATTR(r5, 0x4018aee2, &(0x7f0000001940)={0x0, 0x100, 0x9, &(0x7f0000001900)}) recvfrom$ipx(r4, &(0x7f00000006c0)=""/52, 0x34, 0x100, &(0x7f0000000700)={0x4, 0x9a2, 0x4, "dc108d9d4391", 0x5}, 0x10) renameat(r2, &(0x7f0000001980)='./file1\x00', r5, &(0x7f00000019c0)='./file0/file0\x00') r6 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r6, 0x4, 0x0) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000040), 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r6, &(0x7f0000000200), 0xfffffe08) 2018/03/31 07:41:44 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x9, &(0x7f0000ac0f68)={0xffffffffffff19f8, @in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x98) openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x2bffd, 0x0) sendto(r1, &(0x7f0000000280), 0x0, 0x4, &(0x7f00000001c0)=@ethernet={0x306, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80) ioctl$TCXONC(r0, 0x540a, 0x80000001) write(r0, &(0x7f0000caf000)="9c", 0x1) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000040)={0xb8, 0x20, 0x3, 0x0, 0x8, 0x100000000}) ioctl$TCXONC(r0, 0x540a, 0x1) ioctl$TIOCSCTTY(r1, 0x540e, 0x6) r3 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x4, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000100)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000140)=0x10) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000180)=@sack_info={r4, 0x8, 0x1}, 0xc) r5 = semget$private(0x0, 0x2, 0x411) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r7, 0xae60) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) r9 = dup3(r8, r7, 0x0) ioctl$KVM_GET_LAPIC(r9, 0x8400ae8e, &(0x7f0000001280)={"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"}) semctl$SEM_STAT(r5, 0x1, 0x12, &(0x7f0000000000)=""/25) [ 170.056655] cgroup: cgroup_addrm_files: failed to add cgroup.subtree_control, err=-12 2018/03/31 07:41:44 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket(0xa, 0x0, 0xfffffffffffffffe) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)) mq_notify(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x3, @thr={&(0x7f00000009c0), &(0x7f0000000180)="1f2dec8c60a3ebd5fe628b39c105603bcb5e30d7ff959df745f229f6e642a20638bf6981d30d8ff15ba579bbdc20ed475cf69bcf195d654be5b372f5b6"}}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'ip6tnl0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000580)={'\x00', r2}) r3 = dup2(r0, r1) ioctl$PIO_UNIMAP(r3, 0x4b67, &(0x7f00000000c0)={0x3, &(0x7f0000000040)=[{0xd0, 0x5}, {0x617, 0x7}, {0x5, 0x1ff}]}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000400)={0x0, 0x1, 0xfffffc9c}, 0x10) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000240)=0x14) r4 = syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ptmx\x00', 0x20000002001, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETSW(r5, 0x5402, &(0x7f00009dc000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}) r6 = syz_open_pts(r5, 0x10080) ioctl$TCXONC(r5, 0x540a, 0x2) ioctl$TCSETAW(r5, 0x5407, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7636}) close(r5) bind$inet6(0xffffffffffffffff, &(0x7f000044f000)={0xa, 0x4e21}, 0x1c) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000000)=0x2, 0x4) listen(r1, 0x1) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r3, &(0x7f0000000600)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x28, r7, 0x0, 0x70bd2c, 0x25dfdbfb, {0xe}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x58}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x40) syz_emit_ethernet(0x2, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd60d8652b00140600fe8004000000000000000000000000aafe8000000000000000000000000000aa00004e20", @ANYBLOB="e7c5255d60864c7f2f81a462a4a6576b6a52cee9e9c5ddea"], &(0x7f00000002c0)) fdatasync(r6) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0xff54) socket$inet_smc(0x2b, 0x1, 0x0) getsockname$inet(r4, &(0x7f0000000440)={0x0, 0x0, @multicast2}, &(0x7f0000000300)=0xfffffffffffffda9) setsockopt$nfc_llcp_NFC_LLCP_RW(r1, 0x118, 0x0, &(0x7f0000000140)=0x10001, 0x4) [ 170.144139] FAULT_INJECTION: forcing a failure. [ 170.144139] name failslab, interval 1, probability 0, space 0, times 0 [ 170.155463] CPU: 1 PID: 13701 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #372 [ 170.162816] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 170.172168] Call Trace: [ 170.174749] dump_stack+0x194/0x24d [ 170.178356] ? arch_local_irq_restore+0x53/0x53 [ 170.183009] should_fail+0x8c0/0xa40 [ 170.186705] ? kstrdup+0x39/0x70 [ 170.190049] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 170.195126] ? cgroup_mkdir+0x553/0xfc0 [ 170.199075] ? vfs_mkdir+0x390/0x600 [ 170.202765] ? SyS_mkdirat+0x22b/0x2b0 [ 170.206627] ? do_syscall_64+0x281/0x940 [ 170.210669] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 170.216010] ? find_held_lock+0x35/0x1d0 [ 170.220054] ? find_held_lock+0x35/0x1d0 [ 170.224091] ? __lock_is_held+0xb6/0x140 [ 170.228133] ? check_same_owner+0x320/0x320 [ 170.232436] ? rcu_note_context_switch+0x710/0x710 [ 170.237339] ? rcu_read_lock_sched_held+0x108/0x120 [ 170.242334] should_failslab+0xec/0x120 [ 170.246282] kmem_cache_alloc+0x47/0x760 [ 170.250319] ? memcpy+0x45/0x50 [ 170.253573] ? kstrdup+0x59/0x70 [ 170.256919] __kernfs_new_node+0xe2/0x570 [ 170.261042] ? kernfs_dop_revalidate+0x380/0x380 [ 170.265770] ? mark_held_locks+0xaf/0x100 [ 170.269894] ? retint_kernel+0x10/0x10 [ 170.273756] ? kasan_check_read+0x11/0x20 [ 170.277876] ? read_word_at_a_time+0x12/0x20 [ 170.282260] ? strscpy+0x186/0x500 [ 170.285780] kernfs_new_node+0x80/0xe0 [ 170.289646] __kernfs_create_file+0x4b/0x320 [ 170.294038] cgroup_addrm_files+0x3c5/0xa70 [ 170.298340] ? cgroup_file_write+0x710/0x710 [ 170.302732] ? getrawmonotonic64+0x460/0x460 [ 170.307116] ? kernfs_active+0x92/0x160 [ 170.311070] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 170.315973] ? cgroup_kn_set_ugid+0x2c7/0x370 [ 170.320441] ? cgroup_file_name+0x1d0/0x1d0 [ 170.324740] css_populate_dir+0x340/0x420 [ 170.328865] cgroup_mkdir+0x553/0xfc0 [ 170.332638] ? __lock_is_held+0xb6/0x140 [ 170.336678] ? cgroup_destroy_locked+0x750/0x750 [ 170.341407] ? rcu_read_lock_sched_held+0x108/0x120 [ 170.346396] ? kmem_cache_free+0x258/0x2a0 [ 170.350605] ? set_nlink+0xc1/0x160 [ 170.354208] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 170.359111] ? generic_permission+0x105/0x3c0 [ 170.363582] ? cgroup_destroy_locked+0x750/0x750 [ 170.368311] kernfs_iop_mkdir+0x153/0x1e0 [ 170.372433] vfs_mkdir+0x390/0x600 [ 170.375949] SyS_mkdirat+0x22b/0x2b0 [ 170.379637] ? SyS_mknod+0x480/0x480 [ 170.383324] ? trace_hardirqs_on+0xd/0x10 [ 170.387446] ? do_syscall_64+0xb7/0x940 [ 170.391395] ? SyS_mknod+0x480/0x480 [ 170.395086] do_syscall_64+0x281/0x940 [ 170.398946] ? vmalloc_sync_all+0x30/0x30 [ 170.403068] ? _raw_spin_unlock_irq+0x27/0x70 [ 170.407539] ? finish_task_switch+0x1c1/0x7e0 [ 170.412010] ? syscall_return_slowpath+0x550/0x550 [ 170.416918] ? syscall_return_slowpath+0x2ac/0x550 [ 170.421823] ? prepare_exit_to_usermode+0x350/0x350 [ 170.426813] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 170.432153] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 170.436973] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 170.442137] RIP: 0033:0x454e79 [ 170.445301] RSP: 002b:00007fe2ad9eac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 170.452985] RAX: ffffffffffffffda RBX: 00007fe2ad9eb6d4 RCX: 0000000000454e79 [ 170.460229] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 170.467470] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 170.474713] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 170.481956] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000010 2018/03/31 07:41:44 executing program 2: r0 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)="c6cc8e60a78914d500bfeae773ddb642384ef9648af1058f5fbd2fd309524d989e8ca5c3e6e4d185de0489636bb4012cd2281d57a505b82ae678e253ab1603ef18da1e2b4f2acc3c7651ff1c670f5ed1de51a9a5a850687fc0664d9c81b66fefaf800714c085934bd42e3e21ae71d978f3e76fcbfdc2e66adff8be4d85633beb78581bf230f72954dd487c97d06409d3c6e2f7f22be6284a9b", 0x99, 0xfffffffffffffffb) keyctl$describe(0x6, r0, &(0x7f00000002c0)=""/200, 0xc8) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440)={0x0, 0x0, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) flistxattr(r1, &(0x7f00000003c0)=""/26, 0x1a) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20202, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000000, 0x1010, r3, 0xfffffffffffffffd) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000000580)=ANY=[@ANYBLOB="030000000000000002004e22ac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e24ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000006ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24000000090000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ffffffffffffff000000000000000000000000000000000000000000000002004e210000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d2ffbf53fa5fa447000000000000000000000000000000000000000000000000000000000000000002004e20ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008957cae4e8940184f5bd5619981cf50000000000000002004e220000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055d9b00000000000000002004e23ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) pwrite64(r3, &(0x7f00000004c0)="361cf8298589166f6c2d5823c3b913944a09f012cc6a80f1d50171bf0badb6b5ffdeeaef7d6bdec3b31ce16780d2546875ed31070c85d5735d1ca260f2fca2cc539989af5eafe394f9ae07fcd88029971829aeaf797a78f97cd7f8531aeeb62f497a6d2d8c61dc23348ec786a20e624fdf4c5b839bea2dc66b04b7756cc92f852e", 0x81, 0x0) ioctl$EVIOCSREP(r3, 0x40084503, &(0x7f00000000c0)=[0x2, 0x401]) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000400)=0xfff, 0x4) fallocate(r3, 0x3, 0x0, 0x81) ppoll(&(0x7f0000000080)=[{r2}, {r1, 0x208}, {r3, 0x28}], 0x3, &(0x7f0000000040), &(0x7f0000000140)={0x70000000000}, 0x8) 2018/03/31 07:41:44 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) acct(&(0x7f0000001240)='./file0\x00') setrlimit(0xa, &(0x7f0000000380)={0x4, 0x1}) getsockname(0xffffffffffffff9c, &(0x7f0000001480)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f00000012c0)=0x80) socketpair(0x10, 0x0, 0x8, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000001580)={r3}) r4 = open(&(0x7f00000010c0)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000001300)={0x8, 0x0, 0x6, 0x58a, 0x0}, &(0x7f0000001340)=0x10) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x3052, r3, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f00000001c0)={'bond0\x00', {0x2, 0x4e20, @multicast2=0xe0000002}}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYBLOB="408615824f3f781ae75fcc9554f019621eaccb21d7ca5fb77c06ff41c0d07d78b6de0ed01fa10b1070cb77afb61679a7f893b0c78371e1195ef393dc87b1b329811e67705b9e1bb5dc00c5b14645b010d310e491c159a81b77145882a63f6206ecfb54b4f6b2ddf7963c2b2681ff1aa2dfd55f1e73b02e150e1f8e51e6ae3615336ed2b2b461fccd4ec00311dd4b00cf4316fb4bda9fa1a0a94d01d4db3209cd302a449b841dc10fcc2d63482b979cb70c21ef7000e655a7a1a18b57b6cd06267ef9f582b4783e42e60f460962921710e11ac51a3f9fa92e9118c5f0e1d8b2c342"], &(0x7f0000000040)=0x2) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000100)={r7, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000001380)={r5, @in6={{0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0xf}}}, 0x0, 0x7, 0x0, 0x8, 0x92}, &(0x7f0000001440)=0x98) eventfd(0xffffffff80000001) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000001140)={0x4, 0x8001, 0x40, 0xfffffffffffffffd, 0x0}, &(0x7f0000001180)=0x10) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f0000001500)) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000011c0)={0x95e, 0x101, 0x8009, 0x1ff, 0x31386ac8, 0x8, 0x1, 0x7, r8}, 0x20) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x1, 0x1) recvfrom(r1, &(0x7f00000015c0)=""/83, 0x53, 0x120, 0x0, 0x0) symlinkat(&(0x7f0000001080)='./file0\x00', r4, &(0x7f0000001100)='./file0\x00') close(r0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={r4, 0xffffffffffffffff, 0x4, 0x3}, 0x10) getsockname$netlink(r1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) 2018/03/31 07:41:44 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x80, 0x0) socket$pptp(0x18, 0x1, 0x2) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x1, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r1, 0x8913, &(0x7f0000000000)={'ipddp0\x00', @ifru_flags=0x202}) syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x3, 0x80000) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000000140)) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000040)={0x10001, {{0x2, 0x0, @multicast1=0xe0000001}}}, 0x88) [ 170.489386] cgroup: cgroup_addrm_files: failed to add cgroup.subtree_control, err=-12 2018/03/31 07:41:44 executing program 3: mkdir(&(0x7f0000000640)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000140)={0x0, 0x1}, &(0x7f0000000180)=0x8) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x480, 0x0) unshare(0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000564000)=@abs, 0x6e, &(0x7f0000451ff0)=[{&(0x7f0000007000)="002a932f01000000cf960802e02348f800000000001c0003f2a576", 0x1b}], 0x1, &(0x7f00001f9fe0)}, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000380)='/dev/sg#\x00', 0x40000000000000, 0x0) execve(&(0x7f00000002c0)='./file0\x00', &(0x7f00000003c0)=[&(0x7f0000000300)='\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='9p\x00', &(0x7f0000000540)='9p\x00', &(0x7f0000000600)='proc+\x00']) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000fc0)=[{{&(0x7f00000006c0)=@vsock={0x28, 0x0, 0xffffffff, @my=0x0}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000740)="40397fb237c67cddc876d3f5f81169d4501ed35404c4a612613b5b57b5861c67c81cf9bd35017b85138df39baf4c52b59f424c40f32e2b5f923956785676c399e83dff000edabd", 0x47}], 0x1, &(0x7f0000003640)=ANY=[], 0x0, 0x10}, 0x5}], 0x1, 0x814) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00003ebffb)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000d6c000)="ffffff7f00000000", 0x8, r3) r4 = add_key$user(&(0x7f0000ef5000)='user\x00', &(0x7f00008fa000)={0x73, 0x79, 0x7a}, &(0x7f0000537ffd)="000386", 0x3, r3) r5 = add_key$user(&(0x7f0000688000)='user\x00', &(0x7f00008d9ffb)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000f19edc)="b33ab76079ebe0d14f729cd653e520d29ad7ef0000000000000044c249b544230b9387fb8bd6ed266ccf59ef70995bf2e8e0ecd3fff32853747eda22d2818d08ca27e0ec821620e365a0e6b9485f2d925493f62113e33e5f8c7eba67fc19a9497f5b07e5849d2e875b066cd6401d36616fe0f3c3002801b4627ee7597689525e8e81f750a86eb580fb4690ea52246bd3d32b1a91f944edb74b1f50ae08c5387ed8fd0598b600579f3af3f864e1c324f6928f6672f98f7e149bd61bd78b506e8b", 0xc0, r3) r6 = request_key(&(0x7f0000a98ffb)='user\x00', &(0x7f0000626000)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000dde000)="2f6465612f7675746f66730719", 0x0) keyctl$dh_compute(0x17, &(0x7f00004c8ff4)={r4, r5, r6}, &(0x7f00005cd000), 0x0, &(0x7f000010c000)={&(0x7f0000bf4ff3)={'ghash-generic\x00'}, &(0x7f0000000000)}) ppoll(&(0x7f0000000500)=[{r1, 0x1}, {r0, 0x60}, {r0, 0x531}, {0xffffffffffffffff, 0x2000}, {0xffffffffffffffff, 0x100}, {r1, 0x408}, {r0, 0x200}, {0xffffffffffffffff, 0x8000}], 0x8, &(0x7f0000000580), &(0x7f00000005c0)={0x7ff}, 0x8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40005a00}, 0xc, &(0x7f0000000480)={&(0x7f0000000840)=ANY=[]}, 0x1, 0x0, 0x0, 0x20008800}, 0xc0c0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000200)=0x1c, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000240), &(0x7f0000000280)=0x4) r7 = socket(0x10, 0x802, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r7, 0x89e0, &(0x7f00000007c0)={r7, r0}) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) write(0xffffffffffffffff, &(0x7f0000000400)="24070000000000000000d3b720f0ce83a80075060000ffa89d2c37d9ed3bea9d596bf3e2ffb4d17a02e9b2c464974ac924691e56b878", 0x36) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000140)={0x6, 0x0, 0x8002, 0x8000, 0x0, 0x9, 0x8, 0xbb2d}, 0x20) r8 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r8, &(0x7f0000000840), 0x1000000000000037, 0x0) userfaultfd(0x800) 2018/03/31 07:41:44 executing program 0: unshare(0x8000400) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget(0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f00000012c0)=ANY=[@ANYBLOB="01"], 0x1, 0x0) unshare(0xc000000) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000040)={{{@in=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000000140)=0xe8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.events\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000280)={0x0, 0xec, "fcfd4b145d9e3806e10cdeace73394ac741e6fc4862a5ebc350a64dd14016e7dd15be59e6e95c7c24d649310e98ecb807b98c413ecd7e22aca76249421412570c431669e44442583bbfd992e929d84738972558f472983d7491cd903535191c61a28888f3b827954480ca2adafe91e4e0c02cfa9a948fa0c60441ef2eea7a8a5887889f10303c1d6cf2eb24d6fb57d06f2ddebf4d5af47f37b1584124579bf6a3194a0c84486f37a9c68b4e4ec538f21ce36cf1d462e7cfa4aeabd342bd5cb5adf42a38e6f7eab1373784cef52c35db3d3aa98fff80192862f822d29472896cb1aa977e1591c562cd49d7a56"}, &(0x7f0000000380)=0xf4) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f00000003c0)={r3, 0x3b, "5527df156bc64b58d04488a7b257a42444b12924cc436e47381d075fcf0ce73ebc30aa776cf97e63ef74c06415482d7da548afe658f25524725a64"}, &(0x7f0000000440)=0x43) bind$packet(r0, &(0x7f0000000180)={0x11, 0xf6, r1, 0x1, 0xea, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x14) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000001080)={@loopback={0x0, 0x1}}) getresgid(&(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640)) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x100, 0x110) r4 = syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x8, 0x0) ioctl$TIOCCBRK(r4, 0x5428) 2018/03/31 07:41:44 executing program 4: r0 = socket$pppoe(0x18, 0x1, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f00000000c0)=0x14) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f00000001c0)={0x18, 0x0, {0x3, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 'bond0\x00'}}, 0x1e) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={"6c6fe5ca0f8b000f000003f1220100", 0x0}) r5 = request_key(&(0x7f0000000540)='rxrpc\x00', &(0x7f0000000580)={0x73, 0x79, 0x7a, 0x3}, &(0x7f00000005c0)='lo\x00', 0x0) keyctl$read(0xb, r5, &(0x7f0000000600)=""/93, 0x5d) ioctl$sock_SIOCGIFINDEX(r3, 0x8937, &(0x7f0000000040)={'bond0\x00', r4}) connect$pppoe(r0, &(0x7f0000000100)={0x18, 0x0, {0x1, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 'erspan0\x00'}}, 0x1e) sysfs$2(0x2, 0x2, &(0x7f0000000480)=""/132) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000200)={0xffffffffffffffff}) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000240)={{{@in6, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000340)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000380)={{{@in=@rand_addr=0x6, @in6=@mcast2={0xff, 0x2, [], 0x1}, 0x4e24, 0x0, 0x4e21, 0x81, 0xa, 0xcb7c340c90b55933, 0x80, 0x0, r1, r7}, {0x1000, 0x5, 0x5, 0x9, 0x1000, 0x7f, 0x6}, {0x75, 0x40, 0xf842, 0x4}, 0x1, 0x6e6bb1, 0x0, 0x0, 0x3, 0x2}, {{@in6, 0x4d4, 0x6c}, 0x2, @in=@dev={0xac, 0x14, 0x14, 0xd}, 0x3504, 0x0, 0x3, 0x40, 0x1, 0x0, 0x3}}, 0xe8) r8 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x5, 0x101040) ioctl$sock_inet6_tcp_SIOCOUTQ(r8, 0x5411, &(0x7f0000000180)) 2018/03/31 07:41:44 executing program 7 (fault-call:10 fault-nth:17): r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4900, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000240)=0x4) getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) r1 = dup(0xffffffffffffff9c) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r2 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r2, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r2, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r2, &(0x7f0000000100)=""/65, 0x41) r3 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) fchdir(r2) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(r3, &(0x7f0000000200)='./file1\x00', r2, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r2, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000580)=""/80, 0x50}, {&(0x7f00000008c0)=""/4096, 0x1000}], 0x2, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x20) r5 = syz_open_dev$sndpcmp(&(0x7f00000018c0)='/dev/snd/pcmC#D#p\x00', 0x3, 0x10a00) ioctl$KVM_GET_DEVICE_ATTR(r5, 0x4018aee2, &(0x7f0000001940)={0x0, 0x100, 0x9, &(0x7f0000001900)}) recvfrom$ipx(r4, &(0x7f00000006c0)=""/52, 0x34, 0x100, &(0x7f0000000700)={0x4, 0x9a2, 0x4, "dc108d9d4391", 0x5}, 0x10) renameat(r2, &(0x7f0000001980)='./file1\x00', r5, &(0x7f00000019c0)='./file0/file0\x00') r6 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r6, 0x4, 0x0) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000040), 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r6, &(0x7f0000000200), 0xfffffe08) 2018/03/31 07:41:44 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) acct(&(0x7f0000001240)='./file0\x00') setrlimit(0xa, &(0x7f0000000380)={0x4, 0x1}) getsockname(0xffffffffffffff9c, &(0x7f0000001480)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f00000012c0)=0x80) socketpair(0x10, 0x0, 0x8, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000001580)={r3}) r4 = open(&(0x7f00000010c0)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000001300)={0x8, 0x0, 0x6, 0x58a, 0x0}, &(0x7f0000001340)=0x10) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x3052, r3, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f00000001c0)={'bond0\x00', {0x2, 0x4e20, @multicast2=0xe0000002}}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYBLOB="408615824f3f781ae75fcc9554f019621eaccb21d7ca5fb77c06ff41c0d07d78b6de0ed01fa10b1070cb77afb61679a7f893b0c78371e1195ef393dc87b1b329811e67705b9e1bb5dc00c5b14645b010d310e491c159a81b77145882a63f6206ecfb54b4f6b2ddf7963c2b2681ff1aa2dfd55f1e73b02e150e1f8e51e6ae3615336ed2b2b461fccd4ec00311dd4b00cf4316fb4bda9fa1a0a94d01d4db3209cd302a449b841dc10fcc2d63482b979cb70c21ef7000e655a7a1a18b57b6cd06267ef9f582b4783e42e60f460962921710e11ac51a3f9fa92e9118c5f0e1d8b2c342"], &(0x7f0000000040)=0x2) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000100)={r7, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000001380)={r5, @in6={{0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0xf}}}, 0x0, 0x7, 0x0, 0x8, 0x92}, &(0x7f0000001440)=0x98) eventfd(0xffffffff80000001) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000001140)={0x4, 0x8001, 0x40, 0xfffffffffffffffd, 0x0}, &(0x7f0000001180)=0x10) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f0000001500)) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000011c0)={0x95e, 0x101, 0x8009, 0x1ff, 0x31386ac8, 0x8, 0x1, 0x7, r8}, 0x20) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x1, 0x1) recvfrom(r1, &(0x7f00000015c0)=""/83, 0x53, 0x120, 0x0, 0x0) symlinkat(&(0x7f0000001080)='./file0\x00', r4, &(0x7f0000001100)='./file0\x00') close(r0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={r4, r4, 0x0, 0x3}, 0x10) getsockname$netlink(r1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) [ 170.709711] FAULT_INJECTION: forcing a failure. [ 170.709711] name failslab, interval 1, probability 0, space 0, times 0 [ 170.721111] CPU: 0 PID: 13735 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #372 [ 170.728875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 170.738209] Call Trace: [ 170.740777] dump_stack+0x194/0x24d [ 170.744384] ? arch_local_irq_restore+0x53/0x53 [ 170.749046] should_fail+0x8c0/0xa40 [ 170.752745] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 170.757826] ? kernfs_add_one+0x50/0x450 [ 170.761866] ? rb_first_postorder+0xa0/0xa0 [ 170.766164] ? kernfs_add_one+0x50/0x450 [ 170.770209] ? trace_event_raw_event_lock+0x340/0x340 [ 170.775376] ? trace_hardirqs_off+0x10/0x10 [ 170.779682] ? find_held_lock+0x35/0x1d0 [ 170.783724] ? __lock_is_held+0xb6/0x140 [ 170.787774] ? check_same_owner+0x320/0x320 [ 170.792073] ? lock_downgrade+0x980/0x980 [ 170.796201] ? rcu_note_context_switch+0x710/0x710 [ 170.801124] should_failslab+0xec/0x120 [ 170.805078] __kmalloc_track_caller+0x5f/0x760 [ 170.809643] ? idr_alloc_cyclic+0x1d6/0x320 [ 170.813947] ? kstrdup_const+0x39/0x50 [ 170.817812] ? __mutex_unlock_slowpath+0xe9/0xac0 [ 170.822635] kstrdup+0x39/0x70 [ 170.825806] kstrdup_const+0x39/0x50 [ 170.829499] __kernfs_new_node+0xa2/0x570 [ 170.833629] ? kernfs_dop_revalidate+0x380/0x380 [ 170.838370] ? kasan_check_read+0x11/0x20 [ 170.842495] ? read_word_at_a_time+0x12/0x20 [ 170.846882] ? strscpy+0x186/0x500 [ 170.850412] kernfs_new_node+0x80/0xe0 [ 170.854279] __kernfs_create_file+0x4b/0x320 [ 170.858671] cgroup_addrm_files+0x3c5/0xa70 [ 170.862978] ? cgroup_file_write+0x710/0x710 [ 170.867372] ? getrawmonotonic64+0x460/0x460 [ 170.871760] ? kernfs_active+0x92/0x160 [ 170.875718] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 170.880621] ? cgroup_kn_set_ugid+0x2c7/0x370 [ 170.885091] ? cgroup_file_name+0x1d0/0x1d0 [ 170.889402] css_populate_dir+0x340/0x420 [ 170.893534] cgroup_mkdir+0x553/0xfc0 [ 170.897311] ? __lock_is_held+0xb6/0x140 [ 170.901354] ? cgroup_destroy_locked+0x750/0x750 [ 170.906090] ? rcu_read_lock_sched_held+0x108/0x120 [ 170.911084] ? kmem_cache_free+0x258/0x2a0 [ 170.915302] ? set_nlink+0xc1/0x160 [ 170.918906] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 170.923810] ? generic_permission+0x105/0x3c0 [ 170.928284] ? cgroup_destroy_locked+0x750/0x750 [ 170.933021] kernfs_iop_mkdir+0x153/0x1e0 [ 170.937152] vfs_mkdir+0x390/0x600 [ 170.940672] SyS_mkdirat+0x22b/0x2b0 [ 170.944368] ? SyS_mknod+0x480/0x480 [ 170.948060] ? trace_hardirqs_on+0xd/0x10 [ 170.952189] ? do_syscall_64+0xb7/0x940 [ 170.956140] ? SyS_mknod+0x480/0x480 [ 170.959831] do_syscall_64+0x281/0x940 [ 170.963695] ? vmalloc_sync_all+0x30/0x30 [ 170.967818] ? _raw_spin_unlock_irq+0x27/0x70 [ 170.972291] ? finish_task_switch+0x1c1/0x7e0 [ 170.976767] ? syscall_return_slowpath+0x550/0x550 [ 170.981673] ? syscall_return_slowpath+0x2ac/0x550 [ 170.986580] ? prepare_exit_to_usermode+0x350/0x350 [ 170.991575] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 170.996922] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 171.001749] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 171.006915] RIP: 0033:0x454e79 [ 171.010083] RSP: 002b:00007fe2ad9eac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 171.017771] RAX: ffffffffffffffda RBX: 00007fe2ad9eb6d4 RCX: 0000000000454e79 [ 171.025022] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 171.032272] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 171.039517] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 171.046765] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000011 [ 171.054100] cgroup: cgroup_addrm_files: failed to add cgroup.events, err=-12 2018/03/31 07:41:45 executing program 2: r0 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)="c6cc8e60a78914d500bfeae773ddb642384ef9648af1058f5fbd2fd309524d989e8ca5c3e6e4d185de0489636bb4012cd2281d57a505b82ae678e253ab1603ef18da1e2b4f2acc3c7651ff1c670f5ed1de51a9a5a850687fc0664d9c81b66fefaf800714c085934bd42e3e21ae71d978f3e76fcbfdc2e66adff8be4d85633beb78581bf230f72954dd487c97d06409d3c6e2f7f22be6284a9b", 0x99, 0xfffffffffffffffb) keyctl$describe(0x6, r0, &(0x7f00000002c0)=""/200, 0xc8) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440)={0x0, 0x0, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='mounts\x00') write$vnet(r2, &(0x7f0000001a40)={0x1, {&(0x7f00000003c0)=""/47, 0x2f, &(0x7f0000000a40)=""/4096, 0x3, 0x4}}, 0x68) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20202, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r2, 0x8919, &(0x7f0000000480)={'sit0\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x1010, r4, 0x0) setsockopt$inet_MCAST_MSFILTER(r4, 0x0, 0x30, &(0x7f0000000580)=ANY=[@ANYBLOB="030000000000000002004e22ac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e24ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000006ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ffffffffffffff000000000000000000000000000000000000000000000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e220000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) pwrite64(r4, &(0x7f00000004c0)="361cf8298589166f6c2d5823c3b913944a09f012cc6a80f1d50171bf0badb6b5ffdeeaef7d6bdec3b31ce16780d2546875ed31070c85d5735d1ca260f2fca2cc539989af5eafe394f9ae07fcd88029971829aeaf797a78f97cd7f8531aeeb62f497a6d2d8c61dc23348ec786a20e624fdf4c5b839bea2dc66b04b7756cc92f852e", 0x81, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f0000000400)=0xfff, 0x4) fallocate(r4, 0x3, 0x0, 0x81) ppoll(&(0x7f0000000080)=[{r3}, {r1, 0x208}, {r4, 0x28}], 0x3, &(0x7f00000000c0), &(0x7f0000000140)={0x70000000000}, 0x8) 2018/03/31 07:41:45 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) acct(&(0x7f0000001240)='./file0\x00') setrlimit(0xa, &(0x7f0000000380)={0x4, 0x1}) getsockname(0xffffffffffffff9c, &(0x7f0000001480)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f00000012c0)=0x80) socketpair(0x10, 0x0, 0x8, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000001580)={r3}) r4 = open(&(0x7f00000010c0)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000001300)={0x8, 0x0, 0x6, 0x58a, 0x0}, &(0x7f0000001340)=0x10) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x3052, r3, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f00000001c0)={'bond0\x00', {0x2, 0x4e20, @multicast2=0xe0000002}}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYBLOB="408615824f3f781ae75fcc9554f019621eaccb21d7ca5fb77c06ff41c0d07d78b6de0ed01fa10b1070cb77afb61679a7f893b0c78371e1195ef393dc87b1b329811e67705b9e1bb5dc00c5b14645b010d310e491c159a81b77145882a63f6206ecfb54b4f6b2ddf7963c2b2681ff1aa2dfd55f1e73b02e150e1f8e51e6ae3615336ed2b2b461fccd4ec00311dd4b00cf4316fb4bda9fa1a0a94d01d4db3209cd302a449b841dc10fcc2d63482b979cb70c21ef7000e655a7a1a18b57b6cd06267ef9f582b4783e42e60f460962921710e11ac51a3f9fa92e9118c5f0e1d8b2c342"], &(0x7f0000000040)=0x2) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000100)={r7, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000001380)={r5, @in6={{0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0xf}}}, 0x0, 0x7, 0x0, 0x8, 0x92}, &(0x7f0000001440)=0x98) eventfd(0xffffffff80000001) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000001140)={0x4, 0x8001, 0x40, 0xfffffffffffffffd, 0x0}, &(0x7f0000001180)=0x10) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f0000001500)) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000011c0)={0x95e, 0x101, 0x8009, 0x1ff, 0x31386ac8, 0x8, 0x1, 0x7, r8}, 0x20) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x1, 0x1) recvfrom(r1, &(0x7f00000015c0)=""/83, 0x53, 0x120, 0x0, 0x0) symlinkat(&(0x7f0000001080)='./file0\x00', r4, &(0x7f0000001100)='./file0\x00') close(r0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={r4, r4, 0x0, 0x3}, 0x10) getsockname$netlink(r1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) 2018/03/31 07:41:45 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x9, &(0x7f0000000080)='./file0\x00', r1, &(0x7f0000000180)="ba0f9d0d08ff065787c816414c3a4a5929398c19a5ecabcc42226bbc4ec76a288864029c7adbcfc403d36cd611bf9efcaf4902fa4630a54ad058851fb593be41314cbfa73422c0dff6701d393b95481a57a6a5a0d8366b420a4ab6659445df1fbfcb181f50f9f9") bind$alg(r0, &(0x7f0000f35000)={0x26, "68617368000000000000000200", 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r2 = syz_open_dev$sndmidi(&(0x7f0000000500)='/dev/snd/midiC#D#\x00', 0x2, 0x400) ioctl$VHOST_SET_VRING_ENDIAN(r2, 0x4008af13, &(0x7f00000005c0)={0x2, 0x5}) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x4000, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000240)=0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={r2, 0x28, &(0x7f0000000640)}, 0x10) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f00000002c0)={{0x557, 0x6, 0x7, 0x7, "00b57ca2bff185c4a7425eeb60a33e47899a55b7ba8ddbb898aa2a2581958bec8d64aaca59f038e060616116", 0x6}, 0x0, 0x0, 0x4, r4, 0x6, 0x715, "588adc80cdb872a4ae2e7e967b952c67e2bd905597d01cb33040db6f6f7913bd92e5df821c74c770c5965de5645f85316cd311fe4e449fcb92f43bcb28f883d9", &(0x7f0000000280)="68617368000000000000000200", 0xd, [], [0x6, 0x9, 0x3, 0x200]}) ioctl$KDSETMODE(r3, 0x4b3a, 0xa0000000000) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000480)={0x0, 0x4, 0x30, 0x1, 0x3}, &(0x7f00000004c0)=0x18) setsockopt$inet_sctp_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000580)=@assoc_value={r5, 0x3}, 0x5) accept$ipx(0xffffffffffffffff, 0x0, &(0x7f0000000040)=0xffffffffffffff97) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x71}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r6, 0x6, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x6) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000cdfffc), 0x0) r7 = accept$alg(r0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r8 = socket$bt_cmtp(0x1f, 0x3, 0x5) poll(&(0x7f0000000540)=[{r0, 0xd020}, {r8}], 0x2, 0x7fffffff) sendto$inet(r7, &(0x7f0000e53000), 0x0, 0x2404c815, &(0x7f0000176000)={0x2, 0x4e20, @broadcast=0xffffffff}, 0x10) setresuid(r1, r1, r1) fchmod(r3, 0x11b) openat$dir(0xffffffffffffff9c, &(0x7f0000000600)='./file0\x00', 0x100, 0x142) 2018/03/31 07:41:45 executing program 1: r0 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0xfffffffffffffffb, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r0, 0xc0106403, &(0x7f0000000200)={0x6, 0x800, 0x6c99, 0x7fff}) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = fcntl$dupfd(r1, 0x406, r1) bind(r4, &(0x7f0000000180)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sha512_mb\x00'}, 0x80) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000340)=""/90) pwrite64(r0, &(0x7f0000000400)="ef80b47b8ea20172430a9f9a430ef49467d191fb0d5837990202d6e532a362b0888a1e4b87b0f826bcac2fbe663d8a58844b18d1886a95086ab4f941b10525f814bb846f0835ac98049b18d8e32cad5353dd230e01260e548d1355a97ebdddaf1da4fc605fc782ed495e4e565cc4287af47e53ff4d24118569f93744b0dbcd33a374e2554cd3d5dbdee3cdef70840995dd565875c4ecfeb99b548d3527538082ed2aeda95dfe3e524aca89c60ecb6198cc2e2ac9f2b6042c8b8696c2b8152591e1b754d9a6522c0dabd358e3cc37fd", 0xcf, 0x0) fcntl$getown(r3, 0x9) connect$llc(r4, &(0x7f00000003c0)={0x1a, 0x10f, 0x1, 0x800, 0xfffffffffffffffa, 0x8, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) socket$inet(0x2, 0x80000, 0x20) readv(r2, &(0x7f0000000300)=[{&(0x7f0000000240)=""/188, 0xbc}], 0x1) arch_prctl(0x1001, &(0x7f00000000c0)="802c576f7f3a6f1c7c43b42f373bac2d43b6201116ef0498eabe759fb90a8e122e8f38b04e0ea2fef4ad6fa288df4a3d362e67aa3196b4b6ba8172e28b9942579ceb8d92f75ab96ddefadb99578748632e15db7f0aad3f38c40949a04cca00ee3b315aa41f90d3c67255f041700dc3254ced7c06285d6644426158607952d3573361ca03bef709d2e05a4fd631a5f61587c93df076802f8f09de18d2b42993855f2685b309efae9e64d7d11c76a8") 2018/03/31 07:41:45 executing program 7 (fault-call:10 fault-nth:18): r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4900, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000240)=0x4) getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) r1 = dup(0xffffffffffffff9c) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r2 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r2, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r2, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r2, &(0x7f0000000100)=""/65, 0x41) r3 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) fchdir(r2) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(r3, &(0x7f0000000200)='./file1\x00', r2, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r2, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000580)=""/80, 0x50}, {&(0x7f00000008c0)=""/4096, 0x1000}], 0x2, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x20) r5 = syz_open_dev$sndpcmp(&(0x7f00000018c0)='/dev/snd/pcmC#D#p\x00', 0x3, 0x10a00) ioctl$KVM_GET_DEVICE_ATTR(r5, 0x4018aee2, &(0x7f0000001940)={0x0, 0x100, 0x9, &(0x7f0000001900)}) recvfrom$ipx(r4, &(0x7f00000006c0)=""/52, 0x34, 0x100, &(0x7f0000000700)={0x4, 0x9a2, 0x4, "dc108d9d4391", 0x5}, 0x10) renameat(r2, &(0x7f0000001980)='./file1\x00', r5, &(0x7f00000019c0)='./file0/file0\x00') r6 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r6, 0x4, 0x0) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000040), 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r6, &(0x7f0000000200), 0xfffffe08) 2018/03/31 07:41:45 executing program 0: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24) r1 = getpid() r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0xc0001) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000180)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000002c0)=0x18) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000300)={r3, 0xb2}, &(0x7f0000000340)=0x8) syz_open_pts(r2, 0x200) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000000)=r1) r4 = syz_genetlink_get_family_id$fou(&(0x7f00000003c0)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80080}, 0xc, &(0x7f0000000200)={&(0x7f0000000480)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="00042dbd70f9186fea25bba7080089047edfb973718ffd2f03000000080002250000000000000008000300a7000000080002000200000000fdffffff"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x4000) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x1d) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000280), 0x4) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000400), &(0x7f0000000440)=0xc) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2400, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0x40345410, &(0x7f00000000c0)={{0x2, 0x0, 0xcb, 0x3, 0xd480}}) syz_genetlink_get_family_id$fou(&(0x7f0000000380)='fou\x00') 2018/03/31 07:41:45 executing program 4: open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0) r0 = open$dir(&(0x7f0000000500)='./file0\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x6, 0x8000) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f0000000080)=0x10800801d) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) write(r0, &(0x7f0000000300)="d8", 0x1) sendfile(r0, r0, &(0x7f0000000040), 0x0) syz_mount_image$vfat(&(0x7f0000001640)='vfat\x00', &(0x7f0000001680)='./file0\x00', 0x0, 0x1, &(0x7f0000002900)=[{&(0x7f00000016c0)="cf029ff80a1c57176fcec2ab1bff3e9ffbe0d31231540853608f9da1c7222aad36e440f9ff9e69b8e53ae45dc736ca700022dc4ec4", 0x35, 0x9}], 0x1001, &(0x7f0000002980)) 2018/03/31 07:41:45 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000c9cff0)='/dev/input/event#\x00', 0x0, 0x80002) write$evdev(r0, &(0x7f0000057fa0)=[{{}, 0x0, 0x100000001}, {}], 0x30) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000433000)=""/176) r1 = dup3(r0, r0, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0x4008af13, &(0x7f0000000180)={0x0, 0x3ad}) socket$alg(0x26, 0x5, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f00000002c0)='/dev/snd/pcmC#D#p\x00', 0x1, 0x0) recvmsg(r2, &(0x7f0000000640)={&(0x7f0000000100)=@un=@abs, 0x80, &(0x7f0000000880)=[{&(0x7f0000000180)}, {&(0x7f0000000540)=""/194, 0xc2}, {&(0x7f0000000200)=""/153, 0x99}, {&(0x7f00000006c0)=""/140, 0x8c}, {&(0x7f0000000780)=""/218, 0xda}], 0x5, 0x0, 0x0, 0xffff}, 0x120) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer\x00', 0x2000, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x80003) r5 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x301000) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000300)=ANY=[@ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="3349ff8b9da889e76de154a49d5a62c600", @ANYPTR=&(0x7f0000000900)=ANY=[@ANYBLOB="a31a31d232f7b9867d79fb8a5e87035d1a34f48b12d171e14a4c58398497b45ffa856dbef05a89ca163562164c06506d92cad0f83d59df4c333855e6d8e2d87ff94653a9ec9f508f0b0aa2d9de0a07959953e0849dbcfec5441a744024cd9dde8966e7057cd9b3fd096cd087f32df7fdb314c9338c5654e938e51c16e01e5d1884f39bee3034baa3db9ae26e4856b646f1837f1be59232427f858086d570505c22a1795d6ff1c4271426a84d2525d60f161ffc043dfa316ab2400ae12dce2d9d1ca3b2146d706be7e8b5880921b1a4755933c48963f37f5b5b8e664554ba764c7d072be7c0470de35643bac530b9aa868f01040411dad792ed"], @ANYBLOB="0905ff7f0200070006000000008000005ad192febe67b23eba5d4ad46b1b4659f2de79d4eb88ad5922b25b0d6583ca2b6c87caa70d9c00c4647b7a6309b390236556aaf27506dba6ca2642cf877f0116c1b814748a23af8915e73746e766d697871f9473bd8acce8d5df59ecb1dc322a1ec9ac209f822211198772d34840d6d927c39d4ccdf627d184c187383f10a13bef7e79ad3b69f7a4a1bb62f92b139de49e496d9f91a7c47c65734311d43845edf8553babe076a3291f9c4f9de54f34938544b4ddc0c6a0b95121c38bc43d99ab81d41d8a634af88a44dd96300000000000000000000000"]) r6 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x40100, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r6, 0x80045500, &(0x7f0000000040)=""/76) [ 171.166322] FAULT_INJECTION: forcing a failure. [ 171.166322] name failslab, interval 1, probability 0, space 0, times 0 [ 171.177639] CPU: 1 PID: 13753 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #372 [ 171.184990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 171.194332] Call Trace: [ 171.196911] dump_stack+0x194/0x24d [ 171.200517] ? arch_local_irq_restore+0x53/0x53 [ 171.205165] should_fail+0x8c0/0xa40 [ 171.208854] ? kstrdup+0x39/0x70 [ 171.212198] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 171.217272] ? cgroup_mkdir+0x553/0xfc0 [ 171.221224] ? vfs_mkdir+0x390/0x600 [ 171.224911] ? SyS_mkdirat+0x22b/0x2b0 [ 171.228771] ? do_syscall_64+0x281/0x940 [ 171.232807] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 171.238149] ? find_held_lock+0x35/0x1d0 [ 171.242185] ? find_held_lock+0x35/0x1d0 [ 171.246220] ? __lock_is_held+0xb6/0x140 [ 171.250262] ? check_same_owner+0x320/0x320 [ 171.254560] ? rcu_note_context_switch+0x710/0x710 [ 171.259468] ? rcu_read_lock_sched_held+0x108/0x120 [ 171.264463] should_failslab+0xec/0x120 [ 171.268412] kmem_cache_alloc+0x47/0x760 [ 171.272444] ? memcpy+0x45/0x50 [ 171.275697] ? kstrdup+0x59/0x70 [ 171.279041] __kernfs_new_node+0xe2/0x570 [ 171.283164] ? kernfs_dop_revalidate+0x380/0x380 [ 171.287896] ? kasan_check_read+0x11/0x20 [ 171.292024] ? read_word_at_a_time+0x12/0x20 [ 171.296409] ? strscpy+0x186/0x500 [ 171.299928] kernfs_new_node+0x80/0xe0 [ 171.303789] __kernfs_create_file+0x4b/0x320 [ 171.308173] cgroup_addrm_files+0x3c5/0xa70 [ 171.312473] ? cgroup_file_write+0x710/0x710 [ 171.316861] ? getrawmonotonic64+0x460/0x460 [ 171.321245] ? kernfs_active+0x92/0x160 [ 171.325198] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 171.330100] ? cgroup_kn_set_ugid+0x2c7/0x370 [ 171.334572] ? cgroup_file_name+0x1d0/0x1d0 [ 171.338872] css_populate_dir+0x340/0x420 [ 171.342994] cgroup_mkdir+0x553/0xfc0 [ 171.346773] ? __lock_is_held+0xb6/0x140 [ 171.350809] ? cgroup_destroy_locked+0x750/0x750 [ 171.355538] ? rcu_read_lock_sched_held+0x108/0x120 [ 171.360527] ? kmem_cache_free+0x258/0x2a0 [ 171.364736] ? set_nlink+0xc1/0x160 [ 171.368338] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 171.373237] ? generic_permission+0x105/0x3c0 [ 171.377706] ? cgroup_destroy_locked+0x750/0x750 [ 171.382436] kernfs_iop_mkdir+0x153/0x1e0 [ 171.386562] vfs_mkdir+0x390/0x600 [ 171.390076] SyS_mkdirat+0x22b/0x2b0 [ 171.393762] ? SyS_mknod+0x480/0x480 [ 171.397450] ? trace_hardirqs_on+0xd/0x10 [ 171.401574] ? do_syscall_64+0xb7/0x940 [ 171.405522] ? SyS_mknod+0x480/0x480 [ 171.409208] do_syscall_64+0x281/0x940 [ 171.413073] ? vmalloc_sync_all+0x30/0x30 [ 171.417196] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 171.422704] ? syscall_return_slowpath+0x550/0x550 [ 171.427605] ? syscall_return_slowpath+0x2ac/0x550 [ 171.432511] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 171.437848] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 171.442667] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 171.447832] RIP: 0033:0x454e79 [ 171.450995] RSP: 002b:00007fe2ad9eac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 171.458680] RAX: ffffffffffffffda RBX: 00007fe2ad9eb6d4 RCX: 0000000000454e79 2018/03/31 07:41:45 executing program 2: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000c40)="4e12dcc60fd3d5790419bf51679d5d92ee51d9889d60a1f13736f5fe8c5a956f88fed5f3439a4a1c74ccae1b9cde165578b147beea7557f89100000000000000000000000000000000000000000037e2a3f1e390b8972c105623d77bb454ead15e34c2e0d49050da1e6af7727ba74c0afd488602d29b8667b1e837c3bcf86c2a000000eaba9784aa4a8b6124f76715123b1a72fba334cc94578e4e3d76e072b8316cba", &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000ac0)="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", 0x16d, r0) keyctl$describe(0x6, r1, &(0x7f00000002c0)=""/200, 0xc8) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000240)={0x0, 0x0, 0xffffffffffffffff}) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x80000, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x1010, r4, 0x0) setsockopt$inet_MCAST_MSFILTER(r4, 0x0, 0x30, &(0x7f0000000580)=ANY=[@ANYBLOB="030000000000000002004e22ac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e24ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000006ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ffffffffffffff000000000000000000000000000000000000000000000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e220000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) pwrite64(r4, &(0x7f00000004c0)="361cf8298589166f6c2d5823c3b913944a09f012cc6a80f1d50171bf0badb6b5ffdeeaef7d6bdec3b31ce16780d2546875ed31070c85d5735d1ca260f2fca2cc539989af5eafe394f9ae07fcd88029971829aeaf797a78f97cd7f8531aeeb62f497a6d2d8c61dc23348ec786a20e624fdf4c5b839bea2dc66b04b7756cc92f852e", 0x81, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f0000000400)=0xfff, 0x4) fallocate(r4, 0x3, 0x0, 0x81) ppoll(&(0x7f0000000080)=[{r3}, {r2, 0x208}, {r4, 0x28}], 0x3, &(0x7f00000000c0), &(0x7f0000000140)={0x70000000000}, 0x8) keyctl$describe(0x6, r0, &(0x7f0000000180)=""/45, 0x2d) 2018/03/31 07:41:45 executing program 4: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x3, 0x1000, 0x2, 0x5}}) socket$inet6_sctp(0xa, 0x1, 0x84) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup\x00', 0x200002, 0x0) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f00000000c0)=0x4, &(0x7f0000000100)=0x4) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f00000001c0)) ioctl$KVM_GET_DEVICE_ATTR(r1, 0x4018aee2, &(0x7f0000000180)={0x0, 0xfff, 0x1, &(0x7f0000000140)}) r3 = openat$cgroup_int(r1, &(0x7f0000001340)='memory.high\x00', 0x2, 0x0) pwrite64(r3, &(0x7f0000000080)='e', 0x1, 0x0) recvmsg$kcm(r0, &(0x7f0000001a00)={&(0x7f0000000200)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/22, 0x16}, {&(0x7f0000001340)}, {&(0x7f0000001380)=""/143, 0x8f}, {&(0x7f0000001440)=""/79, 0x4f}, {&(0x7f00000014c0)=""/11, 0xb}, {&(0x7f0000001500)=""/205, 0xcd}, {&(0x7f0000001600)=""/151, 0x97}, {&(0x7f00000016c0)=""/235, 0xeb}, {&(0x7f00000017c0)=""/198, 0xc6}], 0xa, &(0x7f0000001980)=""/121, 0x79, 0x62}, 0x1) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000280)) [ 171.465924] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 171.473164] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 171.480404] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 171.487648] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000012 [ 171.495084] cgroup: cgroup_addrm_files: failed to add cgroup.events, err=-12 2018/03/31 07:41:45 executing program 3: r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r0, &(0x7f0000df8fd9)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) connect$netlink(r0, &(0x7f0000000100)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) r1 = syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x80000) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000300)={0x2, r0, 0x1}) sendto(r0, &(0x7f0000cfefee), 0x209, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000000)=0x7fff, 0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e22, 0xfff, @mcast2={0xff, 0x2, [], 0x1}, 0x5}}, 0xffff, 0x6, 0xc000000000000000, 0x3, 0x1}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={r2, 0x4, 0x6, [0x6, 0x8, 0x81, 0x200000101, 0x101, 0xfff]}, 0xfffffffffffffcb9) r3 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x30000, 0x6c00) syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x3c3, 0x101002) ioctl$KVM_PPC_ALLOCATE_HTAB(r3, 0xc004aea7, &(0x7f0000000080)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) prctl$intptr(0x29, 0x42000000) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f00000000c0), 0x4) 2018/03/31 07:41:45 executing program 1: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000100)={0x6, {{0x2, 0x4e24}}}, 0x88) r1 = getpgrp(0xffffffffffffffff) getpgid(0xffffffffffffffff) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000400)='/dev/sequencer2\x00', 0x0, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r3, 0x4c05, &(0x7f0000000540)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, &(0x7f0000000300)=[@in={0x2, 0x4e22, @loopback=0x7f000001}, @in={0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, @in6={0xa, 0x4e24, 0x5, @remote={0xfe, 0x80, [], 0xbb}, 0x7}], 0x3c) r4 = syz_open_dev$sndtimer(&(0x7f00003aa000)='/dev/snd/timer\x00', 0x0, 0x0) getpgid(r1) ioctl$SNDRV_TIMER_IOCTL_GINFO(r4, 0xc0f85403, &(0x7f0000748f08)={{0x1, 0x0, 0x0, 0x3}, 0x0, 0x0, 'id0\x00', 'timer0\x00'}) r5 = socket$pptp(0x18, 0x1, 0x2) r6 = syz_open_procfs(r1, &(0x7f00000003c0)='ns/uts\x00') accept4$llc(r3, &(0x7f0000000040), &(0x7f00000001c0)=0x10, 0x80800) ioctl$EVIOCGABS20(r2, 0x80184560, &(0x7f0000000440)=""/199) syz_open_dev$urandom(&(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) getsockopt$bt_BT_POWER(r6, 0x112, 0x9, &(0x7f0000000200)=0x177, &(0x7f0000000240)=0x1) lseek(r5, 0x0, 0x0) sendfile(r0, r6, &(0x7f0000000000)=0x40000000000000, 0x7fffffff) sched_setscheduler(r1, 0x0, &(0x7f0000000380)=0x9) ioctl$EVIOCSABS3F(r6, 0x401845ff, &(0x7f0000000340)={0x0, 0xfffffffffffffffd, 0x80, 0x9, 0x4, 0x8}) 2018/03/31 07:41:45 executing program 0: pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) accept$unix(r0, 0x0, &(0x7f0000000100)) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0xffffffff, 0x0, @time, {}, {0x800}, @time=@time={0x77359400}}], 0x30) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000180)={&(0x7f0000011000/0x1000)=nil, 0x1000}) unlink(&(0x7f0000000040)='./file0\x00') bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)={0x0, r2, 0x3, 0x2}, 0x14) getpgid(0x0) sched_setaffinity(0x0, 0x1cd, &(0x7f0000da3000)) link(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./control/file0\x00') utimes(&(0x7f0000967000)='./file0\x00', &(0x7f00000000c0)={{0x77359400}}) dup2(r0, r1) 2018/03/31 07:41:45 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) acct(&(0x7f0000001240)='./file0\x00') setrlimit(0xa, &(0x7f0000000380)={0x4, 0x1}) getsockname(0xffffffffffffff9c, &(0x7f0000001480)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f00000012c0)=0x80) socketpair(0x10, 0x0, 0x8, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000001580)={r3}) r4 = open(&(0x7f00000010c0)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000001300)={0x8, 0x0, 0x6, 0x58a, 0x0}, &(0x7f0000001340)=0x10) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x3052, r3, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f00000001c0)={'bond0\x00', {0x2, 0x4e20, @multicast2=0xe0000002}}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYBLOB="408615824f3f781ae75fcc9554f019621eaccb21d7ca5fb77c06ff41c0d07d78b6de0ed01fa10b1070cb77afb61679a7f893b0c78371e1195ef393dc87b1b329811e67705b9e1bb5dc00c5b14645b010d310e491c159a81b77145882a63f6206ecfb54b4f6b2ddf7963c2b2681ff1aa2dfd55f1e73b02e150e1f8e51e6ae3615336ed2b2b461fccd4ec00311dd4b00cf4316fb4bda9fa1a0a94d01d4db3209cd302a449b841dc10fcc2d63482b979cb70c21ef7000e655a7a1a18b57b6cd06267ef9f582b4783e42e60f460962921710e11ac51a3f9fa92e9118c5f0e1d8b2c342"], &(0x7f0000000040)=0x2) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000100)={r7, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000001380)={r5, @in6={{0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0xf}}}, 0x0, 0x7, 0x0, 0x8, 0x92}, &(0x7f0000001440)=0x98) eventfd(0xffffffff80000001) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000001140)={0x4, 0x8001, 0x40, 0xfffffffffffffffd, 0x0}, &(0x7f0000001180)=0x10) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f0000001500)) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000011c0)={0x95e, 0x101, 0x8009, 0x1ff, 0x31386ac8, 0x8, 0x1, 0x7, r8}, 0x20) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x1, 0x1) recvfrom(r1, &(0x7f00000015c0)=""/83, 0x53, 0x120, 0x0, 0x0) symlinkat(&(0x7f0000001080)='./file0\x00', r4, &(0x7f0000001100)='./file0\x00') close(r0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={r4, r4, 0x0, 0x3}, 0x10) getsockname$netlink(r1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) 2018/03/31 07:41:45 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x200000, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) utime(&(0x7f0000c4c000)='./file0\x00', &(0x7f0000a98000)={0x3}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x0, 0x1, 0x0, 0x2000, &(0x7f0000a98000/0x2000)=nil}) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f0000c9bec8)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0xfffffffffffffffc}) ioctl$KVM_TRANSLATE(r3, 0xc018ae85, &(0x7f0000000080)) 2018/03/31 07:41:47 executing program 2: r0 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)="c6cc8e60a78914d500bfeae773ddb642384ef9648af1058f5fbd2fd309524d989e8ca5c3e6e4d185de0489636bb4012cd2281d57a505b82ae678e253ab1603ef18da1e2b4f2acc3c7651ff1c670f5ed1de51a9a5a850687fc0664d9c81b66fefaf800714c085934bd42e3e21ae71d978f3e76fcbfdc2e66adff8be4d85633beb78581bf230f72954dd487c97d06409d3c6e2f7f22be6284a9b", 0x99, 0xfffffffffffffffb) keyctl$describe(0x6, r0, &(0x7f00000002c0)=""/200, 0xc8) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440)={0x0, 0x0, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20202, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x1010, r3, 0x0) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000000580)=ANY=[@ANYBLOB="030000000000000002004e22ac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e24ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000006ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ffffffffffffff000000000000000000000000000000000000000000000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e220000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) pwrite64(r3, &(0x7f00000004c0)="361cf8298589166f6c2d5823c3b913944a09f012cc6a80f1d50171bf0badb6b5ffdeeaef7d6bdec3b31ce16780d2546875ed31070c85d5735d1ca260f2fca2cc539989af5eafe394f9ae07fcd88029971829aeaf797a78f97cd7f8531aeeb62f497a6d2d8c61dc23348ec786a20e624fdf4c5b839bea2dc66b04b7756cc92f852e", 0x81, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000400)=0xfff, 0x4) fallocate(r3, 0x3, 0x0, 0x81) ppoll(&(0x7f0000000080)=[{r2}, {r1, 0x208}, {r3, 0x28}], 0x3, &(0x7f00000000c0), &(0x7f0000000140)={0x70000000000}, 0x8) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000ac0)={@remote={0xfe, 0x80, [], 0xbb}, 0x8, 0x1, 0x1, 0x2, 0x3, 0x20000000, 0x7077379}, 0x20) r4 = syz_genetlink_get_family_id$fou(&(0x7f00000003c0)='fou\x00') sendmsg$FOU_CMD_GET(r3, &(0x7f0000000a80)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a40)={&(0x7f0000000480)={0x14, r4, 0x200, 0x70bd29, 0x25dfdbfb, {0x3}}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x800) 2018/03/31 07:41:47 executing program 7 (fault-call:10 fault-nth:19): r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4900, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000240)=0x4) getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) r1 = dup(0xffffffffffffff9c) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r2 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r2, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r2, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r2, &(0x7f0000000100)=""/65, 0x41) r3 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) fchdir(r2) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(r3, &(0x7f0000000200)='./file1\x00', r2, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r2, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000580)=""/80, 0x50}, {&(0x7f00000008c0)=""/4096, 0x1000}], 0x2, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x20) r5 = syz_open_dev$sndpcmp(&(0x7f00000018c0)='/dev/snd/pcmC#D#p\x00', 0x3, 0x10a00) ioctl$KVM_GET_DEVICE_ATTR(r5, 0x4018aee2, &(0x7f0000001940)={0x0, 0x100, 0x9, &(0x7f0000001900)}) recvfrom$ipx(r4, &(0x7f00000006c0)=""/52, 0x34, 0x100, &(0x7f0000000700)={0x4, 0x9a2, 0x4, "dc108d9d4391", 0x5}, 0x10) renameat(r2, &(0x7f0000001980)='./file1\x00', r5, &(0x7f00000019c0)='./file0/file0\x00') r6 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r6, 0x4, 0x0) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000040), 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r6, &(0x7f0000000200), 0xfffffe08) 2018/03/31 07:41:47 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000000)={0x0, 0xffffffffffffffff}) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000000)=""/174) close(r0) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f00000008c0)=@pic={0xfffffffffffffffc, 0x7ff, 0x40, 0xffffffff80000001, 0x7, 0xffffffff, 0x7, 0x3, 0x8, 0x4, 0x1, 0x80000001, 0x0, 0x6, 0x211d, 0x41}) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000340)) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = socket$inet(0x2, 0x0, 0x0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r0, 0x4040aea4, &(0x7f0000000100)={0x3, 0x3, 0x5, 0x2}) r4 = dup3(r3, 0xffffffffffffffff, 0x80000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r0, 0xc008551c, &(0x7f00000009c0)=ANY=[@ANYBLOB="09001000000449304d166b4a6f166d5226f90b8b4e3d18404f6f4e63c09766c6aab8ef012adb7f0494dfa3d6826bc078fbaea4c693222873927f2078057630efc69e98ca6c534f2fc4c14723592fd64f72a93448f54dca41fb0b6001438f978900ec7725b1914d82a6b70a1f758e0d99bc3f6dbd24f3ad1cd871d9c37f78cfc2244c46bbe170286e20d2665ee53265fb39daebcdccfc4c04601fdf071283307e69bbe35b3df97ae2a6811d3b745f0a5f0f759870f69fdedbdfb17470879bf768e21194a471c2cbd356941549d400576289eb99fc3b3dc55dad0f5ee9db552f7908"]) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000880)) creat(&(0x7f0000000140)='./file0\x00', 0x4) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x101000, 0x0) r5 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$cgroup_pid(r5, &(0x7f0000000100)=ANY=[], 0x1023c) truncate(&(0x7f0000000280)='./file1\x00', 0x0) write(r5, &(0x7f00000004c0)="15", 0x1) open(&(0x7f0000b91ff9)='./file1\x00', 0xfffc, 0x0) r6 = request_key(&(0x7f0000000240)='cifs.spnego\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000540)='/dev/cuse\x00', 0xfffffffffffffffa) r7 = add_key$keyring(&(0x7f0000000600)='keyring\x00', &(0x7f0000000680)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$search(0xa, r6, &(0x7f0000000580)='id_resolver\x00', &(0x7f00000005c0)={0x73, 0x79, 0x7a, 0x0}, r7) ioctl$KVM_GET_SREGS(r4, 0x8138ae83, &(0x7f0000000380)) fallocate(0xffffffffffffffff, 0x0, 0xffff, 0x9) close(0xffffffffffffffff) setsockopt$kcm_KCM_RECV_DISABLE(r5, 0x119, 0x1, &(0x7f0000000200)=0xb, 0xffffffffffffff69) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f0000000000), &(0x7f0000000300)=0x4) 2018/03/31 07:41:47 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) acct(&(0x7f0000001240)='./file0\x00') setrlimit(0xa, &(0x7f0000000380)={0x4, 0x1}) getsockname(0xffffffffffffff9c, &(0x7f0000001480)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f00000012c0)=0x80) socketpair(0x10, 0x0, 0x8, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000001580)={r3}) r4 = open(&(0x7f00000010c0)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000001300)={0x8, 0x0, 0x6, 0x58a, 0x0}, &(0x7f0000001340)=0x10) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x3052, r3, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f00000001c0)={'bond0\x00', {0x2, 0x4e20, @multicast2=0xe0000002}}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYBLOB="408615824f3f781ae75fcc9554f019621eaccb21d7ca5fb77c06ff41c0d07d78b6de0ed01fa10b1070cb77afb61679a7f893b0c78371e1195ef393dc87b1b329811e67705b9e1bb5dc00c5b14645b010d310e491c159a81b77145882a63f6206ecfb54b4f6b2ddf7963c2b2681ff1aa2dfd55f1e73b02e150e1f8e51e6ae3615336ed2b2b461fccd4ec00311dd4b00cf4316fb4bda9fa1a0a94d01d4db3209cd302a449b841dc10fcc2d63482b979cb70c21ef7000e655a7a1a18b57b6cd06267ef9f582b4783e42e60f460962921710e11ac51a3f9fa92e9118c5f0e1d8b2c342"], &(0x7f0000000040)=0x2) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000100)={r7, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000001380)={r5, @in6={{0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0xf}}}, 0x0, 0x7, 0x0, 0x8, 0x92}, &(0x7f0000001440)=0x98) eventfd(0xffffffff80000001) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000001140)={0x4, 0x8001, 0x40, 0xfffffffffffffffd, 0x0}, &(0x7f0000001180)=0x10) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f0000001500)) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000011c0)={0x95e, 0x101, 0x8009, 0x1ff, 0x31386ac8, 0x8, 0x1, 0x7, r8}, 0x20) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x1, 0x1) recvfrom(r1, &(0x7f00000015c0)=""/83, 0x53, 0x120, 0x0, 0x0) symlinkat(&(0x7f0000001080)='./file0\x00', r4, &(0x7f0000001100)='./file0\x00') close(r0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={r4, r4, 0x4}, 0x10) getsockname$netlink(r1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) 2018/03/31 07:41:47 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='cubic\x00', 0x6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='cubic\x00', 0x6) flock(r0, 0x9) 2018/03/31 07:41:47 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x200200, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000040)={0x2, [0x7fffffff, 0x8]}, 0x8) 2018/03/31 07:41:47 executing program 4: ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x10000) r0 = syz_open_dev$amidi(&(0x7f0000000680)='/dev/amidi#\x00', 0xaf, 0x8080) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, './file0\x00'}, 0x6e) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000000)='memory.high\x00', 0x2, 0x0) r4 = add_key(&(0x7f0000000180)='rxrpc_s\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000440)="86cfbb76066fc3c458", 0xffffffffffffffee, 0xfffffffffffffffe) keyctl$clear(0x7, r4) io_setup(0x400, &(0x7f0000000080)=0x0) msgrcv(0x0, &(0x7f0000000340)=ANY=[], 0x0, 0x0, 0x0) msgsnd(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="00001f0000000000"], 0x8, 0x2) io_submit(r5, 0x0, &(0x7f00000004c0)) ioctl$VHOST_GET_VRING_BASE(r1, 0xc008af12, &(0x7f00000000c0)) r6 = semget$private(0x0, 0x6, 0x0) semctl$SEM_INFO(r6, 0x2, 0x13, &(0x7f0000000340)=""/220) sendfile(r3, r3, &(0x7f0000000040), 0x1) r7 = open(&(0x7f0000000540)='./file0\x00', 0x40040, 0x100) ioctl$sock_inet6_tcp_SIOCINQ(r7, 0x541b, &(0x7f0000000580)) setsockopt$inet6_tcp_buf(r7, 0x6, 0x64f09a4eb42cd7c8, &(0x7f00000005c0)="624609eb1a3e8e61242dc8015576be1316f3c0daeee93ce223de918aa9c197a2aaed98c1b372a9c442f50ff099c8ce14fdedd875c2f9c558404598be5c23d251ed099fbe1c1099716de138c07a2674656918b77a931b4c9d278f395793a8c64df32ccf609f78d7fa399e0d60740e849826a46a96f2a9b7feb6b3dd89b33a012f81ea0f8271d306017fe2", 0x8a) semctl$GETZCNT(r6, 0x7, 0xf, &(0x7f0000000240)=""/124) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$RNDADDTOENTCNT(r7, 0x40045201, &(0x7f0000000740)=0x3) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x20014, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0xe667, 0x4000) semop(r6, &(0x7f0000000480)=[{0x4, 0x1, 0x1800}, {0x0, 0x6, 0x1800}, {0x6, 0x7, 0x1000}, {0x3, 0x8, 0x1000}], 0x4) mknodat(r8, &(0x7f0000000140)='./file0\x00', 0x8001, 0x6) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000004c0)='trusted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, &(0x7f0000000540), 0x0, 0xfffffffffffffff9) 2018/03/31 07:41:47 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000003c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r1, 0x107, 0x5, &(0x7f0000a76000), 0x17) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000240)={0x0, 0x3, 0x30, 0x4f8}, &(0x7f0000000400)=0x6) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f00009ecff8), 0x2, 0x3) [ 172.760570] FAULT_INJECTION: forcing a failure. [ 172.760570] name failslab, interval 1, probability 0, space 0, times 0 [ 172.771868] CPU: 1 PID: 13807 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #372 [ 172.779229] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 172.788576] Call Trace: [ 172.791156] dump_stack+0x194/0x24d [ 172.794767] ? arch_local_irq_restore+0x53/0x53 [ 172.799424] should_fail+0x8c0/0xa40 [ 172.803133] ? kstrdup+0x39/0x70 [ 172.806483] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 172.811561] ? cgroup_mkdir+0x553/0xfc0 [ 172.815512] ? vfs_mkdir+0x390/0x600 [ 172.819197] ? SyS_mkdirat+0x22b/0x2b0 [ 172.823060] ? do_syscall_64+0x281/0x940 [ 172.827096] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 172.832438] ? find_held_lock+0x35/0x1d0 [ 172.836479] ? find_held_lock+0x35/0x1d0 [ 172.840517] ? __lock_is_held+0xb6/0x140 [ 172.844560] ? check_same_owner+0x320/0x320 [ 172.848859] ? rcu_note_context_switch+0x710/0x710 [ 172.853770] ? rcu_read_lock_sched_held+0x108/0x120 [ 172.858764] should_failslab+0xec/0x120 [ 172.862714] kmem_cache_alloc+0x47/0x760 [ 172.866748] ? memcpy+0x45/0x50 [ 172.870008] ? kstrdup+0x59/0x70 [ 172.873358] __kernfs_new_node+0xe2/0x570 [ 172.877481] ? kernfs_dop_revalidate+0x380/0x380 [ 172.882212] ? kasan_check_read+0x11/0x20 [ 172.886334] ? read_word_at_a_time+0x12/0x20 [ 172.890717] ? strscpy+0x186/0x500 [ 172.894240] kernfs_new_node+0x80/0xe0 [ 172.898105] __kernfs_create_file+0x4b/0x320 [ 172.902493] cgroup_addrm_files+0x3c5/0xa70 [ 172.906793] ? cgroup_file_write+0x710/0x710 [ 172.911183] ? getrawmonotonic64+0x460/0x460 [ 172.915568] ? kernfs_active+0x92/0x160 [ 172.919519] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 172.924423] ? cgroup_kn_set_ugid+0x2c7/0x370 [ 172.928898] ? cgroup_file_name+0x1d0/0x1d0 [ 172.933199] css_populate_dir+0x340/0x420 [ 172.937322] cgroup_mkdir+0x553/0xfc0 [ 172.941095] ? __lock_is_held+0xb6/0x140 [ 172.945133] ? cgroup_destroy_locked+0x750/0x750 [ 172.949862] ? rcu_read_lock_sched_held+0x108/0x120 [ 172.954854] ? kmem_cache_free+0x258/0x2a0 [ 172.959067] ? set_nlink+0xc1/0x160 [ 172.962667] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 172.967573] ? generic_permission+0x105/0x3c0 [ 172.972045] ? cgroup_destroy_locked+0x750/0x750 [ 172.976776] kernfs_iop_mkdir+0x153/0x1e0 [ 172.980901] vfs_mkdir+0x390/0x600 [ 172.984418] SyS_mkdirat+0x22b/0x2b0 [ 172.988114] ? SyS_mknod+0x480/0x480 [ 172.991802] ? trace_hardirqs_on+0xd/0x10 [ 172.995924] ? do_syscall_64+0xb7/0x940 [ 172.999877] ? SyS_mknod+0x480/0x480 [ 173.003565] do_syscall_64+0x281/0x940 [ 173.007432] ? vmalloc_sync_all+0x30/0x30 [ 173.011556] ? _raw_spin_unlock_irq+0x27/0x70 [ 173.016032] ? finish_task_switch+0x1c1/0x7e0 [ 173.020503] ? syscall_return_slowpath+0x550/0x550 [ 173.025414] ? syscall_return_slowpath+0x2ac/0x550 [ 173.030327] ? prepare_exit_to_usermode+0x350/0x350 [ 173.035322] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 173.040661] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 173.045495] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 173.050657] RIP: 0033:0x454e79 [ 173.053822] RSP: 002b:00007fe2ad9eac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 2018/03/31 07:41:47 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="49afc1d9e994000000001e0000fa0000000000000000", @ANYPTR=&(0x7f0000000080)=ANY=[@ANYRES32=0xffffffff], @ANYBLOB="0200000000000000"], 0xfffffe84) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000280), &(0x7f00000002c0)=0x4) write$rdma_cm(r0, &(0x7f0000000180)=@resolve_ip={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, r1}}, 0x48) r3 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x3, 0xa8480) write$rdma_cm(r0, &(0x7f00000003c0)=@destroy_id={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r1}}, 0x18) ioctl$VHOST_VSOCK_SET_RUNNING(r3, 0x4004af61, &(0x7f0000000040)) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000100)="b2371c66f54317c265472ef22dc2c161b5ebafa3cd542a365673e89fd6119ddc") [ 173.061505] RAX: ffffffffffffffda RBX: 00007fe2ad9eb6d4 RCX: 0000000000454e79 [ 173.068747] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 173.075989] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 173.083232] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 173.090478] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000013 [ 173.099360] cgroup: cgroup_addrm_files: failed to add cgroup.events, err=-12 2018/03/31 07:41:47 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = accept4$ipx(0xffffffffffffff9c, &(0x7f0000000080), &(0x7f00000000c0)=0x10, 0x80000) sendfile(r0, r1, &(0x7f0000000100), 0x5) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x20000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40042406, &(0x7f0000e53fff)) 2018/03/31 07:41:47 executing program 7 (fault-call:10 fault-nth:20): r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4900, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000240)=0x4) getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) r1 = dup(0xffffffffffffff9c) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r2 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r2, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r2, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r2, &(0x7f0000000100)=""/65, 0x41) r3 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) fchdir(r2) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(r3, &(0x7f0000000200)='./file1\x00', r2, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r2, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000580)=""/80, 0x50}, {&(0x7f00000008c0)=""/4096, 0x1000}], 0x2, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x20) r5 = syz_open_dev$sndpcmp(&(0x7f00000018c0)='/dev/snd/pcmC#D#p\x00', 0x3, 0x10a00) ioctl$KVM_GET_DEVICE_ATTR(r5, 0x4018aee2, &(0x7f0000001940)={0x0, 0x100, 0x9, &(0x7f0000001900)}) recvfrom$ipx(r4, &(0x7f00000006c0)=""/52, 0x34, 0x100, &(0x7f0000000700)={0x4, 0x9a2, 0x4, "dc108d9d4391", 0x5}, 0x10) renameat(r2, &(0x7f0000001980)='./file1\x00', r5, &(0x7f00000019c0)='./file0/file0\x00') r6 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r6, 0x4, 0x0) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000040), 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r6, &(0x7f0000000200), 0xfffffe08) 2018/03/31 07:41:47 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x0, 0x0) r2 = openat(r1, &(0x7f00000000c0)='./file0\x00', 0x20001, 0x5) r3 = getpgrp(0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast2, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000100)=0xe8) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={r3, r4, r5}, 0xc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0x0, 0x20000800, &(0x7f0000000140)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) connect(r0, &(0x7f0000000000)=@nl=@unspec, 0x80) socket(0x11, 0x1, 0xb725) fremovexattr(r0, &(0x7f0000000380)=@random={'osx.', 'nodevnodev\x00'}) 2018/03/31 07:41:47 executing program 2: r0 = add_key(&(0x7f0000000480)='keyring\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r1 = add_key(&(0x7f0000000040)='big_key\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000a40)="c6cc8e60a78914d500bfeae773e1b642384ef9648af1058f5fbd2fd309524d989e8ca5c3e6e4d185de0489636bb4012cd2281d57a505b82ae678e253ab1603ef18da1e2b4f2acc3c7651ff1c670f5ed1de51a9a5a850687fc0664d9c81b66fefaf8007000000024bd42e3e21ae71d978f3e76fcbfdc2e66adff8be4d85633beb78581bf21ff72954dd487c97d06409d3c6e2f7f22be6284a93", 0x99, r0) keyctl$describe(0x6, r1, &(0x7f00000002c0)=""/200, 0xc8) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440)={0x0, 0x0, 0xffffffffffffffff}) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20202, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x1010, r4, 0x0) setsockopt$inet_MCAST_MSFILTER(r4, 0x0, 0x30, &(0x7f0000000580)=ANY=[@ANYBLOB="030000000000000002004e22ac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e24ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000006ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ffffffffffffff000000000000000000000000000000000000000000000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e220000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) pwrite64(r4, &(0x7f00000004c0)="361cf8298589166f6c2d5823c3b913944a09f012cc6a80f1d50171bf0badb6b5ffdeeaef7d6bdec3b31ce16780d2546875ed31070c85d5735d1ca260f2fca2cc539989af5eafe394f9ae07fcd88029971829aeaf797a78f97cd7f8531aeeb62f497a6d2d8c61dc23348ec786a20e624fdf4c5b839bea2dc66b04b7756cc92f852e", 0x81, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f0000000400)=0xfff, 0x4) fallocate(r4, 0x3, 0x0, 0x81) ppoll(&(0x7f0000000080)=[{r3}, {r2, 0x208}, {r4, 0x28}], 0x3, &(0x7f00000000c0), &(0x7f0000000140)={0x70000000000}, 0x8) 2018/03/31 07:41:47 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/195, 0xc3) r1 = dup2(r0, r0) ioctl$TIOCSBRK(r1, 0x40044591) r2 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000000c0)="2b7de12c95a2fcc2b5510d558c4b4f634e0c2e9511f0a580b53b7d776f26b82a5a1f3e2b612b0236070c34a5a640938a283a759733562236c8b86fc0493adc679c35c803114601dd54e17d2a70adb75484d05e137a19ede8cf877e0338ca897b56e2069380366a14efcbd3fa947f56cb4c6a5c8dfebbcd64", 0x78, 0x0) keyctl$set_timeout(0xf, r2, 0x6) [ 173.223335] FAULT_INJECTION: forcing a failure. [ 173.223335] name failslab, interval 1, probability 0, space 0, times 0 [ 173.234688] CPU: 0 PID: 13838 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #372 [ 173.242047] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 173.251391] Call Trace: [ 173.253981] dump_stack+0x194/0x24d [ 173.257611] ? arch_local_irq_restore+0x53/0x53 [ 173.262290] should_fail+0x8c0/0xa40 [ 173.265999] ? kstrdup+0x39/0x70 [ 173.269367] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 173.274465] ? cgroup_mkdir+0x553/0xfc0 [ 173.278432] ? vfs_mkdir+0x390/0x600 [ 173.282143] ? SyS_mkdirat+0x22b/0x2b0 [ 173.286027] ? do_syscall_64+0x281/0x940 [ 173.290077] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 173.295422] ? find_held_lock+0x35/0x1d0 [ 173.299473] ? find_held_lock+0x35/0x1d0 [ 173.303524] ? __lock_is_held+0xb6/0x140 [ 173.307576] ? check_same_owner+0x320/0x320 [ 173.311886] ? rcu_note_context_switch+0x710/0x710 [ 173.316805] ? rcu_read_lock_sched_held+0x108/0x120 [ 173.321812] should_failslab+0xec/0x120 [ 173.325771] kmem_cache_alloc+0x47/0x760 [ 173.329807] ? memcpy+0x45/0x50 [ 173.333072] ? kstrdup+0x59/0x70 [ 173.336422] __kernfs_new_node+0xe2/0x570 [ 173.340560] ? kernfs_dop_revalidate+0x380/0x380 [ 173.345315] ? kasan_check_read+0x11/0x20 [ 173.349460] ? read_word_at_a_time+0x12/0x20 [ 173.353853] ? strscpy+0x186/0x500 [ 173.357380] kernfs_new_node+0x80/0xe0 [ 173.361251] __kernfs_create_file+0x4b/0x320 [ 173.365646] cgroup_addrm_files+0x3c5/0xa70 [ 173.369950] ? cgroup_file_write+0x710/0x710 [ 173.374342] ? getrawmonotonic64+0x460/0x460 [ 173.378745] ? kernfs_active+0x92/0x160 [ 173.382704] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 173.387606] ? cgroup_kn_set_ugid+0x2c7/0x370 [ 173.392074] ? cgroup_file_name+0x1d0/0x1d0 [ 173.396372] css_populate_dir+0x340/0x420 [ 173.400508] cgroup_mkdir+0x553/0xfc0 [ 173.404296] ? __lock_is_held+0xb6/0x140 [ 173.408335] ? cgroup_destroy_locked+0x750/0x750 [ 173.413068] ? rcu_read_lock_sched_held+0x108/0x120 [ 173.418072] ? kmem_cache_free+0x258/0x2a0 [ 173.422289] ? set_nlink+0xc1/0x160 [ 173.425896] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 173.430798] ? generic_permission+0x105/0x3c0 [ 173.435270] ? cgroup_destroy_locked+0x750/0x750 [ 173.440009] kernfs_iop_mkdir+0x153/0x1e0 [ 173.444140] vfs_mkdir+0x390/0x600 [ 173.447658] SyS_mkdirat+0x22b/0x2b0 [ 173.451349] ? SyS_mknod+0x480/0x480 [ 173.455039] ? trace_hardirqs_on+0xd/0x10 [ 173.459165] ? do_syscall_64+0xb7/0x940 [ 173.463115] ? SyS_mknod+0x480/0x480 [ 173.466801] do_syscall_64+0x281/0x940 [ 173.470662] ? vmalloc_sync_all+0x30/0x30 [ 173.474785] ? _raw_spin_unlock_irq+0x27/0x70 [ 173.479254] ? finish_task_switch+0x1c1/0x7e0 [ 173.483734] ? syscall_return_slowpath+0x550/0x550 [ 173.488644] ? syscall_return_slowpath+0x2ac/0x550 [ 173.493547] ? prepare_exit_to_usermode+0x350/0x350 [ 173.498537] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 173.503893] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 173.508716] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 173.513890] RIP: 0033:0x454e79 [ 173.517063] RSP: 002b:00007fe2ad9eac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 173.524742] RAX: ffffffffffffffda RBX: 00007fe2ad9eb6d4 RCX: 0000000000454e79 [ 173.531991] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 173.539237] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 173.546480] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 173.553722] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000014 [ 173.561807] cgroup: cgroup_addrm_files: failed to add cgroup.max.descendants, err=-12 2018/03/31 07:41:48 executing program 5: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000f7db7f)="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", 0x481, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x56d) sendto$inet(r0, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) 2018/03/31 07:41:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) ioctl$KDGKBLED(r1, 0x4b64, &(0x7f0000000040)) writev(r0, &(0x7f0000fdbff8)=[{&(0x7f0000000100)="290000002000190000003fffffffda060214000000e80001040000040d000300ea1100000005000000", 0x29}], 0x1) 2018/03/31 07:41:48 executing program 4: rt_sigprocmask(0x0, &(0x7f0000039ff8)={0xfffffffffffffffa}, 0x0, 0x8) geteuid() gettid() syslog(0x9, &(0x7f00000000c0)=""/181, 0xb5) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000280)={0x1}) inotify_add_watch(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x20000030) timer_delete(0x0) r0 = syz_open_dev$sg(&(0x7f000051b000)='/dev/sg#\x00', 0x0, 0x0) ioctl$KVM_SET_PIT(r0, 0xc0481273, &(0x7f000084cf90)={[{}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x2, 0x0, 0x0, 0x3}]}) r1 = semget(0x0, 0xe0f2b2a6386f4255, 0x702) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000240)=0x5, 0x4) semctl$IPC_INFO(r1, 0x1, 0x3, &(0x7f0000000180)=""/26) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000040)) r2 = syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0xcf46, 0x400007) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f00000001c0), 0x4) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x2000, &(0x7f00001cf000/0x2000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x110000, 0x2000, &(0x7f00001cf000/0x2000)=nil}) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000080)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}) 2018/03/31 07:41:48 executing program 2: r0 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)="c6cc8e60a78914d500bfeae773ddb642384ef9648af1058f5fbd2fd309524d989e8ca5c3e6e4d185de0489636bb4012cd2281d57a505b82ae678e253ab1603ef18da1e2b4f2acc3c7651ff1c670f5ed1de51a9a5a850687fc0664d9c81b66fefaf800714c085934bd42e3e21ae71d978f3e76fcbfdc2e66adff8be4d85633beb78581bf230f72954dd487c97d06409d3c6e2f7f22be6284a9b", 0x99, 0xfffffffffffffffb) socketpair$ax25(0x3, 0x7, 0x7, &(0x7f00000003c0)) keyctl$describe(0x6, r0, &(0x7f00000002c0)=""/200, 0xc8) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440)={0x0, 0x0, 0xffffffffffffffff}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00006f3ff0)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000000), 0xfffffffffffffd29) ioctl$KDGKBLED(r2, 0x40045108, &(0x7f0000000040)) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20202, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x1010, r4, 0x0) setsockopt$inet_MCAST_MSFILTER(r4, 0x0, 0x30, &(0x7f0000000580)=ANY=[@ANYBLOB="030000000000000002004e22ac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e24ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000006ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ffffffffffffff000000000000000000000000000000000000000000000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e220000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) pwrite64(r4, &(0x7f00000004c0)="361cf8298589166f6c2d5823c3b913944a09f012cc6a80f1d50171bf0badb6b5ffdeeaef7d6bdec3b31ce16780d2546875ed31070c85d5735d1ca260f2fca2cc539989af5eafe394f9ae07fcd88029971829aeaf797a78f97cd7f8531aeeb62f497a6d2d8c61dc23348ec786a20e624fdf4c5b839bea2dc66b04b7756cc92f852e", 0x81, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f0000000400)=0xfff, 0x4) fallocate(r4, 0x3, 0x0, 0x81) ppoll(&(0x7f0000000080)=[{r3}, {r1, 0x208}, {r4, 0x28}], 0x3, &(0x7f00000000c0), &(0x7f0000000140)={0x70000000000}, 0x8) 2018/03/31 07:41:48 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000040)={'security\x00', 0x30, "76463160d7aa546bc5865a54a8fc733b93b55f6334e420cd3866e1239292a8a20da7df83774af5b10a227237cf7e6b22"}, &(0x7f00000000c0)=0x54) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000200)={@remote={0xfe, 0x80, [], 0xbb}}, 0x14) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r1, 0x80e85411, &(0x7f0000000100)=""/32) ioctl$TIOCGPTPEER(r1, 0x5441, 0xfffffffffffffff7) 2018/03/31 07:41:48 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) acct(&(0x7f0000001240)='./file0\x00') setrlimit(0xa, &(0x7f0000000380)={0x4, 0x1}) getsockname(0xffffffffffffff9c, &(0x7f0000001480)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f00000012c0)=0x80) socketpair(0x10, 0x0, 0x8, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000001580)={r3}) r4 = open(&(0x7f00000010c0)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000001300)={0x8, 0x0, 0x6, 0x58a, 0x0}, &(0x7f0000001340)=0x10) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x3052, r3, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f00000001c0)={'bond0\x00', {0x2, 0x4e20, @multicast2=0xe0000002}}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYBLOB="408615824f3f781ae75fcc9554f019621eaccb21d7ca5fb77c06ff41c0d07d78b6de0ed01fa10b1070cb77afb61679a7f893b0c78371e1195ef393dc87b1b329811e67705b9e1bb5dc00c5b14645b010d310e491c159a81b77145882a63f6206ecfb54b4f6b2ddf7963c2b2681ff1aa2dfd55f1e73b02e150e1f8e51e6ae3615336ed2b2b461fccd4ec00311dd4b00cf4316fb4bda9fa1a0a94d01d4db3209cd302a449b841dc10fcc2d63482b979cb70c21ef7000e655a7a1a18b57b6cd06267ef9f582b4783e42e60f460962921710e11ac51a3f9fa92e9118c5f0e1d8b2c342"], &(0x7f0000000040)=0x2) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000100)={r7, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000001380)={r5, @in6={{0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0xf}}}, 0x0, 0x7, 0x0, 0x8, 0x92}, &(0x7f0000001440)=0x98) eventfd(0xffffffff80000001) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000001140)={0x4, 0x8001, 0x40, 0xfffffffffffffffd, 0x0}, &(0x7f0000001180)=0x10) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f0000001500)) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000011c0)={0x95e, 0x101, 0x8009, 0x1ff, 0x31386ac8, 0x8, 0x1, 0x7, r8}, 0x20) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x1, 0x1) recvfrom(r1, &(0x7f00000015c0)=""/83, 0x53, 0x120, 0x0, 0x0) symlinkat(&(0x7f0000001080)='./file0\x00', r4, &(0x7f0000001100)='./file0\x00') close(r0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={r4, r4, 0x4}, 0x10) getsockname$netlink(r1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) 2018/03/31 07:41:48 executing program 7 (fault-call:10 fault-nth:21): r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4900, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000240)=0x4) getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) r1 = dup(0xffffffffffffff9c) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r2 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r2, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r2, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r2, &(0x7f0000000100)=""/65, 0x41) r3 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) fchdir(r2) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(r3, &(0x7f0000000200)='./file1\x00', r2, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r2, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000580)=""/80, 0x50}, {&(0x7f00000008c0)=""/4096, 0x1000}], 0x2, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x20) r5 = syz_open_dev$sndpcmp(&(0x7f00000018c0)='/dev/snd/pcmC#D#p\x00', 0x3, 0x10a00) ioctl$KVM_GET_DEVICE_ATTR(r5, 0x4018aee2, &(0x7f0000001940)={0x0, 0x100, 0x9, &(0x7f0000001900)}) recvfrom$ipx(r4, &(0x7f00000006c0)=""/52, 0x34, 0x100, &(0x7f0000000700)={0x4, 0x9a2, 0x4, "dc108d9d4391", 0x5}, 0x10) renameat(r2, &(0x7f0000001980)='./file1\x00', r5, &(0x7f00000019c0)='./file0/file0\x00') r6 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r6, 0x4, 0x0) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000040), 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r6, &(0x7f0000000200), 0xfffffe08) 2018/03/31 07:41:48 executing program 0: keyctl$unlink(0x9, 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x8008700b, &(0x7f000098dffa)) [ 174.474842] FAULT_INJECTION: forcing a failure. [ 174.474842] name failslab, interval 1, probability 0, space 0, times 0 [ 174.486104] CPU: 0 PID: 13867 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #372 [ 174.493459] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 174.502825] Call Trace: [ 174.505416] dump_stack+0x194/0x24d [ 174.509044] ? arch_local_irq_restore+0x53/0x53 [ 174.513733] should_fail+0x8c0/0xa40 [ 174.517447] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 174.522551] ? kernfs_add_one+0x50/0x450 [ 174.526607] ? rb_first_postorder+0xa0/0xa0 [ 174.530925] ? kernfs_add_one+0x50/0x450 [ 174.534986] ? trace_event_raw_event_lock+0x340/0x340 [ 174.540172] ? trace_hardirqs_off+0x10/0x10 [ 174.544503] ? find_held_lock+0x35/0x1d0 [ 174.548571] ? __lock_is_held+0xb6/0x140 [ 174.552640] ? check_same_owner+0x320/0x320 [ 174.556960] ? lock_downgrade+0x980/0x980 [ 174.561107] ? rcu_note_context_switch+0x710/0x710 [ 174.566044] should_failslab+0xec/0x120 [ 174.570020] __kmalloc_track_caller+0x5f/0x760 [ 174.574601] ? idr_alloc_cyclic+0x1d6/0x320 [ 174.578905] ? kstrdup_const+0x39/0x50 [ 174.582772] ? __mutex_unlock_slowpath+0xe9/0xac0 [ 174.587607] kstrdup+0x39/0x70 [ 174.590780] kstrdup_const+0x39/0x50 [ 174.594473] __kernfs_new_node+0xa2/0x570 [ 174.598598] ? kernfs_dop_revalidate+0x380/0x380 [ 174.603332] ? kasan_check_read+0x11/0x20 [ 174.607456] ? read_word_at_a_time+0x12/0x20 [ 174.611841] ? strscpy+0x186/0x500 [ 174.615365] kernfs_new_node+0x80/0xe0 [ 174.619227] __kernfs_create_file+0x4b/0x320 [ 174.623615] cgroup_addrm_files+0x3c5/0xa70 [ 174.627921] ? cgroup_file_write+0x710/0x710 [ 174.632310] ? getrawmonotonic64+0x460/0x460 [ 174.636698] ? kernfs_active+0x92/0x160 [ 174.640649] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 174.645555] ? cgroup_kn_set_ugid+0x2c7/0x370 [ 174.650029] ? cgroup_file_name+0x1d0/0x1d0 [ 174.654332] css_populate_dir+0x340/0x420 [ 174.658455] cgroup_mkdir+0x553/0xfc0 [ 174.662230] ? __lock_is_held+0xb6/0x140 [ 174.666270] ? cgroup_destroy_locked+0x750/0x750 [ 174.671001] ? rcu_read_lock_sched_held+0x108/0x120 [ 174.675996] ? kmem_cache_free+0x258/0x2a0 [ 174.680209] ? set_nlink+0xc1/0x160 [ 174.683809] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 174.688711] ? generic_permission+0x105/0x3c0 [ 174.693180] ? cgroup_destroy_locked+0x750/0x750 [ 174.697909] kernfs_iop_mkdir+0x153/0x1e0 [ 174.702032] vfs_mkdir+0x390/0x600 [ 174.705547] SyS_mkdirat+0x22b/0x2b0 [ 174.709235] ? SyS_mknod+0x480/0x480 [ 174.712923] ? trace_hardirqs_on+0xd/0x10 [ 174.717044] ? do_syscall_64+0xb7/0x940 [ 174.720991] ? SyS_mknod+0x480/0x480 [ 174.725103] do_syscall_64+0x281/0x940 [ 174.728964] ? vmalloc_sync_all+0x30/0x30 [ 174.733085] ? _raw_spin_unlock_irq+0x27/0x70 [ 174.737555] ? finish_task_switch+0x1c1/0x7e0 [ 174.742029] ? syscall_return_slowpath+0x550/0x550 [ 174.746931] ? syscall_return_slowpath+0x2ac/0x550 [ 174.751834] ? prepare_exit_to_usermode+0x350/0x350 [ 174.756826] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 174.762166] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 174.766985] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 174.772148] RIP: 0033:0x454e79 [ 174.775314] RSP: 002b:00007fe2ad9eac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 174.782999] RAX: ffffffffffffffda RBX: 00007fe2ad9eb6d4 RCX: 0000000000454e79 [ 174.790250] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 174.797495] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 174.804738] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 174.811982] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000015 2018/03/31 07:41:49 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000200)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x40000, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f00000035c0)={'nr0\x00'}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x0, 0x0, 0xffefffffffffffff}}) ioctl$SNDRV_TIMER_IOCTL_STATUS(r1, 0x80605414, &(0x7f00000004c0)=""/252) finit_module(r1, &(0x7f0000000080)='/dev/snd/timer\x00', 0x3) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000600)={0x0, 0x0, 0x1}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f00000005c0)={0x0, r2}) readv(r1, &(0x7f0000000480)=[{&(0x7f0000000180)=""/212}, {&(0x7f0000000280)=""/176}, {&(0x7f0000000340)=""/154}, {&(0x7f0000000400)=""/88}], 0x10000000000003e1) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000003600)={@empty, 0x2e}) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={@loopback=0x7f000001, @remote={0xac, 0x14, 0x14, 0xbb}, @broadcast=0xffffffff}, 0xc) r3 = memfd_create(&(0x7f0000000680)='@\x00', 0x4) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r3, 0x0, 0x0, 0x1) fchmod(r3, 0x0) r4 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000004000)={0x4, 0x0, &(0x7f0000000040)=[@enter_looper={0x630c}], 0x0, 0x0, &(0x7f00004c1000)}) ioctl$BINDER_SET_CONTEXT_MGR(r4, 0x40046207, 0x0) socket$unix(0x1, 0x1, 0x0) r5 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r5, 0x29, 0xd1, &(0x7f00000000c0), 0x4) setsockopt$inet6_int(r5, 0x29, 0xc8, &(0x7f0000000000), 0x4) syz_open_dev$amidi(&(0x7f0000000640)='/dev/amidi#\x00', 0x2, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000040)={0x1, 0x1, 0x100000001, 0x158, 0xfffffffffffffe01}, 0xc) 2018/03/31 07:41:49 executing program 1: io_setup(0xba, &(0x7f0000000000)=0x0) r1 = socket(0x2, 0x803, 0xff) shutdown(r1, 0x1) connect$inet(r1, &(0x7f0000000100)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) recvmsg$kcm(r1, &(0x7f0000000140)={&(0x7f00000001c0)=@pppol2tpv3in6, 0x80, &(0x7f0000002700)=[{&(0x7f0000000240)=""/137, 0x89}, {&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000001300)=""/151, 0x97}, {&(0x7f00000013c0)=""/167, 0xa7}, {&(0x7f0000001480)=""/162, 0xa2}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f00000000c0)=""/52, 0x34}, {&(0x7f0000002540)=""/223, 0xdf}, {&(0x7f0000002640)=""/164, 0xa4}], 0x9, &(0x7f00000027c0)=""/124, 0x7c, 0x5}, 0x40000143) io_submit(r0, 0x1, &(0x7f0000000040)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000080)="0fde2d037dc2eb215d610dc3c65ac45d809af44d", 0x14}]) 2018/03/31 07:41:49 executing program 3: unshare(0x3fffffc) madvise(&(0x7f0000b45000/0x4000)=nil, 0xfffffffffffffe77, 0x0) [ 174.819723] cgroup: cgroup_addrm_files: failed to add cgroup.max.depth, err=-12 2018/03/31 07:41:49 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00002ac000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x544f, &(0x7f0000000000)=0x4) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0x4008af13, &(0x7f0000000080)={0x0, 0xff7ffffffffffffe}) 2018/03/31 07:41:49 executing program 0: r0 = memfd_create(&(0x7f0000000540)='\x00', 0x1) r1 = perf_event_open(&(0x7f00000005c0)={0x7, 0x70, 0x8, 0x9, 0x81f6, 0x8, 0x0, 0xfffffffffffffe01, 0x142, 0x1, 0xff, 0x3, 0x6, 0x9, 0x4, 0x5, 0x100000000, 0x8, 0x6, 0x9, 0x1, 0x8, 0x1, 0x800, 0x7, 0xfff, 0x0, 0xf4ca, 0x7, 0x4, 0x7, 0x800, 0x3ff, 0x0, 0x2, 0x7ff, 0x80000000, 0xffffffff00000001, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000580), 0x1}, 0x10000, 0xfd, 0xb6, 0x7, 0x6, 0xf21, 0x976}, 0x0, 0x5, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x24201, 0x0) tee(0xffffffffffffffff, r2, 0x40, 0x0) ioctl$fiemap(r2, 0xc020660b, &(0x7f00000003c0)=ANY=[@ANYBLOB="ff01000000000000030000000000000004000000010400000100000000000000030000000000000060000000000000000700000000000000000000000000000000000000000000000010000000000000000000000000000018f5c0cec650e4239dfa21708adeeccc46dba4d9f31c3792b0afd71a5b12bc405cf3a540876c7a867b243d2a941f9b5d7db991a8ad6fbc4f76e0229d7cf38b2f20f01ce3899f5bcffd4049ce680bc1b30a8a088cf228060204087c529ea52ae084be43f8397e5761572b98032643603cc5b291e988f0b23384c804f0ae2613f21efff74972a19f928e000000000000"]) fallocate(r2, 0x11, 0x0, 0x8000000) ioctl$DRM_IOCTL_GET_CAP(r2, 0xc010640c, &(0x7f0000000000)={0x4, 0x8}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0xcc, &(0x7f00000002c0)=0x1000000, 0x4) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) clone(0x0, &(0x7f0000000000), &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000780)={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc]}, 0x5c) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$VHOST_SET_LOG_BASE(r4, 0xaf01, &(0x7f0000307000)=&(0x7f0000989fff)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x109000, 0x0) ioctl$VHOST_SET_MEM_TABLE(r4, 0x4008af03, &(0x7f0000000000)=ANY=[]) bind$netlink(r3, &(0x7f0000000500)={0x10, 0x0, 0x25dfdbfe}, 0xc) connect$ipx(r5, &(0x7f0000000080)={0x4, 0x2, 0x8, "8685d189ac34"}, 0x10) r6 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0xfff, 0x301000) eventfd2(0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r4, 0x4004af07, &(0x7f00000001c0)=r6) migrate_pages(0x0, 0x6a, &(0x7f0000000640)=0x2, &(0x7f0000000680)=0x3f) getpgrp(0xffffffffffffffff) 2018/03/31 07:41:49 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) acct(&(0x7f0000001240)='./file0\x00') setrlimit(0xa, &(0x7f0000000380)={0x4, 0x1}) getsockname(0xffffffffffffff9c, &(0x7f0000001480)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f00000012c0)=0x80) socketpair(0x10, 0x0, 0x8, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000001580)={r3}) r4 = open(&(0x7f00000010c0)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000001300)={0x8, 0x0, 0x6, 0x58a, 0x0}, &(0x7f0000001340)=0x10) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x3052, r3, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f00000001c0)={'bond0\x00', {0x2, 0x4e20, @multicast2=0xe0000002}}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYBLOB="408615824f3f781ae75fcc9554f019621eaccb21d7ca5fb77c06ff41c0d07d78b6de0ed01fa10b1070cb77afb61679a7f893b0c78371e1195ef393dc87b1b329811e67705b9e1bb5dc00c5b14645b010d310e491c159a81b77145882a63f6206ecfb54b4f6b2ddf7963c2b2681ff1aa2dfd55f1e73b02e150e1f8e51e6ae3615336ed2b2b461fccd4ec00311dd4b00cf4316fb4bda9fa1a0a94d01d4db3209cd302a449b841dc10fcc2d63482b979cb70c21ef7000e655a7a1a18b57b6cd06267ef9f582b4783e42e60f460962921710e11ac51a3f9fa92e9118c5f0e1d8b2c342"], &(0x7f0000000040)=0x2) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000100)={r7, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000001380)={r5, @in6={{0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0xf}}}, 0x0, 0x7, 0x0, 0x8, 0x92}, &(0x7f0000001440)=0x98) eventfd(0xffffffff80000001) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000001140)={0x4, 0x8001, 0x40, 0xfffffffffffffffd, 0x0}, &(0x7f0000001180)=0x10) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f0000001500)) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000011c0)={0x95e, 0x101, 0x8009, 0x1ff, 0x31386ac8, 0x8, 0x1, 0x7, r8}, 0x20) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x1, 0x1) recvfrom(r1, &(0x7f00000015c0)=""/83, 0x53, 0x120, 0x0, 0x0) symlinkat(&(0x7f0000001080)='./file0\x00', r4, &(0x7f0000001100)='./file0\x00') close(r0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={r4, r4, 0x4}, 0x10) getsockname$netlink(r1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) 2018/03/31 07:41:49 executing program 2: r0 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)="c6cc8e60a78914d500bfeae773ddb642384ef9648af1058f5fbd2fd309524d989e8ca5c3e6e4d185de0489636bb4012cd2281d57a505b82ae678e253ab1603ef18da1e2b4f2acc3c7651ff1c670f5ed1de51a9a5a850687fc0664d9c81b66fefaf800714c085934bd42e3e21ae71d978f3e76fcbfdc2e66adff8be4d85633beb78581bf230f72954dd487c97d06409d3c6e2f7f22be6284a9b", 0x99, 0xfffffffffffffffb) keyctl$describe(0x6, r0, &(0x7f00000002c0)=""/200, 0xc8) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440)={0x0, 0x0, 0xffffffffffffffff}) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000ec0)='/dev/qat_adf_ctl\x00', 0x400, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000f00)=0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xffff7fffffffffff, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0x0, r2, 0xfffffffffffffffe) r5 = syz_open_dev$dmmidi(&(0x7f0000000dc0)='/dev/dmmidi#\x00', 0x8, 0x20000) ioctl$TUNGETIFF(r5, 0x800454d2, &(0x7f0000000e80)) r6 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20202, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x1010, r6, 0x0) readv(r1, &(0x7f0000000e00)=[{&(0x7f0000000a40)=""/148, 0x94}, {&(0x7f0000000b00)=""/233, 0xe9}, {&(0x7f0000000c00)=""/242, 0xf2}, {&(0x7f0000000040)=""/26, 0x1a}, {&(0x7f0000000d00)=""/137, 0x89}, {&(0x7f00000003c0)=""/23, 0x17}, {&(0x7f0000000480)=""/2, 0x2}, {&(0x7f0000000dc0)}], 0x8) setsockopt$inet_MCAST_MSFILTER(r6, 0x0, 0x30, &(0x7f0000000580)=ANY=[@ANYBLOB="030000000000000002004e22ac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e24ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000006ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ffffffffffffff000000000000000000000000000000000000000000000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e220000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) pwrite64(r6, &(0x7f00000004c0)="361cf8298589166f6c2d5823c3b913944a09f012cc6a80f1d50171bf0badb6b5ffdeeaef7d6bdec3b31ce16780d2546875ed31070c85d5735d1ca260f2fca2cc539989af5eafe394f9ae07fcd88029971829aeaf797a78f97cd7f8531aeeb62f497a6d2d8c61dc23348ec786a20e624fdf4c5b839bea2dc66b04b7756cc92f852e", 0x81, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r6, 0x84, 0x21, &(0x7f0000000400)=0xfff, 0x4) mlockall(0x2) fallocate(r6, 0x3, 0x0, 0x81) ppoll(&(0x7f0000000080)=[{r4}, {r1, 0x208}, {r6, 0x28}], 0x3, &(0x7f00000000c0), &(0x7f0000000140)={0x70000000000}, 0x8) 2018/03/31 07:41:49 executing program 3: r0 = accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, @dev}, &(0x7f0000000380)=0x10) r1 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000000540)={0x0, 0x0, 0x0, @loopback}, &(0x7f0000000580)=0x1c, 0x800) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000005c0)={0x0, 0x15, &(0x7f0000000500)}, &(0x7f0000000440)=0x10) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000480)={r2, 0x2}, &(0x7f00000004c0)=0x8) r4 = socket(0x2, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000640)={r3, 0x2}, &(0x7f0000000680)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x800, 0xc051, 0x2c5d, 0xccf7, 0x20}, &(0x7f0000000180)=0x98) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000400)={0x7, &(0x7f00000003c0)=[{0x6, 0x7, 0x0, 0x8}, {0x1, 0xffffffffffffff00, 0x8, 0xd8}, {0x81, 0x7, 0x6, 0x4}, {0x1f, 0x5, 0x20, 0x7}, {0x10000, 0x1, 0x6, 0xfffffffffffff000}, {0x8, 0x80, 0x80000000, 0x3}, {0x5, 0x5, 0x2, 0x6}]}, 0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f00000001c0)={r5, @in={{0x2, 0x4e23, @broadcast=0xffffffff}}, 0x4, 0x4, 0x6df7, 0x1, 0xb7}, &(0x7f0000000280)=0x98) ioctl$sock_inet_SIOCSIFBRDADDR(r4, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x0, @multicast2=0xe0000002}}) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000080)=[{0xb, 0xfff}, {0xc, 0x101}], 0x2) setsockopt(r4, 0xff, 0x21, &(0x7f00000002c0)="d9f617e25a6dcba01941d47d54adede5b72bc1bc60b0f3f4878bb597ad5fa88ea3ef2f1b732b6c810b6b759953c2fef652c054d4ef513dd47c9fff56662fb4f8033eee84d661930a02e15d6abc2279751366b8ed48b65c1e075c692573a43e4165daa51a3eeb3a862f3fbee139fb58464323cd", 0x73) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='rdma.current\x00', 0x0, 0x0) ioctl$VT_GETMODE(r6, 0x5601, &(0x7f0000000600)) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f0000000040)=0x1, 0x4) [ 174.919877] binder: BINDER_SET_CONTEXT_MGR already set [ 174.944170] binder: 13891:13898 ioctl 40046207 0 returned -16 2018/03/31 07:41:49 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) acct(&(0x7f0000001240)='./file0\x00') setrlimit(0xa, &(0x7f0000000380)={0x4, 0x1}) getsockname(0xffffffffffffff9c, &(0x7f0000001480)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f00000012c0)=0x80) socketpair(0x10, 0x0, 0x8, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000001580)={r3}) r4 = open(&(0x7f00000010c0)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000001300)={0x8, 0x0, 0x6, 0x58a, 0x0}, &(0x7f0000001340)=0x10) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x3052, r3, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f00000001c0)={'bond0\x00', {0x2, 0x4e20, @multicast2=0xe0000002}}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYBLOB="408615824f3f781ae75fcc9554f019621eaccb21d7ca5fb77c06ff41c0d07d78b6de0ed01fa10b1070cb77afb61679a7f893b0c78371e1195ef393dc87b1b329811e67705b9e1bb5dc00c5b14645b010d310e491c159a81b77145882a63f6206ecfb54b4f6b2ddf7963c2b2681ff1aa2dfd55f1e73b02e150e1f8e51e6ae3615336ed2b2b461fccd4ec00311dd4b00cf4316fb4bda9fa1a0a94d01d4db3209cd302a449b841dc10fcc2d63482b979cb70c21ef7000e655a7a1a18b57b6cd06267ef9f582b4783e42e60f460962921710e11ac51a3f9fa92e9118c5f0e1d8b2c342"], &(0x7f0000000040)=0x2) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000100)={r7, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000001380)={r5, @in6={{0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0xf}}}, 0x0, 0x7, 0x0, 0x8, 0x92}, &(0x7f0000001440)=0x98) eventfd(0xffffffff80000001) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000001140)={0x4, 0x8001, 0x40, 0xfffffffffffffffd, 0x0}, &(0x7f0000001180)=0x10) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f0000001500)) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000011c0)={0x95e, 0x101, 0x8009, 0x1ff, 0x31386ac8, 0x8, 0x1, 0x7, r8}, 0x20) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x1, 0x1) recvfrom(r1, &(0x7f00000015c0)=""/83, 0x53, 0x120, 0x0, 0x0) symlinkat(&(0x7f0000001080)='./file0\x00', r4, &(0x7f0000001100)='./file0\x00') close(r0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={r4, r4, 0x4, 0x3}, 0x10) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0xc) 2018/03/31 07:41:49 executing program 1: r0 = socket$nl_xfrm(0x11, 0x3, 0x6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000034c0)={'gre0\x00'}) 2018/03/31 07:41:49 executing program 4: r0 = semget$private(0x0, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000000c0)={@remote={0xfe, 0x80, [], 0xbb}, 0x0, 0x1, 0x2, 0x0, 0xffffffff00000000, 0x0, 0x6}, 0x20) semop(r0, &(0x7f0000035ffa), 0x1bd) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x5, 0x100, 0x100, 0x2}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000269fb8)={0x1, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000020000018160000d074bfc23840bf314c7447beb06678a73d87a1981adca8060f3865ccec0881d8ccffd200050002000000004773f150ba7b8e4066090ec315651af337e4177709", @ANYBLOB="000000000000000000000000000000014d8526ce1635d3bd0b38af621ab8e4e83acdb2694ef51e0f50619ee9c46e55ed87a62f6fd3b2af8807cb7e77ec00b3818a7daed5b3ceb7f08f1bcf0bceb54deb6def8c3d1ac74684e27351325f6168450c49b71eb4d5fb42583b621388b1cacaf84a7101b71195d74e721146e24064ac3cd54bff87b1e026ce0903d8ea50a10930b93590cf0b4c87ba62dd607915dcde"], &(0x7f000039cff6)="7379e66b616c6c657200", 0x8, 0x1000, &(0x7f000039c000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f000039efd8)={0xffffffffffffffff, 0x0, 0x0, 0x33, &(0x7f00002c5000), &(0x7f00003a3fcd)=""/51}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='IPVS\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) chown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000080)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$RNDCLEARPOOL(r2, 0x5206, &(0x7f0000000340)) write(r4, &(0x7f00000000c0), 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000180)={{{@in6, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f0000000280)=0xe8) getresgid(&(0x7f00000059c0), &(0x7f0000005a00), &(0x7f0000005a40)) fstat(0xffffffffffffffff, &(0x7f00000000c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r1, 0x50, &(0x7f000039efb0)}, 0x10) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000080)=[0x9]) r5 = socket$inet6(0xa, 0x5, 0x0) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000000)) delete_module(&(0x7f0000000040)='\\lonodev\x00', 0x200) sched_yield() setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000d74000)={@dev={0xfe, 0x80}, 0x0, 0x0, 0x3, 0x9}, 0x20) dup3(r5, r5, 0x4) 2018/03/31 07:41:49 executing program 7 (fault-call:10 fault-nth:22): r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4900, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000240)=0x4) getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) r1 = dup(0xffffffffffffff9c) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r2 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r2, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r2, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r2, &(0x7f0000000100)=""/65, 0x41) r3 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) fchdir(r2) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(r3, &(0x7f0000000200)='./file1\x00', r2, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r2, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000580)=""/80, 0x50}, {&(0x7f00000008c0)=""/4096, 0x1000}], 0x2, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x20) r5 = syz_open_dev$sndpcmp(&(0x7f00000018c0)='/dev/snd/pcmC#D#p\x00', 0x3, 0x10a00) ioctl$KVM_GET_DEVICE_ATTR(r5, 0x4018aee2, &(0x7f0000001940)={0x0, 0x100, 0x9, &(0x7f0000001900)}) recvfrom$ipx(r4, &(0x7f00000006c0)=""/52, 0x34, 0x100, &(0x7f0000000700)={0x4, 0x9a2, 0x4, "dc108d9d4391", 0x5}, 0x10) renameat(r2, &(0x7f0000001980)='./file1\x00', r5, &(0x7f00000019c0)='./file0/file0\x00') r6 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r6, 0x4, 0x0) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000040), 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r6, &(0x7f0000000200), 0xfffffe08) 2018/03/31 07:41:49 executing program 2: r0 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)="c6cc8e60a78914d500bfeae773ddb642384ef9648af1058f5fbd2fd309524d989e8ca5c3e6e4d185de0489636bb4012cd2281d57a505b82ae678e253ab1603ef18da1e2b4f2acc3c7651ff1c670f5ed1de51a9a5a850687fc0664d9c81b66fefaf800714c085934bd42e3e21ae71d978f3e76fcbfdc2e66adff8be4d85633beb78581bf230f72954dd487c97d06409d3c6e2f7f22be6284a9b", 0x99, 0xfffffffffffffffb) keyctl$describe(0x6, r0, &(0x7f00000002c0)=""/200, 0xc8) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440)={0x0, 0x0, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20202, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x1010, r3, 0x0) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000000580)=ANY=[@ANYBLOB="030000000000000002004e22ac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e24ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000006ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ffffffffffffff000000000000000000000000000000000000000000000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e220000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) pwrite64(r3, &(0x7f00000004c0)="361cf8298589166f6c2d5823c3b913944a09f012cc6a80f1d50171bf0badb6b5ffdeeaef7d6bdec3b31ce16780d2546875ed31070c85d5735d1ca260f2fca2cc539989af5eafe394f9ae07fcd88029971829aeaf797a78f97cd7f8531aeeb62f497a6d2d8c61dc23348ec786a20e624fdf4c5b839bea2dc66b04b7756cc92f852e", 0x81, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000400)=0xfff, 0x4) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r3, 0xc008551a, &(0x7f0000000040)={0xb, 0x10, [0x4, 0x8000, 0x7ff, 0x8]}) fallocate(r3, 0x3, 0x0, 0x81) ppoll(&(0x7f0000000080)=[{r2}, {r1, 0x208}, {r3, 0x28}], 0x3, &(0x7f00000000c0), &(0x7f0000000140)={0x70000000000}, 0x8) 2018/03/31 07:41:49 executing program 3: r0 = memfd_create(&(0x7f0000000000)='/dev/vcs#\x00', 0x2) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000240)={0xffffffffffffffff, 0x3, 0x6, 0x3, 0x1, 0x4, 0x1, 0x5, 0xbd9, 0x2, 0x401}, 0xb) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f00000001c0)={'icmp\x00'}, &(0x7f0000000200)=0x1e) r1 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x1, 0x300ffc) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000040)={'nat\x00'}, &(0x7f00000000c0)=0x27) futex(&(0x7f0000000ffc), 0x85, 0x0, &(0x7f0000000100), &(0x7f0000000140), 0xfffffffffffffffc) 2018/03/31 07:41:49 executing program 5: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) open_by_handle_at(r0, &(0x7f0000000080)={0x41, 0x6, "23fa97c58c39adb7122acfbda6e17190407657d32db93fba02a1358e86dd46cb7216802f77a43737259e6b828fdef92145798c31d2b6cbb611"}, 0x200) ioctl$TIOCSBRK(r1, 0x5427) r2 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x1ff, 0x151001) syz_emit_ethernet(0x3e, &(0x7f0000ea7cfa)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "c000e2", 0x3, 0x11, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@echo_reply={0x81}}}}}}, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000100)=0x0) ptrace$peekuser(0x3, r3, 0x400) 2018/03/31 07:41:49 executing program 0: r0 = syz_open_dev$tun(&(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'ifb0\x00', 0x400f}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x60001, 0x0) openat$cgroup_ro(r1, &(0x7f00000000c0)='cpuacct.stat\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000000)) 2018/03/31 07:41:49 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) acct(&(0x7f0000001240)='./file0\x00') setrlimit(0xa, &(0x7f0000000380)={0x4, 0x1}) getsockname(0xffffffffffffff9c, &(0x7f0000001480)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f00000012c0)=0x80) socketpair(0x10, 0x0, 0x8, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000001580)={r3}) r4 = open(&(0x7f00000010c0)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000001300)={0x8, 0x0, 0x6, 0x58a, 0x0}, &(0x7f0000001340)=0x10) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x3052, r3, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f00000001c0)={'bond0\x00', {0x2, 0x4e20, @multicast2=0xe0000002}}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYBLOB="408615824f3f781ae75fcc9554f019621eaccb21d7ca5fb77c06ff41c0d07d78b6de0ed01fa10b1070cb77afb61679a7f893b0c78371e1195ef393dc87b1b329811e67705b9e1bb5dc00c5b14645b010d310e491c159a81b77145882a63f6206ecfb54b4f6b2ddf7963c2b2681ff1aa2dfd55f1e73b02e150e1f8e51e6ae3615336ed2b2b461fccd4ec00311dd4b00cf4316fb4bda9fa1a0a94d01d4db3209cd302a449b841dc10fcc2d63482b979cb70c21ef7000e655a7a1a18b57b6cd06267ef9f582b4783e42e60f460962921710e11ac51a3f9fa92e9118c5f0e1d8b2c342"], &(0x7f0000000040)=0x2) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000100)={r7, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000001380)={r5, @in6={{0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0xf}}}, 0x0, 0x7, 0x0, 0x8, 0x92}, &(0x7f0000001440)=0x98) eventfd(0xffffffff80000001) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000001140)={0x4, 0x8001, 0x40, 0xfffffffffffffffd, 0x0}, &(0x7f0000001180)=0x10) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f0000001500)) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000011c0)={0x95e, 0x101, 0x8009, 0x1ff, 0x31386ac8, 0x8, 0x1, 0x7, r8}, 0x20) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x1, 0x1) recvfrom(r1, &(0x7f00000015c0)=""/83, 0x53, 0x120, 0x0, 0x0) symlinkat(&(0x7f0000001080)='./file0\x00', r4, &(0x7f0000001100)='./file0\x00') close(r0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={r4, r4, 0x4, 0x3}, 0x10) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0xc) [ 175.143527] FAULT_INJECTION: forcing a failure. [ 175.143527] name failslab, interval 1, probability 0, space 0, times 0 [ 175.154811] CPU: 0 PID: 13941 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #372 [ 175.162165] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 175.171509] Call Trace: [ 175.174097] dump_stack+0x194/0x24d [ 175.177712] ? arch_local_irq_restore+0x53/0x53 [ 175.182365] should_fail+0x8c0/0xa40 [ 175.186054] ? kstrdup+0x39/0x70 [ 175.189398] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 175.194473] ? cgroup_mkdir+0x553/0xfc0 [ 175.198421] ? vfs_mkdir+0x390/0x600 [ 175.202109] ? SyS_mkdirat+0x22b/0x2b0 [ 175.205973] ? do_syscall_64+0x281/0x940 [ 175.210012] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 175.215353] ? find_held_lock+0x35/0x1d0 [ 175.219391] ? find_held_lock+0x35/0x1d0 [ 175.223427] ? __lock_is_held+0xb6/0x140 [ 175.227469] ? check_same_owner+0x320/0x320 [ 175.231768] ? rcu_note_context_switch+0x710/0x710 [ 175.236672] ? rcu_read_lock_sched_held+0x108/0x120 [ 175.241663] should_failslab+0xec/0x120 [ 175.245613] kmem_cache_alloc+0x47/0x760 [ 175.249644] ? memcpy+0x45/0x50 [ 175.252897] ? kstrdup+0x59/0x70 [ 175.256241] __kernfs_new_node+0xe2/0x570 [ 175.260364] ? kernfs_dop_revalidate+0x380/0x380 [ 175.265096] ? kasan_check_read+0x11/0x20 [ 175.269220] ? read_word_at_a_time+0x12/0x20 [ 175.273603] ? strscpy+0x186/0x500 [ 175.277122] kernfs_new_node+0x80/0xe0 [ 175.280983] __kernfs_create_file+0x4b/0x320 [ 175.285369] cgroup_addrm_files+0x3c5/0xa70 [ 175.289667] ? cgroup_file_write+0x710/0x710 [ 175.294052] ? getrawmonotonic64+0x460/0x460 [ 175.298436] ? kernfs_active+0x92/0x160 [ 175.302387] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 175.307287] ? cgroup_kn_set_ugid+0x2c7/0x370 [ 175.311754] ? cgroup_file_name+0x1d0/0x1d0 [ 175.316053] css_populate_dir+0x340/0x420 [ 175.320176] cgroup_mkdir+0x553/0xfc0 [ 175.323949] ? __lock_is_held+0xb6/0x140 [ 175.327986] ? cgroup_destroy_locked+0x750/0x750 [ 175.332716] ? rcu_read_lock_sched_held+0x108/0x120 [ 175.337708] ? kmem_cache_free+0x258/0x2a0 [ 175.341917] ? set_nlink+0xc1/0x160 [ 175.345517] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 175.350417] ? generic_permission+0x105/0x3c0 [ 175.354884] ? cgroup_destroy_locked+0x750/0x750 [ 175.359611] kernfs_iop_mkdir+0x153/0x1e0 [ 175.363734] vfs_mkdir+0x390/0x600 [ 175.367248] SyS_mkdirat+0x22b/0x2b0 [ 175.370936] ? SyS_mknod+0x480/0x480 [ 175.374620] ? trace_hardirqs_on+0xd/0x10 [ 175.378741] ? do_syscall_64+0xb7/0x940 [ 175.382688] ? SyS_mknod+0x480/0x480 [ 175.386374] do_syscall_64+0x281/0x940 [ 175.390237] ? vmalloc_sync_all+0x30/0x30 [ 175.394357] ? _raw_spin_unlock_irq+0x27/0x70 [ 175.398827] ? finish_task_switch+0x1c1/0x7e0 [ 175.403295] ? syscall_return_slowpath+0x550/0x550 [ 175.408196] ? syscall_return_slowpath+0x2ac/0x550 [ 175.413101] ? prepare_exit_to_usermode+0x350/0x350 [ 175.418094] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 175.423433] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 175.428250] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 175.433412] RIP: 0033:0x454e79 [ 175.436573] RSP: 002b:00007fe2ad9eac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 175.444252] RAX: ffffffffffffffda RBX: 00007fe2ad9eb6d4 RCX: 0000000000454e79 [ 175.451494] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 175.458736] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 175.465981] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 175.473224] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000016 [ 175.480721] cgroup: cgroup_addrm_files: failed to add cgroup.max.depth, err=-12 2018/03/31 07:41:49 executing program 1: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x200000000401, 0x2) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)={0x0, @dev, @remote}, &(0x7f0000000080)=0xc) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@dev={0xfe, 0x80, [], 0x15}, 0x71, r1}) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000140)={0x5, &(0x7f0000000100)=[{0x7ff, 0x614, 0x6}, {0x2, 0xff, 0x361f1c3a}, {0x3, 0x3, 0x77c5, 0xfffffffffffffffb}, {0x219b, 0x8000, 0x0, 0x6}, {0x7, 0xdf, 0x6, 0x6}]}, 0x10) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000180)=0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000280)='tunl0\x00', 0x10) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r2, 0x54a3) 2018/03/31 07:41:49 executing program 5: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0xaf01, &(0x7f00000002c0)=&(0x7f0000000280)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000300)='./file0\x00', 0x8, 0x7, &(0x7f00000007c0)=[{&(0x7f0000000340)="2e1624bce218a54fdf3d6e38e7583297657abc097f257cd85d3752e784f34cf7697e9b3f60c73f032dbceb71359f94f8be0051b6fc01fa180123216cf50f713972a6dbc541ddc12a71dc4375fd6b74bae3adc243259a01e1abda6121e9bce514f985d0140707754910ca77276f196027ca90f00032d8b2cf997742f028ecf4f4b01304c1810ebbecf398b5878c75a131d97b26c151edf853393c636346b670c860d29405c32f8bf9d763b0a01b12", 0xae, 0x1ff}, {&(0x7f0000000400)="1997bd83ce18f8ffb0c655bb6a7d1d8b3d677f57ec4557d7a084d797fcf60f4abd1d22ba33892b", 0x27, 0x1ff}, {&(0x7f0000000440)="18b57fd3b6ca7dc0520b523487c9cb06dc140a4ade200c0acd8b47327d8371368b243a42cb862eba115b6822f9f700a4018b1ae7aae587522549ee67dda53aeaabbb1fd420eda3f5da7f9747cccda86ef6d830a8ae7127eeac0fbbb1e85b70f52763251a372a2da09ab5b2ccfdcf153bd911174da7a4fbe5bdb4ae974b49f80c28ac48e2882e439e132d", 0x8a, 0x2}, {&(0x7f0000000500)="1b818e37f899fea673522ab146e6d307c659e93aae660ec32281734b7c5f6e1e0f0c77b957c03764a9383b58a9556a0a0d73177d082130312e48fd2cc0907a515638e64be2e6609d12aae92285783709cb07e69b092e5aaf059e8bea63a2f7869b280b2105ea7ba5ecbcc13509a1087d6733ac", 0x73, 0x40}, {&(0x7f0000000580)="fa3383c6d072bf06f0f0ee03a1baead0de6e3480dd31abd1b02c4fb14d80255e74ebbc3d74d7c0b3c1201152a0d0928adfc7302f25436c0daac5a407ccccb27bc11ea85c4bbbdb62feede0f3af0c4c6439a83f525e41", 0x56, 0x2}, {&(0x7f0000000600)="70bf2115140d0ab174e7ba6cd25f5d66f4d348e3c8f0b9b12ee029f055bbe08b5417541a295454c81e8901097f3570b336eb0b9611688d6a68b31eaf4b226ace9e3a6b112b02fde2d501de5a0c5b1a5c1d355bf41a2742a14ce03a7d53fccdbda2d9641ce81bed7b050cee1ff2df2a0aed16434183fcd59882c79f49b1c30a567afd3974791386aa10bc9ba15ddef95647a3fa4f9eef25240541871ba3d78d77f0461d953d5bcbf3f575ba6de991b08b77be172a288e3846f65c6c976aa19109165ed6892eb1550da8f6c868557f4448b0fd477a1adf69d9c9b13e400aad65", 0xdf, 0x7fffffff}, {&(0x7f0000000700)="4079e2608fc7dd4fcf40b8815cb2ac8e3275013bae19c96aa146ba5e80ec0273462e734cd10d40e69dadfc075393987e403c9921fd38598e1778503b6bdcc0f15eb2b9fa109b3b4332b19d05bbf8cf8f3f74d9a8d6296cd9668db6835263de10fc6040e3c65ebd49587badf61cf98673f20a3826f9923789bbf6d3e728f1e93c7d7a5df88725f8f8b27a5788fc683214f9a4b154d1a72122c91e1aa90f8f8d9e49b40455d6414ac1b0c9cd28ebbb60e78d7069a5d550c4ecbd79c81646", 0xbd, 0x10001}], 0x39804, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000df5fd8)={0x0, 0x0, &(0x7f00003acf97)=""/105, &(0x7f0000bf6000)=""/228, &(0x7f000017d000)=""/199}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000cef000)={0x1, 0x0, &(0x7f000062a000)=""/167, &(0x7f0000aac000)=""/21, &(0x7f00002fdf52)=""/174}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000f82ffc)=0x1) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=""/187, &(0x7f0000000180)=""/118, &(0x7f0000000200)=""/80}) [ 175.491257] futex_wake_op: syz-executor3 tries to shift op by -1; fix this program 2018/03/31 07:41:49 executing program 2: r0 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)="c6cc8e60a78914d500bfeae773ddb642384ef9648af1058f5fbd2fd309524d989e8ca5c3e6e4d185de0489636bb4012cd2281d57a505b82ae678e253ab1603ef18da1e2b4f2acc3c7651ff1c670f5ed1de51a9a5a850687fc0664d9c81b66fefaf800714c085934bd42e3e21ae71d978f3e76fcbfdc2e66adff8be4d85633beb78581bf230f72954dd487c97d06409d3c6e2f7f22be6284a9b", 0x99, 0xfffffffffffffffb) keyctl$describe(0x6, r0, &(0x7f00000002c0)=""/200, 0xc8) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440)={0x0, 0x0, 0xffffffffffffffff}) r2 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x80) ioctl$sock_inet6_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f00000003c0)) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20202, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x1010, r4, 0x0) setsockopt$inet_MCAST_MSFILTER(r4, 0x0, 0x30, &(0x7f0000000580)=ANY=[@ANYBLOB="030000000000000002004e22ac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e24ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000006ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ffffffffffffff000000000000000000000000000000000000000000000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e220000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) pwrite64(r4, &(0x7f00000004c0)="361cf8298589166f6c2d5823c3b913944a09f012cc6a80f1d50171bf0badb6b5ffdeeaef7d6bdec3b31ce16780d2546875ed31070c85d5735d1ca260f2fca2cc539989af5eafe394f9ae07fcd88029971829aeaf797a78f97cd7f8531aeeb62f497a6d2d8c61dc23348ec786a20e624fdf4c5b839bea2dc66b04b7756cc92f852e", 0x81, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f0000000400)=0xfff, 0x4) fallocate(r4, 0x3, 0x0, 0x81) ppoll(&(0x7f0000000080)=[{r3}, {r1, 0x208}, {r4, 0x28}], 0x3, &(0x7f00000000c0), &(0x7f0000000140)={0x70000000000}, 0x8) 2018/03/31 07:41:49 executing program 3: r0 = socket$inet6_sctp(0xa, 0x100000000005, 0x84) r1 = syz_open_dev$sndpcmc(&(0x7f0000000400)='/dev/snd/pcmC#D#c\x00', 0x2, 0x222200) ioctl$void(r1, 0x543b766b5b588bb3) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'bridge0\x00', &(0x7f0000000100)=@ethtool_drvinfo={0x3, "95bd8e555941a50c6c133af872ddc08bcf679c51e6b0214e025ffe161af610eb", "33588c4f52cdf44b1062f8e585a3cb35bc0bd474cb2e6a27d67cb6f35b6902f0", "0a3e02d4cdf36d9a1df02e68dfe28268e54e30abeb2009a1c026a25be601ea27", "b18f32b33ae634c5e32b06b0bec98fabfd2cce3c6394877663f573cf3f01740c", "58ae14557dc205153358ca46ad37db2c939ecc06180fe0f8806e5e185321b6ef", "134474fb777811e4cf5d67da"}}) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000000)={0x0, 0xffffffff, 0x800, 0x2}, &(0x7f0000000040)=0x10) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000300)={r2, @in6={{0xa, 0x4e22, 0x1, @local={0xfe, 0x80, [], 0xaa}, 0x1}}, 0x2, 0x3}, 0x90) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f00000002c0)=ANY=[@ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00\x00']) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000200)={r2, @in={{0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x1c75, 0x2}, 0x90) 2018/03/31 07:41:49 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) acct(&(0x7f0000001240)='./file0\x00') setrlimit(0xa, &(0x7f0000000380)={0x4, 0x1}) getsockname(0xffffffffffffff9c, &(0x7f0000001480)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f00000012c0)=0x80) socketpair(0x10, 0x0, 0x8, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000001580)={r3}) r4 = open(&(0x7f00000010c0)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000001300)={0x8, 0x0, 0x6, 0x58a, 0x0}, &(0x7f0000001340)=0x10) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x3052, r3, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f00000001c0)={'bond0\x00', {0x2, 0x4e20, @multicast2=0xe0000002}}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYBLOB="408615824f3f781ae75fcc9554f019621eaccb21d7ca5fb77c06ff41c0d07d78b6de0ed01fa10b1070cb77afb61679a7f893b0c78371e1195ef393dc87b1b329811e67705b9e1bb5dc00c5b14645b010d310e491c159a81b77145882a63f6206ecfb54b4f6b2ddf7963c2b2681ff1aa2dfd55f1e73b02e150e1f8e51e6ae3615336ed2b2b461fccd4ec00311dd4b00cf4316fb4bda9fa1a0a94d01d4db3209cd302a449b841dc10fcc2d63482b979cb70c21ef7000e655a7a1a18b57b6cd06267ef9f582b4783e42e60f460962921710e11ac51a3f9fa92e9118c5f0e1d8b2c342"], &(0x7f0000000040)=0x2) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000100)={r7, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000001380)={r5, @in6={{0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0xf}}}, 0x0, 0x7, 0x0, 0x8, 0x92}, &(0x7f0000001440)=0x98) eventfd(0xffffffff80000001) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000001140)={0x4, 0x8001, 0x40, 0xfffffffffffffffd, 0x0}, &(0x7f0000001180)=0x10) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f0000001500)) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000011c0)={0x95e, 0x101, 0x8009, 0x1ff, 0x31386ac8, 0x8, 0x1, 0x7, r8}, 0x20) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x1, 0x1) recvfrom(r1, &(0x7f00000015c0)=""/83, 0x53, 0x120, 0x0, 0x0) symlinkat(&(0x7f0000001080)='./file0\x00', r4, &(0x7f0000001100)='./file0\x00') close(r0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={r4, r4, 0x4, 0x3}, 0x10) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0xc) 2018/03/31 07:41:49 executing program 1: r0 = socket(0xa, 0x2000000001, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0xfffffffffffffff9, 0x101800) mkdirat$cgroup(r1, &(0x7f0000000080)='syz1\x00', 0x1ff) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) ppoll(&(0x7f00000000c0)=[{r0, 0xd082}], 0x1, &(0x7f0000000140)={r2, r3+10000000}, &(0x7f0000000180)={0x7fff}, 0x8) getsockopt$packet_int(r1, 0x107, 0x10, &(0x7f00000001c0), &(0x7f0000000200)=0x4) getsockopt(r0, 0x0, 0x53, &(0x7f0000001000)=""/8, &(0x7f0000000ffc)=0x7) 2018/03/31 07:41:49 executing program 0: socket$netlink(0x10, 0x3, 0x15) syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local={0x1, 0x80, 0xc2}, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @broadcast=0xffffffff}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 2018/03/31 07:41:49 executing program 7 (fault-call:10 fault-nth:23): r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4900, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000240)=0x4) getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) r1 = dup(0xffffffffffffff9c) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r2 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r2, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r2, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r2, &(0x7f0000000100)=""/65, 0x41) r3 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) fchdir(r2) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(r3, &(0x7f0000000200)='./file1\x00', r2, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r2, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000580)=""/80, 0x50}, {&(0x7f00000008c0)=""/4096, 0x1000}], 0x2, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x20) r5 = syz_open_dev$sndpcmp(&(0x7f00000018c0)='/dev/snd/pcmC#D#p\x00', 0x3, 0x10a00) ioctl$KVM_GET_DEVICE_ATTR(r5, 0x4018aee2, &(0x7f0000001940)={0x0, 0x100, 0x9, &(0x7f0000001900)}) recvfrom$ipx(r4, &(0x7f00000006c0)=""/52, 0x34, 0x100, &(0x7f0000000700)={0x4, 0x9a2, 0x4, "dc108d9d4391", 0x5}, 0x10) renameat(r2, &(0x7f0000001980)='./file1\x00', r5, &(0x7f00000019c0)='./file0/file0\x00') r6 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r6, 0x4, 0x0) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000040), 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r6, &(0x7f0000000200), 0xfffffe08) [ 175.663355] FAULT_INJECTION: forcing a failure. [ 175.663355] name failslab, interval 1, probability 0, space 0, times 0 [ 175.674678] CPU: 0 PID: 13982 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #372 [ 175.682044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 175.691389] Call Trace: [ 175.693976] dump_stack+0x194/0x24d [ 175.697604] ? arch_local_irq_restore+0x53/0x53 [ 175.702278] should_fail+0x8c0/0xa40 [ 175.706002] ? kstrdup+0x39/0x70 [ 175.709367] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 175.714453] ? cgroup_mkdir+0x553/0xfc0 [ 175.718410] ? vfs_mkdir+0x390/0x600 [ 175.722101] ? SyS_mkdirat+0x22b/0x2b0 [ 175.725973] ? do_syscall_64+0x281/0x940 [ 175.730016] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 175.735365] ? find_held_lock+0x35/0x1d0 [ 175.739409] ? find_held_lock+0x35/0x1d0 [ 175.743452] ? __lock_is_held+0xb6/0x140 [ 175.747501] ? check_same_owner+0x320/0x320 [ 175.751802] ? rcu_note_context_switch+0x710/0x710 [ 175.756709] ? rcu_read_lock_sched_held+0x108/0x120 [ 175.761710] should_failslab+0xec/0x120 [ 175.765661] kmem_cache_alloc+0x47/0x760 [ 175.769706] ? memcpy+0x45/0x50 [ 175.772964] ? kstrdup+0x59/0x70 [ 175.776314] __kernfs_new_node+0xe2/0x570 [ 175.780469] ? kernfs_dop_revalidate+0x380/0x380 [ 175.785209] ? kasan_check_read+0x11/0x20 [ 175.789335] ? read_word_at_a_time+0x12/0x20 [ 175.793722] ? strscpy+0x186/0x500 [ 175.797251] kernfs_new_node+0x80/0xe0 [ 175.801120] __kernfs_create_file+0x4b/0x320 [ 175.805513] cgroup_addrm_files+0x3c5/0xa70 [ 175.809820] ? cgroup_file_write+0x710/0x710 [ 175.814216] ? getrawmonotonic64+0x460/0x460 [ 175.818606] ? kernfs_active+0x92/0x160 [ 175.822565] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 175.827470] ? cgroup_kn_set_ugid+0x2c7/0x370 [ 175.831944] ? cgroup_file_name+0x1d0/0x1d0 [ 175.836250] css_populate_dir+0x340/0x420 [ 175.840381] cgroup_mkdir+0x553/0xfc0 [ 175.844160] ? __lock_is_held+0xb6/0x140 [ 175.848204] ? cgroup_destroy_locked+0x750/0x750 [ 175.852937] ? rcu_read_lock_sched_held+0x108/0x120 [ 175.857931] ? kmem_cache_free+0x258/0x2a0 [ 175.862148] ? set_nlink+0xc1/0x160 [ 175.865756] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 175.870664] ? generic_permission+0x105/0x3c0 [ 175.875141] ? cgroup_destroy_locked+0x750/0x750 [ 175.879873] kernfs_iop_mkdir+0x153/0x1e0 [ 175.884003] vfs_mkdir+0x390/0x600 [ 175.887532] SyS_mkdirat+0x22b/0x2b0 [ 175.891238] ? SyS_mknod+0x480/0x480 [ 175.894928] ? trace_hardirqs_on+0xd/0x10 [ 175.899052] ? do_syscall_64+0xb7/0x940 [ 175.903005] ? SyS_mknod+0x480/0x480 [ 175.906702] do_syscall_64+0x281/0x940 [ 175.910569] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 175.916088] ? syscall_return_slowpath+0x550/0x550 [ 175.920993] ? syscall_return_slowpath+0x2ac/0x550 [ 175.925906] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 175.931252] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 175.936078] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 175.941245] RIP: 0033:0x454e79 [ 175.944410] RSP: 002b:00007fe2ad9eac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 175.952094] RAX: ffffffffffffffda RBX: 00007fe2ad9eb6d4 RCX: 0000000000454e79 2018/03/31 07:41:50 executing program 5: timer_create(0xfffffffffffffff1, &(0x7f0000005fb0)={0x4, 0x0, 0x1}, &(0x7f0000002ffc)) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/audio\x00', 0x0, 0x0) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000400)=0x3, &(0x7f0000000440)=0x4) timer_settime(0x0, 0x0, &(0x7f0000001fe0)={{0x77359400}, {0x0, 0x6}}, &(0x7f0000001000)) timer_gettime(0x0, &(0x7f0000000fe0)) [ 175.959341] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 175.966586] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 175.973832] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 175.981080] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000017 [ 175.988880] cgroup: cgroup_addrm_files: failed to add cgroup.stat, err=-12 2018/03/31 07:41:50 executing program 2: r0 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)="c6cc8e60a78914d500bfeae773ddb642384ef9648af1058f5fbd2fd309524d989e8ca5c3e6e4d185de0489636bb4012cd2281d57a505b82ae678e253ab1603ef18da1e2b4f2acc3c7651ff1c670f5ed1de51a9a5a850687fc0664d9c81b66fefaf800714c085934bd42e3e21ae71d978f3e76fcbfdc2e66adff8be4d85633beb78581bf230f72954dd487c97d06409d3c6e2f7f22be6284a9b", 0x99, 0xfffffffffffffffb) keyctl$describe(0x6, r0, &(0x7f00000002c0)=""/200, 0xc8) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440)={0x0, 0x0, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r3, 0x29, 0x41, &(0x7f0000000a40)={'filter\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x1010, r3, 0x0) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000000580)=ANY=[@ANYBLOB="030000000000000002004e22ac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e24ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000006ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ffffffffffffff000000000000000000000000000000000000000000000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e220000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) timerfd_create(0x6, 0x800) pwrite64(r3, &(0x7f00000004c0)="361cf8298589166f6c2d5823c3b913944a09f012cc6a80f1d50171bf0badb6b5ffdeeaef7d6bdec3b31ce16780d2546875ed31070c85d5735d1ca260f2fca2cc539989af5eafe394f9ae07fcd88029971829aeaf797a78f97cd7f8531aeeb62f497a6d2d8c61dc23348ec786a20e624fdf4c5b839bea2dc66b04b7756cc92f852e", 0x81, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000400)=0xfff, 0x4) fallocate(r3, 0x3, 0x0, 0x81) ppoll(&(0x7f0000000080)=[{r2}, {r1, 0x208}, {r3, 0x28}], 0x3, &(0x7f00000000c0), &(0x7f0000000140)={0x70000000000}, 0x8) 2018/03/31 07:41:50 executing program 0: r0 = memfd_create(&(0x7f0000000000)='md5sum@\x00', 0x3) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="05011700", @ANYRES16=r1, @ANYBLOB="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"], 0x104}, 0x1, 0x0, 0x0, 0x40}, 0x40001) getpeername(r0, &(0x7f0000000280)=@alg, &(0x7f0000000300)=0x80) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000340)={0x1, 0xff, 0x2}, 0xc) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0x4008af13, &(0x7f0000000380)={0x2, 0x6}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f00000003c0)=0x1) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000400)={0x0, 0x12, "5cbff7db29eadfa7dc0fdc352d04bd8b8f3b"}, &(0x7f0000000440)=0x1a) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000480)=@assoc_value={r2, 0x54d}, &(0x7f00000004c0)=0x8) ioctl$KDSKBMETA(r0, 0x4b63, &(0x7f0000000940)=0xdab) bind$llc(r0, &(0x7f0000000500)={0x1a, 0x313, 0x1000, 0x784d480, 0x5, 0xfff, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000540)) r3 = syz_open_dev$sndtimer(&(0x7f0000001000)='/dev/snd/timer\x00', 0x0, 0x0) r4 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000003000)=0x8) ioctl$KVM_SET_GSI_ROUTING(r4, 0x4008ae6a, &(0x7f0000000000)={0x9, 0x0, [{0x4, 0x4, 0x0, 0x0, @sint={0x2423, 0x6b8}}, {0xffffffffffffff78, 0x3, 0x0, 0x0, @msi={0x1, 0xfffffffffffffbd5, 0x100000000}}, {0x7, 0x4, 0x0, 0x0, @sint={0x8}}, {0x4, 0x7, 0x0, 0x0, @irqchip={0x2, 0x28}}, {0x6, 0x4, 0x0, 0x0, @adapter={0xd01e, 0x7, 0x400, 0x6, 0x5}}, {0x1000000000000, 0x4, 0x0, 0x0, @sint={0x80000000, 0x1f}}, {0x4, 0x7, 0x0, 0x0, @adapter={0x7ff, 0xf9f, 0x50000, 0xa4a9, 0x7}}, {0x100000001, 0x1, 0x0, 0x0, @sint={0x500000, 0x9}}, {0xffff, 0x3, 0x0, 0x0, @adapter={0x8, 0x20, 0x401, 0x6, 0x20}}]}) munmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000) close(r3) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000580), &(0x7f00000005c0)=0x9b94006419b34f8d) bind$llc(0xffffffffffffffff, &(0x7f0000000600)={0x1a, 0x206, 0xb3, 0xa0dc, 0x100000000, 0x800, @random="9bad9bb82713"}, 0x10) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640), &(0x7f0000000680)=0x30) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000006c0)=[@in6={0xa, 0x4e21, 0xfffffffffffffff7, @empty, 0xfffffffffffffffb}, @in6={0xa, 0x4e22, 0x10000, @mcast2={0xff, 0x2, [], 0x1}, 0x400}, @in={0x2, 0x4e20, @rand_addr=0x3}], 0x48) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000740)={'HL\x00'}, &(0x7f0000000780)=0x1e) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f00000007c0)={r0, 0x7, 0x7, r0}) getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f0000000840)={@local, @dev}, &(0x7f0000000880)=0xc) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f00000008c0)={@rand_addr, @dev}, &(0x7f0000000900)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000a80)={{{@in, @in=@broadcast}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000800)=0xe8) getsockname$packet(r0, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000c00)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000c40)={@broadcast, @rand_addr}, &(0x7f0000000c80)=0xc) socket$nl_generic(0x10, 0x3, 0x10) 2018/03/31 07:41:50 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x80000000101002, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CLR_FD(r0, 0x7002) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'ip6_vti0\x00', {0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}}) r1 = shmget$private(0x0, 0x3000, 0x1000, &(0x7f0000ffa000/0x3000)=nil) ioctl$KVM_GET_REGS(r0, 0x8090ae81, &(0x7f0000000140)) shmctl$SHM_STAT(r1, 0xd, &(0x7f00000000c0)=""/78) 2018/03/31 07:41:50 executing program 3: r0 = socket(0x1e, 0x4, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0, 0x0}, &(0x7f0000000400)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) tgkill(0x0, 0x0, 0x0) r4 = accept4$ax25(0xffffffffffffff9c, &(0x7f0000000380), &(0x7f0000000480)=0x10, 0x80000) fcntl$getown(0xffffffffffffffff, 0x9) r5 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000090d8b75e67e16b394342abb5158df87ea8984e79c93df7498b2b34796068700e29fbd789f9a031f23e16c96e30baed2961953b057f7a3222943acc4b8cfa4de553f8276731ddeb811efd44ea011e1a0db9074a28a826c88566b89c57cc3cca4aec41d37fa27c8daa19030d03139d0aea71d509d9a20ba7deceb656cc1308d9d1f111b6bd1595486f55e229923be4ed8cbfb78e86280b4cacf386bfa8840afb312a4c520a03b27f805d181bd09ea208931a36e888060a2d") ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000500)={0x10000000, 0x0, 0x3}) getpeername(r4, &(0x7f0000002940)=@can={0x0, 0x0}, &(0x7f00000029c0)=0x80) connect$packet(r5, &(0x7f0000002a00)={0x11, 0x7, r6, 0x1, 0x4, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x15}}, 0x14) syz_open_procfs(r1, &(0x7f0000000300)='sched\x00') fsetxattr(r5, &(0x7f0000000140)=@known='user.syz\x00', &(0x7f0000000180)="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", 0x137, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r5, 0x84, 0x22, &(0x7f0000000800)={0x7fff, 0xa, 0xf33, 0xe51c}, 0x10) fremovexattr(r5, &(0x7f0000000000)=@known='user.syz\x00') ioctl$DRM_IOCTL_GET_CAP(r5, 0xc010640c, &(0x7f0000000340)={0x9}) r7 = socket$vsock_stream(0x28, 0x1, 0x0) write(r7, &(0x7f0000000980)="5f8bed08f918d990e27f6f76fdc57c5bdded6a1968bef8938df3e3b0a8b058f38915c29e2a6c98ad0517f66d1b96920a9e6ddefc043e261c246b4693c1e38c28655539c78f2eabce8ad4f5ccc8f89105076ff01e739d6f8b546fca444a201f7a11cf0e4c278101703bf599fcfaeda4fe77d3e5161b319bb00bcf37af00d5b28379385ff43e4e52499af53a787e684c574908cf26260e5208d035d28ea7b765cbae6987f0703ac645ca45012f11678bf1921b8a1997ad125aa2aadd948f3dd86bc86f3c6ce933f648c9659405f401c33f59d892e576471c915cc595739beae4", 0xdf) connect(r4, &(0x7f0000000740)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x80) syz_genetlink_get_family_id$ipvs(&(0x7f0000000580)='IPVS\x00') fcntl$getown(r5, 0x9) syz_fuseblk_mount(&(0x7f00000004c0)='./file0\x00', &(0x7f00000005c0)='./file0\x00', 0xe000, r2, r3, 0x325e, 0x0, 0x2820080) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x0, 0x200, 0x0, 0x2}, &(0x7f0000000680)=0x10) sendmsg$IPVS_CMD_GET_INFO(r4, &(0x7f0000000700)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000a80)=ANY=[@ANYBLOB="93000000aad39b297d008fc03e408ee000310e16e8ff44b195358ad6b69030cb40e7f8649b5e69f24b3a6daf07bd0477597848f75cb4d9aed524eca5a532ee46cf99dc8600098fbe73187d366c51a4d622a561c7cd644928903f1081c0482a431b85ef56dbbda38230200ebe9e61a1ab9f75b8328b877f7756e8b5fc43edad3f0192340dffe8d7fad134e6d88fd835c24c09d6d464316d210976bfaec7bcc4f4d28ac8b7bd1f55d75298874707978d6ccc40d53b25021065a131d6ad43cb07d283b2af29cfe57c504fc0caa701e9f0f2beec6e46cbc351364642a29b7e4f1744cc3fbda9959a85e2aa00000000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x40000) fcntl$getown(r4, 0x9) r8 = socket$packet(0x11, 0x3, 0x300) ioctl$LOOP_SET_FD(r5, 0x4c00, r8) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, 0xffffffffffffffff, &(0x7f00000002c0)) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f00000007c0)=@req3={0xee34, 0x4, 0x4, 0x1, 0x767, 0x8001, 0x4}, 0xffffffffffffff3b) r9 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r9, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) 2018/03/31 07:41:50 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_flowlabel\x00') r1 = eventfd2(0x20000000, 0x80000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) sendfile(r1, r0, &(0x7f0000000080), 0x10ed5b) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) r4 = socket$inet(0x2, 0x6, 0xfffffffffffffff8) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) dup3(r4, r2, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000080)={0x100000000006, r2, 0xfffffffffffffffe}) r6 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x101000, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) fchdir(r7) r8 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0x1023c) truncate(&(0x7f0000000140)='./file0\x00', 0x0) write(r8, &(0x7f0000000180)="15", 0x1) r9 = open(&(0x7f0000b91ff9)='./file0\x00', 0x68042, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r5, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x1}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r7, 0x84, 0x9, &(0x7f00000003c0)={r10, @in6={{0xa, 0x4e24, 0x8000, @mcast1={0xff, 0x1, [], 0x1}}}, 0x10000, 0xe82a, 0x3, 0x9, 0x40}, 0x98) fallocate(r9, 0x0, 0xffff, 0x9) ioctl$KVM_TPR_ACCESS_REPORTING(r6, 0xc028ae92, &(0x7f0000000480)={0x7, 0x8001}) close(0xffffffffffffffff) readahead(r6, 0x1244, 0xffffffffffffff64) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x80, 0x5) openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) dup2(r2, r4) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f0000000300)={0x0, 0xfffffffffffffffb, 0x1, 0xe52d, 0x0, 0x20000000000}, &(0x7f0000000340)=0x14) 2018/03/31 07:41:50 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00006a4ff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000e3eff8)={0x0, 0x0}, 0x0) dup3(r0, r3, 0x80000) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r4, r2) 2018/03/31 07:41:50 executing program 7 (fault-call:10 fault-nth:24): r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4900, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000240)=0x4) getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) r1 = dup(0xffffffffffffff9c) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r2 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r2, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r2, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r2, &(0x7f0000000100)=""/65, 0x41) r3 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) fchdir(r2) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(r3, &(0x7f0000000200)='./file1\x00', r2, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r2, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000580)=""/80, 0x50}, {&(0x7f00000008c0)=""/4096, 0x1000}], 0x2, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x20) r5 = syz_open_dev$sndpcmp(&(0x7f00000018c0)='/dev/snd/pcmC#D#p\x00', 0x3, 0x10a00) ioctl$KVM_GET_DEVICE_ATTR(r5, 0x4018aee2, &(0x7f0000001940)={0x0, 0x100, 0x9, &(0x7f0000001900)}) recvfrom$ipx(r4, &(0x7f00000006c0)=""/52, 0x34, 0x100, &(0x7f0000000700)={0x4, 0x9a2, 0x4, "dc108d9d4391", 0x5}, 0x10) renameat(r2, &(0x7f0000001980)='./file1\x00', r5, &(0x7f00000019c0)='./file0/file0\x00') r6 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r6, 0x4, 0x0) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000040), 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r6, &(0x7f0000000200), 0xfffffe08) [ 176.146711] FAULT_INJECTION: forcing a failure. [ 176.146711] name failslab, interval 1, probability 0, space 0, times 0 [ 176.158054] CPU: 1 PID: 14004 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #372 [ 176.165400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 176.174733] Call Trace: [ 176.177304] dump_stack+0x194/0x24d [ 176.180912] ? arch_local_irq_restore+0x53/0x53 [ 176.185563] should_fail+0x8c0/0xa40 [ 176.189252] ? kstrdup+0x39/0x70 [ 176.192598] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 176.197676] ? cgroup_mkdir+0x553/0xfc0 [ 176.201623] ? vfs_mkdir+0x390/0x600 [ 176.205309] ? SyS_mkdirat+0x22b/0x2b0 [ 176.209173] ? do_syscall_64+0x281/0x940 [ 176.213209] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 176.218547] ? find_held_lock+0x35/0x1d0 [ 176.222582] ? find_held_lock+0x35/0x1d0 [ 176.226622] ? __lock_is_held+0xb6/0x140 [ 176.230667] ? check_same_owner+0x320/0x320 [ 176.234965] ? rcu_note_context_switch+0x710/0x710 [ 176.239867] ? rcu_read_lock_sched_held+0x108/0x120 [ 176.244860] should_failslab+0xec/0x120 [ 176.248808] kmem_cache_alloc+0x47/0x760 [ 176.252843] ? memcpy+0x45/0x50 [ 176.256098] ? kstrdup+0x59/0x70 [ 176.259441] __kernfs_new_node+0xe2/0x570 [ 176.263567] ? kernfs_dop_revalidate+0x380/0x380 [ 176.268298] ? kasan_check_read+0x11/0x20 [ 176.272418] ? read_word_at_a_time+0x12/0x20 [ 176.276802] ? strscpy+0x186/0x500 [ 176.280320] kernfs_new_node+0x80/0xe0 [ 176.284183] __kernfs_create_file+0x4b/0x320 [ 176.288567] cgroup_addrm_files+0x3c5/0xa70 [ 176.292869] ? cgroup_file_write+0x710/0x710 [ 176.297256] ? getrawmonotonic64+0x460/0x460 [ 176.301642] ? kernfs_active+0x92/0x160 [ 176.305592] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 176.310494] ? cgroup_kn_set_ugid+0x2c7/0x370 [ 176.314961] ? cgroup_file_name+0x1d0/0x1d0 [ 176.319258] css_populate_dir+0x340/0x420 [ 176.323379] cgroup_mkdir+0x553/0xfc0 [ 176.327155] ? __lock_is_held+0xb6/0x140 [ 176.331193] ? cgroup_destroy_locked+0x750/0x750 [ 176.335922] ? rcu_read_lock_sched_held+0x108/0x120 [ 176.340911] ? kmem_cache_free+0x258/0x2a0 [ 176.345122] ? set_nlink+0xc1/0x160 [ 176.348726] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 176.353629] ? generic_permission+0x105/0x3c0 [ 176.358097] ? cgroup_destroy_locked+0x750/0x750 [ 176.362829] kernfs_iop_mkdir+0x153/0x1e0 [ 176.366951] vfs_mkdir+0x390/0x600 [ 176.370465] SyS_mkdirat+0x22b/0x2b0 [ 176.374155] ? SyS_mknod+0x480/0x480 [ 176.377842] ? trace_hardirqs_on+0xd/0x10 [ 176.381963] ? do_syscall_64+0xb7/0x940 [ 176.385912] ? SyS_mknod+0x480/0x480 [ 176.389598] do_syscall_64+0x281/0x940 [ 176.393458] ? vmalloc_sync_all+0x30/0x30 [ 176.397581] ? _raw_spin_unlock_irq+0x27/0x70 [ 176.402052] ? finish_task_switch+0x1c1/0x7e0 [ 176.406519] ? syscall_return_slowpath+0x550/0x550 [ 176.411420] ? syscall_return_slowpath+0x2ac/0x550 [ 176.416325] ? prepare_exit_to_usermode+0x350/0x350 [ 176.421317] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 176.426655] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 176.431476] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 176.436642] RIP: 0033:0x454e79 [ 176.439805] RSP: 002b:00007fe2ad9eac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 2018/03/31 07:41:50 executing program 6 (fault-call:23 fault-nth:0): r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) acct(&(0x7f0000001240)='./file0\x00') setrlimit(0xa, &(0x7f0000000380)={0x4, 0x1}) getsockname(0xffffffffffffff9c, &(0x7f0000001480)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f00000012c0)=0x80) socketpair(0x10, 0x0, 0x8, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000001580)={r3}) r4 = open(&(0x7f00000010c0)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000001300)={0x8, 0x0, 0x6, 0x58a, 0x0}, &(0x7f0000001340)=0x10) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x3052, r3, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f00000001c0)={'bond0\x00', {0x2, 0x4e20, @multicast2=0xe0000002}}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYBLOB="408615824f3f781ae75fcc9554f019621eaccb21d7ca5fb77c06ff41c0d07d78b6de0ed01fa10b1070cb77afb61679a7f893b0c78371e1195ef393dc87b1b329811e67705b9e1bb5dc00c5b14645b010d310e491c159a81b77145882a63f6206ecfb54b4f6b2ddf7963c2b2681ff1aa2dfd55f1e73b02e150e1f8e51e6ae3615336ed2b2b461fccd4ec00311dd4b00cf4316fb4bda9fa1a0a94d01d4db3209cd302a449b841dc10fcc2d63482b979cb70c21ef7000e655a7a1a18b57b6cd06267ef9f582b4783e42e60f460962921710e11ac51a3f9fa92e9118c5f0e1d8b2c342"], &(0x7f0000000040)=0x2) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000100)={r7, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000001380)={r5, @in6={{0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0xf}}}, 0x0, 0x7, 0x0, 0x8, 0x92}, &(0x7f0000001440)=0x98) eventfd(0xffffffff80000001) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000001140)={0x4, 0x8001, 0x40, 0xfffffffffffffffd, 0x0}, &(0x7f0000001180)=0x10) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f0000001500)) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000011c0)={0x95e, 0x101, 0x8009, 0x1ff, 0x31386ac8, 0x8, 0x1, 0x7, r8}, 0x20) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x1, 0x1) recvfrom(r1, &(0x7f00000015c0)=""/83, 0x53, 0x120, 0x0, 0x0) symlinkat(&(0x7f0000001080)='./file0\x00', r4, &(0x7f0000001100)='./file0\x00') close(r0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={r4, r4, 0x4, 0x3}, 0x10) getsockname$netlink(r1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) [ 176.447485] RAX: ffffffffffffffda RBX: 00007fe2ad9eb6d4 RCX: 0000000000454e79 [ 176.454727] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 176.461969] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 176.469211] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 176.476456] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000018 [ 176.483773] cgroup: cgroup_addrm_files: failed to add cgroup.stat, err=-12 2018/03/31 07:41:50 executing program 2: r0 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)="c6cc8e60a78914d500bfeae773ddb642384ef9648af1058f5fbd2fd309524d989e8ca5c3e6e4d185de0489636bb4012cd2281d57a505b82ae678e253ab1603ef18da1e2b4f2acc3c7651ff1c670f5ed1de51a9a5a850687fc0664d9c81b66fefaf800714c085934bd42e3e21ae71d978f3e76fcbfdc2e66adff8be4d85633beb78581bf230f72954dd487c97d06409d3c6e2f7f22be6284a9b", 0x99, 0xfffffffffffffffb) keyctl$describe(0x6, r0, &(0x7f00000002c0)=""/200, 0xc8) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440)={0x0, 0x0, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20202, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x1010, r3, 0x0) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000000580)=ANY=[@ANYBLOB="030000000000000002004e22ac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e24ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000006ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ffffffffffffff000000000000000000000000000000000000000000000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e220000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) pwrite64(r3, &(0x7f00000004c0)="361cf8298589166f6c2d5823c3b913944a09f012cc6a80f1d50171bf0badb6b5ffdeeaef7d6bdec3b31ce16780d2546875ed31070c85d5735d1ca260f2fca2cc539989af5eafe394f9ae07fcd88029971829aeaf797a78f97cd7f8531aeeb62f497a6d2d8c61dc23348ec786a20e624fdf4c5b839bea2dc66b04b7756cc92f852e", 0x81, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000400)=0xfff, 0x4) fallocate(r3, 0x3, 0x0, 0x81) ppoll(&(0x7f0000000080)=[{r2}, {r1, 0x208}, {r3, 0x28}], 0x3, &(0x7f00000000c0), &(0x7f0000000140)={0x70000000000}, 0x8) 2018/03/31 07:41:50 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) acct(&(0x7f0000001240)='./file0\x00') setrlimit(0xa, &(0x7f0000000380)={0x4, 0x1}) getsockname(0xffffffffffffff9c, &(0x7f0000001480)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f00000012c0)=0x80) socketpair(0x10, 0x0, 0x8, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000001580)={r3}) r4 = open(&(0x7f00000010c0)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000001300)={0x8, 0x0, 0x6, 0x58a, 0x0}, &(0x7f0000001340)=0x10) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x3052, r3, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f00000001c0)={'bond0\x00', {0x2, 0x4e20, @multicast2=0xe0000002}}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYBLOB="408615824f3f781ae75fcc9554f019621eaccb21d7ca5fb77c06ff41c0d07d78b6de0ed01fa10b1070cb77afb61679a7f893b0c78371e1195ef393dc87b1b329811e67705b9e1bb5dc00c5b14645b010d310e491c159a81b77145882a63f6206ecfb54b4f6b2ddf7963c2b2681ff1aa2dfd55f1e73b02e150e1f8e51e6ae3615336ed2b2b461fccd4ec00311dd4b00cf4316fb4bda9fa1a0a94d01d4db3209cd302a449b841dc10fcc2d63482b979cb70c21ef7000e655a7a1a18b57b6cd06267ef9f582b4783e42e60f460962921710e11ac51a3f9fa92e9118c5f0e1d8b2c342"], &(0x7f0000000040)=0x2) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000100)={r7, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000001380)={r5, @in6={{0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0xf}}}, 0x0, 0x7, 0x0, 0x8, 0x92}, &(0x7f0000001440)=0x98) eventfd(0xffffffff80000001) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000001140)={0x4, 0x8001, 0x40, 0xfffffffffffffffd, 0x0}, &(0x7f0000001180)=0x10) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f0000001500)) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000011c0)={0x95e, 0x101, 0x8009, 0x1ff, 0x31386ac8, 0x8, 0x1, 0x7, r8}, 0x20) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x1, 0x1) recvfrom(r1, &(0x7f00000015c0)=""/83, 0x53, 0x120, 0x0, 0x0) symlinkat(&(0x7f0000001080)='./file0\x00', r4, &(0x7f0000001100)='./file0\x00') close(r0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={r4, r4, 0x4, 0x3}, 0x10) getsockname$netlink(r1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) 2018/03/31 07:41:50 executing program 0: perf_event_open(&(0x7f0000223000)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000004fff)='\x00', 0x4) lseek(r0, 0x0, 0x2) 2018/03/31 07:41:50 executing program 7 (fault-call:10 fault-nth:25): r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4900, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000240)=0x4) getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) r1 = dup(0xffffffffffffff9c) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r2 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r2, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r2, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r2, &(0x7f0000000100)=""/65, 0x41) r3 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) fchdir(r2) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(r3, &(0x7f0000000200)='./file1\x00', r2, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r2, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000580)=""/80, 0x50}, {&(0x7f00000008c0)=""/4096, 0x1000}], 0x2, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x20) r5 = syz_open_dev$sndpcmp(&(0x7f00000018c0)='/dev/snd/pcmC#D#p\x00', 0x3, 0x10a00) ioctl$KVM_GET_DEVICE_ATTR(r5, 0x4018aee2, &(0x7f0000001940)={0x0, 0x100, 0x9, &(0x7f0000001900)}) recvfrom$ipx(r4, &(0x7f00000006c0)=""/52, 0x34, 0x100, &(0x7f0000000700)={0x4, 0x9a2, 0x4, "dc108d9d4391", 0x5}, 0x10) renameat(r2, &(0x7f0000001980)='./file1\x00', r5, &(0x7f00000019c0)='./file0/file0\x00') r6 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r6, 0x4, 0x0) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000040), 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r6, &(0x7f0000000200), 0xfffffe08) 2018/03/31 07:41:50 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x823800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) accept$ax25(0xffffffffffffffff, &(0x7f0000000740), &(0x7f0000000780)=0x10) mkdir(&(0x7f0000000040)='./file0/control\x00', 0x0) r0 = syz_open_dev$dspn(&(0x7f00000003c0)='/dev/dsp#\x00', 0x3f, 0x400000) ioctl$VHOST_GET_VRING_BASE(r0, 0xc008af12, &(0x7f0000000480)) mkdir(&(0x7f0000155ff2)='./file0/file0\x00', 0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000100)=""/11) r1 = memfd_create(&(0x7f0000000080)=']eth1,\x00', 0x3) ioctl$TCFLSH(r1, 0x540b, 0x52) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000ff4)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r2, 0x40087703, 0x407) mmap(&(0x7f0000447000/0x4000)=nil, 0x4000, 0x0, 0x13, r2, 0x0) readv(r2, &(0x7f0000000900)=[{&(0x7f0000001000)=""/4096, 0x1000}], 0x1) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000280)={{0x2, 0x4e24, @broadcast=0xffffffff}, {0x1}, 0x60, {0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}, 'gretap0\x00'}) readv(r2, &(0x7f0000002fd0)=[{&(0x7f0000448fdc)=""/36, 0x24}], 0x1) r3 = open(&(0x7f0000000000)='./file0\x00', 0x400000, 0x4) ioctl$VT_OPENQRY(r3, 0x5600, &(0x7f0000000040)) syz_mount_image$iso9660(&(0x7f0000000300)='iso9660\x00', &(0x7f0000000340)='./file0\x00', 0x1, 0x2, &(0x7f0000000440)=[{&(0x7f0000000380)="279c4e3321cc", 0x6, 0x2}, {&(0x7f0000000400)="b197483c6af18a8613bed8c3746cc23c551ebfbc686429b11973a69f224021bbf599fa190fb6a0b465ef6d15", 0x2c, 0x80000001}], 0x10, &(0x7f00000005c0)=ANY=[@ANYBLOB="6e6f726f636b2c6d61feffffffffffffff6d6f64653d3b343d303f7e2c686964652c6d61703d6e6f993586abf400726d616c2c757466382c626c6f636b3d3336372cbaec703d6f66662c00d462c1454989ea34dcee7f4e72f7f5cef00afdf748b590d17dbabd1f4321af7f55f497e1c9c4d655e3d7f6f551b8e6077f2cecb2714ed8a68b07e01f30aa1975f43e71ef498e912f89581b18ce9fafc45aafb41a36b2839b3092f1b87eea3d8351cf2b28f9176af580c8595d142e12fbc2855d98aafed9697b6e94a50c2aee04de3ab499892585"]) rename(&(0x7f0000b2a000)='./file0/file0\x00', &(0x7f0000ab3ff0)='./file0/control\x00') getsockname(r1, &(0x7f0000000200)=@rc, &(0x7f00000000c0)=0x80) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x200000, 0x0) clock_gettime(0x7, &(0x7f0000000080)) 2018/03/31 07:41:50 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0xfffffffffffffffc}, 0x54, &(0x7f00000003c0)={&(0x7f00000002c0)=@updpolicy={0xb8, 0x19, 0x213, 0x0, 0x0, {{@in=@loopback=0x7f000001, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1, 0x0, 0x0, 0x2}, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0xc200, 0x0) ioctl$KDMKTONE(r1, 0x4b30, 0x4) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0xc4, r2, 0x101, 0x70bd25, 0x25dfdbfe, {0x1}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2=0xe0000002}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bcsf0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote={0xac, 0x14, 0x14, 0xbb}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ifb0\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x2}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8000}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x3f}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfffffffffffffff9}, @IPVS_CMD_ATTR_DEST={0x20, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@dev={0xfe, 0x80, [], 0x16}}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xffffffff}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x59}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}]}, 0xc4}, 0x1, 0x0, 0x0, 0x10}, 0x8000) [ 176.645610] FAULT_INJECTION: forcing a failure. [ 176.645610] name failslab, interval 1, probability 0, space 0, times 0 [ 176.656912] CPU: 0 PID: 14030 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #372 [ 176.664261] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 176.673588] Call Trace: [ 176.676155] dump_stack+0x194/0x24d [ 176.679760] ? arch_local_irq_restore+0x53/0x53 [ 176.684412] should_fail+0x8c0/0xa40 [ 176.688105] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 176.693183] ? kernfs_add_one+0x50/0x450 [ 176.697217] ? rb_first_postorder+0xa0/0xa0 [ 176.701511] ? kernfs_add_one+0x50/0x450 [ 176.705549] ? trace_hardirqs_off+0x10/0x10 [ 176.709847] ? find_held_lock+0x35/0x1d0 [ 176.713884] ? __lock_is_held+0xb6/0x140 [ 176.717925] ? check_same_owner+0x320/0x320 [ 176.722221] ? lock_downgrade+0x980/0x980 [ 176.726742] ? rcu_note_context_switch+0x710/0x710 [ 176.731651] should_failslab+0xec/0x120 [ 176.735605] __kmalloc_track_caller+0x5f/0x760 [ 176.740164] ? idr_alloc_cyclic+0x1d6/0x320 [ 176.744460] ? kstrdup_const+0x39/0x50 [ 176.748323] ? __mutex_unlock_slowpath+0xe9/0xac0 [ 176.753139] kstrdup+0x39/0x70 [ 176.756308] kstrdup_const+0x39/0x50 [ 176.759996] __kernfs_new_node+0xa2/0x570 [ 176.764124] ? kernfs_dop_revalidate+0x380/0x380 [ 176.768855] ? kasan_check_read+0x11/0x20 [ 176.772976] ? read_word_at_a_time+0x12/0x20 [ 176.777356] ? strscpy+0x186/0x500 [ 176.780875] kernfs_new_node+0x80/0xe0 [ 176.784736] __kernfs_create_file+0x4b/0x320 [ 176.789124] cgroup_addrm_files+0x3c5/0xa70 [ 176.793425] ? cgroup_file_write+0x710/0x710 [ 176.797811] ? getrawmonotonic64+0x460/0x460 [ 176.802197] ? kernfs_active+0x92/0x160 [ 176.806149] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 176.811050] ? cgroup_kn_set_ugid+0x2c7/0x370 [ 176.815518] ? cgroup_file_name+0x1d0/0x1d0 [ 176.819821] css_populate_dir+0x340/0x420 [ 176.823942] cgroup_mkdir+0x553/0xfc0 [ 176.827714] ? __lock_is_held+0xb6/0x140 [ 176.831752] ? cgroup_destroy_locked+0x750/0x750 [ 176.836484] ? retint_kernel+0x10/0x10 [ 176.840350] ? kernfs_iop_mkdir+0xd4/0x1e0 [ 176.844559] ? cgroup_destroy_locked+0x750/0x750 [ 176.849289] kernfs_iop_mkdir+0x153/0x1e0 [ 176.853412] vfs_mkdir+0x390/0x600 [ 176.856927] SyS_mkdirat+0x22b/0x2b0 [ 176.860617] ? SyS_mknod+0x480/0x480 [ 176.864303] ? trace_hardirqs_on+0xd/0x10 [ 176.868425] ? do_syscall_64+0xb7/0x940 [ 176.872374] ? SyS_mknod+0x480/0x480 [ 176.876064] do_syscall_64+0x281/0x940 [ 176.879925] ? vmalloc_sync_all+0x30/0x30 [ 176.884046] ? _raw_spin_unlock_irq+0x27/0x70 [ 176.888517] ? finish_task_switch+0x1c1/0x7e0 [ 176.892988] ? syscall_return_slowpath+0x550/0x550 [ 176.897892] ? syscall_return_slowpath+0x2ac/0x550 [ 176.902795] ? prepare_exit_to_usermode+0x350/0x350 [ 176.907787] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 176.913125] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 176.917945] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 176.923106] RIP: 0033:0x454e79 [ 176.926271] RSP: 002b:00007fe2ad9eac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 176.933951] RAX: ffffffffffffffda RBX: 00007fe2ad9eb6d4 RCX: 0000000000454e79 2018/03/31 07:41:51 executing program 0: r0 = syz_open_pts(0xffffffffffffff9c, 0x484242) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000040)) r1 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) ftruncate(r1, 0x8000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000a61000)='/dev/ptmx\x00', 0x801, 0x0) sendfile(r2, r1, &(0x7f0000335ff8), 0xffffffff) close(r2) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000080)=[@in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e24, 0x4, @loopback={0x0, 0x1}, 0x3}], 0x2c) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000000)=0x5) 2018/03/31 07:41:51 executing program 5: syz_emit_ethernet(0x122, &(0x7f0000000100)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@mpls_uc={0x8847, {[{0x9, 0xe7f, 0x1, 0x7}, {0x1, 0xfff, 0x8, 0x8004}, {0xffff, 0x0, 0x10000, 0xfff}, {0xffffffff, 0x7fffffff, 0x0, 0x7}, {0x3, 0x8, 0x6, 0x9a3d}, {0x5, 0x100000001, 0xffffffffffffffdd, 0x5}, {0x8c0, 0x5, 0x1200000000}, {0xad, 0x8, 0x9, 0x2}, {0x5, 0xfffffffffffffffe, 0x80000000, 0x20}, {0x1, 0x7, 0x7fffffff, 0x114000000000}], @llc={@snap={0xaa, 0xaa, "e06b", 'MF\x00', 0x883e, "52eda9f08f663e5d18baa8b35741313ede3ea7a03e31beedb2dbba6b38c706bdd013506ca1f2eb66b436f3e10064877ac751f90f15954f5b5b2135a72baabb3cde287f6449f71418beff075ba68fd773e3dbe60e126c71e32dfe9f436f39573bb4105f6c78462211815e3dcdf1b5267ce3f706e9e5197aa45a72b4c88c85a45a1530f7cb78abfe383125515b4e3a031ed89cbf8307e0b36f2357814b2fdaf68e61415ba64d7ee1fd914eebe71da6dc073b216aed77ee4434f2d9f2a6c3e4f5f8f3756bce79ea85c9135c0042a6c3c43cf4a5d5612a964bd7b943732b161f9589d255e1"}}}}}}, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000080)=ANY=[@ANYBLOB="ffffffffffff6a47283c8678080045060030000000000002907800000000e000000114009078ac14ffbb000000081e84d84b2db57b8a0af02ad8c4fda114c3cb5cb13f2e3aad888e5999a9a33fec47ec6545da5f1e7893e403aa2b5e2a450681e472b0ef59fe787e"], &(0x7f0000aed000)) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x2, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) [ 176.941195] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 176.948437] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 176.955678] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 176.962922] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000019 [ 176.970404] cgroup: cgroup_addrm_files: failed to add cpu.stat, err=-12 2018/03/31 07:41:51 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) acct(&(0x7f0000001240)='./file0\x00') setrlimit(0xa, &(0x7f0000000380)={0x4, 0x1}) getsockname(0xffffffffffffff9c, &(0x7f0000001480)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f00000012c0)=0x80) socketpair(0x10, 0x0, 0x8, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000001580)={r3}) r5 = open(&(0x7f00000010c0)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r5, 0x84, 0x22, &(0x7f0000001300)={0x8, 0x0, 0x6, 0x58a, 0x0}, &(0x7f0000001340)=0x10) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x3052, r3, 0x0) ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f00000001c0)={'bond0\x00', {0x2, 0x4e20, @multicast2=0xe0000002}}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYBLOB="408615824f3f781ae75fcc9554f019621eaccb21d7ca5fb77c06ff41c0d07d78b6de0ed01fa10b1070cb77afb61679a7f893b0c78371e1195ef393dc87b1b329811e67705b9e1bb5dc00c5b14645b010d310e491c159a81b77145882a63f6206ecfb54b4f6b2ddf7963c2b2681ff1aa2dfd55f1e73b02e150e1f8e51e6ae3615336ed2b2b461fccd4ec00311dd4b00cf4316fb4bda9fa1a0a94d01d4db3209cd302a449b841dc10fcc2d63482b979cb70c21ef7000e655a7a1a18b57b6cd06267ef9f582b4783e42e60f460962921710e11ac51a3f9fa92e9118c5f0e1d8b2c342"], &(0x7f0000000040)=0x2) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000100)={r8, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000001380)={r6, @in6={{0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0xf}}}, 0x0, 0x7, 0x0, 0x8, 0x92}, &(0x7f0000001440)=0x98) eventfd(0xffffffff80000001) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000001140)={0x4, 0x8001, 0x40, 0xfffffffffffffffd, 0x0}, &(0x7f0000001180)=0x10) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, &(0x7f0000001500)) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000011c0)={0x95e, 0x101, 0x8009, 0x1ff, 0x31386ac8, 0x8, 0x1, 0x7, r9}, 0x20) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x1, 0x1) recvfrom(r1, &(0x7f00000015c0)=""/83, 0x53, 0x120, 0x0, 0x0) symlinkat(&(0x7f0000001080)='./file0\x00', r5, &(0x7f0000001100)='./file0\x00') close(r0) getsockopt$ARPT_SO_GET_ENTRIES(r4, 0x0, 0x61, &(0x7f00000003c0)={'filter\x00', 0x5e, "bf587249bbeb9d171c1ef73178b696ea6df0fc1d0b072ff9f6d39e77c5e3d1bd29b649f997d76efb3f17f7552f760a6e0212a349639e450d378eb7615736ea343871b22a4157281f9f4b92b4d6139697361be6322c96ad9baaa5a668ff43"}, &(0x7f0000000480)=0x82) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={r5, r5, 0x4, 0x3}, 0x10) getsockname$netlink(r1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) 2018/03/31 07:41:51 executing program 2: socket$unix(0x1, 0x5, 0x0) r0 = syz_open_dev$dspn(&(0x7f00000003c0)='/dev/dsp#\x00', 0xd1, 0x80000) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r0, 0x800443d2, &(0x7f0000001d40)={0x4, &(0x7f0000001cc0)=[{}, {}, {}, {}]}) r1 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)="c6cc8e60a78914d500bfeae773ddb642384ef9648af1058f5fbd2fd309524d989e8ca5c3e6e4d185de0489636bb4012cd2281d57a505b82ae678e253ab1603ef18da1e2b4f2acc3c7651ff1c670f5ed1de51a9a5a850687fc0664d9c81b66fefaf800714c085934bd42e3e21ae71d978f3e76fcbfdc2e66adff8be4d85633beb78581bf230f72954dd487c97d06409d3c6e2f7f22be6284a9b", 0x99, 0xfffffffffffffffb) keyctl$describe(0x6, r1, &(0x7f00000002c0)=""/200, 0xc8) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440)={0x0, 0x0, 0xffffffffffffffff}) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20202, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x1010, r4, 0x0) setsockopt$inet_MCAST_MSFILTER(r4, 0x0, 0x30, &(0x7f0000000580)=ANY=[@ANYBLOB="030000000000000002004e22ac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e24ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000006ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ffffffffffffff000000000000000000000000000000000000000000000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e220000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) pwrite64(r4, &(0x7f00000004c0)="361cf8298589166f6c2d5823c3b913944a09f012cc6a80f1d50171bf0badb6b5ffdeeaef7d6bdec3b31ce16780d2546875ed31070c85d5735d1ca260f2fca2cc539989af5eafe394f9ae07fcd88029971829aeaf797a78f97cd7f8531aeeb62f497a6d2d8c61dc23348ec786a20e624fdf4c5b839bea2dc66b04b7756cc92f852e", 0x81, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f0000000400)=0xfff, 0x4) fallocate(r4, 0x3, 0x0, 0x81) ppoll(&(0x7f0000000080)=[{r3}, {r2, 0x208}, {r4, 0x28}], 0x3, &(0x7f00000000c0), &(0x7f0000000140)={0x70000000000}, 0x8) syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x80000) 2018/03/31 07:41:51 executing program 3: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0, 0x0}, &(0x7f0000000400)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) tgkill(0x0, 0x0, 0x0) r2 = accept4$ax25(0xffffffffffffff9c, &(0x7f0000000380), &(0x7f0000000480)=0x10, 0x80000) fcntl$getown(r2, 0x9) r3 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000090d8b75e67e16b394342abb5158df87ea8984e79c93df7498b2b34796068700e29fbd789f9a031f23e16c96e30baed2961953b057f7a3222943acc4b8cfa4de553f8276731ddeb811efd44ea011e1a0db9074a28a826c88566b89c57cc3cca4aec41d37fa27c8daa19030d03139d0aea71d509d9a20ba7deceb656cc1308d9d1f111b6bd1595486f55e229923be4ed8cbfb78e86280b4cacf386bfa8840afb312a4c520a03b27f805d181bd09ea208931a36e888060a2d") fcntl$setlease(r2, 0x400, 0x0) getpeername(r2, &(0x7f0000002940)=@can={0x0, 0x0}, &(0x7f00000029c0)=0x80) connect$packet(r3, &(0x7f0000002a00)={0x11, 0x0, r4, 0x1, 0x4, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x14) fstat(0xffffffffffffffff, &(0x7f0000000040)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$dspn(&(0x7f00001f4000)='/dev/dsp#\x00', 0x1, 0x2) openat(r3, &(0x7f0000000500)='./file0\x00', 0x10000, 0x0) ioctl$int_in(r5, 0x0, &(0x7f0000000640)) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000040), 0x1) close(r5) syncfs(0xffffffffffffffff) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000280)=""/198) fsetxattr(r3, &(0x7f0000000140)=@known='user.syz\x00', &(0x7f0000000180)="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", 0x137, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000600)={0x1f, 0x100000001, 0x5, 0x8, 0x4, 0x3da, 0x0, 0xffffffff, 0x0}, &(0x7f00000007c0)=0x20) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000800)={0x7fff, 0xa, 0xf33, 0xe51c, r6}, 0x10) fremovexattr(r3, &(0x7f0000000000)=@known='user.syz\x00') ioctl$DRM_IOCTL_GET_CAP(r3, 0xc010640c, &(0x7f0000000340)={0x9}) connect(r2, &(0x7f0000000740)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x80) syz_genetlink_get_family_id$ipvs(&(0x7f0000000540)='IPVS\x00') syz_fuseblk_mount(&(0x7f00000004c0)='./file0\x00', &(0x7f00000005c0)='./file0\x00', 0xe000, r0, r1, 0x325e, 0x0, 0x2820080) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x0, 0x200, 0x0, 0x2}, &(0x7f0000000680)=0x10) 2018/03/31 07:41:51 executing program 5: r0 = socket(0xa, 0x1, 0x0) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f00000003c0)=ANY=[@ANYBLOB="0300c25f000002000000000000000000000800000001085622b7e041e400000070c710c074b7a235810e8b82176c68b994d1def47d4bd07b6409efb564cda86cdea8690d1ad8a286e22fe3e375b15d4dba431782e6734e3843b7a12a4cfa8cc2c157e645589d35d8e9d738a75c5377a2c5aa500dc45d46096156e04098d00c772511627353f50857e34a183f17"]) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'bridge0\x00', 0x4}, 0x18) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x44000, 0x0) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000100)={{0xa, 0x4e22, 0x6, @remote={0xfe, 0x80, [], 0xbb}, 0xfffffffffffff001}, {0xa, 0x4e22, 0xfff, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}, 0x3f}, 0xfffffffffffffe00, [0x5, 0x80000001, 0x7fff, 0x5, 0x1, 0x0, 0x80000001, 0x200]}, 0x5c) ioctl(r0, 0x8918, &(0x7f0000000000)) signalfd4(r0, &(0x7f0000000080)={0x2}, 0x8, 0x80000) umount2(&(0x7f0000000000)='./file0\x00', 0x4) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000080)=0x801) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000020}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=@ipmr_newroute={0x2c, 0x18, 0x300, 0x70bd26, 0x25dfdbfb, {0x80, 0x20, 0x0, 0x7a, 0xfd, 0x3, 0xfd, 0x3, 0x400}, [@RTA_SRC={0x8, 0x2, @rand_addr=0x7}, @RTA_SRC={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0xe}}]}, 0x2c}, 0x1, 0x0, 0x0, 0xc0}, 0x10) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f00000000c0)={{0xffffffffffffffff}}) r2 = syz_open_procfs(0x0, &(0x7f0000000280)="2f65786500000000000409004bddd9de91be10eebf000ee9a9d50f1e8600000854fa07424adee93707da75af1f0200f5cd26d7a0d2ef6ae0d178621cffc0a87164000000e39c5a") ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, &(0x7f0000000040)}) 2018/03/31 07:41:51 executing program 0: perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x4) 2018/03/31 07:41:51 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x4205, 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000100)) r1 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000200)) 2018/03/31 07:41:51 executing program 1: mkdir(&(0x7f000063543e)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00000db000)='ramfs\x00', 0x0, &(0x7f000000a000)) r0 = dup(0xffffffffffffffff) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x200000, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f00000000c0)=r0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chroot(&(0x7f0000fddff8)='./file0\x00') mount(&(0x7f00008bcff8)='./file0\x00', &(0x7f0000a51ff8)='./file0\x00', &(0x7f00002d6ffd)='9p\x00', 0x5000, 0x0) pivot_root(&(0x7f0000359ff8)='./file0\x00', &(0x7f00007d7ff8)='./file0\x00') keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) renameat2(r1, &(0x7f0000000080)='./file1\x00', r1, &(0x7f0000000100)='./file0\x00', 0x0) 2018/03/31 07:41:51 executing program 7 (fault-call:10 fault-nth:26): r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4900, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000240)=0x4) getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) r1 = dup(0xffffffffffffff9c) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r2 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r2, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r2, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r2, &(0x7f0000000100)=""/65, 0x41) r3 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) fchdir(r2) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(r3, &(0x7f0000000200)='./file1\x00', r2, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r2, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000580)=""/80, 0x50}, {&(0x7f00000008c0)=""/4096, 0x1000}], 0x2, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x20) r5 = syz_open_dev$sndpcmp(&(0x7f00000018c0)='/dev/snd/pcmC#D#p\x00', 0x3, 0x10a00) ioctl$KVM_GET_DEVICE_ATTR(r5, 0x4018aee2, &(0x7f0000001940)={0x0, 0x100, 0x9, &(0x7f0000001900)}) recvfrom$ipx(r4, &(0x7f00000006c0)=""/52, 0x34, 0x100, &(0x7f0000000700)={0x4, 0x9a2, 0x4, "dc108d9d4391", 0x5}, 0x10) renameat(r2, &(0x7f0000001980)='./file1\x00', r5, &(0x7f00000019c0)='./file0/file0\x00') r6 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r6, 0x4, 0x0) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000040), 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r6, &(0x7f0000000200), 0xfffffe08) [ 177.309710] FAULT_INJECTION: forcing a failure. [ 177.309710] name failslab, interval 1, probability 0, space 0, times 0 [ 177.320997] CPU: 0 PID: 14066 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #372 [ 177.328352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 177.337688] Call Trace: [ 177.340264] dump_stack+0x194/0x24d [ 177.343880] ? arch_local_irq_restore+0x53/0x53 [ 177.348538] should_fail+0x8c0/0xa40 [ 177.352236] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 177.357319] ? kernfs_add_one+0x50/0x450 [ 177.361361] ? rb_first_postorder+0xa0/0xa0 [ 177.365660] ? kernfs_add_one+0x50/0x450 [ 177.369701] ? trace_event_raw_event_lock+0x340/0x340 [ 177.374869] ? trace_hardirqs_off+0x10/0x10 [ 177.379176] ? find_held_lock+0x35/0x1d0 [ 177.383219] ? __lock_is_held+0xb6/0x140 [ 177.387267] ? check_same_owner+0x320/0x320 [ 177.391566] ? lock_downgrade+0x980/0x980 [ 177.395694] ? rcu_note_context_switch+0x710/0x710 [ 177.400613] should_failslab+0xec/0x120 [ 177.404568] __kmalloc_track_caller+0x5f/0x760 [ 177.409130] ? idr_alloc_cyclic+0x1d6/0x320 [ 177.413434] ? kstrdup_const+0x39/0x50 [ 177.417299] ? __mutex_unlock_slowpath+0xe9/0xac0 [ 177.422124] kstrdup+0x39/0x70 [ 177.425295] kstrdup_const+0x39/0x50 [ 177.428989] __kernfs_new_node+0xa2/0x570 [ 177.433121] ? kernfs_dop_revalidate+0x380/0x380 [ 177.437859] ? kasan_check_read+0x11/0x20 [ 177.441985] ? read_word_at_a_time+0x12/0x20 [ 177.446373] ? strscpy+0x186/0x500 [ 177.449900] kernfs_new_node+0x80/0xe0 [ 177.453770] __kernfs_create_file+0x4b/0x320 [ 177.458162] cgroup_addrm_files+0x3c5/0xa70 [ 177.462473] ? cgroup_file_write+0x710/0x710 [ 177.466866] ? getrawmonotonic64+0x460/0x460 [ 177.471253] ? kernfs_active+0x92/0x160 [ 177.475209] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 177.480114] ? cgroup_kn_set_ugid+0x2c7/0x370 [ 177.484586] ? cgroup_file_name+0x1d0/0x1d0 [ 177.488891] css_populate_dir+0x340/0x420 [ 177.493026] cgroup_mkdir+0x553/0xfc0 [ 177.496808] ? __lock_is_held+0xb6/0x140 [ 177.500850] ? cgroup_destroy_locked+0x750/0x750 [ 177.505582] ? rcu_read_lock_sched_held+0x108/0x120 [ 177.510576] ? kmem_cache_free+0x258/0x2a0 [ 177.514791] ? set_nlink+0xc1/0x160 [ 177.518398] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 177.523304] ? generic_permission+0x105/0x3c0 [ 177.527776] ? cgroup_destroy_locked+0x750/0x750 [ 177.532513] kernfs_iop_mkdir+0x153/0x1e0 [ 177.536642] vfs_mkdir+0x390/0x600 [ 177.540164] SyS_mkdirat+0x22b/0x2b0 [ 177.543857] ? SyS_mknod+0x480/0x480 [ 177.547551] ? trace_hardirqs_on+0xd/0x10 [ 177.551679] ? do_syscall_64+0xb7/0x940 [ 177.555635] ? SyS_mknod+0x480/0x480 [ 177.559325] do_syscall_64+0x281/0x940 [ 177.563190] ? vmalloc_sync_all+0x30/0x30 [ 177.567314] ? _raw_spin_unlock_irq+0x27/0x70 [ 177.571787] ? finish_task_switch+0x1c1/0x7e0 [ 177.576260] ? syscall_return_slowpath+0x550/0x550 [ 177.581171] ? syscall_return_slowpath+0x2ac/0x550 [ 177.586076] ? prepare_exit_to_usermode+0x350/0x350 [ 177.591071] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 177.596417] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 177.601241] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 177.606405] RIP: 0033:0x454e79 2018/03/31 07:41:52 executing program 0: r0 = dup(0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000140)=[{0x3, 0x3}, {0x3}, {0x0, 0x2}], 0x3) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000289000)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000058000)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x83}, 0x1}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000020, &(0x7f000023f000)=0xa, 0x263) r2 = accept4(r1, &(0x7f0000000080)=@rc, &(0x7f0000000100)=0x80, 0x80800) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000000)=0x8000, 0x4) setsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f00000002c0)={0x1000, 0x100000000}, 0x2) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000240)=0x1, &(0x7f0000000280)=0x2) ioctl$sock_netrom_TIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r0, 0x0, 0x1b, 0x1e, &(0x7f0000000180)="a303101bd63cd4f04b073e61686d83e99fe78d330cde708905f0d6", &(0x7f00000001c0)=""/30, 0x0, 0x80}, 0x28) connect$inet6(r1, &(0x7f0000070fe4)={0xa, 0x4e20}, 0x1c) [ 177.609573] RSP: 002b:00007fe2ad9eac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 177.617259] RAX: ffffffffffffffda RBX: 00007fe2ad9eb6d4 RCX: 0000000000454e79 [ 177.624507] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 177.631758] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 177.639005] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 177.646255] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 000000000000001a [ 177.653722] cgroup: cgroup_addrm_files: failed to add cpu.stat, err=-12 2018/03/31 07:41:52 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000002000)=@ethernet, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002fd8)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000080)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000023c74fd08000004008100dc36ff55702eaba742d25b06bf6ee860e289b98744888f4ab720f056a3a9437481fbc3dd53e80707"], 0x1}, 0x1}, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)=ANY=[@ANYBLOB="01000000fcffffff00000000000000", @ANYRES64=0x0, @ANYBLOB="000000000100000000000000f400000068759a67d860373e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"], 0x3}, 0x1}, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/kvm\x00', 0x23ffd, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r5 = dup3(r3, r0, 0x80000) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e22, @multicast1=0xe0000001}}, 0x80, 0x4}, &(0x7f00000003c0)=0x90) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r5, 0x84, 0x10, &(0x7f0000000540)=@sack_info={r6, 0x983c, 0x1}, &(0x7f0000000340)=0xc) setsockopt$inet_sctp_SCTP_CONTEXT(r5, 0x84, 0x11, &(0x7f0000000380)={0x0, 0x3493}, 0x8) ioctl$KDSKBMODE(r5, 0x4b45, &(0x7f0000000100)=0x2) ppoll(&(0x7f0000000000)=[{r2, 0x1000}, {r3, 0x721a}, {r4, 0xfff}], 0x3, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f00000000c0)={0x800000000000a35}, 0x8) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r7 = userfaultfd(0x807ff) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup\x00', 0x200002, 0x0) r9 = openat$cgroup_int(r8, &(0x7f0000000080)='cgroup.max.depth\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f00000003c0)=ANY=[], 0x0) sendfile(r9, r9, &(0x7f0000000040), 0x1) ioctl$UFFDIO_API(r7, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r5, 0x84, 0x1e, &(0x7f0000000200)=0xffffffffffffffe1, 0x4) ioctl$UFFDIO_REGISTER(r7, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) creat(&(0x7f0000000000)='./control/file0\x00', 0x0) unlink(&(0x7f0000000440)='./control/file0/file0\x00') stat(&(0x7f00000001c0)='./control\x00', &(0x7f0000000280)) getegid() 2018/03/31 07:41:52 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0xaf01, &(0x7f0000307000)=&(0x7f0000989fff)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000000)=ANY=[]) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000140)={0x0, r1}) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000000)=r1) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000cef000)={0x1, 0x0, &(0x7f000062a000)=""/167, &(0x7f0000aac000)=""/21, &(0x7f00002fdf52)=""/174}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000180)={0x0, 0x1, &(0x7f0000000280)=""/147, &(0x7f0000000340)=""/223, &(0x7f0000000580)=""/4096}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000040)=0x1) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000f82ffc)=0x4001) dup2(r1, r0) eventfd(0x0) 2018/03/31 07:41:52 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) acct(&(0x7f0000001240)='./file0\x00') setrlimit(0xa, &(0x7f0000000380)={0x4, 0x1}) getsockname(0xffffffffffffff9c, &(0x7f0000001480)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f00000012c0)=0x80) socketpair(0x10, 0x0, 0x8, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000001580)={r3}) r4 = open(&(0x7f00000010c0)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000001300)={0x8, 0x0, 0x6, 0x58a, 0x0}, &(0x7f0000001340)=0x10) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x3052, r3, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f00000001c0)={'bond0\x00', {0x2, 0x4e20, @multicast2=0xe0000002}}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYBLOB="408615824f3f781ae75fcc9554f019621eaccb21d7ca5fb77c06ff41c0d07d78b6de0ed01fa10b1070cb77afb61679a7f893b0c78371e1195ef393dc87b1b329811e67705b9e1bb5dc00c5b14645b010d310e491c159a81b77145882a63f6206ecfb54b4f6b2ddf7963c2b2681ff1aa2dfd55f1e73b02e150e1f8e51e6ae3615336ed2b2b461fccd4ec00311dd4b00cf4316fb4bda9fa1a0a94d01d4db3209cd302a449b841dc10fcc2d63482b979cb70c21ef7000e655a7a1a18b57b6cd06267ef9f582b4783e42e60f460962921710e11ac51a3f9fa92e9118c5f0e1d8b2c342"], &(0x7f0000000040)=0x2) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000100)={r7, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000001380)={r5, @in6={{0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0xf}}}, 0x0, 0x7, 0x0, 0x8, 0x92}, &(0x7f0000001440)=0x98) eventfd(0xffffffff80000001) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000001140)={0x4, 0x8001, 0x40, 0xfffffffffffffffd, 0x0}, &(0x7f0000001180)=0x10) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f0000001500)) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000011c0)={0x95e, 0x101, 0x8009, 0x1ff, 0x31386ac8, 0x8, 0x1, 0x7, r8}, 0x20) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x1, 0x1) ioctl$KVM_GET_MSR_INDEX_LIST(r3, 0xc004ae02, &(0x7f00000003c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}) recvfrom(r1, &(0x7f00000015c0)=""/83, 0x53, 0x120, 0x0, 0x0) symlinkat(&(0x7f0000001080)='./file0\x00', r4, &(0x7f0000001100)='./file0\x00') close(r0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={r4, r4, 0x4, 0x3}, 0x10) getsockname$netlink(r1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) 2018/03/31 07:41:52 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000001c0)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000040)={0x28, 0x2d, 0xd65484de4ce62ee9, 0x0, 0x0, {0x2}, [@typed={0x14, 0x2b, @ipv6=@local={0xfe, 0x80, [], 0xaa}}]}, 0x28}, 0x1}, 0x0) 2018/03/31 07:41:52 executing program 3: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x40200) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000040)={{0xd288, 0x800}, 'port1\x00', 0x80, 0x810, 0x8, 0x8, 0x3, 0x2d80, 0x539a, 0x0, 0x5, 0x2}) epoll_create1(0x80000) pipe2(&(0x7f0000000100), 0x84800) ioctl$TIOCNOTTY(r0, 0x5422) 2018/03/31 07:41:52 executing program 2: r0 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)="c6cc8e60a78914d500bfeae773ddb642384ef9648af1058f5fbd2fd309524d989e8ca5c3e6e4d185de0489636bb4012cd2281d57a505b82ae678e253ab1603ef18da1e2b4f2acc3c7651ff1c670f5ed1de51a9a5a850687fc0664d9c81b66fefaf800714c085934bd42e3e21ae71d978f3e76fcbfdc2e66adff8be4d85633beb78581bf230f72954dd487c97d06409d3c6e2f7f22be6284a9b", 0x99, 0xfffffffffffffffb) keyctl$describe(0x6, r0, &(0x7f00000002c0)=""/200, 0xc8) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440)={0x0, 0x0, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) sendfile(r1, r1, &(0x7f0000000480), 0x1c000000) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20202, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x1010, r3, 0x0) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000000580)=ANY=[@ANYBLOB="030000000000000002004e22ac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e24ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000006ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ffffffffffffff000000000000000000000000000000000000000000000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000002004e20ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e220000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) pwrite64(r3, &(0x7f0000000a40)="361cf8298589166f6c2d5823c3b913944a09f012cc6a80f1d50171bf0badb6b5ffdeeeef7d6bdec3b31ce16780d2546875ed7e95d05414ef4d7d31070c85d5735d1ca260f2fca2cc539989af5eafe394f9ae07fcd88029971829aeaf797a78f97cd7f8531aeeb62f497a6d2d8c61dc23348ec786a20e624fdf4c5b839bea2dc66bf5d575113c6422a1734857982ed8083a7fea6b43314c3cd9c960bd1a272cb93cee90097b46ad88908457e7fa4fcd84afb9a628bf0412c69ad20cb23cc9b01a66083c35ecd918689d17beb5d4", 0xcd, 0x26) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000400)=0xfff, 0x4) accept4$bt_l2cap(r3, &(0x7f0000000040), &(0x7f00000003c0)=0xe, 0x80000) fallocate(r3, 0x3, 0x0, 0x81) clock_gettime(0x0, &(0x7f0000000b80)={0x0, 0x0}) ppoll(&(0x7f0000000b40), 0x0, &(0x7f00000000c0)={r4, r5+10000000}, &(0x7f0000000140)={0x70000000000}, 0x8) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f00000004c0)={0x4, [0x5, 0xff, 0x200, 0x7f]}, &(0x7f0000000500)=0xc) 2018/03/31 07:41:52 executing program 7 (fault-call:10 fault-nth:27): r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4900, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000240)=0x4) getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) r1 = dup(0xffffffffffffff9c) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r2 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r2, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r2, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r2, &(0x7f0000000100)=""/65, 0x41) r3 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) fchdir(r2) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(r3, &(0x7f0000000200)='./file1\x00', r2, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r2, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000580)=""/80, 0x50}, {&(0x7f00000008c0)=""/4096, 0x1000}], 0x2, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x20) r5 = syz_open_dev$sndpcmp(&(0x7f00000018c0)='/dev/snd/pcmC#D#p\x00', 0x3, 0x10a00) ioctl$KVM_GET_DEVICE_ATTR(r5, 0x4018aee2, &(0x7f0000001940)={0x0, 0x100, 0x9, &(0x7f0000001900)}) recvfrom$ipx(r4, &(0x7f00000006c0)=""/52, 0x34, 0x100, &(0x7f0000000700)={0x4, 0x9a2, 0x4, "dc108d9d4391", 0x5}, 0x10) renameat(r2, &(0x7f0000001980)='./file1\x00', r5, &(0x7f00000019c0)='./file0/file0\x00') r6 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r6, 0x4, 0x0) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000040), 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r6, &(0x7f0000000200), 0xfffffe08) [ 177.829856] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 177.921065] FAULT_INJECTION: forcing a failure. [ 177.921065] name failslab, interval 1, probability 0, space 0, times 0 [ 177.932373] CPU: 0 PID: 14107 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #372 [ 177.939720] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 177.949051] Call Trace: [ 177.951615] dump_stack+0x194/0x24d [ 177.955221] ? arch_local_irq_restore+0x53/0x53 [ 177.959872] should_fail+0x8c0/0xa40 [ 177.963560] ? __mutex_unlock_slowpath+0xe9/0xac0 [ 177.968377] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 177.973454] ? _raw_spin_unlock+0x22/0x30 [ 177.977579] ? kernfs_dop_revalidate+0x380/0x380 [ 177.982315] ? find_held_lock+0x35/0x1d0 [ 177.986351] ? __lock_is_held+0xb6/0x140 [ 177.990392] ? check_same_owner+0x320/0x320 [ 177.994688] ? __kernfs_create_file+0x27f/0x320 [ 177.999331] ? rcu_note_context_switch+0x710/0x710 [ 178.004240] should_failslab+0xec/0x120 [ 178.008189] kmem_cache_alloc+0x47/0x760 [ 178.012226] ? __lock_is_held+0xb6/0x140 [ 178.016268] sched_create_group+0x22/0x70 [ 178.020389] cpu_cgroup_css_alloc+0xe/0x30 [ 178.024601] cgroup_apply_control_enable+0x44d/0xbc0 [ 178.029685] ? cgroup_propagate_control+0x570/0x570 [ 178.035115] ? css_populate_dir+0x289/0x420 [ 178.039412] cgroup_mkdir+0x56f/0xfc0 [ 178.043185] ? __lock_is_held+0xb6/0x140 [ 178.047224] ? cgroup_destroy_locked+0x750/0x750 [ 178.051952] ? rcu_read_lock_sched_held+0x108/0x120 [ 178.056942] ? kmem_cache_free+0x258/0x2a0 [ 178.061153] ? set_nlink+0xc1/0x160 [ 178.064756] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 178.069657] ? generic_permission+0x105/0x3c0 [ 178.074129] ? cgroup_destroy_locked+0x750/0x750 [ 178.078859] kernfs_iop_mkdir+0x153/0x1e0 [ 178.082981] vfs_mkdir+0x390/0x600 [ 178.086500] SyS_mkdirat+0x22b/0x2b0 [ 178.090190] ? SyS_mknod+0x480/0x480 [ 178.093878] ? trace_hardirqs_on+0xd/0x10 [ 178.097999] ? do_syscall_64+0xb7/0x940 [ 178.101953] ? SyS_mknod+0x480/0x480 [ 178.105640] do_syscall_64+0x281/0x940 [ 178.109503] ? vmalloc_sync_all+0x30/0x30 [ 178.113624] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 178.119136] ? syscall_return_slowpath+0x550/0x550 [ 178.124041] ? syscall_return_slowpath+0x2ac/0x550 [ 178.128949] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 178.134289] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 178.139112] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 178.144274] RIP: 0033:0x454e79 [ 178.147436] RSP: 002b:00007fe2ad9eac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 178.155118] RAX: ffffffffffffffda RBX: 00007fe2ad9eb6d4 RCX: 0000000000454e79 [ 178.162360] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 178.169601] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 178.176843] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 178.184088] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 000000000000001b 2018/03/31 07:41:53 executing program 5: r0 = socket$inet(0x2, 0x802, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0), &(0x7f0000000400)=0x8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000b80)=@broute={'broute\x00', 0x20, 0x3, 0x358, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200010c0], 0x0, &(0x7f00000006c0), &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x3f9) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x4012}) 2018/03/31 07:41:53 executing program 4: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x1f, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffff9c, 0x84, 0xd, &(0x7f00000000c0)=@assoc_id=0x0, &(0x7f0000000140)=0x4) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000180)={r2, 0xfffffffffffffffe, 0x8001}, &(0x7f00000001c0)=0x8) r3 = memfd_create(&(0x7f000088f000)='b\n\x00\x00\x00', 0x4) fcntl$setflags(r0, 0x2, 0x1) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af21, &(0x7f0000000040)={0x3, r3}) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x1f, r3, 0x0) ftruncate(r3, 0x0) 2018/03/31 07:41:53 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000deaff6)='numa_maps\x00') setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f00000001c0)={0x2}, 0x4) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000080)=0xfffffffffffffffd) r2 = socket$inet(0x2b, 0x1, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000500)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000080)=0xc) setreuid(r3, 0x0) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}) readv(r0, &(0x7f00000f9000)=[{&(0x7f00009fb079)=""/4096, 0x1000}], 0x1) readv(r0, &(0x7f0000f5c000)=[{&(0x7f000079f000)=""/91, 0x5b}], 0x1) ioctl$sock_ipx_SIOCAIPXPRISLT(r1, 0x89e1, &(0x7f0000000540)=0x80000001) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000580)={{{@in=@dev, @in6=@local}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000280)=0xe8) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), &(0x7f0000000240)=0x10) sendmsg$nl_netfilter(r1, &(0x7f00000004c0)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000340)=ANY=[@ANYBLOB="20016d338d470001290bbf0000000000000000060c014f002af3a3545fead78bb8a991aebf7e4eea62b4e60171f5d9f1d24cd57d3507000000000000000d300d996a68a01c83c9860c54b2dca269a5d15b08f2c6e4ea15923513dcefe1bf255714008d00fe80ee00000000000000000000000000feffff496d622be204ac000000000000", @ANYBLOB="08000e00030000000c002a"], 0x8f}, 0x1, 0x0, 0x0, 0x400c4}, 0x80) pipe(&(0x7f0000000180)) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, &(0x7f0000000300)=0x1) ioctl(r0, 0x8, &(0x7f0000000000)="2448312507907e338f67cba8f4b7965c7109a9c85d1e5fcba957f2bb2a272983c184c7c336bb2a4b5bd5bdedb39f06a8a7d98728c23e5d9d7f7bfc9ec25cbf228641234e578b4301c1617c7ec3e37dee7c85f3b8c2df0f5a67b8adcb83ba1a6537d1879ad203a494bcd112f05c65e01ac56d5919445015a0d23e21c8a60902228d22ebd9c3cc078fc521993ad69d9f395f70c811262565beddaa76455c9b1c1a8676bede20783a84af9ff164486fa993d32d3422211a10cd36a970b6413c9669826a544dc98b7232d3fab06cffab") 2018/03/31 07:41:53 executing program 7 (fault-call:10 fault-nth:28): r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4900, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000240)=0x4) getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) r1 = dup(0xffffffffffffff9c) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r2 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r2, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r2, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r2, &(0x7f0000000100)=""/65, 0x41) r3 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) fchdir(r2) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(r3, &(0x7f0000000200)='./file1\x00', r2, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r2, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000580)=""/80, 0x50}, {&(0x7f00000008c0)=""/4096, 0x1000}], 0x2, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x20) r5 = syz_open_dev$sndpcmp(&(0x7f00000018c0)='/dev/snd/pcmC#D#p\x00', 0x3, 0x10a00) ioctl$KVM_GET_DEVICE_ATTR(r5, 0x4018aee2, &(0x7f0000001940)={0x0, 0x100, 0x9, &(0x7f0000001900)}) recvfrom$ipx(r4, &(0x7f00000006c0)=""/52, 0x34, 0x100, &(0x7f0000000700)={0x4, 0x9a2, 0x4, "dc108d9d4391", 0x5}, 0x10) renameat(r2, &(0x7f0000001980)='./file1\x00', r5, &(0x7f00000019c0)='./file0/file0\x00') r6 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r6, 0x4, 0x0) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000040), 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r6, &(0x7f0000000200), 0xfffffe08) 2018/03/31 07:41:53 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) acct(&(0x7f0000001240)='./file0\x00') setrlimit(0xa, &(0x7f0000000380)={0x4, 0x1}) getsockname(0xffffffffffffff9c, &(0x7f0000001480)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f00000012c0)=0x80) socketpair(0x10, 0x0, 0x8, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000480)={r2}) r4 = open(&(0x7f00000010c0)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000001300)={0x8, 0x0, 0x6, 0x58a, 0x0}, &(0x7f0000001340)=0x10) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x3052, r3, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f00000001c0)={'bond0\x00', {0x2, 0x4e20, @multicast2=0xe0000002}}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYBLOB="408615824f3f781ae75fcc9554f019621eaccb21d7ca5fb77c06ff41c0d07d78b6de0ed01fa10b1070cb77afb61679a7f893b0c78371e1195ef393dc87b1b329811e67705b9e1bb5dc00c5b14645b010d310e491c159a81b77145882a63f6206ecfb54b4f6b2ddf7963c2b2681ff1aa2dfd55f1e73b02e150e1f8e51e6ae3615336ed2b2b461fccd4ec00311dd4b00cf4316fb4bda9fa1a0a94d01d4db3209cd307f0000001dc10fcc2d63482b979cb70c21ef7000e655a7a1a18b57b6cd06267ef9f582b4783e42e60f460962921710e11ac51a3f9fa92e9118c5f0e1d8b2c342"], &(0x7f0000000040)=0x2) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000100)={r7, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000001380)={r5, @in6={{0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0xf}}}, 0x0, 0x7, 0x0, 0x8, 0x92}, &(0x7f0000001440)=0x98) eventfd(0xffffffff80000001) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000001140)={0x4, 0x8001, 0x40, 0xfffffffffffffffd, 0x0}, &(0x7f0000001180)=0x10) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f0000001500)) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000011c0)={0x95e, 0x101, 0x8009, 0x1ff, 0x31386ac8, 0x8, 0x1, 0x7, r8}, 0x20) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x1, 0x1) recvfrom(r1, &(0x7f00000015c0)=""/83, 0x53, 0x120, 0x0, 0x0) symlinkat(&(0x7f0000001080)='./file0\x00', r4, &(0x7f0000001100)='./file0\x00') close(r0) getsockname$netlink(r1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) 2018/03/31 07:41:53 executing program 2: r0 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)="c6cc8e60a78914d500bfeae773ddb642384ef9648af1058f5fbd2fd309524d989e8ca5c3e6e4d185de0489636bb4012cd2281d57a505b82ae678e253ab1603ef18da1e2b4f2acc3c7651ff1c670f5ed1de51a9a5a850687fc0664d9c81b66fefaf800714c085934bd42e3e21ae71d978f3e76fcbfdc2e66adff8be4d85633beb78581bf230f72954dd487c97d06409d3c6e2f7f22be6284a9b", 0x99, 0xfffffffffffffffb) keyctl$describe(0x6, r0, &(0x7f00000002c0)=""/200, 0xc8) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440)={0x0, 0x0, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20202, 0x0) sendto$inet(r3, &(0x7f0000000a40)="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", 0x1000, 0x0, &(0x7f0000000040)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x1010, r3, 0x0) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000001a40)=ANY=[@ANYBLOB="030000000000000002004e22ac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e24ac140000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000006ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ffffffffffffff000000000000000000000000000000000000000000000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005609000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e6ab7864f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002e6d69fcd7bdedf2821ab3ee5d1c7843557ccdd69866e13eecf6df6ba3b74fcbb25e7199a6c151105753c2e271632c835b139d32f99459adc222f1eb481b8d887a54f020fc1661a7947e1cf6fe78c07aa14ef75f3bc45cc9588383921c58a3e6d0c183b7dc37221e39cc0140f21b0987fff13abf0f56849bcadf387da8e79f7f3f0e8a40eed0f1ad7ebf1b843205949986263ecf80a4d3fb5742d313c3a675cd6ba56be8a2981ba431d3331acb42"], 0x1) pwrite64(r3, &(0x7f00000004c0)="361cf8298589166f6c2d5823c3b913944a09f012cc6a80f1d50171bf0badb6b5ffdeeaef7d6bdec3b31ce16780d2546875ed31070c85d5735d1ca260f2fca2cc539989af5eafe394f9ae07fcd88029971829aeaf797a78f97cd7f8531aeeb62f497a6d2d8c61dc23348ec786a20e624fdf4c5b839bea2dc66b04b7756cc92f852e", 0x81, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000400)=0xfff, 0x4) fallocate(r3, 0x3, 0x0, 0x81) ppoll(&(0x7f0000000080)=[{r2}, {r1, 0x208}, {r3, 0x28}], 0x3, &(0x7f00000000c0), &(0x7f0000000140)={0x70000000000}, 0x8) 2018/03/31 07:41:53 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0xaf01, &(0x7f0000307000)=&(0x7f0000989fff)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000000)=ANY=[]) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000140)={0x0, r1}) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000000)=r1) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000cef000)={0x1, 0x0, &(0x7f000062a000)=""/167, &(0x7f0000aac000)=""/21, &(0x7f00002fdf52)=""/174}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000180)={0x0, 0x1, &(0x7f0000000280)=""/147, &(0x7f0000000340)=""/223, &(0x7f0000000580)=""/4096}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000040)=0x1) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000f82ffc)=0x4001) dup2(r1, r0) eventfd(0x0) 2018/03/31 07:41:53 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) sendmsg(r0, &(0x7f0000001380)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x2, 0x4, 0x2, 0x4}}, 0x80, &(0x7f0000001280)=[{&(0x7f0000000180)="93fcf5dd25386aeb2f08be69437c3763f1e14d6c905c0f391666209ee8d2410b170d9a3aed1a508982231d447f16d8d3040d67d356ff2d6299f979f04246b43db2f9b03c34ba4a0da8497b5514d74e803cdba81935900081c7b2d27a9fa113b298e052374bfe2daf3d508c0baa", 0x6d}, {&(0x7f0000000200)="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", 0x1000}, {&(0x7f0000001200)="3d27caf7057706036ec392a3b40cd0385fc591e80953ac10a92a4cf64d148743a490717f9bd76f817ebc254e79f9f865d82608a8beb18eba1913a152a04c1f67680b9c3f7d9907ec0b31a447a9070fbbb078ab59603e48212e915fc1c8376bde0201f31289f4a6d2ce71e630ebd4", 0x6e}], 0x3, &(0x7f00000012c0)=[{0xb8, 0x108, 0x800, "83d5b19b4a890ba0ce34bc37f42eca7c6d42d5da4683a1b1d6e454e4b99e4804bff33d79051f6174d75bd1e3e7d9113ec99cfefdb2d7892380ff1cba81127361fc522724418c9aeba5c6e22c8893702294f7695c76f1ed492c1a8b3f29f0280133b61ac244f5f030b7733471882b2de0c39a466e2a3b9917a8ab9a8e399ac905fce288d856970e60df6c02d143e02b8d80a8589dffca73f97fa996c3c4f697d198b287a90d907b"}], 0xb8, 0x4085}, 0x50) getsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000f61ffc), &(0x7f0000f6e000)=0x4) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="2a06c8f713db0a4dd127c85d060d21a6", 0x10) mkdir(&(0x7f00000000c0)='./file0\x00', 0x24) sched_yield() timer_create(0x0, &(0x7f0000001540)={0x0, 0x17, 0x3, @thr={&(0x7f00000013c0)="80daed7567c96f7d7df208c34c65d858232282f0a8d7c44d0f16941464ea4953986dccafd75651fe629dce49f94cfc21fd48d90b5dbd4c0f8b001797521c71f0e88aebef94baa477655abe59eb2d6abdb70cf4f707c7691284dbe67682a2aeb4bfed08c971b475101e05732f39e6a200e280105fc11f4c80e6cd9c8b07f59f860b439de0fc344b18dbfc00887ee0f32d6a9000ed6988a8466a38bcaf0578db426101df4ad6f32cf922c867be930003", &(0x7f0000001480)="101fd2855fc4555636472bfa2bffb4671d22d9144b8da0ebc1b2c08f9419c7e603e2efa1caa7b2b53fffcdc29e7fc103e1ed8b1bae04ff20a7150f5268e706b8e823cfecf649aabc0a40e8338017625e6eee7413bae735eae25e951c2fd6358d8a482a9c32c074f484f57787df088c65f45be1b539c0cda0bb273d3eb1e196671fb1703f48d6edd6d21f4d051f9a751bf5aeb13265650bc019bb30abf46e123d08f253fa31f922116c46ca8a907514c4c6c8a570b221"}}, &(0x7f0000001580)=0x0) timer_delete(r1) r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000080)=0x10001) [ 178.912590] kernel msg: ebtables bug: please report to author: Wrong len argument [ 178.929644] FAULT_INJECTION: forcing a failure. [ 178.929644] name failslab, interval 1, probability 0, space 0, times 0 [ 178.940928] CPU: 0 PID: 14125 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #372 [ 178.948274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 178.957604] Call Trace: [ 178.960166] dump_stack+0x194/0x24d [ 178.963767] ? arch_local_irq_restore+0x53/0x53 [ 178.968417] ? __save_stack_trace+0x7e/0xd0 [ 178.972715] should_fail+0x8c0/0xa40 [ 178.976411] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 178.981486] ? kasan_kmalloc+0xad/0xe0 [ 178.985346] ? __kmalloc+0x162/0x760 [ 178.989032] ? kzalloc+0xf/0x20 [ 178.992283] ? alloc_fair_sched_group+0x5e/0x530 [ 178.997012] ? sched_create_group+0x35/0x70 [ 179.001311] ? kernfs_iop_mkdir+0x153/0x1e0 [ 179.005606] ? vfs_mkdir+0x390/0x600 [ 179.009294] ? SyS_mkdirat+0x22b/0x2b0 [ 179.013153] ? do_syscall_64+0x281/0x940 [ 179.017188] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 179.022524] ? save_stack+0x43/0xd0 [ 179.026127] ? find_held_lock+0x35/0x1d0 [ 179.030161] ? __lock_is_held+0xb6/0x140 [ 179.034202] ? check_same_owner+0x320/0x320 [ 179.038498] ? rcu_note_context_switch+0x710/0x710 [ 179.043412] should_failslab+0xec/0x120 [ 179.047360] __kmalloc+0x63/0x760 [ 179.050792] ? sched_create_group+0x22/0x70 [ 179.055086] ? kzalloc+0xf/0x20 [ 179.058340] kzalloc+0xf/0x20 [ 179.061423] alloc_fair_sched_group+0xd6/0x530 [ 179.065977] ? __lock_is_held+0xb6/0x140 [ 179.070018] sched_create_group+0x35/0x70 [ 179.074143] cpu_cgroup_css_alloc+0xe/0x30 [ 179.078354] cgroup_apply_control_enable+0x44d/0xbc0 [ 179.083435] ? cgroup_propagate_control+0x570/0x570 [ 179.088429] ? css_populate_dir+0x289/0x420 [ 179.092725] cgroup_mkdir+0x56f/0xfc0 [ 179.096497] ? __lock_is_held+0xb6/0x140 [ 179.100536] ? cgroup_destroy_locked+0x750/0x750 [ 179.105264] ? rcu_read_lock_sched_held+0x108/0x120 [ 179.110255] ? kmem_cache_free+0x258/0x2a0 [ 179.114464] ? set_nlink+0xc1/0x160 [ 179.118063] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 179.122966] ? generic_permission+0x105/0x3c0 [ 179.127434] ? cgroup_destroy_locked+0x750/0x750 [ 179.132161] kernfs_iop_mkdir+0x153/0x1e0 [ 179.136284] vfs_mkdir+0x390/0x600 [ 179.139797] SyS_mkdirat+0x22b/0x2b0 [ 179.143484] ? SyS_mknod+0x480/0x480 [ 179.147168] ? trace_hardirqs_on+0xd/0x10 [ 179.151289] ? do_syscall_64+0xb7/0x940 [ 179.155237] ? SyS_mknod+0x480/0x480 [ 179.158922] do_syscall_64+0x281/0x940 [ 179.162782] ? vmalloc_sync_all+0x30/0x30 [ 179.166904] ? _raw_spin_unlock_irq+0x27/0x70 [ 179.171376] ? finish_task_switch+0x1c1/0x7e0 [ 179.175846] ? syscall_return_slowpath+0x550/0x550 [ 179.180748] ? syscall_return_slowpath+0x2ac/0x550 [ 179.185649] ? prepare_exit_to_usermode+0x350/0x350 [ 179.190654] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 179.195992] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 179.200812] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 179.205973] RIP: 0033:0x454e79 [ 179.209135] RSP: 002b:00007fe2ad9eac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 179.216817] RAX: ffffffffffffffda RBX: 00007fe2ad9eb6d4 RCX: 0000000000454e79 [ 179.224059] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 179.231302] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 179.238543] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 179.245783] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 000000000000001c [ 179.265991] kernel msg: ebtables bug: please report to author: Wrong len argument 2018/03/31 07:41:53 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x200000, 0x0) r2 = request_key(&(0x7f0000000140)='syzkaller\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0xfffffffffffffffa) r3 = add_key(&(0x7f00000002c0)='blacklist\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000340)="135e68039ef5454b43dbb1387cfaeb36c58583749a5338bb253ec0a9b07f8e2a8a129e96b1690a", 0x27, 0xfffffffffffffffd) keyctl$instantiate_iov(0x14, r2, &(0x7f0000000280)=[{&(0x7f0000000200)="f15bf80938cf80da07feac4bca87cb06af40cfd1c99f07b3c3f75ca9e0c47211b75a9e5b2852dc8c5eae7300f1538218494631b12910304379d3dceaf6c23ef568f0f6c3d136dbc525e27c4b6578", 0x4e}], 0x1, r3) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040)=@assoc_id=0x0, &(0x7f0000000080)=0x4) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000000c0)={r4, 0x9, 0x30}, &(0x7f0000000100)=0x23e) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b97000)={0x2, &(0x7f000048fff0)=[{}, {0x6}]}, 0x10) getsockopt$sock_buf(r0, 0x1, 0x1a, &(0x7f0000baf000)=""/1, &(0x7f0000561ffc)=0x1) 2018/03/31 07:41:53 executing program 7 (fault-call:10 fault-nth:29): r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4900, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000240)=0x4) getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) r1 = dup(0xffffffffffffff9c) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r2 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r2, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r2, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r2, &(0x7f0000000100)=""/65, 0x41) r3 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) fchdir(r2) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(r3, &(0x7f0000000200)='./file1\x00', r2, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r2, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000580)=""/80, 0x50}, {&(0x7f00000008c0)=""/4096, 0x1000}], 0x2, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x20) r5 = syz_open_dev$sndpcmp(&(0x7f00000018c0)='/dev/snd/pcmC#D#p\x00', 0x3, 0x10a00) ioctl$KVM_GET_DEVICE_ATTR(r5, 0x4018aee2, &(0x7f0000001940)={0x0, 0x100, 0x9, &(0x7f0000001900)}) recvfrom$ipx(r4, &(0x7f00000006c0)=""/52, 0x34, 0x100, &(0x7f0000000700)={0x4, 0x9a2, 0x4, "dc108d9d4391", 0x5}, 0x10) renameat(r2, &(0x7f0000001980)='./file1\x00', r5, &(0x7f00000019c0)='./file0/file0\x00') r6 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r6, 0x4, 0x0) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000040), 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r6, &(0x7f0000000200), 0xfffffe08) 2018/03/31 07:41:53 executing program 5: pipe2(&(0x7f000041eff8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) vmsplice(r0, &(0x7f0000a44000)=[{&(0x7f0000938f68)}], 0x1, 0x0) madvise(&(0x7f0000b5e000/0x3000)=nil, 0x3000, 0x10) madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0xe) 2018/03/31 07:41:53 executing program 2: r0 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)="c6cc8e60a78914d500bfeae773ddb642384ef9648af1058f5fbd2fd309524d989e8ca5c3e6e4d185de0489636bb4012cd2281d57a505b82ae678e253ab1603ef18da1e2b4f2acc3c7651ff1c670f5ed1de51a9a5a850687fc0664d9c81b66fefaf800714c085934bd42e3e21ae71d978f3e76fcbfdc2e66adff8be4d85633beb78581bf230f72954dd487c97d06409d3c6e2f7f22be6284a9b", 0x99, 0xfffffffffffffffb) keyctl$describe(0x6, r0, &(0x7f00000002c0)=""/200, 0xc8) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440)={0x0, 0x8000, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20202, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x1010, r3, 0x0) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000000580)=ANY=[@ANYBLOB="030000000000000002004e22ac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e24ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000006ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ffffffffffffff000000000000000000000000000000000000000000000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e220000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) pwrite64(r3, &(0x7f00000004c0)="361cf8298589166f6c2d5823c3b913944a09f012cc6a80f1d50171bf0badb6b5ffdeeaef7d6bdec3b31ce16780d2546875ed31070c85d5735d1ca260f2fca2cc539989af5eafe394f9ae07fcd88029971829aeaf797a78f97cd7f8531aeeb62f497a6d2d8c61dc23348ec786a20e624fdf4c5b839bea2dc66b04b7756cc92f852e", 0x81, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000400)=0xfff, 0x4) fallocate(r3, 0x3, 0x0, 0x81) ppoll(&(0x7f0000000080)=[{r2}, {r1, 0x208}, {r3, 0x28}], 0x3, &(0x7f00000000c0), &(0x7f0000000140)={0x70000000000}, 0x8) openat$cgroup_ro(r3, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 2018/03/31 07:41:53 executing program 1: mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x4c033, 0xffffffffffffffff, 0x0) r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x10001, 0x8000) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000080)) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f00000000c0)) setsockopt(r0, 0x65, 0x1, &(0x7f0000000000)="5b4cd9494e24241dce54b2670000000062e50fa42f3f6947", 0x18) 2018/03/31 07:41:53 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0xaf01, &(0x7f0000307000)=&(0x7f0000989fff)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000000)=ANY=[]) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000140)={0x0, r1}) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000000)=r1) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000cef000)={0x1, 0x0, &(0x7f000062a000)=""/167, &(0x7f0000aac000)=""/21, &(0x7f00002fdf52)=""/174}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000180)={0x0, 0x1, &(0x7f0000000280)=""/147, &(0x7f0000000340)=""/223, &(0x7f0000000580)=""/4096}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000040)=0x1) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000f82ffc)=0x4001) dup2(r1, r0) eventfd(0x0) 2018/03/31 07:41:53 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x2, 0x80400) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) setrlimit(0xa, &(0x7f0000000380)={0x4, 0x1}) getsockname(0xffffffffffffff9c, &(0x7f0000001480)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f00000012c0)=0x80) socketpair(0x10, 0x0, 0x8, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000001580)={r3}) r4 = open(&(0x7f00000010c0)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000001300)={0x8, 0x0, 0x6, 0x58a, 0x0}, &(0x7f0000001340)=0x10) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x3052, r3, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f00000001c0)={'bond0\x00', {0x2, 0x4e20, @multicast2=0xe0000002}}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000480)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000040)=0x2) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000a80)={r5, @in={{0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0xffffff4a) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000001380)={r5, @in6={{0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0xf}}}, 0x0, 0x7, 0x0, 0x8, 0x92}, &(0x7f0000001440)=0x98) eventfd(0xffffffff80000001) sendfile(r3, r6, 0x0, 0x1ff) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000001140)={0x4, 0x8001, 0x40, 0xfffffffffffffffd, 0x0}, &(0x7f0000001180)=0x10) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f0000001500)) ioctl$KDDISABIO(r3, 0x4b37) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000011c0)={0x95e, 0x101, 0x8009, 0x1ff, 0x31386ac8, 0x8, 0x1, 0x7, r7}, 0x20) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x1, 0x1) recvfrom(r1, &(0x7f00000015c0)=""/83, 0x53, 0x120, 0x0, 0x0) symlinkat(&(0x7f0000001080)='./file0\x00', r4, &(0x7f0000001100)='./file0\x00') close(r0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={r4, r4, 0x4, 0x3}, 0x10) getsockname$netlink(r1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) 2018/03/31 07:41:53 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1a, &(0x7f00000f5ffc)=0xfffffffeffffffff, 0x4) bind$inet6(r1, &(0x7f0000710fe4)={0xa, 0x4e21}, 0x1c) r2 = dup2(r1, r1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r2, 0xc02c5341, &(0x7f0000000040)) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f0000000200)={'broute\x00', 0x0, 0x4, 0xfb, [], 0x4, &(0x7f00000000c0)=[{}, {}, {}, {}], &(0x7f0000000100)=""/251}, &(0x7f0000000280)=0x78) r3 = getpid() getpgrp(r3) syz_emit_ethernet(0x2a, &(0x7f00000002c0)=ANY=[@ANYBLOB="a58501009cd500001400000008000100001c00005bfe1fc67128cc000000119078ac14ffbbe000000100004e2100089078129b2ff6481025919c743c9c94ee3f85862fc93cc5a96f81acbc092af930260bdbb2938c3a9ba360a59a909018ad17549a19fbf1eb5a849f445528ebbaa412db6ccfa243296fe00ebe3d9535c8af3dab925ea9b5ae62e9b7d517608aca65858167e65e05556898dc98964d974279bd35e258ea5ccea37d3009d1b75c4a31be1fcebe07"], 0x0) 2018/03/31 07:41:53 executing program 1: ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000040)={0x3ffe, 0x0, 0x2, 0x200000000800}) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x4028700f, &(0x7f0000000140)) 2018/03/31 07:41:53 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) mq_getsetattr(r0, &(0x7f0000000040)={0xcb6b, 0x1, 0x0, 0x7, 0x9, 0xb2, 0x0, 0x4}, &(0x7f0000000100)) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000000)=0x7) r1 = mq_open(&(0x7f0000000000)='-$\x00', 0x6e93ebbbcc0884f2, 0x3, &(0x7f0000664fc0)={0x0, 0x1, 0x2}) mq_timedreceive(r1, &(0x7f000009d000)=""/224, 0xe0, 0x20d4671c, &(0x7f0000e6eff8)={0x77359400}) setsockopt$ax25_int(r0, 0x101, 0x6, &(0x7f0000ddfffc)=0x1, 0x4) mq_timedsend(r1, &(0x7f000066c000), 0x0, 0x0, &(0x7f000066cff0)) syz_extract_tcp_res$synack(&(0x7f00000001c0)={0x41424344, 0x41424344}, 0x1, 0x0) syz_extract_tcp_res(&(0x7f00000000c0)={0x41424344}, 0x4, 0x101) syz_emit_ethernet(0x129, &(0x7f0000000380)=ANY=[@ANYBLOB="cd3997030f000180c20000008847000000000000ca0b00000000ff0000000000000000000070000000806f15eabe00d73b0000000000000000000000000000000001ff020000000000000000000000000001a902026900000000fe8000000000000000000000000000aa4e224e24", @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="c104fffe9078007722079ea5560ff213128d81da75385fb1d3bd7a2e61e621f975000000e3b82f1510ca9b9fc1ed55bad4e17e36b5ac2777b7db593101b31734161e65bf0d04197f50848ba25630cf6d21a5399287fe8e556f07a07dc102f980d9ee136b87f9d8cf1940b0b0246f65dbd4882a95a6decdf0ca19ad1b7981ae394e5db759d00acddf4d972fbe9d436e9b48aac49831b4e5a02bdbdff8352ac39345b53d23278f252086c980d579028b4d9d0680"], 0x0) 2018/03/31 07:41:53 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-camellia-asm\x00'}, 0x58) getsockopt$inet_mreq(r0, 0x0, 0x0, &(0x7f0000000000)={@multicast1, @dev}, &(0x7f0000000080)=0x8) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f000048f000)="ad56b6c5824c8eb995298992ea54c7beef9f5d56530f90c2", 0x18) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) readv(r1, &(0x7f0000000440)=[{&(0x7f0000000380)=""/142, 0x8e}], 0x1) 2018/03/31 07:41:53 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0xaf01, &(0x7f0000307000)=&(0x7f0000989fff)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000000)=ANY=[]) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000140)={0x0, r1}) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000000)=r1) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000cef000)={0x1, 0x0, &(0x7f000062a000)=""/167, &(0x7f0000aac000)=""/21, &(0x7f00002fdf52)=""/174}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000180)={0x0, 0x1, &(0x7f0000000280)=""/147, &(0x7f0000000340)=""/223, &(0x7f0000000580)=""/4096}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000040)=0x1) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000f82ffc)=0x4001) dup2(r1, r0) eventfd(0x0) 2018/03/31 07:41:53 executing program 1: r0 = socket(0x2, 0x1, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r1, &(0x7f0000000000)) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000007ffc), 0x4) [ 179.578826] FAULT_INJECTION: forcing a failure. [ 179.578826] name failslab, interval 1, probability 0, space 0, times 0 [ 179.590116] CPU: 1 PID: 14166 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #372 [ 179.597472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 179.606815] Call Trace: [ 179.609383] dump_stack+0x194/0x24d [ 179.612989] ? arch_local_irq_restore+0x53/0x53 [ 179.617641] should_fail+0x8c0/0xa40 [ 179.621334] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 179.626415] ? trace_hardirqs_off+0x10/0x10 [ 179.630709] ? alloc_fair_sched_group+0xd6/0x530 [ 179.635439] ? sched_create_group+0x35/0x70 [ 179.639735] ? cgroup_apply_control_enable+0x44d/0xbc0 [ 179.644986] ? SyS_mkdirat+0x22b/0x2b0 [ 179.648856] ? print_irqtrace_events+0x270/0x270 [ 179.653587] ? find_held_lock+0x35/0x1d0 [ 179.657622] ? __lock_is_held+0xb6/0x140 [ 179.661662] ? check_same_owner+0x320/0x320 [ 179.665959] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 179.670953] ? rcu_note_context_switch+0x710/0x710 [ 179.675861] should_failslab+0xec/0x120 [ 179.679811] kmem_cache_alloc_node_trace+0x5a/0x760 [ 179.684801] ? __refill_cfs_bandwidth_runtime+0x120/0x120 [ 179.690310] ? sched_create_group+0x22/0x70 [ 179.694613] ? find_next_bit+0xcc/0x100 [ 179.698580] alloc_fair_sched_group+0x1f0/0x530 [ 179.703229] sched_create_group+0x35/0x70 [ 179.707352] cpu_cgroup_css_alloc+0xe/0x30 [ 179.711561] cgroup_apply_control_enable+0x44d/0xbc0 [ 179.716643] ? cgroup_propagate_control+0x570/0x570 [ 179.721634] ? css_populate_dir+0x289/0x420 [ 179.725934] cgroup_mkdir+0x56f/0xfc0 [ 179.729708] ? __lock_is_held+0xb6/0x140 [ 179.733745] ? cgroup_destroy_locked+0x750/0x750 [ 179.738475] ? rcu_read_lock_sched_held+0x108/0x120 [ 179.743465] ? kmem_cache_free+0x258/0x2a0 [ 179.747675] ? set_nlink+0xc1/0x160 [ 179.751277] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 179.756178] ? generic_permission+0x105/0x3c0 [ 179.760645] ? cgroup_destroy_locked+0x750/0x750 [ 179.765375] kernfs_iop_mkdir+0x153/0x1e0 [ 179.769497] vfs_mkdir+0x390/0x600 [ 179.773020] SyS_mkdirat+0x22b/0x2b0 [ 179.776710] ? SyS_mknod+0x480/0x480 [ 179.780398] ? trace_hardirqs_on+0xd/0x10 [ 179.784522] ? do_syscall_64+0xb7/0x940 [ 179.789946] ? SyS_mknod+0x480/0x480 [ 179.793636] do_syscall_64+0x281/0x940 [ 179.797501] ? vmalloc_sync_all+0x30/0x30 [ 179.801624] ? _raw_spin_unlock_irq+0x27/0x70 [ 179.806092] ? finish_task_switch+0x1c1/0x7e0 [ 179.810562] ? syscall_return_slowpath+0x550/0x550 [ 179.815465] ? syscall_return_slowpath+0x2ac/0x550 [ 179.820370] ? prepare_exit_to_usermode+0x350/0x350 [ 179.825361] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 179.830703] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 179.835523] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 179.840687] RIP: 0033:0x454e79 [ 179.843852] RSP: 002b:00007fe2ad9eac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 179.851534] RAX: ffffffffffffffda RBX: 00007fe2ad9eb6d4 RCX: 0000000000454e79 [ 179.858780] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 179.866028] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 179.873271] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 2018/03/31 07:41:54 executing program 2: r0 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)="c6cc8e60a78914d500bfeae773ddb642384ef9648af1058f5fbd2fd309524d989e8ca5c3e6e4d185de0489636bb4012cd2281d57a505b82ae678e253ab1603ef18da1e2b4f2acc3c7651ff1c670f5ed1de51a9a5a850687fc0664d9c81b66fefaf800714c085934bd42e3e21ae71d978f3e76fcbfdc2e66adff8be4d85633beb78581bf230f72954dd487c97d06409d3c6e2f7f22be6284a9b", 0x99, 0xfffffffffffffffb) keyctl$describe(0x6, r0, &(0x7f00000002c0)=""/200, 0xc8) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440)={0x0, 0x0, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20202, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x1013, r3, 0x0) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000000580)=ANY=[@ANYBLOB="030000000000000002004e22ac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e24ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000006ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ffffffffffffff000000000000000000000000000000000000000000000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e220000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) pwrite64(r3, &(0x7f00000004c0)="361cf8298589166f6c2d5823c3b913944a09f012cc6a80f1d50171bf0badb6b5ffdeeaef7d6bdec3b31ce16780d2546875ed31070c85d5735d1ca260f2fca2cc539989af5eafe394f9ae07fcd88029971829aeaf797a78f97cd7f8531aeeb62f497a6d2d8c61dc23348ec786a20e624fdf4c5b839bea2dc66b04b7756cc92f852e", 0x81, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000400)=0xfff, 0x4) fallocate(r3, 0x3, 0x0, 0x81) ppoll(&(0x7f0000000080)=[{r2}, {r1, 0x208}, {r3, 0x28}], 0x3, &(0x7f00000000c0), &(0x7f0000000140)={0x70000000000}, 0x8) 2018/03/31 07:41:54 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x129, 0x10000}], 0x0, &(0x7f0000016000)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd2(0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x10000, 0x0) ioctl$TCSBRKP(r3, 0x5425, 0xfffffffffffffffa) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x81, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x800, 0x0) ioctl$KVM_GET_IRQCHIP(r3, 0xc208ae62, &(0x7f0000001340)=@ioapic) r6 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000001500)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000001540)="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", 0x1000, 0xfffffffffffffff8) r7 = add_key(&(0x7f0000002540)='pkcs7_test\x00', &(0x7f0000002580)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000025c0)="70cb132c3f254033c719bac682bc91e1e2175fac21707360fe0065a623cf56645c5bc9f4484d39e908159d0c2c200024e6c704b9f408ffa6d622a3def58ee163023e1ca520072e5d8d65c366aec2954bd1b6fc930d1967a3d6a84ed463067bf64ee4b4897ae18b0afa571d89f0e6432c189e54259a45cb8e2bb4d4e4d246529cbe112e64af93330897484e14925dee1483184c31b7d51fefa3f2281b6740ef18a7de80410e00e88e9dda32103465a6c33dae16ae1040cf6881b7d4dc2d5e50de8c07f7b34142f53d7f87613edc227a9a867bd037a13721ab1cb32e", 0xdb, 0xfffffffffffffffd) keyctl$unlink(0x9, r6, r7) ioctl$VHOST_SET_VRING_CALL(r5, 0x4008af21, &(0x7f0000000040)) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000358fe0)={r2, 0x0, 0x2, r2}) ioctl$KVM_SET_GUEST_DEBUG(r3, 0x4048ae9b, &(0x7f0000001480)={0x2, 0x0, [0x6, 0x9, 0x7, 0x7fff, 0x2, 0x44, 0xe72, 0x4c]}) mkdirat$cgroup(r5, &(0x7f00000000c0)='syz1\x00', 0x1ff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000001280)=0x2) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f00000012c0)={0x3, 0x337e, 0x0, 0x9, 0x3, 0x2, 0x4, 0x7fff, r8}, &(0x7f0000001300)=0x20) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f00000011c0)={r9, 0x20, &(0x7f0000001180)=[@in={0x2, 0x4e20}, @in={0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}]}, &(0x7f0000001200)=0x10) ioctl$ASHMEM_GET_PIN_STATUS(r3, 0x7709, 0x0) ppoll(&(0x7f0000000100)=[{r2, 0x20}, {r0, 0x1}, {r0, 0x8002}], 0x3, &(0x7f0000000140)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x8) 2018/03/31 07:41:54 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) acct(&(0x7f0000001240)='./file0\x00') setrlimit(0xa, &(0x7f0000000380)={0x4, 0x1}) getsockname(0xffffffffffffff9c, &(0x7f0000001480)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f00000012c0)=0x80) socketpair(0x10, 0x0, 0x8, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000001580)={r3}) r4 = open(&(0x7f00000010c0)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000000400)={0x4, 0x8006, 0x8, 0x9, 0x0}, &(0x7f00000003c0)=0xffffffffffffff36) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000440)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000540)=0xe8) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x3052, r3, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f00000001c0)={'bond0\x00', {0x2, 0x4e20, @multicast2=0xe0000002}}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYBLOB="408615824f3f781ae75fcc9554f019621eaccb21d7ca5fb77c06ff41c0d07d78b6de0ed01fa10b1070cb77afb61679a7f893b0c78371e1195ef393dc87b1b329811e67705b9e1bb5dc00c5b14645b010d310e491c159a81b77145882a63f6206ecfb54b4f6b2ddf7963c2b2681ff1aa2dfd55f1e73b02e150e1f8e51e6ae3615336ed2b2b461fccd4ec00311dd4b00cf4316fb4bda9fa1a0a94d01d4db3209cd302a449b841dc10fcc2d63482b979cb70c21ef7000e655a7a1a18b57b6cd06267ef9f582b4783e42e60f460962921710e11ac51a3f9fa92e9118c5f0e1d8b2c342"], &(0x7f0000000040)=0x2) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000100)={r7, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000001380)={r5, @in6={{0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0xf}}}, 0x0, 0x7, 0x0, 0x8, 0x92}, &(0x7f0000001440)=0x98) eventfd(0xffffffff80000001) r8 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r8, 0x29, 0x1b, &(0x7f00000001c0)={@remote={0xfe, 0x80, [], 0xbb}}, 0x14) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000001140)={0x4, 0x8001, 0x40, 0xfffffffffffffffd, 0x0}, &(0x7f0000001180)=0x10) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f0000001500)) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000011c0)={0x95e, 0x101, 0x8009, 0x1ff, 0x31386ac8, 0x8, 0x1, 0x7, r9}, 0x20) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x1, 0x1) recvfrom(r1, &(0x7f00000015c0)=""/83, 0x53, 0x120, 0x0, 0x0) symlinkat(&(0x7f0000001080)='./file0\x00', r4, &(0x7f0000001100)='./file0\x00') close(r0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={r4, r4, 0x4, 0x3}, 0x10) getsockname$netlink(r1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) 2018/03/31 07:41:54 executing program 3: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000380)="5cbdb80442f63cdd4cf72de36881c573fda7bef7bd89a479b3225be98d3e35e92772d1ab1f18128416a829c7920e9dbe4f3de23396796c5be3bf19cc5083a0c82624df93a03130e25b843161fafaa46e69d2063338bb10fcd5a84588409b50c3413f3be2926cfa98be2c59f52b8c763d07b1ede4180d10dad010158515ea7cb5d3d971968270192cdd464967a90a850b8a8d1a7b9c019a1d996183e8633a48903db1985fafa3d29b26bb26a18b2a4adfca1bba6e10f5542a2b4024c66d2265dcd92cb1307935551a8cdddfa2fb0b91b77238ef4d8d92286caa3c02a0ec07232013e1e89d1b952918ec370a39fbbc2013f128135e09845f77694c7ac6476841afe4f01ddc69f2769153dab225d5205ef76cd1d17dcb0a9bac906dc17eb06596cd55611eaa2289936fdd7a2160ae6480d60a3e00a6e5c542357bb95623333074366dc8b21ada24a158f7e63eeee040b2f3c4745ae1d876b5befdbb11ccb0eb559d77a1a1870e40babc47a02f108eefdb1f950ade4395556356419ef1cb07e3e714992f04c97076bc83dac164979e5f31ad67fceaa2dafb43f616d408875c12fb7ccf5cc4f541c2e31669ffd9b67a947b85c26933e587c2023a9fc5b06ceccf06fb184716a5a5d67bd79ec5945c82936026868aab3f5a0447f4b03e47e95a44f79f10e9f3035c8f7e86ef71f726da2bdbedb2b9a768a0cac59b95d1b9f59aa706246b01c91a3e20f4b86646d83e970712972a87df0a07e74c93fb0251c73f05b38e59556a08c4817a17e1919ea26492c7961e8a5d0263fb2df48c41a3be33bc360e744d52d6552bc929a480e704343720f5410c2ab23d714782e90b4f18824d1d0fb07c799dd8155401b62b9e794e755e534436995e10b2b96ddea38abd4fc4d9029267b6fe5ba8da7aff6b6583daa5a237527b629a42ddd29f42f48eb41b3f2757d2468f8ad30ade9f7b483502810180644ed68ffcb051beb9beae871951cb57bcc4fd4bc652815bc067f9bbdcf8630c0dad052c2eb3b5b04ce8b44baa47fe4933fff7202eb07430243af9a5f0f4e050822d2a658f05f6ac18e7735a5b6023bb199f4a19570c7366eb57bc724420e487d1402670d90f934a20f98a0d4660fce3ecc4dbb8593f5d01d871dba44dd2d0bc25c749a3f79beced2554e3328ba987b3da77062879988c141a2c977a9f7b54d0283688ab5b5ab4a233761f472e6d75e705e65fe993a4b4029b5d9b312439e04489e082f944a773c1e56f78a94fdfe542b4b562e0bbe8a32297e700043821d09be440920e9cc39ddd5533558e99b34edb0fff04953dbfe336c98681e26ff5cd32ebcb2d27680189c9dc5a8c15e5edd79ef805ef5d9e3c6a0d065aeebf16092debecc7a341e01bb6d89c5f59c5c2bfdf78a63db2ce9da56f398b0d4c4ce90978acb02fe99afb2af46b46f842800203ef5c1fdef120a652e90c1517c12ad5efdba87e82d330a1190eae05b007285e1326e09f1856cb16b08b6ae9e58ee68fdac02269766f1b125d8751b116b8c4ff92ca6fcc0fba4dff861973dd964b0a0cb7857465941f6fc8435d28a9ece58c144681793b29ffa2e97c4f6d09794e5dde357f0d118dc569f17bf048fe9daf637029ed6f9ede4b8abdc6228ba2760e1a0de1a77b613f136544b61698aed88bbe38f558de0f31936863c78dc782d61a5ac2d1d4441d1c29b7d2ae06661fd5d69a64bc13dce36845ca007e558a8007f906635a4c2ae32e9f4e6e50f5d8ecaae4ab0fdae3307d537ea19c89f530d708c5dc9f676216ca219f4c117b770f7c809c01672831cf7ef6bf746e060893e68f2d4502038354abf56eeed1f811a3cbc49fdb7ba047986d7cce99822274cf15fe6ce420c220348ea444857fcc61d7539d30392e8e23f42261979dcc878dab8caabba9b9e0e24c9df6754a52f633315a50f1a76a30729f14b0ae767b3ca9497f655e29acf9ce52b9629ad9b27cc66f67948794bddb196cd2ed451ea94e7cc8b9d941fc3640e61336e7814326aab347df86a89ac4959581f367678cfdd0ca30c446522a398cc5801497dceec3186ac03da11d49c738b8d92a7c06bd5b86b0a2c3bb06fad445009cbd6562897273403afaf8b148e5489c00e0460f5a3712728cbfecaf1dcddf75c7710f621a6439664a632d965e90ee437216cfb7dd0cf5b14196fe620bf7355b1c9bac1e2875f7cfe4ee72a41332d9a27b5a9b530c2a3c0518fdb983b5e5a98b345f10bdafb438fa112f6ec32ea4003ac6714073e12aee06ede59fea1942a63bd3240cfc92c7c0f2d4a4cf2bbeaca93d022b8e161b9d3c0348491c7ac69746d9f122e7e14f8f89eaaff9878dbd3dd3da6d6b102eb0893de7b055f67a166e7efe83e24209587c30a02dde719e418f01afb222f13481c93f1d91de2b90b5514a0afb1612d630cf5bf8741da9d36770bb0501aa143ac66b1386733a8cfefc7e4746ca66efe6f7384bcfaf3f731f7624c1b49e7b09f0204f94ffe3b00813bf2a8cc4fd40f3ab53104daa21644aabe71226bd85f90477c5e2f200e9207e8759306432608e4086898b135cd1166c99c6c80a123f85e0761ea7cb8250ece879076d7f0485aaf9e9c15d2014f2c2e2659290c9da0888deb15938a968d219f44b6296061704e7118d845ca1fe836d81a151427375bacae4806a98d054d863d2142dc12ffde8f79a7de713aedfce0ce9f8f666dedf466df0806372045900ad656bae7f5d076811b095ad7deb143a4e852fa9a5927321e579e0d5df09dc2cd89a1b5821714e4ca9983c8778fd7178e1cfd3fbe5c4e91eabc488526c79a477d97bd280603e0ebf6344edec433183ed08c120bcd897b318b8ac0e8f45b5148889816f56b60ad4eb86fd4c17cb03dcdf6959a3d754c00eb765a77fa923db7e6e68b774e573d7a6d11dd5f33bdd4db23e8a3ec74f91e83e5cdc95fee1103cb5208d1d666d0bc9a7cfa5e76ae892e7067d489d315e500a80e5cbb95320d4d0add4de71ff327206914b17eaf916939ff4ccffb053dc50da782ed49eee997a0ee29481cf8d99869e901166e80df66268b5434b08e6470764ab57834aa7a72319c6dc88909fdea0f1123f562a9f359c6d15886e70940fafb92478a98592c09c83d8f9da389f724fe065972de10ca796d1de81fb0359c7015e737adbc0b3d9c37b45bb955c966a41beb50b058c1418db57289efe673910543bac79cf91f577292ae2d8e482d88f3ad61b965ac1048bbfe6e2f3fa27c2ff5766bdf7dcba7f1657e994ba0af90ef4215ebb24ca3cd84f051c4f9b173b1ee5a079d951e6579c5e4e63c1edca883a4696d8b2a54cc38c362ddfebf493ac938b2fc06722d99608b97d91cab7865b5d5ceb1508c0d8770d636e7ef1121e8a5911582f8b8a508fafdb089488144b86098341833a076e5a2879add6e0f9011b9655a398de15f2dc07b4c2e5b8a22bc40f53c60cea55516d0c05c8380c89beed232fa77afa9a1d0883d8de043f2f7dbad32b16c6be0c8a360aef629a06457b7c8ae2e6c59b2f7cae4ca578eaaa41540f311af7ff476b1458a7c788a24952a48d52fc48200522fc86f0861d3557d6046a16b96d5ba4be2a653e73633e65315d142b7e21aef700103a97e3959c12bb8e157fe470a5b3668f1942f713c862768addf4f3b80b7d67e9538e45c9a9942917eabc7f24af383c95d343df90d251c9afeb4412de4af06a515b52d2ec4168747603024a9503abee2025add3bd597033102933b11cfacd6e675721313fecec59c9936fcce9ff01a86043ca8d29bbd2125213d69b6c7fe0179d6c3c39b562f66d166788a21f4b6883fd5cc5999bc86201405d23605e46f1b50fa48ee0d5750cebfbbd1f953538c61184161e1777d3d13fdfd19624058ff492aa78d084fd452f88150915108076d6011789a5af0e2e2df5493a56387fa356cbb6bc00cbe14e7fd1e2436bf3ee5b5f5c4c9cbb8cf432bec647997ac57392d44d43bc26daf63b373f69fd867b5f874625e11ce22db5731d0ebfe7dc8143e41f8f2643f306725884f7d2204836b26d1682f3fd6c6a9cf247939151fa10bad02908ce8b4b6d0973aa354c887b7fe9f9e04a2c56e612b8ce35629c39025ab152fb87a99f3b04bc51147b2d1e1d5410d71f97aa40a7264d8f880495e7791045c250e7fffca219f0eaa89d9b8d5a6c731e252cda29a36919a157891aaaf2b862866d41190516422b657fe85d9db90e756606c92d1c08fc5ec6882b7554cf78c4c1c316a134f127ab00e71dc6e955d7a8409763ecd3f27d5ade3e30a3ac5eb8a95e8cc8de1e3d6794c7d059b9598d1d4569f9a738c2c1c904edd83ebf0573136de8f57d64d0749a9134613b801bc4918b319e5e844dab8875fd81b3bbf4df6c40fab6c2d32ec25a185fb5711df002d4808b4f34e8ce0b7ba9bcab2985251d9057b78f1309e484899ff3c84cfda70a686c5f8e536d0cfeaeab6ea4084a78069d2ee1f9f084c3397caecb8ac3771c1d720064b88ba1eb964ecd1ec89e592212d6608d3e08ea398570cfe1b89fee52679dbf7effe6bb43db33ec42b45889e0a038b6648977882dfc8fab8115cd8c1df488bb0d758d66c6d9d39c9b998f12904fd50942d46e214e4d47e94b2051bee421b977c669235a6cc11be27e133a309c84c157885834cf290da7e0514b55982c4e7e0311e28a24a3b8d92ff7c810b6dcbaeb63361f084cc7a3963f10d8d3fcde9ba94c34fa7a9383e7ec6d6373410d1740ca2080c348d755d2a9cda48597bcd00460e317fbce4c78ddd0894654ffab74298177d65605f1e89aecca288e8e6df1180cecb714dcafc47078bb5eb90fe5786c7dfa40acd20f93e7f5eae3ae0e06d0f366247406db0d66f1efefccd949aa549d61571ff3dfce94f209a751169abfa158c4437710320656a3216217744af0e962226ee886cd7207b1e5a6967700e0045f8a3297aeb6cd6f3fb55ee1e3b2078f77a5dab7951e2da2cb9525b017c6ae2fe560ad28da7faec8749bd6714fb63937f5667cc8ad6920fd86b1058b1caec88b08f8e07db4335e7393264837db65ff8ae4b0057153fb8f3be6e33faee025ae70eb30526a004c2554c3025dc73b4e28cc575f6a0f4a9cae85aa93ed5480392a62efe80ab8e3b01cc9d32c870cd429431b89aebe70dfdaed8adf729759a00e5939916eeb707e8fc8b3b19edaa2674d93e00486f5e23478ac245e02ac1d99392ba909f8af989f311fba1c5cf26b966902e53d3460db36d909cfc10a4ea43df739ac281deca654dcadda0f9bc5537a9bc0dd32b07cd38a19168ae043142a6372f1fb51ce81fd3cf3da71b55c544a9fc178e7a18d6b2c87337a06ebed80e8a45bce2401770a9342360ac3f198b4ed4f70e8c00545edec30c5b83338447c8f103e08a0d5b4e57baf69adfb3072f3b9e3a58e68c4bf5c6af43d605a033ea85e056783f413a0be7affbac2690e837fd83ef2b6fd46f57327d9219b739cac4d7d19fa324985cf25d433a50870a08c12008fb1d5af24477063edb3da2971b37ed2626c5591998dc0a0fa047ea6630f6a606a56eb1325f5a50a79cb566b49f1afb376642c2e8a51baef5cc7fc9410cb65205ea7516b742a7873e17786f163ea007802523a0745204b5caa8352e7a04a50a3a4e96b622e9ff443ac46c448c6dac454e1e88cd9e91e6790af39dd87039ba1ce3a48ea5d794c0f2dcf4b87c166a03f0358a5926c4ec6027107959a6bf6dbb95a324faf6b865997fe7210cafccd99e9ca880f11418549bcfe1e371b5c559a5bf1da01276bc3449d6b492170", 0x1000, r1) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e20, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) listen(r0, 0x20) r2 = accept4(r0, &(0x7f0000000000)=@hci, &(0x7f0000000080)=0x1f4, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0xc000, 0x0) write$cgroup_subtree(r3, &(0x7f0000000180)={[{0x2d, 'cpu', 0x20}, {0x2d, 'rdma', 0x20}, {0x2f, 'cpu', 0x20}, {0x0, 'memory', 0x20}]}, 0x18) socketpair(0x1a, 0x0, 0x0, &(0x7f0000000040)) sendmsg(r2, &(0x7f0000000340)={&(0x7f00000000c0)=@l2={0x1f}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="100002000001"], 0x10}, 0x0) [ 179.880513] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 000000000000001d [ 179.960461] encrypted_key: master key parameter 'áè•)ì7 [ 179.960461] 9û¼' is invalid 2018/03/31 07:41:55 executing program 7 (fault-call:10 fault-nth:30): r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4900, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000240)=0x4) getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) r1 = dup(0xffffffffffffff9c) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r2 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r2, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r2, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r2, &(0x7f0000000100)=""/65, 0x41) r3 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) fchdir(r2) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(r3, &(0x7f0000000200)='./file1\x00', r2, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r2, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000580)=""/80, 0x50}, {&(0x7f00000008c0)=""/4096, 0x1000}], 0x2, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x20) r5 = syz_open_dev$sndpcmp(&(0x7f00000018c0)='/dev/snd/pcmC#D#p\x00', 0x3, 0x10a00) ioctl$KVM_GET_DEVICE_ATTR(r5, 0x4018aee2, &(0x7f0000001940)={0x0, 0x100, 0x9, &(0x7f0000001900)}) recvfrom$ipx(r4, &(0x7f00000006c0)=""/52, 0x34, 0x100, &(0x7f0000000700)={0x4, 0x9a2, 0x4, "dc108d9d4391", 0x5}, 0x10) renameat(r2, &(0x7f0000001980)='./file1\x00', r5, &(0x7f00000019c0)='./file0/file0\x00') r6 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r6, 0x4, 0x0) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000040), 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r6, &(0x7f0000000200), 0xfffffe08) 2018/03/31 07:41:55 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0xaf01, &(0x7f0000307000)=&(0x7f0000989fff)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000000)=ANY=[]) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000140)={0x0, r1}) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000000)=r1) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000cef000)={0x1, 0x0, &(0x7f000062a000)=""/167, &(0x7f0000aac000)=""/21, &(0x7f00002fdf52)=""/174}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000180)={0x0, 0x1, &(0x7f0000000280)=""/147, &(0x7f0000000340)=""/223, &(0x7f0000000580)=""/4096}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000040)=0x1) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000f82ffc)=0x4001) dup2(r1, r0) 2018/03/31 07:41:55 executing program 1: sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x1a1, 0x0, &(0x7f0000001000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) r0 = socket$inet6_sctp(0xa, 0x20000000000005, 0x84) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f00000001c0)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e20, @broadcast=0xffffffff}}, 0x591, 0x4778, 0xf3bf, 0x0, 0x20}, &(0x7f0000000200)=0x98) socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000240)={'tunl0\x00', @ifru_data=&(0x7f0000000180)="d61a072afa6a2e6e9105a65cf0b08be4d57565e1a85eff283ee23d954743a2e3"}) 2018/03/31 07:41:55 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) acct(&(0x7f0000000500)='./file0\x00') setrlimit(0xa, &(0x7f0000000380)={0x4, 0x1}) getsockname(0xffffffffffffff9c, &(0x7f0000001480)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f00000012c0)=0x80) socketpair(0x10, 0x1fe, 0x2, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000001580)={r3}) r5 = open(&(0x7f00000010c0)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r5, 0x84, 0x22, &(0x7f0000001300)={0x8, 0x0, 0x6, 0x58a, 0x0}, &(0x7f0000001340)=0x10) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x3052, r3, 0x0) ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f00000001c0)={'bond0\x00', {0x2, 0x4e20, @multicast2=0xe0000002}}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYBLOB="408615824f3f781ae75fcc9554f019621eaccb21d7ca5fb7fc66ff41c0d07d78b6de0ed01fa10b1070cb77afb61679a7f893b0c78371e1195ef393dc87b1b38b811e67705b9e1bb5dc00c5b14645b010d310e491c159a81b77145882a63f6206ecfb54b4f6b2ddf7963c2b2681ff1aa2dfd55f1e73b02e150e1f8e51e6ae3615336ed2b2b461fccd4ec00311dd4b00cf4316fb4bda9fa1a0a94d01d4db3209cd302a449b841dc10fcc2d63482b979cb70c21ef706614aae0b4452c2500e655a7a1a18b57b6cd06267ef9f582b4783e42e60f460962921710e11ac51a3f9fa92e91"], &(0x7f0000000040)=0x2) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000100)={r8, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000001380)={r6, @in6={{0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0xf}}}, 0x0, 0x7, 0x0, 0x8, 0x92}, &(0x7f0000001440)=0x98) eventfd(0xffffffff80000001) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f00000003c0)) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000001140)={0x4, 0x8001, 0x40, 0xfffffffffffffffd, 0x0}, &(0x7f0000001180)=0x10) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, &(0x7f0000001500)) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000011c0)={0x95e, 0x101, 0x8009, 0x1ff, 0x31386ac8, 0x8, 0x1, 0x7, r9}, 0x20) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x1, 0x1) socket$kcm(0x29, 0x2, 0x0) recvfrom(r1, &(0x7f00000015c0)=""/83, 0x53, 0x120, 0x0, 0x0) symlinkat(&(0x7f0000001080)='./file0\x00', r5, &(0x7f0000001100)='./file0\x00') close(r0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000480)={0x0}, &(0x7f00000004c0)=0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0xa0, 0x3, 0x8, 0xffff, 0x0, 0x400, 0x4080, 0x4, 0x20, 0x800, 0x6, 0x6, 0x100000000, 0x3, 0x20, 0x20, 0x20, 0xa7f, 0x4, 0x0, 0x4, 0x48, 0x8d, 0xd3, 0x2400, 0x4, 0x1ff, 0x26d, 0xfffffffffffffffc, 0x0, 0x0, 0x6, 0x8000, 0x5, 0x7, 0x81, 0x0, 0x100000000, 0x0, @perf_config_ext={0x6, 0x80000000}, 0x24000, 0x3f, 0x4, 0x7, 0x80000000, 0x2, 0x1}, r10, 0x3, r4, 0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={r5, r5, 0x4, 0x3}, 0x10) getsockname$netlink(r1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) 2018/03/31 07:41:55 executing program 2: r0 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)="c6cc8e60a78914d500bfeae773ddb642384ef9648af1058f5fbd2fd309524d989e8ca5c3e6e4d185de0489636bb4012cd2281d57a505b82ae678e253ab1603ef18da1e2b4f2acc3c7651ff1c670f5ed1de51a9a5a850687fc0664d9c81b66fefaf800714c085934bd42e3e21ae71d978f3e76fcbfdc2e66adff8be4d85633beb78581bf230f72954dd487c97d06409d3c6e2f7f22be6284a9b", 0x99, 0xfffffffffffffffb) r1 = socket$inet_udp(0x2, 0x2, 0x0) keyctl$describe(0x6, r0, &(0x7f00000002c0)=""/200, 0xc8) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440)={0x0, 0x0, 0xffffffffffffffff}) r3 = accept4$inet(r1, &(0x7f0000000dc0), &(0x7f0000000e00)=0x10, 0x800) r4 = syz_open_dev$dmmidi(&(0x7f00000003c0)='/dev/dmmidi#\x00', 0x69d8, 0x8000) connect$nfc_llcp(r4, &(0x7f0000000a40)={0x27, 0x0, 0x0, 0x7, 0x3f, 0x80000000, "e40815e40eef993cb027e4ec1d7765d2b39243407f960a97798eaec8c8e151914e81827ba1e32ca7bd6c2b221741f4d60b4e9a5ea978fd0bc9a34a3f0beb5d", 0x13}, 0x60) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) r6 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x2, 0x101000) ioctl$TIOCEXCL(r6, 0x540c) r7 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20202, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x1010, r7, 0x0) setsockopt$inet_MCAST_MSFILTER(r7, 0x0, 0x30, &(0x7f0000000580)=ANY=[@ANYBLOB="030000000000000002004e22ac1414aa000000000000000000000000000000000000000000000040000000000000000000000000000000000097b7b85dd02a4ae10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e24ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000006ac1414bb000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e240000000900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffff00000000000000000000000000000002004e2100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffffffffffff0000000000000000000000000000000000000000987ff4cdeafe57b9a8f371000000000000000000000000000002004e23ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e220000000000000000000000fffffffffffffff0000000000000b074b124000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000002004e23ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000aa19f1e509ca0cdd00000000000000000000000000000000000000000000000000000000000000000000"], 0x1) pwrite64(r7, &(0x7f00000004c0)="361cf8298589166f6c2d5823c3b913944a09f012cc6a80f1d50171bf0badb6b5ffdeeaef7d6bdec3b31ce16780d2546875ed31070c85d5735d1ca260f2fca2cc539989af5eafe394f9ae07fcd88029971829aeaf797a78f97cd7f8531aeeb62f497a6d2d8c61dc23348ec786a20e624fdf4c5b839bea2dc66b04b7756cc92f852e", 0x81, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r7, 0x84, 0x21, &(0x7f0000000400)=0xfff, 0x4) fallocate(r7, 0x3, 0x0, 0x81) ppoll(&(0x7f0000000080)=[{r5}, {r2, 0x208}, {r7, 0x28}], 0x3, &(0x7f00000000c0), &(0x7f0000000140)={0x70000000000}, 0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e20, @multicast1=0xe0000001}}, 0x6}, &(0x7f0000000480)=0x90) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r7, 0x84, 0x6d, &(0x7f0000000b80)={0x0, 0xf6, "ecdad43146393e19d8cfa4717ec81d5d37a03ed484689dcc7f8c17c6746e8c85d77bf3a978d4c1b9a2a36aa97763fd7b09ca5099ab6efd4befb482627395ce6a8f55b02c887b0ed78d52c014855a8459d4f4febb03422b67dd922cf4ba848458a4bea972aee336e6d64ad8ff486f893362e8a24465ec040fb002d10a5e1bab9aa2982e4086a7c40686851d936a3b224d05619ab7c8eed03ef6b52ff6972b1aae245defb7fbf1d27113730d0309de26e89ed8cefec48abce689d384121d5b2ef4ccb3f72e6458e86eebd02380c646170a5e29349b9a782936c559abad5018853ddb14a0f78bc64f1fef009730e7b1e888c386f22f3251"}, &(0x7f0000000c80)=0xfe) pread64(r3, &(0x7f0000000e40)=""/29, 0x1d, 0x36) getsockopt$inet_sctp_SCTP_STATUS(r4, 0x84, 0xe, &(0x7f0000000cc0)={r8, 0x8, 0xa4, 0x20, 0x400, 0x400, 0x8001, 0x80, {r9, @in={{0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x8001, 0x1, 0xb5c6, 0x0, 0x7}}, &(0x7f0000000d80)=0xb0) ioctl$LOOP_CTL_GET_FREE(r7, 0x4c82) 2018/03/31 07:41:55 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000000)={'HL\x00'}, &(0x7f0000000040)=0x1e) bind$inet6(r0, &(0x7f0000807fe4)={0xa, 0x4e22}, 0x1c) r1 = socket(0xa, 0x802, 0x0) r2 = socket(0xd, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000480)=0x2) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000005c0)={r3, @in6={{0xa, 0x4e23, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x1}}, 0x1, 0x8, 0x166, 0x0, 0x8}, 0x98) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000080)={0x0, 0x8}, &(0x7f0000000100)=0x8) socket(0x40000000000005, 0x7fffe, 0x0) r4 = socket(0x11, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000180)={'bond0\x00', 0x17fd}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@dev, @in6=@dev}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) r5 = userfaultfd(0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='task\x00') getsockname$ax25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x10) flock(0xffffffffffffffff, 0xc) r6 = dup(r5) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r6, 0x84, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$EVIOCGKEYCODE(r6, 0x80084504, &(0x7f0000000940)=""/213) ioctl$UFFDIO_API(r5, 0xc018aa3f, &(0x7f0000f6bfe8)={0xaa}) mremap(&(0x7f0000d7e000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f00001cd000/0x3000)=nil) poll(&(0x7f0000000140)=[{r5}], 0x1, 0x14a) setsockopt$netlink_NETLINK_TX_RING(r6, 0x10e, 0x7, &(0x7f0000000100)={0x200, 0x5, 0x3, 0x1}, 0x10) ioctl$UFFDIO_REGISTER(r6, 0xc020aa00, &(0x7f0000000280)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) accept4$ax25(r6, 0x0, &(0x7f0000000540), 0x80000) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f0000000200)=0x4) ioctl$UFFDIO_REGISTER(r5, 0xc028aa03, &(0x7f0000000240)={{&(0x7f00005e3000/0x800000)=nil, 0x800000}, 0x200000}) userfaultfd(0x80000) 2018/03/31 07:41:55 executing program 4: setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000223fd4)=[@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}], 0x10) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r0, &(0x7f0000001700)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000016c0)={0xffffffff}, 0x111}}, 0x20) write$rdma_cm(r0, &(0x7f0000000180)=@bind_ip={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x9, @dev={0xfe, 0x80}, 0x7}, r1}}, 0x30) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000080)=""/206) write$rdma_cm(r0, &(0x7f0000000040)=@listen={0x7, 0x8, 0xfa00, {r1}}, 0xff88) 2018/03/31 07:41:55 executing program 5: eventfd(0x3) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x30000, 0x0) r1 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0xed, 0x10300) ioctl$KVM_SET_NR_MMU_PAGES(r1, 0xae44, 0x8) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x40005, 0x0) fallocate(r2, 0x1, 0x4006, 0x4001001) ioctl$ASHMEM_GET_PROT_MASK(r2, 0x7706, &(0x7f0000000040)) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x1010, r0, 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) sendmsg$can_raw(r1, &(0x7f0000000340)={&(0x7f00000003c0)={0x1d, r3}, 0x10, &(0x7f0000000300)={&(0x7f00000002c0)=@can={{0x3, 0x2, 0x6, 0x2}, 0x2, 0x1, 0x0, 0x0, "e88255e919ff3099"}, 0x10}, 0x1, 0x0, 0x0, 0x48000}, 0x40) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@local={0xfe, 0x80, [], 0xaa}, @in6=@local={0xfe, 0x80, [], 0xaa}, 0x4e21, 0x0, 0x4e22, 0x1, 0xa, 0x0, 0xa0, 0x3c, r3, r4}, {0x15, 0x79b2a403, 0x8, 0xd7, 0x10000, 0x4, 0x4, 0x71}, {0x0, 0x6, 0x6, 0x7}, 0x80, 0x6e6bb7, 0x2, 0x1, 0x3, 0x3}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x4d5}, 0x2, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0x3507, 0x6, 0x3, 0xe02, 0x3, 0x9, 0x6}}, 0xe8) prctl$getreaper(0x28, &(0x7f0000000400)) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000380)=0x1) 2018/03/31 07:41:55 executing program 1: ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000200)={0x1, 0xffffffffffffff9c, 0x1}) close(r0) perf_event_open(&(0x7f0000d2af88)={0x2, 0x70, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0xd99, 0x288080) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f00000001c0)={0x7}) mmap(&(0x7f0000cb0000/0x4000)=nil, 0x4000, 0x2000003, 0x10, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) poll(&(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r2, 0x5eb857) r4 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r4, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) r5 = accept4(0xffffffffffffffff, &(0x7f0000975000)=@can, &(0x7f0000752ffc)=0x10, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000080)={'ifb0\x00', {0x2, 0x0, @multicast1=0xe0000001}}) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000480)={{0x0, @remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 'none\x00', 0x20, 0x133c, 0x69}, {@rand_addr=0x6, 0x4e22, 0x10003, 0xb27, 0x1, 0x6}}, 0x44) sendmsg$nl_netfilter(r5, &(0x7f0000b76fc8)={&(0x7f0000715000)={0x10}, 0xc, &(0x7f000066f000)={&(0x7f0000896000)=ANY=[@ANYBLOB="41fb3be42e99850700"], 0x9}, 0x1}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c000000"], 0x1}, 0x1, 0x0, 0x0, 0x4040}, 0x40080) sendmmsg(r5, &(0x7f000000b880)=[{{0x0, 0x0, &(0x7f0000002140)=[{&(0x7f0000002100)="8b557b6d36259e2ddb7c8962f9e22c53ed1e43c6", 0x14}], 0x1, &(0x7f0000002180)}}], 0x1, 0x0) r6 = accept4(r2, &(0x7f0000000340)=@rc, &(0x7f0000000140)=0x80, 0x80800) ioctl$sock_inet_SIOCSIFADDR(r6, 0x8916, &(0x7f00000003c0)={'tunl0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x11}}}) shutdown(r4, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r2, 0x8917, &(0x7f00000001c0)={'ip_vti0\x00', {0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}}) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000400)={{0xa, 0x4e22, 0x1f, @ipv4={[], [0xff, 0xff]}, 0x5}, {0xa, 0x4e24, 0x7fffffff, @loopback={0x0, 0x1}, 0x5}, 0x2, [0x3, 0x3, 0x3, 0x1, 0x42a, 0x30e, 0x1, 0x4]}, 0x5c) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000141000), 0x0) write(r4, &(0x7f0000f8aff1), 0xff8f) [ 181.081353] device bond0 entered promiscuous mode 2018/03/31 07:41:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000000)='memory.high\x00', 0x2, 0x0) keyctl$clear(0x7, 0x0) io_setup(0x400, &(0x7f0000000080)=0x0) msgrcv(0x0, &(0x7f0000000340)=ANY=[], 0x0, 0x0, 0x0) io_submit(r3, 0x0, &(0x7f00000004c0)) ioctl$VHOST_GET_VRING_BASE(r0, 0xc008af12, &(0x7f00000000c0)) semget$private(0x0, 0x0, 0x0) sendfile(r2, r2, &(0x7f0000000040), 0x1) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x6000, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r4, 0x84, 0x1c, &(0x7f0000000180), &(0x7f0000000200)=0x4) r5 = open(&(0x7f0000000540)='./file0\x00', 0x40040, 0x100) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r5, 0x84, 0x10, &(0x7f00000003c0)=@sack_info={0x0, 0x1}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r4, 0x84, 0x7c, &(0x7f0000000440)={r6, 0x8, 0x316a}, &(0x7f0000000480)=0x8) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000580)) r7 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0xe667, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000000240)={0x67dad5d, 0x8208, 0x3f, 0x1000000000000004, 0x0}, &(0x7f0000000280)=0x10) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f00000002c0)={r8, 0x3f}, &(0x7f0000000340)=0x8) ioctl$KVM_S390_VCPU_FAULT(r7, 0x4008ae52, &(0x7f0000000380)) 2018/03/31 07:41:55 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0xaf01, &(0x7f0000307000)=&(0x7f0000989fff)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000000)=ANY=[]) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000140)={0x0, r1}) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000000)=r1) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000cef000)={0x1, 0x0, &(0x7f000062a000)=""/167, &(0x7f0000aac000)=""/21, &(0x7f00002fdf52)=""/174}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000180)={0x0, 0x1, &(0x7f0000000280)=""/147, &(0x7f0000000340)=""/223, &(0x7f0000000580)=""/4096}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000040)=0x1) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000f82ffc)=0x4001) dup2(r1, r0) [ 181.133478] FAULT_INJECTION: forcing a failure. [ 181.133478] name failslab, interval 1, probability 0, space 0, times 0 [ 181.144753] CPU: 1 PID: 14217 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #372 [ 181.152107] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 181.161451] Call Trace: [ 181.164038] dump_stack+0x194/0x24d [ 181.167665] ? arch_local_irq_restore+0x53/0x53 [ 181.172342] should_fail+0x8c0/0xa40 [ 181.176048] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 181.181137] ? trace_hardirqs_off+0x10/0x10 [ 181.185443] ? alloc_fair_sched_group+0xd6/0x530 [ 181.190180] ? sched_create_group+0x35/0x70 [ 181.194484] ? cgroup_apply_control_enable+0x44d/0xbc0 [ 181.199742] ? SyS_mkdirat+0x22b/0x2b0 [ 181.203614] ? print_irqtrace_events+0x270/0x270 [ 181.208355] ? find_held_lock+0x35/0x1d0 [ 181.212400] ? __lock_is_held+0xb6/0x140 [ 181.216453] ? check_same_owner+0x320/0x320 [ 181.220756] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 181.225755] ? rcu_note_context_switch+0x710/0x710 [ 181.230669] should_failslab+0xec/0x120 [ 181.234623] kmem_cache_alloc_node_trace+0x5a/0x760 [ 181.239617] ? __refill_cfs_bandwidth_runtime+0x120/0x120 [ 181.245131] ? sched_create_group+0x22/0x70 [ 181.249436] ? find_next_bit+0xcc/0x100 [ 181.253393] alloc_fair_sched_group+0x1f0/0x530 [ 181.258051] sched_create_group+0x35/0x70 [ 181.262180] cpu_cgroup_css_alloc+0xe/0x30 [ 181.266399] cgroup_apply_control_enable+0x44d/0xbc0 [ 181.271490] ? cgroup_propagate_control+0x570/0x570 [ 181.276494] ? css_populate_dir+0x289/0x420 [ 181.280802] cgroup_mkdir+0x56f/0xfc0 [ 181.284581] ? __lock_is_held+0xb6/0x140 [ 181.288627] ? cgroup_destroy_locked+0x750/0x750 [ 181.293364] ? rcu_read_lock_sched_held+0x108/0x120 [ 181.298360] ? kmem_cache_free+0x258/0x2a0 [ 181.302577] ? set_nlink+0xc1/0x160 [ 181.306183] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 181.311089] ? generic_permission+0x105/0x3c0 [ 181.315564] ? cgroup_destroy_locked+0x750/0x750 [ 181.320302] kernfs_iop_mkdir+0x153/0x1e0 [ 181.324430] vfs_mkdir+0x390/0x600 [ 181.327952] SyS_mkdirat+0x22b/0x2b0 [ 181.331649] ? SyS_mknod+0x480/0x480 [ 181.335347] ? do_syscall_64+0xb7/0x940 [ 181.339304] ? SyS_mknod+0x480/0x480 [ 181.342998] do_syscall_64+0x281/0x940 [ 181.346868] ? vmalloc_sync_all+0x30/0x30 [ 181.350994] ? finish_task_switch+0x1c1/0x7e0 [ 181.355472] ? syscall_return_slowpath+0x550/0x550 [ 181.360380] ? syscall_return_slowpath+0x2ac/0x550 [ 181.365288] ? prepare_exit_to_usermode+0x350/0x350 [ 181.370288] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 181.375632] ? trace_hardirqs_off_thunk+0x1a/0x1c 2018/03/31 07:41:55 executing program 2: r0 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)="c6cc8e60a78914d500bfeae773ddb642384ef9648af1058f5fbd2fd309524d989e8ca5c3e6e4d185de0489636bb4012cd2281d57a505b82ae678e253ab1603ef18da1e2b4f2acc3c7651ff1c670f5ed1de51a9a5a850687fc0664d9c81b66fefaf800714c085934bd42e3e21ae71d978f3e76fcbfdc2e66adff8be4d85633beb78581bf230f72954dd487c97d06409d3c6e2f7f22be6284a9b", 0x99, 0xfffffffffffffffb) keyctl$describe(0x6, r0, &(0x7f00000002c0)=""/200, 0xc8) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440)={0x0, 0x0, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20202, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x1010, r3, 0x0) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000000580)=ANY=[@ANYBLOB="030000000000000002004e22ac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e24ac1414aa0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000006ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24000000090000000000000000000000000000000000000000000000000000000000000000000000000067410000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ffffffffffffff000000000000000000000000000000000000000000000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f60600000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e220000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) pwrite64(r3, &(0x7f00000004c0)="361cf8298589166f6c2d5823c3b913944a09f012cc6a80f1d50171bf0badb6b5ffdeeaef7d6bdec3b31ce16780d2546875ed31070c85d5735d1ca260f2fca2cc539989af5eafe394f9ae07fcd88029971829aeaf797a78f97cd7f8531aeeb62f497a6d2d8c61dc23348ec786a20e624fdf4c5b839bea2dc66b04b7756cc92f852e", 0x81, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000400)=0xfff, 0x4) fallocate(r3, 0x3, 0x0, 0x81) ppoll(&(0x7f0000000080)=[{r2}, {r1, 0x208}, {r3, 0x28}], 0x3, &(0x7f00000000c0), &(0x7f0000000140)={0x70000000000}, 0x8) [ 181.380461] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 181.385626] RIP: 0033:0x454e79 [ 181.388796] RSP: 002b:00007fe2ad9eac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 181.396483] RAX: ffffffffffffffda RBX: 00007fe2ad9eb6d4 RCX: 0000000000454e79 [ 181.403729] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 181.410976] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 181.418225] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 181.425473] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 000000000000001e 2018/03/31 07:41:55 executing program 4: futex(&(0x7f0000000040), 0x9, 0x0, &(0x7f00000000c0), &(0x7f00000002c0), 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ipx\x00') setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000100)={{0x1d, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e22, 0x0, 'wlc\x00', 0x0, 0x1, 0x6d}, {@rand_addr=0x2, 0x4e24, 0x100000010000, 0x101, 0x4, 0xe16}}, 0xfffffffffffffef0) 2018/03/31 07:41:55 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) acct(&(0x7f0000001240)='./file0\x00') setrlimit(0xa, &(0x7f0000000380)={0x4, 0x1}) getsockname(0xffffffffffffff9c, &(0x7f0000001480)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f00000012c0)=0x80) socketpair(0x10, 0x0, 0x8, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000001580)={r3}) r4 = open(&(0x7f00000010c0)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000001300)={0x8, 0x0, 0x6, 0x58a, 0x0}, &(0x7f0000001340)=0x10) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x3052, r3, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f00000001c0)={'bond0\x00', {0x2, 0x4e20, @multicast2=0xe0000002}}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYBLOB="408615824f3f781ae75fcc9554f019621eaccb21d7ca5fb77c06ff41c0d07d78b6de0ed01fa10b1070cb77afb61679a7f893b0c78371e1195ef393dc87b1b329811e67705b9e1bb5dc00c5b14645b010d310e491c159a81b77145882a63f6206ecfb54b4f6b2ddf7963c2b2681ff1aa2dfd55f1e73b02e150e1f8e51e6ae3615336ed2b2b461fccd4ec00311dd4b00cf4316fb4bda9fa1a0a94d01d4db3209cd302a449b841dc10fcc2d63482b979cb70c21ef7000e655a7a1a18b57b6cd06267ef9f582b4783e42e60f460962921710e11ac51a3f9fa92e9118c5f0e1d8b2c342"], &(0x7f0000000040)=0x2) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000100)={r7, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000001380)={r5, @in6={{0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0xf}}}, 0x0, 0x7, 0x0, 0x8, 0x92}, &(0x7f0000001440)=0x98) eventfd(0xffffffff80000001) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000001140)={0x4, 0x8001, 0x40, 0xfffffffffffffffd, 0x0}, &(0x7f0000001180)=0x10) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f0000001500)) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000011c0)={0x95e, 0x101, 0x8009, 0x1ff, 0x31386ac8, 0x8, 0x1, 0x7, r8}, 0x20) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x1, 0x1) recvfrom(r1, &(0x7f00000015c0)=""/83, 0x53, 0x120, 0x0, 0x0) symlinkat(&(0x7f0000001080)='./file0\x00', r4, &(0x7f0000001100)='./file0\x00') close(r0) unlink(&(0x7f00000003c0)='./file0\x00') bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={r4, r4, 0x4, 0x3}, 0x10) getsockname$netlink(r1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) 2018/03/31 07:41:55 executing program 3: r0 = socket$inet(0x10, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000000)={0xf1, {{0x2, 0x4e22, @rand_addr}}}, 0x88) close(r0) sendmsg(r0, &(0x7f0000a1bfc8)={0x0, 0x0, &(0x7f0000cbbff0)=[{&(0x7f0000c0c106)="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", 0xec1}], 0x1, &(0x7f0000d82000)}, 0x0) [ 181.477233] dccp_xmit_packet: Payload too large (65423) for featneg. 2018/03/31 07:41:55 executing program 2: r0 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000a40)="c6cc8e60a78914d500bfeae773ddb642384ef9648af1058f5fbd2fd309524d989e8ca5c3e6e4d185de0800636bb4012cd2281d57a505b82ae678e253ab1603ef18da1e2b4f2acc3c7651ff1c670f0400000000000000687fc0664d9c81c36fefaf800714c085934bd4040021ae71d978f3e76fcbfdc2e66adff8be4d85633beb78581bf230f72954dd487c97d06409d3c6e2f7f22be6284a9b40493e754c117488c90d1d651440da29398e8b", 0xac, 0xfffffffffffffffb) keyctl$describe(0x6, r0, &(0x7f00000002c0)=""/200, 0xc8) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440)={0x0, 0x0, r1}) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20202, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x1010, r4, 0x0) setsockopt$inet_MCAST_MSFILTER(r4, 0x0, 0x30, &(0x7f0000000580)=ANY=[@ANYBLOB="030000000000000002004e22ac1414aa0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e24ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000006ac1414bb000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000036625a32505597a3f627d31a4b8f0000000000230001000002004e24000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ffffffffffffff000000000000000000000000000000000000000000000002004e2100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000000e000500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f89543415bdbde3fffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414aa0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e220000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) pwrite64(r4, &(0x7f00000004c0)="361cf8298589166f6c2d5823c3b913944a09f012cc6a80f1d50171bf0badb6b5ffdeeaef7d6bdec3b31ce16780d2546875ed31070c85d5735d1ca260f2fca2cc539989af5eafe394f9ae07fcd88029971829aeaf797a78f97cd7f8531aeeb62f497a6d2d8c61dc23348ec786a20e624fdf4c5b839bea2dc66b04b7756cc92f852e", 0x81, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f0000000400)=0xfff, 0x4) fallocate(r4, 0x3, 0x0, 0x81) ppoll(&(0x7f0000000080)=[{r3}, {r2, 0x208}, {r4, 0x28}], 0x3, &(0x7f0000000280), &(0x7f0000000140)={0x70000000000}, 0xfffffffffffffe20) ioctl$VHOST_SET_VRING_ERR(r4, 0x4008af22, &(0x7f0000000040)={0x3, r4}) [ 181.624707] dccp_close: ABORT with 65423 bytes unread 2018/03/31 07:41:56 executing program 7 (fault-call:10 fault-nth:31): r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4900, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000240)=0x4) getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) r1 = dup(0xffffffffffffff9c) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r2 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r2, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r2, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r2, &(0x7f0000000100)=""/65, 0x41) r3 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) fchdir(r2) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(r3, &(0x7f0000000200)='./file1\x00', r2, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r2, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000580)=""/80, 0x50}, {&(0x7f00000008c0)=""/4096, 0x1000}], 0x2, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x20) r5 = syz_open_dev$sndpcmp(&(0x7f00000018c0)='/dev/snd/pcmC#D#p\x00', 0x3, 0x10a00) ioctl$KVM_GET_DEVICE_ATTR(r5, 0x4018aee2, &(0x7f0000001940)={0x0, 0x100, 0x9, &(0x7f0000001900)}) recvfrom$ipx(r4, &(0x7f00000006c0)=""/52, 0x34, 0x100, &(0x7f0000000700)={0x4, 0x9a2, 0x4, "dc108d9d4391", 0x5}, 0x10) renameat(r2, &(0x7f0000001980)='./file1\x00', r5, &(0x7f00000019c0)='./file0/file0\x00') r6 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r6, 0x4, 0x0) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000040), 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r6, &(0x7f0000000200), 0xfffffe08) 2018/03/31 07:41:56 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0xaf01, &(0x7f0000307000)=&(0x7f0000989fff)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000000)=ANY=[]) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000140)={0x0, r1}) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000000)=r1) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000cef000)={0x1, 0x0, &(0x7f000062a000)=""/167, &(0x7f0000aac000)=""/21, &(0x7f00002fdf52)=""/174}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000180)={0x0, 0x1, &(0x7f0000000280)=""/147, &(0x7f0000000340)=""/223, &(0x7f0000000580)=""/4096}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000040)=0x1) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000f82ffc)=0x4001) dup2(r1, r0) 2018/03/31 07:41:56 executing program 3: r0 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x1f, 0x40) recvfrom$ax25(r0, &(0x7f0000000080)=""/54, 0x36, 0x40000001, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000100)=ANY=[@ANYRES32=0x0, @ANYBLOB="5200000009a2f3aa549fbde70f7ea99218c933719d49fe852ebb10bdb07ddd3004a7b64c7a00c668ac4a31a80a811abf0100000000000002000000002b2aecf2821b9e19e85fd77300e9050000000000000000000000"], &(0x7f0000000000)=0x5a) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000180)={0x7, 0x8002, 0x3, 0x8, r1}, 0x10) r2 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x6, 0x0, 0x3, 0x1, 0x8, "f818f0c1bb550ad90018fecd5ef34ee7087afc3d3c160dccb79e39c7f212bbc6bb25d1e434e7b552b4c994ab947bed3339feb0972f382d87c3e1cf0ffe28b20d", "41f7d7065175a58b2fb43d7041c5980e479c1148f37624883e28e043679554f38fcea353e21bce5d6306ef6f08efd018e259d1661ece9bc627e6e16a8d1fd20f", "d0f1eb0b4bbc9df904a7c7e724e0bdce2b777cb6ac329f68b1b45be7cd4cf322", [0x19, 0x8001]}) fsetxattr(r2, &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000505000)="0000000201000000000000010400000000000000", 0x14, 0x0) 2018/03/31 07:41:56 executing program 1: r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) capset(&(0x7f0000581ff8)={0x19980330}, &(0x7f00000000c0)) mlockall(0x1) capset(&(0x7f0000000100)={0x2000020080522}, &(0x7f0000000040)={0x0, 0x2, 0x2, 0x3, 0x0, 0x6}) 2018/03/31 07:41:56 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x11}}}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d5affc), 0xfffffffffffffd34) write(r0, &(0x7f00000002c0)="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", 0x5f5) write(r0, &(0x7f000069efac)="e26d4afed4d3467b7ee66e9ebb4039955b1d97a427cc701c5e5e6447b6510bff58c631328eeae8186bf1c22f39347ebb869277e809a7002f38611d02a6e3d4e4f6b8923c59ff9438d8c3d353b76131b90e044f80", 0x54) r1 = dup(r0) bind$can_raw(r1, &(0x7f00000008c0)={0x1d}, 0x10) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f0000000000)={0x0, 0x2000}) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) recvfrom(r0, &(0x7f0000000180)=""/226, 0xfffffffffffffff6, 0x0, 0x0, 0xfffffffffffffcd1) write$eventfd(r1, &(0x7f0000000bc0), 0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0x400}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000140)={r2, 0x1000}, &(0x7f0000000280)=0x8) 2018/03/31 07:41:56 executing program 4: r0 = creat(&(0x7f0000ffd000)='./file0\x00', 0x0) socket$inet_sctp(0x2, 0x5, 0x84) socket$inet6_udp(0xa, 0x2, 0x0) unshare(0x400) ioctl$sock_ipx_SIOCIPXNCPCONN(r0, 0x89e3, &(0x7f0000000000)=0xb1) openat(r0, &(0x7f0000000040)='./file0\x00', 0x48402, 0x10) mq_notify(0xffffffffffffffff, &(0x7f000044bfa0)={0x20000000, 0x15, 0x2}) 2018/03/31 07:41:56 executing program 2: r0 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)="c6cc8e60a78914d500bfeae773ddb642384ef9648af1058f5fbd2fd309524d989e8ca5c3e6e4d185de0489636bb4012cd2281d57a505b82ae678e253ab1603ef18da1e2b4f2acc3c7651ff1c670f5ed1de51a9a5a850687fc0664d9c81b66fefaf800714c085934bd42e3e21ae71d978f3e76fcbfdc2e66adff8be4d85633beb78581bf230f72954dd487c97d06409d3c6e2f7f22be6284a9b", 0x99, 0xfffffffffffffffb) keyctl$describe(0x6, r0, &(0x7f00000002c0)=""/200, 0xc8) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440)={0x0, 0x0, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/enforce\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x1010, r3, 0x0) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000000580)=ANY=[@ANYBLOB="030000000000000002004e22ac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e24ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000018000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000006ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ffffffffffffff000000000000000000000000000000000000000000000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414aa00000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e220000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) pwrite64(r3, &(0x7f00000004c0)="361cf8298589166f6c2d5823c3b913944a09f012cc6a80f1d50171bf0badb6b5ffdeeaef7d6bdec3b31ce16780d2546875ed31070c85d5735d1ca260f2fca2cc539989af5eafe394f9ae07fcd88029971829aeaf797a78f97cd7f8531aeeb62f497a6d2d8c61dc23348ec786a20e624fdf4c5b839bea2dc66b04b7756cc92f852e", 0x81, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000400)=0xfff, 0x4) fallocate(r3, 0x3, 0x0, 0x81) ppoll(&(0x7f0000000080)=[{r2}, {r1, 0x208}, {r3, 0x28}], 0x3, &(0x7f00000000c0), &(0x7f0000000140)={0x70000000000}, 0x8) 2018/03/31 07:41:56 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) acct(&(0x7f0000001240)='./file0\x00') setrlimit(0xa, &(0x7f0000000380)={0x4, 0x1}) getsockname(0xffffffffffffff9c, &(0x7f0000001480)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f00000012c0)=0x80) socketpair(0x10, 0x0, 0x8, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000001580)={r3}) r4 = open(&(0x7f00000010c0)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000001300)={0x8, 0x0, 0x6, 0x58a, 0x0}, &(0x7f0000001340)=0x10) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x3052, r3, 0x0) accept$ax25(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x10) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f00000001c0)={'bond0\x00', {0x2, 0x4e20, @multicast2=0xe0000002}}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000040)=0x2) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000100)={r8, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000001380)={r5, @in6={{0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0xf}}}, 0x0, 0x7, 0x0, 0x8, 0x92}, &(0x7f0000001440)=0x98) eventfd(0xffffffff80000001) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000001140)={0x4, 0x8001, 0x40, 0xfffffffffffffffd, 0x0}, &(0x7f0000001180)=0x10) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f0000001500)) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000011c0)={0x95e, 0x101, 0x8009, 0x1ff, 0x31386ac8, 0x8, 0x1, 0x7, r9}, 0x20) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x1, 0x1) ioctl$EVIOCSABS3F(r4, 0x401845ff, &(0x7f0000000280)={0x0, 0x4, 0x8, 0x8a, 0x80000000, 0x10000}) recvfrom(r1, &(0x7f00000015c0)=""/83, 0x53, 0x120, 0x0, 0x0) ioctl$sock_bt(r3, 0xdd1f, &(0x7f0000000500)="d73343b2f28ac92ac7ef138038048b5e7248bbe1da4c70fec55916d7b03c256f9efa936799145851f6e83288dfa16bafb17a86e6c80038d38c287bee8531fbe83d3722ff02aa0522633f0445c7b02a8127e4b9997ea546130d7a27c6dbfeeee1784b5b9b06926e0bce4abfcf1c3f26d2a330db889279a4a76873d0e1d0703e7ff6a5080feaf6a07e31f0adbd358475bff111d28b3ca1a575ffd154dbfdb89fdc37fd92c027edb272bddfd45ee9c62f67542b468283975cd89c1e8ef04fdf4cab444b48984cb2b7eba0a64ebeee4fe2f3571e51c84b64bfc3bd71e6c1") symlinkat(&(0x7f0000001080)='./file0\x00', r4, &(0x7f0000001100)='./file0\x00') close(r7) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={r4, r4, 0x4, 0x3}, 0x10) getsockname$netlink(r1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) 2018/03/31 07:41:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000d36000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-serpent-avx2\x00'}, 0x58) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/rfkill\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f0000001500)=@sack_info={0x0, 0x200, 0x7f}, &(0x7f0000001540)=0xc) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000001580)={r3, 0x100000000}, 0x8) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7be", 0x10) r4 = accept$alg(r0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000001400)=@assoc_value={r3, 0x3ff}, 0x8) r5 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x86, 0x101100) ioctl$VHOST_SET_VRING_NUM(r5, 0x4008af10, &(0x7f0000000080)={0x3, 0x9}) sendmsg$alg(r4, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000003080)="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", 0x180}], 0x1}, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x1a, &(0x7f0000001340)=0x6, 0x4) r6 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x4, 0x40000) io_setup(0x400, &(0x7f0000001180)=0x0) io_cancel(r7, &(0x7f0000001240)={0x0, 0x0, 0x0, 0x2, 0x3000, r1, &(0x7f00000011c0)="bc6af1d27e22da4cae0fd601a91a9a03c9da2c45c6a146edff140a7490799a16785517822258b024e68ab7f7128c4f7997d99f95178505d4d1026cc5305b07256ec1eea4c73dde62df2da40b9beba757765835cb3fc5e121716cd463711f5c6f2866861fd1b297b0dc", 0x69, 0x0, 0x0, 0x1, r6}, &(0x7f00000012c0)) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f0000001380)=0x1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r6, 0xc0bc5351, &(0x7f00000010c0)={0x100000000, 0x1, 'client0\x00', 0xffffffff80000002, "c45da2c7f9cf9f63", "1b124af2a1b99fa55ab6f3f706f17bfcc12066dcc931a8f42d56393952100637", 0x8000, 0x101}) recvmsg(r4, &(0x7f0000001700)={&(0x7f0000001440)=@in={0x0, 0x0, @remote}, 0x80, &(0x7f00000015c0)=[{&(0x7f00000000c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001600)=""/193, 0xc1}, 0x0) 2018/03/31 07:41:56 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0xaf01, &(0x7f0000307000)=&(0x7f0000989fff)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000000)=ANY=[]) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000140)={0x0, r1}) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000000)=r1) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000cef000)={0x1, 0x0, &(0x7f000062a000)=""/167, &(0x7f0000aac000)=""/21, &(0x7f00002fdf52)=""/174}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000180)={0x0, 0x1, &(0x7f0000000280)=""/147, &(0x7f0000000340)=""/223, &(0x7f0000000580)=""/4096}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000040)=0x1) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000f82ffc)=0x4001) eventfd(0x0) 2018/03/31 07:41:56 executing program 2: r0 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)="c6cc8e60a78914d500bfeae773ddb642384ef9648af1058f5fbd2fd309524d989e8ca5c3e6e4d185de0489636bb4012cd2281d57a505b82ae678e253ab1603ef18da1e2b4f2acc3c7651ff1c670f5ed1de51a9a5a850687fc0664d9c81b66fefaf800714c085934bd42e3e21ae71d978f3e76fcbfdc2e66adff8be4d85633beb78581bf230f72954dd487c97d06409d3c6e2f7f22be6284a9b", 0x99, 0xfffffffffffffffb) keyctl$describe(0x6, r0, &(0x7f00000002c0)=""/200, 0xc8) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffff9c, 0xc008640a, &(0x7f00000003c0)) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffff9c, 0xc008640a, &(0x7f0000000480)) r1 = syz_open_dev$mice(&(0x7f0000000a40)='/dev/input/mice\x00', 0x0, 0x200080) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000a80)={0x0, 0x80000}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000ac0)={0x0, 0x80000}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000440)={r2, 0x0, 0xffffffffffffffff}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) r5 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20202, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x1010, r5, 0x0) setsockopt$inet_MCAST_MSFILTER(r5, 0x0, 0x30, &(0x7f0000000580)=ANY=[@ANYBLOB="030000000000000002004e22ac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e24ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000006ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ffffffffffffff000000000000000000000000000000000000000000000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e220000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) pwrite64(r5, &(0x7f00000004c0)="361cf8298589166f6c2d5823c3b913944a09f012cc6a80f1d50171bf0badb6b5ffdeeaef7d6bdec3b31ce16780d2546875ed31070c85d5735d1ca260f2fca2cc539989af5eafe394f9ae07fcd88029971829aeaf797a78f97cd7f8531aeeb62f497a6d2d8c61dc23348ec786a20e624fdf4c5b839bea2dc66b04b7756cc92f852e", 0x81, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r5, 0x84, 0x21, &(0x7f0000000400)=0xfff, 0x4) ioctl$sock_inet_SIOCGIFNETMASK(r5, 0x891b, &(0x7f0000000040)={'rose0\x00', {0x2, 0x4e20}}) fallocate(r5, 0x3, 0x0, 0x81) ppoll(&(0x7f0000000080)=[{r4}, {r3, 0x208}, {r5, 0x28}], 0x3, &(0x7f00000000c0), &(0x7f0000000140)={0x70000000000}, 0x8) 2018/03/31 07:41:56 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ppp\x00', 0xa00, 0x0) inotify_add_watch(r1, &(0x7f0000000340)='./file0\x00', 0x408) r2 = syz_open_dev$amidi(&(0x7f0000000480)='/dev/amidi#\x00', 0x7d, 0x501300) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000240)={0x3, 0x3ff, 0x8001, 0x3, 0x1, 0x98, 0x7, 0x0, 0x7fff, 0xff}) r3 = dup(r2) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000380)={'sit0\x00', 0x0}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_names\x00') setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000b80)={r4, @empty, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000080)={'bcsf0\x00', r4}) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r5, 0xc0a85322, &(0x7f00000003c0)) r6 = accept$alg(r0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r7 = getpgrp(0x0) fcntl$setown(r0, 0x8, r7) sendmmsg$alg(r6, &(0x7f0000000100)=[{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000037c0)="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", 0xfd0}], 0x1, &(0x7f0000000300)}], 0x1, 0x0) recvmsg(r6, &(0x7f0000000140)={&(0x7f0000000280)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f0000001480)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/6, 0x6}, 0x0) modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/42, 0x2a) [ 182.302319] FAULT_INJECTION: forcing a failure. [ 182.302319] name failslab, interval 1, probability 0, space 0, times 0 [ 182.313622] CPU: 0 PID: 14283 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #372 [ 182.320978] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 182.330320] Call Trace: [ 182.332907] dump_stack+0x194/0x24d [ 182.336533] ? arch_local_irq_restore+0x53/0x53 [ 182.341190] ? __save_stack_trace+0x7e/0xd0 [ 182.345492] should_fail+0x8c0/0xa40 [ 182.349184] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 182.354262] ? kasan_kmalloc+0xad/0xe0 [ 182.358126] ? kmem_cache_alloc_node_trace+0x150/0x760 [ 182.363376] ? alloc_fair_sched_group+0x267/0x530 [ 182.368193] ? sched_create_group+0x35/0x70 [ 182.372489] ? cpu_cgroup_css_alloc+0xe/0x30 [ 182.376875] ? vfs_mkdir+0x390/0x600 [ 182.380562] ? SyS_mkdirat+0x22b/0x2b0 [ 182.384423] ? do_syscall_64+0x281/0x940 [ 182.388458] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 182.393799] ? find_held_lock+0x35/0x1d0 [ 182.397836] ? __lock_is_held+0xb6/0x140 [ 182.401877] ? check_same_owner+0x320/0x320 [ 182.406175] ? rcu_note_context_switch+0x710/0x710 [ 182.411085] should_failslab+0xec/0x120 [ 182.415038] kmem_cache_alloc_node_trace+0x5a/0x760 [ 182.420032] ? unregister_fair_sched_group+0x5e0/0x5e0 [ 182.425284] ? find_next_bit+0xcc/0x100 [ 182.429237] alloc_fair_sched_group+0x1f0/0x530 [ 182.433884] sched_create_group+0x35/0x70 [ 182.438010] cpu_cgroup_css_alloc+0xe/0x30 [ 182.442223] cgroup_apply_control_enable+0x44d/0xbc0 [ 182.447308] ? cgroup_propagate_control+0x570/0x570 [ 182.452304] ? css_populate_dir+0x289/0x420 [ 182.456601] cgroup_mkdir+0x56f/0xfc0 [ 182.460378] ? __lock_is_held+0xb6/0x140 [ 182.464417] ? cgroup_destroy_locked+0x750/0x750 [ 182.469149] ? rcu_read_lock_sched_held+0x108/0x120 [ 182.474142] ? kmem_cache_free+0x258/0x2a0 [ 182.478353] ? set_nlink+0xc1/0x160 [ 182.481955] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 182.486856] ? generic_permission+0x105/0x3c0 [ 182.491327] ? cgroup_destroy_locked+0x750/0x750 [ 182.496062] kernfs_iop_mkdir+0x153/0x1e0 [ 182.500185] vfs_mkdir+0x390/0x600 [ 182.503700] SyS_mkdirat+0x22b/0x2b0 [ 182.507388] ? SyS_mknod+0x480/0x480 [ 182.511077] ? trace_hardirqs_on+0xd/0x10 [ 182.515204] ? do_syscall_64+0xb7/0x940 [ 182.519152] ? SyS_mknod+0x480/0x480 [ 182.522839] do_syscall_64+0x281/0x940 [ 182.526703] ? vmalloc_sync_all+0x30/0x30 [ 182.530826] ? _raw_spin_unlock_irq+0x27/0x70 [ 182.535295] ? finish_task_switch+0x1c1/0x7e0 [ 182.539765] ? syscall_return_slowpath+0x550/0x550 [ 182.544670] ? syscall_return_slowpath+0x2ac/0x550 [ 182.549574] ? prepare_exit_to_usermode+0x350/0x350 [ 182.554566] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 182.559912] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 182.564736] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 182.569901] RIP: 0033:0x454e79 [ 182.573066] RSP: 002b:00007fe2ad9eac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 182.580746] RAX: ffffffffffffffda RBX: 00007fe2ad9eb6d4 RCX: 0000000000454e79 [ 182.587991] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 182.595239] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 2018/03/31 07:41:56 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x2000}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_RES_CTX(r0, 0x401c5820, &(0x7f0000000080)={0x2b8, &(0x7f0000000040)}) 2018/03/31 07:41:56 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) acct(&(0x7f0000001240)='./file0\x00') setrlimit(0xa, &(0x7f0000000380)={0x4, 0x1}) getsockname(0xffffffffffffff9c, &(0x7f0000001480)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f00000012c0)=0x80) socketpair(0x10, 0x0, 0x8, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000001580)={r3}) r4 = open(&(0x7f00000010c0)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000001300)={0x8, 0x0, 0x6, 0x58a, 0x0}, &(0x7f0000001340)=0x10) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x3052, r3, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f00000001c0)={'bond0\x00', {0x2, 0x4e20, @multicast2=0xe0000002}}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000400)=ANY=[@ANYRES32=0x0, @ANYBLOB="408615824f3f781ae75fcc9554f019621eaccb21d7ca5fb77c06ff41c0d07d78b6a7f893b0c78371e1195ef393dc87b1b329811e67705b9e1bb5dc00c5b14645b010d310e46206ecfb54b4f6b2ddf7963c2b2681ff1aa2dfd55f1e73b02e150e1f8e51e6ae3615336ed2b2b461fccd4ec00311dd4b00cf4316fb4bda9fa1a0a94d01d4db3209cd302a449b841dc10fcc2d63482b979cb70c21ef7000e655a7a1a18b57b6cd06267ef9f582b4783e42e60f460962921710e11ac51a3f9fa92e9118c5f0e1d8b2c34200000000000000000000000000000000000000000000dce7578acb7cebf36a145fb245bfae71aa15afbd7fe9a450930bfd287d67008120b38407e6721920512ef1a422b203f44cc21ba440ea3aae6b8654545ee548a46c802d92a761283f77478deca5d5c8613376b417041565d3649953aa205698159e45e33cddc9a667c3b1da5be3097ccfb4e37bf0694a80e0c0000000"], &(0x7f0000000040)=0x2) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000100)={r7, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000001380)={r5, @in6={{0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0xf}}}, 0x0, 0x7, 0x0, 0x8, 0x92}, &(0x7f0000001440)=0x98) eventfd(0xffffffff80000001) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000001140)={0x4, 0x8001, 0x40, 0xfffffffffffffffd, 0x0}, &(0x7f0000001180)=0x10) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f0000001500)) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000011c0)={0x95e, 0x101, 0x8009, 0x1ff, 0x31386ac8, 0x8, 0x1, 0x7, r8}, 0x20) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x1, 0x1) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1, 0x40010, r3, 0x0) recvfrom(r1, &(0x7f00000015c0)=""/83, 0x53, 0x120, 0x0, 0x0) symlinkat(&(0x7f0000001080)='./file0\x00', r4, &(0x7f0000001100)='./file0\x00') close(r0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={r4, r4, 0x4, 0x3}, 0x10) getsockname$netlink(r1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) [ 182.602484] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 182.609729] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 000000000000001f 2018/03/31 07:41:57 executing program 7 (fault-call:10 fault-nth:32): r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4900, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000240)=0x4) getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) r1 = dup(0xffffffffffffff9c) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r2 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r2, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r2, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r2, &(0x7f0000000100)=""/65, 0x41) r3 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) fchdir(r2) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(r3, &(0x7f0000000200)='./file1\x00', r2, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r2, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000580)=""/80, 0x50}, {&(0x7f00000008c0)=""/4096, 0x1000}], 0x2, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x20) r5 = syz_open_dev$sndpcmp(&(0x7f00000018c0)='/dev/snd/pcmC#D#p\x00', 0x3, 0x10a00) ioctl$KVM_GET_DEVICE_ATTR(r5, 0x4018aee2, &(0x7f0000001940)={0x0, 0x100, 0x9, &(0x7f0000001900)}) recvfrom$ipx(r4, &(0x7f00000006c0)=""/52, 0x34, 0x100, &(0x7f0000000700)={0x4, 0x9a2, 0x4, "dc108d9d4391", 0x5}, 0x10) renameat(r2, &(0x7f0000001980)='./file1\x00', r5, &(0x7f00000019c0)='./file0/file0\x00') r6 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r6, 0x4, 0x0) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000040), 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r6, &(0x7f0000000200), 0xfffffe08) 2018/03/31 07:41:57 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe2(&(0x7f0000000700)={0x0, 0x0}, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup3(r4, r3, 0x0) ioctl$KVM_SET_DEBUGREGS(r3, 0x4080aea2, &(0x7f00000001c0)={[], 0x0, 0x80}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000140)=[@text16={0x10, &(0x7f00000000c0)="673e0f009d8dfbcab566660f54583df30f704c000066b8010000000f01c164650feb3f66b9800000c00f326635001000000f30ba610066b80090000066ef660f14ea66b80500000066b94300c0fe0f01c10f20d86635200000000f22d8", 0x5d}], 0x1, 0x0, &(0x7f0000000180), 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x4000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000000)) 2018/03/31 07:41:57 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000240)='/dev/snd/pcmC#D#p\x00', 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000002c0)) ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0x4010640d, &(0x7f00000003c0)={0x0, 0x5f27}) syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) modify_ldt$read(0x0, &(0x7f00000000c0)=""/152, 0x98) r1 = msgget$private(0x0, 0x0) msgrcv(r1, &(0x7f0000000300)={0x0, ""/87}, 0x5f, 0x0, 0x1000) inotify_rm_watch(r0, 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000923000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f0000000200)={'gre0\x00', 0x9}) ppoll(&(0x7f0000000000)=[{r2}], 0x1, &(0x7f0000000040)={0x77359400}, &(0x7f0000000080), 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x5) creat(&(0x7f0000000180)='./file0\x00', 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f00000000c0)={{0x80}, "706f72ff070000000000000000000000000b000000000000000000001f0000ffffff03000000ef000003ff02000000000012000000000000000000000600", 0xc3, 0x80003}) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x1, 0x0) close(r2) setsockopt$inet6_buf(r3, 0x29, 0x32, &(0x7f00000004c0)="d630110c9230f1b6ef142a6a524a775a76055f0ae00ccd9231d31a774a8fd746667919a9718382c2eb58efb493dd5666f784347c440e8e7d20e55b57a16b3aee237feeadf5a43e4a42ae9474fa36754c53da435c5038336a4cd1dc921364cc4535633bae39683617db42f9f87624492c83d25a90db0dc19331dc14ce025e143f2a30bdd916d1c03cae278a51daed75585c9b399b25402303d6213ab7809ab2d37aef3642ff8fb4cebe6eac97ac72c2691d76742409dcb49ac81d5b725563d33e55f0fb48edc3076de6", 0xc9) bind$nfc_llcp(r0, &(0x7f0000000400)={0x27, 0x1, 0x1, 0x0, 0x6, 0x9, "94841dca8397edd50185cd427aa6a8d33345d33bb87067297f24db06f5d8a9bc8ce7eac2db4e0fd3ac79723c9ca25af01690ed620394dbe0a6bd7235e2c818", 0x1d}, 0x60) close(r3) 2018/03/31 07:41:57 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0xaf01, &(0x7f0000307000)=&(0x7f0000989fff)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000000)=ANY=[]) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000140)={0x0, r1}) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000000)=r1) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000cef000)={0x1, 0x0, &(0x7f000062a000)=""/167, &(0x7f0000aac000)=""/21, &(0x7f00002fdf52)=""/174}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000180)={0x0, 0x1, &(0x7f0000000280)=""/147, &(0x7f0000000340)=""/223, &(0x7f0000000580)=""/4096}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000040)=0x1) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000f82ffc)=0x4001) eventfd(0x0) 2018/03/31 07:41:57 executing program 3: r0 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xfffffffffffffffc, 0x100000000032, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xab7, 0x20300) ioctl$sock_netrom_SIOCGSTAMPNS(r1, 0x8907, &(0x7f0000000080)) openat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x20000, 0x1) accept4$netrom(r1, &(0x7f0000000500)=@full, &(0x7f0000000580)=0x48, 0x800) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000000)) 2018/03/31 07:41:57 executing program 2: r0 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)="c6cc8e60a78914d500bfeae773ddb642384ef9648af1058f5fbd2fd309524d989e8ca5c3e6e4d185de0489636bb4012cd2281d57a505b82ae678e253ab1603ef18da1e2b4f2acc3c7651ff1c670f5ed1de51a9a5a850687fc0664d9c81b66fefaf800714c085934bd42e3e21ae71d978f3e76fcbfdc2e66adff8be4d85633beb78581bf230f72954dd487c97d06409d3c6e2f7f22be6284a9b", 0x99, 0xfffffffffffffffb) keyctl$describe(0x6, r0, &(0x7f00000002c0)=""/200, 0xc8) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440)={0x0, 0x0, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20202, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x1010, r3, 0x0) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000000a40)=ANY=[@ANYBLOB="030000000000000002004e22ac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e24ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000006ac1414bb0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ffffffffffffff000000000000000000000000000000000000000000000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000536e29264fca627a243c30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e220000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) pwrite64(r3, &(0x7f00000004c0)="361cf8298589166f6c2d5823c3b913944a09f012cc6a80f1d50171bf0badb6b5ffdeeaef7d6bdec3b31ce16780d2546875ed31070c85d5735d1ca260f2fca2cc539989af5eafe394f9ae07fcd88029971829aeaf797a78f97cd7f8531aeeb62f497a6d2d8c61dc23348ec786a20e624fdf4c5b839bea2dc66b04b7756cc92f852e", 0x81, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000400)=0xfff, 0x4) fallocate(r3, 0x3, 0x0, 0x81) ppoll(&(0x7f0000000080)=[{r2}, {r1, 0x208}, {r3, 0x28}], 0x3, &(0x7f00000000c0), &(0x7f0000000140)={0x70000000000}, 0x8) 2018/03/31 07:41:57 executing program 5: perf_event_open(&(0x7f000055cf88)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f000000dff8)=@file={0x1}, 0x2) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x86000, 0x0) add_key(&(0x7f0000bbaff8)='trusted\x00', &(0x7f0000c33ffb)={0x73, 0x79, 0x7a}, &(0x7f00000d6000), 0x0, 0xffffffffffffffff) ioctl$KVM_GET_TSC_KHZ(r1, 0xaea3) listen(r0, 0x0) add_key(&(0x7f0000efeffa)='logon\x00', &(0x7f0000a13000)={0x73, 0x79, 0x7a}, &(0x7f0000bd9faa), 0x0, 0xfffffffffffffffe) listen(r0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f00000000c0)=""/97, 0x61}, 0x0) 2018/03/31 07:41:57 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) acct(&(0x7f0000001240)='./file0\x00') setrlimit(0xa, &(0x7f0000000380)={0x4, 0x1}) getsockname(0xffffffffffffff9c, &(0x7f0000001480)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f00000012c0)=0x80) socketpair(0x10, 0x0, 0x8, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000001580)={r3}) r4 = open(&(0x7f00000010c0)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000001300)={0x8, 0x0, 0x6, 0x58a, 0x0}, &(0x7f0000001340)=0x10) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x3052, r3, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f00000001c0)={'bond0\x00', {0x2, 0x4e20, @multicast2=0xe0000002}}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000440)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000040)=0x2) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000100)={r8, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000001380)={r5, @in6={{0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0xf}}}, 0x0, 0x7, 0x0, 0x8, 0x92}, &(0x7f0000001440)=0x98) eventfd(0xffffffff80000001) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000001140)={0x4, 0x8001, 0x40, 0xfffffffffffffffd, 0x0}, &(0x7f0000001180)=0x10) ioctl$KVM_IRQ_LINE_STATUS(r7, 0xc008ae67, &(0x7f0000000280)={0x101, 0xea8}) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f0000001500)) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000011c0)={0x95e, 0x101, 0x8009, 0x1ff, 0x31386ac8, 0x8, 0x1, 0x7, r9}, 0x20) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x1, 0x1) recvfrom(r1, &(0x7f00000015c0)=""/83, 0x53, 0x120, 0x0, 0x0) symlinkat(&(0x7f0000001080)='./file0\x00', r4, &(0x7f0000001100)='./file0\x00') close(r0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={r4, r4, 0x4, 0x3}, 0x10) getsockname$netlink(r1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) 2018/03/31 07:41:57 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000080)) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040)=0x2, 0x4) 2018/03/31 07:41:57 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0xaf01, &(0x7f0000307000)=&(0x7f0000989fff)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000000)=ANY=[]) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000140)={0x0, r1}) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000000)=r1) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000cef000)={0x1, 0x0, &(0x7f000062a000)=""/167, &(0x7f0000aac000)=""/21, &(0x7f00002fdf52)=""/174}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000180)={0x0, 0x1, &(0x7f0000000280)=""/147, &(0x7f0000000340)=""/223, &(0x7f0000000580)=""/4096}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000040)=0x1) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000f82ffc)=0x4001) eventfd(0x0) [ 183.178267] FAULT_INJECTION: forcing a failure. [ 183.178267] name failslab, interval 1, probability 0, space 0, times 0 [ 183.189532] CPU: 1 PID: 14340 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #372 [ 183.196885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 183.206219] Call Trace: [ 183.208795] dump_stack+0x194/0x24d [ 183.212409] ? arch_local_irq_restore+0x53/0x53 [ 183.217058] ? __save_stack_trace+0x7e/0xd0 [ 183.221366] should_fail+0x8c0/0xa40 [ 183.225066] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 183.230149] ? kasan_kmalloc+0xad/0xe0 [ 183.234016] ? kmem_cache_alloc_node_trace+0x150/0x760 [ 183.239275] ? alloc_fair_sched_group+0x1f0/0x530 [ 183.244119] ? sched_create_group+0x35/0x70 [ 183.248420] ? cpu_cgroup_css_alloc+0xe/0x30 [ 183.252810] ? vfs_mkdir+0x390/0x600 [ 183.256500] ? SyS_mkdirat+0x22b/0x2b0 [ 183.260368] ? do_syscall_64+0x281/0x940 [ 183.264409] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 183.269756] ? find_held_lock+0x35/0x1d0 [ 183.273801] ? __lock_is_held+0xb6/0x140 [ 183.277853] ? check_same_owner+0x320/0x320 [ 183.282159] ? rcu_note_context_switch+0x710/0x710 [ 183.287073] should_failslab+0xec/0x120 [ 183.291031] kmem_cache_alloc_node_trace+0x5a/0x760 [ 183.296035] ? __refill_cfs_bandwidth_runtime+0x120/0x120 [ 183.301554] ? sched_create_group+0x22/0x70 [ 183.305853] ? find_next_bit+0xcc/0x100 [ 183.309811] alloc_fair_sched_group+0x267/0x530 [ 183.314466] sched_create_group+0x35/0x70 [ 183.318595] cpu_cgroup_css_alloc+0xe/0x30 [ 183.322808] cgroup_apply_control_enable+0x44d/0xbc0 [ 183.327899] ? cgroup_propagate_control+0x570/0x570 [ 183.332900] ? css_populate_dir+0x289/0x420 [ 183.337202] cgroup_mkdir+0x56f/0xfc0 [ 183.340979] ? __lock_is_held+0xb6/0x140 [ 183.345031] ? cgroup_destroy_locked+0x750/0x750 [ 183.349765] ? rcu_read_lock_sched_held+0x108/0x120 [ 183.354760] ? kmem_cache_free+0x258/0x2a0 [ 183.358975] ? set_nlink+0xc1/0x160 [ 183.362583] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 183.367492] ? generic_permission+0x105/0x3c0 [ 183.371965] ? cgroup_destroy_locked+0x750/0x750 [ 183.376702] kernfs_iop_mkdir+0x153/0x1e0 [ 183.380831] vfs_mkdir+0x390/0x600 [ 183.384352] SyS_mkdirat+0x22b/0x2b0 [ 183.388049] ? SyS_mknod+0x480/0x480 [ 183.391740] ? trace_hardirqs_on+0xd/0x10 [ 183.395869] ? do_syscall_64+0xb7/0x940 [ 183.399824] ? SyS_mknod+0x480/0x480 [ 183.403518] do_syscall_64+0x281/0x940 [ 183.407390] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 183.412904] ? syscall_return_slowpath+0x550/0x550 [ 183.417813] ? syscall_return_slowpath+0x2ac/0x550 [ 183.422727] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 183.428071] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 183.432896] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 183.438062] RIP: 0033:0x454e79 [ 183.441231] RSP: 002b:00007fe2ad9eac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 183.448917] RAX: ffffffffffffffda RBX: 00007fe2ad9eb6d4 RCX: 0000000000454e79 [ 183.456170] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 183.463505] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 183.470754] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 2018/03/31 07:41:57 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x9, 0x105000) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x48, r2, 0x408, 0x70bd28, 0x25dfdbfc, {0x8}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x80000000}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x1}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x6}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xfffffffffffff1ff}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000240)={0x10001, 0xfff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=@ethtool_sfeatures={0x3b, 0x2, [{0x9}, {0x3fc6, 0x1}]}}) [ 183.477999] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000020 2018/03/31 07:41:57 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) sendmsg(r0, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c, &(0x7f0000012f70), 0x0, &(0x7f0000000000)=[{0x28, 0x29, 0x5, "270202010000007efe8000000000000052"}], 0x28}, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x9, 0x2) openat$cgroup_ro(r1, &(0x7f0000000080)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) 2018/03/31 07:41:57 executing program 2: r0 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)="c6cc8e60a78914d500bfeae773ddb642384ef9648af1058f5fbd2fd309524d989e8ca5c3e6e4d185de0489636bb4012cd2281d57a505b82ae678e253ab1603ef18da1e2b4f2acc3c7651ff1c670f5ed1de51a9a5a850687fc0664d9c81b66fefaf800714c085934bd42e3e21ae71d978f3e76fcbfdc2e66adff8be4d85633beb78581bf230f72954dd487c97d06409d3c6e2f7f22be6284a9b", 0x99, 0xfffffffffffffffb) keyctl$describe(0x6, r0, &(0x7f00000002c0)=""/200, 0xc8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, &(0x7f00000003c0), &(0x7f0000000480)=0x40) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440)={0x0, 0x0, 0xffffffffffffffff}) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000005c0)='/selinux/enforce\x00', 0x22202, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x1010, r4, 0x0) setsockopt$inet_MCAST_MSFILTER(r4, 0x0, 0x30, &(0x7f0000000ac0)=ANY=[@ANYBLOB="030000000000000002004e22ac1414aa000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e24ac1414aa002300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e8ffff01000006ac1414bbe527527db04a500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ffffffffffffff000000000000000000000000000000000000000000000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000002004e23ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000021b4e20ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e220000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000000047890970cad9aa7b04b3cd5f42ff92baa490bbae060d586aa9fad377048bafb17b4190c0ef0fed9046a8848db23fca3ea0d47a30e709dc8925b11b69e7d9f2de2b8febf8e9a7396144322e3b3bbbe23a40fc2e4058a3bdb7b16dc0468240f727853d0c86f57d5cbd4230b6bd3e757d9bd046098b64ce38570ab35088cafe0a62aeb6a8884e3d47a9feccefbba55d75ccf19bd35aceacc71afc0ee7358e4e7f2328b8ef745018965011"], 0x1) pwrite64(r4, &(0x7f00000004c0)="361cf8298589166f6c2d5823c3b913944a09f012cc6a80f1d50171bf0badb6b5ffdeeaef7d6bdec3b31ce16780d2546875ed31070c85d5735d1ca260f2fca2cc539989af5eafe394f9ae07fcd88029971829aeaf797a78f97cd7f8531aeeb62f497a6d2d8c61dc23348ec786a20e624fdf4c5b839bea2dc66b04b7756cc92f852e", 0x81, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f0000000400)=0xfff, 0x4) fallocate(r4, 0x3, 0x0, 0x81) ppoll(&(0x7f0000000080)=[{r3}, {r2, 0x208}, {r4, 0x28}], 0x3, &(0x7f00000000c0), &(0x7f0000000140)={0x70000000000}, 0x8) 2018/03/31 07:41:57 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) acct(&(0x7f0000001240)='./file0\x00') setrlimit(0xa, &(0x7f0000000380)={0x4, 0x1}) getsockname(0xffffffffffffff9c, &(0x7f0000001480)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f00000012c0)=0x80) socketpair(0x10, 0x0, 0x8, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000001580)={r3}) r4 = open(&(0x7f00000010c0)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000001300)={0x8, 0x0, 0x6, 0x58a, 0x0}, &(0x7f0000001340)=0x10) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x3052, r3, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f00000001c0)={'bond0\x00', {0x2, 0x4e20, @multicast2=0xe0000002}}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000440)=ANY=[@ANYRES32=0x0, @ANYBLOB="408615824f3f781ae75fcc9554f019621eaccb21d7ca5f22e2f33741c0d07d78b6de0ed01fa10b1070cb77afb61679a7f893b0c78371e1195ef393dc87b1b329811e67705b9e1bb5dc00c5b14645b010d310e491c159a81b6b5fb52277145882a63f6206ecfb54b4f6b2ddf7963c2b2681ff1aa2dfd55f1e73b02e150e1f8e51e6ae3615336ed2b2b461fccd4ec00311dd4b00cf4316fb4bda9fa1a0a94d01d4db3209cd302a449b841dc10fcc2d63482b9700020c21f000000055a7a1a18b57b6cd06267ef9f582b4783e42e60f460962921710e11ac51a3f9fa92e9118c5f0e1d8b2c342"], &(0x7f0000000040)=0x2) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000100)={r7, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000001380)={r5, @in6={{0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0xf}}}, 0x0, 0x7, 0x0, 0x8, 0x92}, &(0x7f0000001440)=0x98) eventfd(0xffffffff80000001) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000001140)={0x4, 0x8001, 0x40, 0xfffffffffffffffd, 0x0}, &(0x7f0000001180)=0x10) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f0000001500)) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000011c0)={0x95e, 0x101, 0x8009, 0x1ff, 0x31386ac8, 0x8, 0x1, 0x7, r8}, 0x20) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x1, 0x1) recvfrom(r1, &(0x7f00000015c0)=""/83, 0x53, 0x120, 0x0, 0x0) symlinkat(&(0x7f0000001080)='./file0\x00', r4, &(0x7f0000001100)='./file0\x00') close(r0) mkdir(&(0x7f000053bff8)='./file0\x00', 0x0) mount(&(0x7f0000000a80)='./file0\x00', &(0x7f00000008c0)='./file0\x00', &(0x7f0000000a40)='sysfs\x00', 0x0, &(0x7f0000cde000)) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(0xffffffffffffffff, 0x40046411, &(0x7f0000000000)) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) 2018/03/31 07:41:57 executing program 5: ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, &(0x7f0000a1cffc)) r0 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) mlock(&(0x7f0000960000/0x4000)=nil, 0x4000) sendfile(r0, r0, &(0x7f0000b58000)=0x200000, 0xffff) 2018/03/31 07:41:57 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) tgkill(0x0, 0x0, 0x0) r0 = syz_open_dev$usbmon(&(0x7f000004cff3)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0x9208, 0x10000007ff) r1 = memfd_create(&(0x7f0000000540)='\x00', 0x1) r2 = perf_event_open(&(0x7f00000005c0)={0x7, 0x70, 0x8, 0x9, 0x81f6, 0x8, 0x0, 0xfffffffffffffe01, 0x0, 0x1, 0x0, 0x3, 0x6, 0x9, 0x4, 0x5, 0x100000000, 0x8, 0x6, 0x9, 0x1, 0x8, 0x3, 0x800, 0x74, 0xfff, 0x9, 0xf4ca, 0x7, 0x4, 0x1, 0x800, 0x3ff, 0x0, 0x0, 0x1ff, 0x80000000, 0xffffffff00000001, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000580), 0x1}, 0x10000, 0xfd, 0xb6, 0x7, 0x6, 0xf21, 0x976}, 0x0, 0x5, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)) r3 = epoll_create1(0x7ffff) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x35, 0xffffffffffffffff, 0x0) r4 = userfaultfd(0x0) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r5 = creat(&(0x7f0000000140)='./control/file0\x00', 0x0) write$sndseq(r5, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000280)='./file0\x00') mount(&(0x7f00000003c0)='./control\x00', &(0x7f0000000400)='./control\x00', &(0x7f0000000440)='tmpfs\x00', 0x0, 0x0) close(r4) r6 = fcntl$dupfd(r3, 0x0, r3) r7 = epoll_create1(0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f00000000c0)) epoll_ctl$EPOLL_CTL_ADD(r7, 0x1, r6, &(0x7f000086fff4)) r8 = getpgrp(0xffffffffffffffff) r9 = getpid() epoll_ctl$EPOLL_CTL_ADD(r7, 0x1, r3, &(0x7f0000000100)) kcmp$KCMP_EPOLL_TFD(r8, r9, 0x7, r7, &(0x7f0000000000)={r7, r6}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xec5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8000, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/03/31 07:41:58 executing program 7 (fault-call:10 fault-nth:33): r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4900, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000240)=0x4) getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) r1 = dup(0xffffffffffffff9c) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r2 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r2, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r2, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r2, &(0x7f0000000100)=""/65, 0x41) r3 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) fchdir(r2) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(r3, &(0x7f0000000200)='./file1\x00', r2, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r2, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000580)=""/80, 0x50}, {&(0x7f00000008c0)=""/4096, 0x1000}], 0x2, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x20) r5 = syz_open_dev$sndpcmp(&(0x7f00000018c0)='/dev/snd/pcmC#D#p\x00', 0x3, 0x10a00) ioctl$KVM_GET_DEVICE_ATTR(r5, 0x4018aee2, &(0x7f0000001940)={0x0, 0x100, 0x9, &(0x7f0000001900)}) recvfrom$ipx(r4, &(0x7f00000006c0)=""/52, 0x34, 0x100, &(0x7f0000000700)={0x4, 0x9a2, 0x4, "dc108d9d4391", 0x5}, 0x10) renameat(r2, &(0x7f0000001980)='./file1\x00', r5, &(0x7f00000019c0)='./file0/file0\x00') r6 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r6, 0x4, 0x0) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000040), 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r6, &(0x7f0000000200), 0xfffffe08) 2018/03/31 07:41:58 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000001480)={&(0x7f0000001280)={0x10}, 0xc, &(0x7f0000001440)={&(0x7f00000028c0)=@newsa={0x140, 0x10, 0x111, 0x0, 0x0, {{@in6, @in6=@mcast2={0xff, 0x2, [], 0x1}}, {@in6=@loopback={0x0, 0x1}, 0x0, 0x32}, @in, {}, {}, {}, 0x0, 0x0, 0xa}, [@tfcpad={0x8, 0x16}, @algo_auth={0x48, 0x1, {{'crct10dif-generic\x00'}}}]}, 0x140}, 0x1}, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000000)=0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x1, r1}) [ 183.781315] syz-executor5 (14369) used greatest stack depth: 15240 bytes left [ 183.800133] FAULT_INJECTION: forcing a failure. [ 183.800133] name failslab, interval 1, probability 0, space 0, times 0 [ 183.811404] CPU: 1 PID: 14384 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #372 [ 183.818749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 183.828095] Call Trace: [ 183.830687] dump_stack+0x194/0x24d [ 183.834319] ? arch_local_irq_restore+0x53/0x53 [ 183.838982] ? __save_stack_trace+0x7e/0xd0 [ 183.843295] should_fail+0x8c0/0xa40 [ 183.846994] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 183.852082] ? kasan_kmalloc+0xad/0xe0 [ 183.855951] ? kmem_cache_alloc_node_trace+0x150/0x760 [ 183.861202] ? alloc_fair_sched_group+0x1f0/0x530 [ 183.866027] ? sched_create_group+0x35/0x70 [ 183.870327] ? cpu_cgroup_css_alloc+0xe/0x30 [ 183.874711] ? vfs_mkdir+0x390/0x600 [ 183.878402] ? SyS_mkdirat+0x22b/0x2b0 [ 183.882273] ? do_syscall_64+0x281/0x940 [ 183.886314] ? find_held_lock+0x35/0x1d0 [ 183.890353] ? __lock_is_held+0xb6/0x140 [ 183.894394] ? check_same_owner+0x320/0x320 [ 183.898691] ? rcu_note_context_switch+0x710/0x710 [ 183.903601] should_failslab+0xec/0x120 [ 183.907555] kmem_cache_alloc_node_trace+0x5a/0x760 [ 183.912554] ? unregister_fair_sched_group+0x5e0/0x5e0 [ 183.917815] ? find_next_bit+0xcc/0x100 [ 183.921768] alloc_fair_sched_group+0x267/0x530 [ 183.926416] sched_create_group+0x35/0x70 [ 183.930539] cpu_cgroup_css_alloc+0xe/0x30 [ 183.934748] cgroup_apply_control_enable+0x44d/0xbc0 [ 183.939829] ? cgroup_propagate_control+0x570/0x570 [ 183.944821] ? css_populate_dir+0x289/0x420 [ 183.949120] cgroup_mkdir+0x56f/0xfc0 [ 183.952896] ? __lock_is_held+0xb6/0x140 [ 183.956936] ? cgroup_destroy_locked+0x750/0x750 [ 183.961666] ? rcu_read_lock_sched_held+0x108/0x120 [ 183.966660] ? kmem_cache_free+0x258/0x2a0 [ 183.970880] ? set_nlink+0xc1/0x160 [ 183.974499] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 183.979405] ? generic_permission+0x105/0x3c0 [ 183.983876] ? cgroup_destroy_locked+0x750/0x750 [ 183.988607] kernfs_iop_mkdir+0x153/0x1e0 [ 183.992731] vfs_mkdir+0x390/0x600 [ 183.996247] SyS_mkdirat+0x22b/0x2b0 [ 183.999944] ? SyS_mknod+0x480/0x480 [ 184.003638] ? trace_hardirqs_on+0xd/0x10 [ 184.007761] ? do_syscall_64+0xb7/0x940 [ 184.011711] ? SyS_mknod+0x480/0x480 [ 184.015411] do_syscall_64+0x281/0x940 [ 184.019279] ? vmalloc_sync_all+0x30/0x30 [ 184.023406] ? _raw_spin_unlock_irq+0x27/0x70 [ 184.027875] ? finish_task_switch+0x1c1/0x7e0 [ 184.032348] ? syscall_return_slowpath+0x550/0x550 [ 184.037263] ? syscall_return_slowpath+0x2ac/0x550 [ 184.042174] ? prepare_exit_to_usermode+0x350/0x350 [ 184.047177] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 184.052516] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 184.057338] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 184.062512] RIP: 0033:0x454e79 [ 184.065684] RSP: 002b:00007fe2ad9eac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 184.073377] RAX: ffffffffffffffda RBX: 00007fe2ad9eb6d4 RCX: 0000000000454e79 [ 184.080628] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 184.087874] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 184.095124] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 184.102388] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000021 2018/03/31 07:41:58 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000300), 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @my}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x4) listen(r0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000280), 0x4) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000440)=0x1) r1 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000100)={0x28, 0x0, 0xffffffff, @my=0x0}, 0x10, 0x800) r2 = add_key(&(0x7f0000000040)='big_key\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f00000000c0)="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", 0xd05, 0xfffffffffffffffc) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000f00)='/dev/rfkill\x00', 0x210000, 0x0) perf_event_open(&(0x7f0000d2af88)={0x2, 0x70, 0xe2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$revoke(0x3, r2) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000e40)={'ipddp0\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000001880)=@filter={'filter\x00', 0xe, 0x5, 0x910, [0x0, 0x20000f40, 0x20000f70, 0x20001280], 0x0, &(0x7f0000000e80), &(0x7f0000000f40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x2, [{{{0x1b, 0x40, 0x88ff, 'gretap0\x00', 'ip_vti0\x00', 'yam0\x00', 'bcsf0\x00', @random="9d2a30f0494a", [0x0, 0x0, 0xff], @empty, [0x0, 0xff, 0xff, 0x0, 0xff], 0xb0, 0x150, 0x180, [@time={'time\x00', 0x18, {{0x78, 0x7f, 0xef7, 0x1b84, 0x7b, 0x8, 0x3}}}]}, [@common=@log={'log\x00', 0x28, {{0x5, "041d6404f30a76781b32e1466b1ca2776b0674b77356a28ac056147f6961", 0x9}}}, @common=@log={'log\x00', 0x28, {{0xfffffffffffffffd, "2738f0c3c89e10252687630b295360eb0c1438566b069278024cc4fe34a8", 0x5}}}]}, @common=@STANDARD={'\x00', 0x8}}, {{{0x11, 0x3, 0xe937, 'irlan0\x00', 'yam0\x00', 'ip6_vti0\x00', 'vlan0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x16}, [0x0, 0xff, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0x0, 0xff], 0x70, 0xe8, 0x160}, [@common=@nflog={'nflog\x00', 0x50, {{0x578, 0x5, 0x20, 0x0, 0x0, "0401fff13dfd690d973dcc5561340c74fbb0bc393394bbf1e70e623402646f66a19d74d22a1a70636633eb94045d5f4ceb3abd7409ce23f84874184733494312"}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x7f, 0x2, 0xfffffffffffff1e6, 0x0, 0x0, "79e5428d074326034d7c004f8abf5354b394fcb2baf2b932ed9a3d7302c2a32751ac55ba47608be527ac54a685cffb341e52e8740fdb6dbcf82728caf40d51aa"}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x5a6d6acab21dbe09, 0x1a, 0x0, 'rose0\x00', 'gretap0\x00', 'irlan0\x00', 'ipddp0\x00', @empty, [0xff, 0x0, 0x0, 0xff, 0xff, 0xff], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [0x0, 0x0, 0x0, 0xff, 0xff, 0xff], 0xe8, 0x170, 0x1e8, [@ip6={'ip6\x00', 0x50, {{@local={0xfe, 0x80, [], 0xaa}, @empty, [0x0, 0xffffffff, 0x0, 0xff0000ff], [0xff, 0xff000000, 0x0, 0xffffffff], 0x1, 0x8, 0x0, 0x8, 0x4e24, 0x4e24, 0x4e23, 0x4e20}}}]}, [@common=@log={'log\x00', 0x28, {{0x5, "e62280d09c35a60f66d812b9f9a9a9f9e7679acf94110e6cd628483e2b9d", 0xb}}}, @common=@mark={'mark\x00', 0x10, {{0x0, 0xffffffffffffffff}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x2, 0x6, 0x100000000, 0x1, 0x0, "865389eeda6d93e69784bdb1fb2056b5928e29b3d96434809c05390f3b589e62b493d9e686fc895c04cea2495cfb8d8911d3e45116cd5968f5f0a17e44af7473"}}}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x2, [{{{0x1d, 0x8, 0x8808, 'vcan0\x00', '\x00', 'syz_tun\x00', 'syzkaller0\x00', @empty, [0xff, 0xff, 0x0, 0x0, 0xff, 0xff], @empty, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], 0x110, 0x1a0, 0x1d8, [@state={'state\x00', 0x8, {{0x1}}}, @stp={'stp\x00', 0x48, {{0x6, {0xffff, 0xedc, 0xe16, @link_local={0x1, 0x80, 0xc2}, [0xff, 0x0, 0xff, 0xff, 0xff], 0x9, 0x4, 0x4, 0x10, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [0x0, 0x0, 0xff, 0x0, 0xff], 0x4e20, 0x4e21, 0x80000001, 0xfffffffffffff525, 0x3, 0x7fffffff, 0x3, 0x40, 0x7, 0xfffffffffffffff7}, 0x400, 0x2d}}}]}, [@common=@ERROR={'ERROR\x00', 0x20, {"290ff366b8bf50e1d6a9313c1401d3f7ad6c2a260549ee71903705062fe0"}}, @common=@ERROR={'ERROR\x00', 0x20, {"b0cbf5d5c3a016961df9f0a090d5bd6fbe091191f89f6f82a9d36f30880e"}}]}, @common=@mark={'mark\x00', 0x10, {{0xffffffd0, 0xfffffffffffffffd}}}}, {{{0x5, 0x24, 0x1a, 'ip6gre0\x00', 'ifb0\x00', 'erspan0\x00', 'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2}, [0x0, 0xff, 0xff, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0x0, 0x0, 0xff, 0x0, 0xff], 0x138, 0x180, 0x1b0, [@ip6={'ip6\x00', 0x50, {{@dev={0xfe, 0x80, [], 0x19}, @mcast2={0xff, 0x2, [], 0x1}, [0xff000000, 0xff0000ff, 0xffffffff, 0xffffffff], [0xffffffff, 0xffffffff, 0xff, 0xffffff00], 0x9, 0x2f, 0x1, 0x9, 0x4e24, 0x4e21, 0x4e23, 0x4e24}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x4}}}]}, [@common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00', 0x7f, 0x4c, 0x401}}}]}, @common=@STANDARD={'\x00', 0x8, {0xfffffffffffffffe}}}]}]}, 0x988) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f00000000c0)={0x7, 0x7, 0x20ba, 0x5, 0x8, 0xfff, 0x200, 0x20, 0x1, 0x3, 0xfffffffffffffff8, 0x9}) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f00000002c0)={0x1, 0xf7, &(0x7f0000000180)="bf24c8d50c0bc09883793d52204b3c0435443d388935fc2cc42084ba99ef51fc75e9c59d9b74e691372b89aefde1f37d3be1d5317e047368f5cd384989448ea813c12c5423fe047b0ec8585207f814605a2c92d52277e30843526104cba8f3877dbb5485b25179793075070dd1057845c6735d03815fd95c8220f7cce7bccf61cbbdfee688469d912bdee2c1761f726f184f794a02c9b9723b6470c6d27a0b4c6bdc90f6063f9ea10aa0ac271c1ea93ba5959cfbed92c9376c24131b83b913b4f442d8f3b48fdbd805b20b5bae4ed128b35313de5ab0cc09faa96b36525123f9437882039cae46b7bd78aad2393be518a3bb2d66560880"}) connect$ipx(0xffffffffffffffff, &(0x7f0000000140)={0x4, 0x0, 0x102, "851779d0cb52", 0xa37}, 0x10) setsockopt$packet_int(r3, 0x107, 0x17, &(0x7f0000000e00)=0x1b, 0x4) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f0000000380)={0x221, 0x8000, 0x8, 0x80000000, 0x20, 0x401, 0x7, 0x2, 0x400, 0xc6, 0x9, 0x2}) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000003c0)={0x0, 0xffffffffffffffff, 0x3, 0x1}, 0x14) 2018/03/31 07:41:58 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0xaf01, &(0x7f0000307000)=&(0x7f0000989fff)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000000)=ANY=[]) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000140)={0x0, r1}) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000000)=r1) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000cef000)={0x1, 0x0, &(0x7f000062a000)=""/167, &(0x7f0000aac000)=""/21, &(0x7f00002fdf52)=""/174}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000180)={0x0, 0x1, &(0x7f0000000280)=""/147, &(0x7f0000000340)=""/223, &(0x7f0000000580)=""/4096}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000f82ffc)=0x4001) dup2(r1, r0) eventfd(0x0) 2018/03/31 07:41:58 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000680)={'ip6tnl0\x00', @ifru_flags=0x4000}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000000c0)={{{@in=@multicast2, @in=@loopback}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000040)=0xe8) r2 = accept4(r0, 0x0, &(0x7f0000000000), 0x80800) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x1, &(0x7f0000000080)=0xffffffffffff1088, 0x4) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) ppoll(&(0x7f0000000240)=[{r2, 0x1}, {r1, 0x60}, {r0, 0x2}, {r2, 0x208}, {r1, 0x100e}], 0x5, &(0x7f00000002c0)={r3, r4+30000000}, &(0x7f0000000300)={0x1}, 0x8) r5 = syz_open_dev$dmmidi(&(0x7f0000000540)='/dev/dmmidi#\x00', 0x7, 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r5, 0xc4c85512, &(0x7f00000006c0)={{0x6, 0x0, 0x36a0, 0x1, "cd93d9d28071ac55539ccac8e43c6a5b6e5aabbc417658aefc4aca0acde7148d69f4d8f4ce370e44f4d2d93c", 0x8}, 0x5, [0x4, 0x1, 0x4, 0xad, 0x1, 0x7ff, 0x3, 0x4, 0x8, 0x1, 0xe20, 0x1, 0x8, 0xdcf, 0x1, 0x7, 0x7ff, 0x7fffffff, 0x3ff, 0x100000001, 0x7f, 0x80000000, 0x1, 0xffffffffffffffbe, 0x7e0, 0x9, 0x80000000, 0xffff, 0x8, 0x0, 0x8, 0x200, 0x100, 0xfff, 0xffffffff7fffffff, 0xc2de, 0x1, 0x0, 0x3, 0x8, 0x5, 0xfffffffffffffff7, 0x1, 0x100, 0xfffffffffffffff9, 0x5, 0x7, 0x9, 0x1, 0xff, 0x59, 0x100000001, 0x2, 0xe8, 0xfffffffffffff801, 0x9cc3, 0x1, 0x1, 0x3, 0x9, 0x7ff, 0x4c769cb2, 0xffff, 0x2, 0xf6, 0xfff, 0xbc32, 0x7, 0xff, 0x0, 0x33, 0xffffffffffffffff, 0x20, 0x0, 0x9, 0x4, 0x1ff, 0x5, 0x7, 0x4, 0x7, 0x1, 0xecb, 0x4, 0x1000, 0x100, 0x7, 0x200, 0x7ff, 0x6, 0x2, 0x4, 0x40, 0x51c, 0x1000, 0xffffffff, 0x6, 0x1, 0x1, 0x2, 0x7, 0x2, 0xaaee, 0x8, 0x948, 0x8, 0xb109, 0x247, 0xfffffffffffffff9, 0x0, 0x100000001, 0xfffffffffffffffe, 0x3, 0x4, 0x0, 0xd88a, 0x100, 0x10001, 0x6, 0x9, 0x4, 0x1, 0x33843c46, 0x7, 0x4, 0x9, 0xfff, 0x5bb], {0x77359400}}) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x2000, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r6, 0x84, 0x6f, &(0x7f0000000400)={0x0, 0xb4, &(0x7f0000000340)=[@in={0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}, @in={0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}, @in={0x2, 0x4e22, @multicast1=0xe0000001}, @in={0x2, 0x4e23}, @in={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, @in6={0xa, 0x4e20, 0x629, @dev={0xfe, 0x80, [], 0xa}, 0x8}, @in6={0xa, 0x4e24, 0x6bc2, @remote={0xfe, 0x80, [], 0xbb}, 0x80}, @in={0x2, 0x4e24, @multicast2=0xe0000002}, @in6={0xa, 0x4e20, 0x4, @mcast2={0xff, 0x2, [], 0x1}, 0xa5}]}, &(0x7f0000000440)=0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r6, 0x84, 0x17, &(0x7f0000000480)={r7, 0x1, 0x7c, "3a2c894d8ca2206434a2a26bd0e47c9d2fa869e7e0cfa0f63445f1571e3b7161c7dbe4c2cf16dc0c96216baf74111cc7873e0ee8de7eeca7e710db5ab07bf75eeac0aadebc7515aae61f4a7ebdb264414973d2857fa49d9c1f32e50c3f26e5ffc4313cd6805c669d5dece9cad29ff4f40002d39c96aff54c43be1e2c"}, 0x84) r8 = gettid() syz_open_procfs(r8, &(0x7f0000000580)='ns/uts\x00') openat$cgroup(r6, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) 2018/03/31 07:41:58 executing program 2: r0 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)="c6cc8e60a78914d500bfeae773ddb642384ef9648af1058f5fbd2fd309524d989e8ca5c3e6e4d185de0489636bb4012cd2281d57a505b82ae678e253ab1603ef18da1e2b4f2acc3c7651ff1c670f5ed1de51a9a5a850687fc0664d9c81b66fefaf800714c085934bd42e3e21ae71d978f3e76fcbfdc2e66adff8be4d85633beb78581bf230f72954dd487c97d06409d3c6e2f7f22be6284a9b", 0x99, 0xfffffffffffffffb) keyctl$describe(0x6, r0, &(0x7f00000002c0)=""/200, 0xc8) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440)={0x0, 0x0, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20202, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x1010, r3, 0x0) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000000580)=ANY=[@ANYBLOB="030000000000000002004e22ac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e24ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000006ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ffffffffffffff000000000000000000000000000000000000000000000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e220000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) pwrite64(r3, &(0x7f00000004c0)="361cf8298589166f6c2d5823c3b913944a09f012cc6a80f1d50171bf0badb6b5ffdeeaef7d6bdec3b31ce16780d2546875ed31070c85d5735d1ca260f2fca2cc539989af5eafe394f9ae07fcd88029971829aeaf797a78f97cd7f8531aeeb62f497a6d2d8c61dc23348ec786a20e624fdf4c5b839bea2dc66b04b7756cc92f852e", 0x81, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000400)=0xfff, 0x4) ioctl$VT_DISALLOCATE(r3, 0x5608) fallocate(r3, 0x3, 0x0, 0x81) ppoll(&(0x7f0000000080)=[{r2}, {r1, 0x208}, {r3, 0x28}], 0x3, &(0x7f00000000c0), &(0x7f0000000140)={0x70000000000}, 0x8) 2018/03/31 07:41:58 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) acct(&(0x7f0000001240)='./file0\x00') setrlimit(0xa, &(0x7f0000000380)={0x4, 0x1}) getsockname(0xffffffffffffff9c, &(0x7f0000001480)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f00000012c0)=0x80) socketpair(0x10, 0x0, 0x8, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000001580)={r3}) r4 = open(&(0x7f00000010c0)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000001300)={0x8, 0x0, 0x6, 0x58a, 0x0}, &(0x7f0000001340)=0x10) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x3052, r3, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f00000001c0)={'bond0\x00', {0x2, 0x4e20, @multicast2=0xe0000002}}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYBLOB="408615824f3f781ae75fcc9554f019621eaccb21d7ca5fb77c06ff41c0d07d78b6de0ed01fa10b1070cb77afb61679a7f893b0c78371e1195ef393dc87b1b329811e67705b9e1bb5dc00c5b14645b010d310e491c159a81b77145882a63f6206ecfb54b4f6b2ddf7963c2b2681ff1aa2dfd55f1e73b02e150e1f8e51e6ae3615336ed2b2b461fccd4ec00311dd4b00cf4316fb4bda9fa1a0a94d01d4db3209cd302a449b841dc10fcc2d63482b979cb70c21ef7000e655a7a1a18b57b6cd06267ef9f582b4783e42e60f460962921710e11ac51a3f9fa92e9118c5f0e1d8b2c342"], &(0x7f0000000040)=0x2) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000100)={r7, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000001380)={r5, @in6={{0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0xf}}}, 0x0, 0x7, 0x0, 0x8, 0x92}, &(0x7f0000001440)=0x98) eventfd(0xffffffff80000001) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000001140)={0x4, 0x8001, 0x40, 0xfffffffffffffffd, 0x0}, &(0x7f0000001180)=0x10) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f0000001500)) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000011c0)={0x95e, 0x101, 0x8009, 0x1ff, 0x31386ac8, 0x8, 0x1, 0x7, r8}, 0x20) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x1, 0x1) recvfrom(r1, &(0x7f00000015c0)=""/83, 0x53, 0x120, 0x0, 0x0) symlinkat(&(0x7f0000001080)='./file0\x00', r4, &(0x7f0000001100)='./file0\x00') close(r0) getsockopt$IP_VS_SO_GET_SERVICES(r3, 0x0, 0x482, &(0x7f00000003c0)=""/101, &(0x7f0000000440)=0x65) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={r4, r4, 0x4, 0x3}, 0x10) getsockname$netlink(r1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) 2018/03/31 07:41:58 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000fcbff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) accept(0xffffffffffffffff, &(0x7f0000000100)=@ax25, &(0x7f0000000180)=0x80) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x202) timer_create(0x7, &(0x7f00000001c0)={0x0, 0x22, 0x1}, &(0x7f0000000200)=0x0) timer_delete(r3) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000780)={"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"}) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000000)=ANY=[@ANYBLOB="7214b861609d56576f74b290702eb1a90797ed338df6dccd08e601c86138c2389490ed89f13647b733a789e35f59c1a71bb45ddfa1dd6c65c93d0be16b9a4bee409e262c7b7d53989a3efc3cf1e36be988a274178accb93df6e00d6cee35d5288a42d2e4c8ac783fcd30eb299c3aafedc25d016aa8410fe8aba00bb2d9e515a4c1da050417ff6509019d0b"], &(0x7f0000000240)=0x1) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) 2018/03/31 07:41:58 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='pagemap\x00') setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0xffff, 0x1, 0x2, 0x7948, 0xf63}, 0xc) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r1, &(0x7f0000021fe4)={0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) 2018/03/31 07:41:58 executing program 7 (fault-call:10 fault-nth:34): r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4900, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000240)=0x4) getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) r1 = dup(0xffffffffffffff9c) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r2 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r2, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r2, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r2, &(0x7f0000000100)=""/65, 0x41) r3 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) fchdir(r2) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(r3, &(0x7f0000000200)='./file1\x00', r2, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r2, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000580)=""/80, 0x50}, {&(0x7f00000008c0)=""/4096, 0x1000}], 0x2, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x20) r5 = syz_open_dev$sndpcmp(&(0x7f00000018c0)='/dev/snd/pcmC#D#p\x00', 0x3, 0x10a00) ioctl$KVM_GET_DEVICE_ATTR(r5, 0x4018aee2, &(0x7f0000001940)={0x0, 0x100, 0x9, &(0x7f0000001900)}) recvfrom$ipx(r4, &(0x7f00000006c0)=""/52, 0x34, 0x100, &(0x7f0000000700)={0x4, 0x9a2, 0x4, "dc108d9d4391", 0x5}, 0x10) renameat(r2, &(0x7f0000001980)='./file1\x00', r5, &(0x7f00000019c0)='./file0/file0\x00') r6 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r6, 0x4, 0x0) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000040), 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r6, &(0x7f0000000200), 0xfffffe08) [ 184.336989] FAULT_INJECTION: forcing a failure. [ 184.336989] name failslab, interval 1, probability 0, space 0, times 0 [ 184.348303] CPU: 0 PID: 14398 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #372 [ 184.355659] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 184.365002] Call Trace: [ 184.367577] dump_stack+0x194/0x24d [ 184.371185] ? arch_local_irq_restore+0x53/0x53 [ 184.375834] should_fail+0x8c0/0xa40 [ 184.379527] ? kstrdup+0x39/0x70 [ 184.382871] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 184.387954] ? cgroup_apply_control_enable+0x390/0xbc0 [ 184.393206] ? kernfs_iop_mkdir+0x153/0x1e0 [ 184.397503] ? vfs_mkdir+0x390/0x600 [ 184.401192] ? SyS_mkdirat+0x22b/0x2b0 [ 184.405055] ? do_syscall_64+0x281/0x940 [ 184.409096] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 184.414437] ? find_held_lock+0x35/0x1d0 [ 184.418477] ? find_held_lock+0x35/0x1d0 [ 184.422515] ? __lock_is_held+0xb6/0x140 [ 184.426555] ? check_same_owner+0x320/0x320 [ 184.430853] ? rcu_note_context_switch+0x710/0x710 [ 184.435759] ? rcu_read_lock_sched_held+0x108/0x120 [ 184.440756] should_failslab+0xec/0x120 [ 184.444708] kmem_cache_alloc+0x47/0x760 [ 184.448746] ? memcpy+0x45/0x50 [ 184.452001] ? kstrdup+0x59/0x70 [ 184.455350] __kernfs_new_node+0xe2/0x570 [ 184.459473] ? kernfs_dop_revalidate+0x380/0x380 [ 184.464209] ? snprintf+0xc0/0xf0 [ 184.467638] ? vsprintf+0x40/0x40 [ 184.471067] ? rq_clock+0x90/0x90 [ 184.474497] kernfs_new_node+0x80/0xe0 [ 184.478365] __kernfs_create_file+0x4b/0x320 [ 184.482754] cgroup_addrm_files+0x3c5/0xa70 [ 184.487056] ? cgroup_file_write+0x710/0x710 [ 184.491443] ? cpu_cgroup_css_alloc+0x30/0x30 [ 184.495918] ? __lock_is_held+0xb6/0x140 [ 184.499961] ? sched_online_group+0x4e0/0x4e0 [ 184.504429] ? cpu_cgroup_css_online+0x3a/0x50 [ 184.508985] ? online_css+0x224/0x2e0 [ 184.512763] css_populate_dir+0x198/0x420 [ 184.516886] cgroup_apply_control_enable+0x390/0xbc0 [ 184.521967] ? cgroup_propagate_control+0x570/0x570 [ 184.526963] ? css_populate_dir+0x289/0x420 [ 184.531258] cgroup_mkdir+0x56f/0xfc0 [ 184.535033] ? __lock_is_held+0xb6/0x140 [ 184.539071] ? cgroup_destroy_locked+0x750/0x750 [ 184.543806] ? rcu_read_lock_sched_held+0x108/0x120 [ 184.548800] ? kmem_cache_free+0x258/0x2a0 [ 184.553013] ? set_nlink+0xc1/0x160 [ 184.556625] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 184.561531] ? generic_permission+0x105/0x3c0 [ 184.566005] ? cgroup_destroy_locked+0x750/0x750 [ 184.570743] kernfs_iop_mkdir+0x153/0x1e0 [ 184.574869] vfs_mkdir+0x390/0x600 [ 184.578388] SyS_mkdirat+0x22b/0x2b0 [ 184.582077] ? SyS_mknod+0x480/0x480 [ 184.585767] ? trace_hardirqs_on+0xd/0x10 [ 184.589890] ? do_syscall_64+0xb7/0x940 [ 184.593841] ? SyS_mknod+0x480/0x480 [ 184.597528] do_syscall_64+0x281/0x940 [ 184.601392] ? vmalloc_sync_all+0x30/0x30 [ 184.605515] ? _raw_spin_unlock_irq+0x27/0x70 [ 184.609989] ? finish_task_switch+0x1c1/0x7e0 [ 184.614461] ? syscall_return_slowpath+0x550/0x550 [ 184.619365] ? syscall_return_slowpath+0x2ac/0x550 [ 184.624272] ? prepare_exit_to_usermode+0x350/0x350 [ 184.629264] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 184.634603] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 184.639422] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 184.644588] RIP: 0033:0x454e79 [ 184.647750] RSP: 002b:00007fe2ad9eac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 184.655431] RAX: ffffffffffffffda RBX: 00007fe2ad9eb6d4 RCX: 0000000000454e79 [ 184.662673] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 184.669920] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 184.677162] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 2018/03/31 07:41:59 executing program 3: r0 = syz_open_dev$random(&(0x7f0000001000)='/dev/random\x00', 0x0, 0x199840) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x62000)=nil, 0x62000, 0x0, 0x11, r1, 0x0) clone(0x0, &(0x7f0000a36000), &(0x7f0000855000), &(0x7f0000006ffc), &(0x7f0000340000)) epoll_create1(0x0) preadv(r0, &(0x7f00006a6000)=[{&(0x7f0000005000)=""/2, 0x2}], 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0xfff, 0x9, @local={0xfe, 0x80, [], 0xaa}, 0x20}, {0xa, 0x4e24, 0x6, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, 0x5}, 0x100000000, [0x7, 0x7f, 0x4, 0x9, 0xef02, 0x7fffffff, 0xfffffffffffffff8, 0x10001]}, 0x5c) r2 = openat$cgroup(r1, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) mmap(&(0x7f0000ff6000/0xa000)=nil, 0xa000, 0xb, 0x40011, r2, 0x0) [ 184.684407] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000022 [ 184.691904] cgroup: cgroup_addrm_files: failed to add weight, err=-12 2018/03/31 07:41:59 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000308000)='/dev/snd/controlC#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000065b38)={{0x9, 0x0, 0x0, 0x0, "dda52a8bfb30cc12936b8da3effa922ab208de0b3960eadc49fe526638ddffed947db68402df32de3aee7163"}, 0x0, [], {0x0, 0x989680}}) syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x8, 0x10800) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x81, 0x40) mq_timedreceive(r1, &(0x7f0000000080)=""/45, 0x2d, 0xffffffff80000001, &(0x7f00000000c0)={0x0, 0x989680}) 2018/03/31 07:41:59 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0xaf01, &(0x7f0000307000)=&(0x7f0000989fff)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000000)=ANY=[]) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000140)={0x0, r1}) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000000)=r1) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000cef000)={0x1, 0x0, &(0x7f000062a000)=""/167, &(0x7f0000aac000)=""/21, &(0x7f00002fdf52)=""/174}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000180)={0x0, 0x1, &(0x7f0000000280)=""/147, &(0x7f0000000340)=""/223, &(0x7f0000000580)=""/4096}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000f82ffc)=0x4001) dup2(r1, r0) eventfd(0x0) 2018/03/31 07:41:59 executing program 2: r0 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)="c6cc8e60a78914d500bfeae773ddb642384ef9648af1058f5fbd2fd309524d989e8ca5c3e6e4d185de0489636bb4012cd2281d57a505b82ae678e253ab1603ef18da1e2b4f2acc3c7651ff1c670f5ed1de51a9a5a850687fc0664d9c81b66fefaf800714c085934bd42e3e21ae71d978f3e76fcbfdc2e66adff8be4d85633beb78581bf230f72954dd487c97d06409d3c6e2f7f22be6284a9b", 0x99, 0xfffffffffffffffb) keyctl$describe(0x6, r0, &(0x7f00000002c0)=""/200, 0xc8) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440)={0x0, 0x0, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20202, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x1010, r3, 0x0) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000000580)=ANY=[@ANYBLOB="030000000000000002004e22ac1414aa00000000000000000000000000000000000000007f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e24ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000006ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ffffffffffffff000000000000000000000000000000000000000000000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e220000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) pwrite64(r3, &(0x7f00000004c0)="361cf8298589166f6c2d5823c3b913944a09f012cc6a80f1d50171bf0badb6b5ffdeeaef7d6bdec3b31ce16780d2546875ed31070c85d5735d1ca260f2fca2cc539989af5eafe394f9ae07fcd88029971829aeaf797a78f97cd7f8531aeeb62f497a6d2d8c61dc23348ec786a20e624fdf4c5b839bea2dc66b04b7756cc92f852e", 0x81, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000400)=0xfff, 0x4) fallocate(r3, 0x3, 0x0, 0x81) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000003c0)={0x6, &(0x7f0000000040)=[{0x9, 0x1, 0x6ef3, 0x4}, {0xfa66, 0x57f, 0x2}, {0x2, 0x4, 0x6, 0x4}, {0xfffffffffffffff4, 0xe00000000000, 0x39, 0x9}, {0x2, 0x6, 0x6, 0xa}, {0x3, 0x2, 0x101, 0x80000000}]}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0x40605346, &(0x7f0000000a80)={0x9, 0x2, {0xffffffffffffffff, 0x3, 0x4, 0x1, 0x7}}) ppoll(&(0x7f0000000080)=[{r2}, {r1, 0x208}, {r3, 0x28}], 0x3, &(0x7f00000000c0), &(0x7f0000000140)={0x70000000000}, 0x8) syz_open_dev$sndmidi(&(0x7f0000000480)='/dev/snd/midiC#D#\x00', 0x4, 0x0) syz_open_dev$amidi(&(0x7f0000000a40)='/dev/amidi#\x00', 0x1, 0x200) 2018/03/31 07:41:59 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x0) creat(&(0x7f0000000080)='./file0/bus\x00', 0x141) ioctl$TCSETA(r0, 0x4030582a, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}) 2018/03/31 07:41:59 executing program 7 (fault-call:10 fault-nth:35): r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4900, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000240)=0x4) getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) r1 = dup(0xffffffffffffff9c) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r2 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r2, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r2, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r2, &(0x7f0000000100)=""/65, 0x41) r3 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) fchdir(r2) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(r3, &(0x7f0000000200)='./file1\x00', r2, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r2, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000580)=""/80, 0x50}, {&(0x7f00000008c0)=""/4096, 0x1000}], 0x2, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x20) r5 = syz_open_dev$sndpcmp(&(0x7f00000018c0)='/dev/snd/pcmC#D#p\x00', 0x3, 0x10a00) ioctl$KVM_GET_DEVICE_ATTR(r5, 0x4018aee2, &(0x7f0000001940)={0x0, 0x100, 0x9, &(0x7f0000001900)}) recvfrom$ipx(r4, &(0x7f00000006c0)=""/52, 0x34, 0x100, &(0x7f0000000700)={0x4, 0x9a2, 0x4, "dc108d9d4391", 0x5}, 0x10) renameat(r2, &(0x7f0000001980)='./file1\x00', r5, &(0x7f00000019c0)='./file0/file0\x00') r6 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r6, 0x4, 0x0) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000040), 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r6, &(0x7f0000000200), 0xfffffe08) 2018/03/31 07:41:59 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) acct(&(0x7f0000001240)='./file0\x00') setrlimit(0xa, &(0x7f0000000380)={0x4, 0x1}) getsockname(0xffffffffffffff9c, &(0x7f0000001480)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f00000012c0)=0x80) socketpair(0x10, 0x0, 0x8, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000001580)={r3}) r4 = open(&(0x7f00000010c0)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000001300)={0x8, 0x0, 0x6, 0x58a, 0x0}, &(0x7f0000001340)=0x10) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r7 = mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x3052, r3, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f00000003c0)={r5, 0xe7, "3e3fea5def5b50178a3c561939877944c97b2acb209343b21feb8c64e9b8b70437afe669ffbb817fd20ad0570f85636ec559fecd7ea452f484a537aa52c7f71a6ef407dad3b3fb07f43884371a98b656d98364c2f835dfd40ee033a21997f15d5d1ca55e3091f749b0e8f87e3dd1217efd4cd1ce4709d64ead55f898908114c5c595414aa070cfb6e5caa175bab9debcca1714d1d476fb0178d128448b7968035bcfb2ea1d87bf59fad9e7609eeef8884ab18e50f94fc027d940226662854ed531ed639948767c804c9286c128b4982c492840b092c21e2e0a648364cb88e3d301bee53243e41c"}, &(0x7f00000004c0)=0xef) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f00000001c0)={'bond0\x00', {0x2, 0x4e20, @multicast2=0xe0000002}}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYBLOB="408615824f3f781ae75fcc9554f019621eaccb21d7ca5fb77c06ff41c0d07d78b6de0ed01fa10b1070cb77afb61679a7f893b0c78371e1195ef393dc87b1b329811e67705b9e1bb5dc00c5b14645b010d310e491c159a81b77145882a63f6206ecfb54b4f6b2ddf7963c2b2681ff1aa2dfd55f1e73b02e150e1f8e51e6ae3615336ed2b2b461fccd4ec00311dd4b00cf4316fb4bda9fa1a0a94d01d4db3209cd302a449b841dc10fcc2d63482b979cb70c21ef7000e655a7a1a18b57b6cd06267ef9f582b4783e42e60f460962921710e11ac51a3f9fa92e9118c5f0e1d8b2c342"], &(0x7f0000000040)=0x2) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000100)={r8, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000001380)={r5, @in6={{0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0xf}}}, 0x0, 0x7, 0x0, 0x8, 0x92}, &(0x7f0000001440)=0x98) eventfd(0xffffffff80000001) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000001140)={0x4, 0x8001, 0x40, 0xfffffffffffffffd, 0x0}, &(0x7f0000001180)=0x10) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f0000001500)) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000011c0)={0x95e, 0x101, 0x8009, 0x1ff, 0x31386ac8, 0x8, 0x1, 0x7, r9}, 0x20) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x1, 0x1) recvfrom(r1, &(0x7f00000015c0)=""/83, 0x53, 0x120, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000840)={0xc8, 0x0, &(0x7f0000000680)=[@decrefs={0x40046307}, @transaction_sg={0x40486311, {{0x3, 0x0, 0x3, 0x0, 0x10, 0x0, 0x0, 0x48, 0x8, &(0x7f0000000500)=[@fd={0x66642a85, 0x0, r0, 0x0, 0x3}, @fd={0x66642a85, 0x0, r0, 0x0, 0x2}, @flat={0x73622a85, 0x0, r7}], &(0x7f0000000580)=[0x38]}, 0x9}}, @acquire={0x40046305, 0x1}, @acquire={0x40046305, 0x2}, @enter_looper={0x630c}, @dead_binder_done={0x40086310, 0x1}, @reply_sg={0x40486312, {{0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x28, 0x20, &(0x7f0000000600)=[@ptr={0x70742a85, 0x0, &(0x7f00000005c0), 0x1, 0x3, 0x34}], &(0x7f0000000640)=[0x18, 0x78, 0x78, 0x38]}, 0x8}}, @release={0x40046306, 0x3}], 0xbe, 0x0, &(0x7f0000000780)="2c2295e5ea4c1c7af16804fd42bcbb3cde903b1eb52274ef98f6d054ab7a6b508ed53d083ae926409acf06577b3cd8b45d6d736d707c2b7137f1a379d8067b57c6320d860734a5847ec689a18c31b85a055cf9ef865635003001dbb3d1328dcf5bd287116b9270e9df431e9b9a38771a313dedf9548eec950c9ed87875e6af41587371cb3621e9475ad41f82e60196b134b62780dfad0b8ce673616333f4883a20c04abd7d74c4d9885fc381b1fa048dc73b1e15be8fe37fd18350325d6f"}) symlinkat(&(0x7f0000001080)='./file0\x00', r4, &(0x7f0000001100)='./file0\x00') close(r0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={r4, r4, 0x4, 0x3}, 0x10) getsockname$netlink(r1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) 2018/03/31 07:41:59 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0xaf01, &(0x7f0000307000)=&(0x7f0000989fff)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000000)=ANY=[]) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000140)={0x0, r1}) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000000)=r1) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000cef000)={0x1, 0x0, &(0x7f000062a000)=""/167, &(0x7f0000aac000)=""/21, &(0x7f00002fdf52)=""/174}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000180)={0x0, 0x1, &(0x7f0000000280)=""/147, &(0x7f0000000340)=""/223, &(0x7f0000000580)=""/4096}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000f82ffc)=0x4001) dup2(r1, r0) eventfd(0x0) 2018/03/31 07:41:59 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000001240)='net\x00\x00\x00\x00p\x00') getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f00000000c0), &(0x7f0000000100)=0x4) fcntl$notify(r0, 0x402, 0x10) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000001280)=@getsa={0x1070, 0x12, 0x20, 0x70bd27, 0x25dfdbfc, {@in6=@mcast2={0xff, 0x2, [], 0x1}, 0xfff, 0xa}, [@algo_comp={0x1048, 0x3, {{'deflate\x00'}, 0x8000, "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"}}]}, 0x1070}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000004) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip_tables_names\x00') getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e20, @multicast2=0xe0000002}}}, &(0x7f00000002c0)=0x84) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000300)={r2, 0x3ff}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140)={0x0, 0x1}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000001c0)={r3, 0x3, 0x30}, 0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000380)={r2, 0x8}, &(0x7f00000003c0)=0x8) 2018/03/31 07:41:59 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00'}) r0 = socket$inet(0x2, 0x5, 0x0) r1 = socket$inet6(0xa, 0x800, 0x8010000000000084) bind$inet6(r1, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff]}, 0x81}, 0x1c) listen(r1, 0xcc) keyctl$session_to_parent(0x12) accept4$inet6(r1, &(0x7f0000000040)={0x0, 0x0, 0x0, @local}, &(0x7f0000000100)=0x1c, 0x0) connect$inet(r0, &(0x7f0000555ff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000871fc8), 0x0, 0x0) 2018/03/31 07:41:59 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x8001, 0xfffffffffffffffc) ioctl(r0, 0x4000000000001276, &(0x7f0000000040)) msgget(0x2, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x4, &(0x7f0000000740)=""/223, 0xdf) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f00000002c0)={@empty, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x8) r1 = accept4$nfc_llcp(r0, &(0x7f0000000940), &(0x7f0000000080)=0x60, 0x800) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000100)={{0x0, 0x0, 0x0, 0x0, "386aea20273dc03c3d18dd0dbd4a0ca15f9f580393cc4ec3b8ee256b9aa630224ba64c6ff43ee01d2996c914"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "eda422cd37591b3a5a7a683380f7e0b9e790c6b72cd0a4f3342f7431c1699a305ca3091bb2320e8df4e298a2cca26637866a68c1426ffbd8a6c7da1d8ea77d9d", &(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x13}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x800, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000500)="d3238eea76b0470531092a0a77b0b49789a0fc97b8f8b9e23a2a5a5a0c169ed6e83480b4801dbf79db3527904ee3128c05ce2806e210237c36b88ceabe99d8784860e5d0e91fe33d38d0133e056cdd1e2910d57fc5eb1b23db3b60a7077ff33bb6c7445cd258ee25f9187269c22d1ed05acb2b9b599bd285b692257a631754ab9befebd3fdb3167361c24c5c5dcf90e476e052b9d22362c57878cb7205fe36", 0x9f, 0xfffffffffffffffe) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000300)={'gretap0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000780)=[{&(0x7f0000000840)="edb4a01f68d76905035a4ebdd427d31585a5a650581902b1c077f74ca8f1ce7d3e2f6e1c6760433af9664b3f3bebab3a1a1c4ef86f42c39b758accc1e7637bb18d28248dc7a1719b73388830b162613b17fd02220bd1fe2ad86adb96efcfc672d126ae58f745fba0e7534cdbae947449df767bd76a0c38b5752dcd13f7065edea86dc156c0708e76c2c99a94a95f1e93ff73cb3eb94e06d399cf48aaac7963d13e4b3a6b32bc2b19d5461545dcf3f71bb24442d286421f8d891d77a3c4c1c9435bbdf187682c22ded22b669b7790d05b4894166a2d5f33098cf908a23a2e0671d824e88942fbe0bd1416c98d9b", 0xed}], 0x1, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r4, 0x4010ae68, &(0x7f0000000000)={0x0, 0x5000}) ioctl$KVM_CREATE_PIT2(r4, 0x4040ae77, &(0x7f0000000440)={0xfffffffffffffff7}) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000280)='tls\x00', 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000005fd8)={'vcan0\x00'}) socket$can_raw(0x1d, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x0) r6 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x0, 0x0) connect$vsock_stream(r6, &(0x7f0000000080)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) dup2(r3, r5) dup3(r3, r4, 0x0) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000180)={0x0, r1, 0x1}) ftruncate(0xffffffffffffffff, 0x45) lseek(0xffffffffffffffff, 0x0, 0x3) 2018/03/31 07:41:59 executing program 2: r0 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)="c6cc8e60a78914d500bfeae773ddb642384ef9648af1058f5fbd2fd309524d989e8ca5c3e6e4d185de0489636bb4012cd2281d57a505b82ae678e253ab1603ef18da1e2b4f2acc3c7651ff1c670f5ed1de51a9a5a850687fc0664d9c81b66fefaf800714c085934bd42e3e21ae71d978f3e76fcbfdc2e66adff8be4d85633beb78581bf230f72954dd487c97d06409d3c6e2f7f22be6284a9b", 0x99, 0xfffffffffffffffb) socket$pppoe(0x18, 0x1, 0x0) keyctl$describe(0x6, r0, &(0x7f00000002c0)=""/200, 0xc8) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440)={0x0, 0x0, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20202, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x1010, r3, 0x0) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000000580)=ANY=[@ANYBLOB="030000000000000002004e22ac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e24ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000006ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ffffffffffffff000000000000000000000000000000000000000000000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e220000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) pwrite64(r3, &(0x7f00000004c0)="361cf8298589166f6c2d5823c3b913944a09f012cc6a80f1d50171bf0badb6b5ffdeeaef7d6bdec3b31ce16780d2546875ed31070c85d5735d1ca260f2fca2cc539989af5eafe394f9ae07fcd88029971829aeaf797a78f97cd7f8531aeeb62f497a6d2d8c61dc23348ec786a20e624fdf4c5b839bea2dc66b04b7756cc92f852e", 0x81, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000400)=0xfff, 0x4) fallocate(r3, 0x3, 0x0, 0x81) ppoll(&(0x7f0000000080)=[{r2}, {r1, 0x208}, {r3, 0x28}], 0x3, &(0x7f00000000c0), &(0x7f0000000140)={0x70000000000}, 0x8) [ 184.953994] FAULT_INJECTION: forcing a failure. [ 184.953994] name failslab, interval 1, probability 0, space 0, times 0 [ 184.965390] CPU: 0 PID: 14446 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #372 [ 184.972743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 184.982082] Call Trace: [ 184.984653] dump_stack+0x194/0x24d [ 184.988258] ? arch_local_irq_restore+0x53/0x53 [ 184.992911] should_fail+0x8c0/0xa40 [ 184.996603] ? kstrdup+0x39/0x70 [ 184.999947] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 185.005030] ? cgroup_apply_control_enable+0x390/0xbc0 [ 185.010281] ? kernfs_iop_mkdir+0x153/0x1e0 [ 185.014575] ? vfs_mkdir+0x390/0x600 [ 185.018262] ? SyS_mkdirat+0x22b/0x2b0 [ 185.022123] ? do_syscall_64+0x281/0x940 [ 185.026160] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 185.031499] ? find_held_lock+0x35/0x1d0 [ 185.035537] ? find_held_lock+0x35/0x1d0 [ 185.039576] ? __lock_is_held+0xb6/0x140 [ 185.043617] ? check_same_owner+0x320/0x320 [ 185.047915] ? rcu_note_context_switch+0x710/0x710 [ 185.052824] ? rcu_read_lock_sched_held+0x108/0x120 [ 185.057819] should_failslab+0xec/0x120 [ 185.061767] kmem_cache_alloc+0x47/0x760 [ 185.065804] ? memcpy+0x45/0x50 [ 185.069064] ? kstrdup+0x59/0x70 [ 185.072408] __kernfs_new_node+0xe2/0x570 [ 185.076534] ? kernfs_dop_revalidate+0x380/0x380 [ 185.081271] ? snprintf+0xc0/0xf0 [ 185.084700] ? vsprintf+0x40/0x40 [ 185.088129] ? rq_clock+0x90/0x90 [ 185.091559] kernfs_new_node+0x80/0xe0 [ 185.095423] __kernfs_create_file+0x4b/0x320 [ 185.099811] cgroup_addrm_files+0x3c5/0xa70 [ 185.104112] ? cgroup_file_write+0x710/0x710 [ 185.108499] ? cpu_cgroup_css_alloc+0x30/0x30 [ 185.112977] ? __lock_is_held+0xb6/0x140 [ 185.117021] ? sched_online_group+0x4e0/0x4e0 [ 185.121493] ? cpu_cgroup_css_online+0x3a/0x50 [ 185.126048] ? online_css+0x224/0x2e0 [ 185.129825] css_populate_dir+0x198/0x420 [ 185.133951] cgroup_apply_control_enable+0x390/0xbc0 [ 185.139037] ? cgroup_propagate_control+0x570/0x570 [ 185.144035] ? css_populate_dir+0x289/0x420 [ 185.148332] cgroup_mkdir+0x56f/0xfc0 [ 185.152105] ? __lock_is_held+0xb6/0x140 [ 185.156145] ? cgroup_destroy_locked+0x750/0x750 [ 185.160881] ? rcu_read_lock_sched_held+0x108/0x120 [ 185.165874] ? kmem_cache_free+0x258/0x2a0 [ 185.170085] ? set_nlink+0xc1/0x160 [ 185.173688] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 185.178593] ? generic_permission+0x105/0x3c0 [ 185.183063] ? cgroup_destroy_locked+0x750/0x750 [ 185.187796] kernfs_iop_mkdir+0x153/0x1e0 [ 185.191922] vfs_mkdir+0x390/0x600 [ 185.195441] SyS_mkdirat+0x22b/0x2b0 [ 185.199130] ? SyS_mknod+0x480/0x480 [ 185.202818] ? trace_hardirqs_on+0xd/0x10 [ 185.206942] ? do_syscall_64+0xb7/0x940 [ 185.210893] ? SyS_mknod+0x480/0x480 [ 185.214583] do_syscall_64+0x281/0x940 [ 185.218444] ? vmalloc_sync_all+0x30/0x30 [ 185.222568] ? _raw_spin_unlock_irq+0x27/0x70 [ 185.227038] ? finish_task_switch+0x1c1/0x7e0 [ 185.231510] ? syscall_return_slowpath+0x550/0x550 [ 185.236412] ? syscall_return_slowpath+0x2ac/0x550 [ 185.241317] ? prepare_exit_to_usermode+0x350/0x350 [ 185.246311] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 185.251656] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 185.256478] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 185.261643] RIP: 0033:0x454e79 [ 185.264806] RSP: 002b:00007fe2ad9eac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 185.272490] RAX: ffffffffffffffda RBX: 00007fe2ad9eb6d4 RCX: 0000000000454e79 [ 185.279735] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 185.286979] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 185.294222] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 185.301467] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000023 [ 185.309037] cgroup: cgroup_addrm_files: failed to add weight, err=-12 2018/03/31 07:41:59 executing program 2: r0 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)="c6cc8e60a78914d500bfeae773ddb642384ef9648af1058f5fbd2fd309524d989e8ca5c3e6e4d185de0489636bb4012cd2281d57a505b82ae678e253ab1603ef18da1e2b4f2acc3c7651ff1c670f5ed1de51a9a5a850687fc0664d9c81b66fefaf800714c085934bd42e3e21ae71d978f3e76fcbfdc2e66adff8be4d85633beb78581bf230f72954dd487c97d06409d3c6e2f7f22be6284a9b", 0x99, 0xfffffffffffffffb) keyctl$describe(0x6, r0, &(0x7f00000002c0)=""/200, 0xc8) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440)={0x0, 0x0, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) r3 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x1ff, 0x204001) ioctl$KVM_GET_MP_STATE(r3, 0x8004ae98, &(0x7f00000003c0)) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20202, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x1010, r4, 0x0) setsockopt$inet_MCAST_MSFILTER(r4, 0x0, 0x30, &(0x7f0000000580)=ANY=[@ANYBLOB="030000000000000002004e22ac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e24ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000006ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ffffffffffffff000000000000000000000000000000000000000000000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b2feffff000000000000000000000000000000000000000000000000000000000000000000000000000002004e220000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) pwrite64(r4, &(0x7f00000004c0)="361cf8298589166f6c2d5823c3b913944a09f012cc6a80f1d50171bf0badb6b5ffdeeaef7d6bdec3b31ce16780d2546875ed31070c85d5735d1ca260f2fca2cc539989af5eafe394f9ae07fcd88029971829aeaf797a78f97cd7f8531aeeb62f497a6d2d8c61dc23348ec786a20e624fdf4c5b839bea2dc66b04b7756cc92f852e", 0x81, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f0000000400)=0xfff, 0x4) fallocate(r4, 0x3, 0x0, 0x81) ppoll(&(0x7f0000000080)=[{r2}, {r1, 0x208}, {r4, 0x28}], 0x3, &(0x7f00000000c0), &(0x7f0000000140)={0x70000000000}, 0x8) 2018/03/31 07:42:00 executing program 1: socket$netlink(0x10, 0x3, 0xc) writev(0xffffffffffffffff, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000002031900000007000000068100023b0509000100010100ff3ffe", 0x1e}], 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000f6fff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000080)={0x1f, 0x3, {0xff, 0xba52, 0x7, 0x3f8}}, 0xe) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000a8d000)={&(0x7f0000c78ff4)={0x10}, 0xc, &(0x7f0000df6000)={&(0x7f0000b04cf4)={0x1c, 0x17, 0xa, 0xfffffffffffffffd, 0xffffffffffffffff, 0xffffffffffffffff, {}, [@typed={0x8, 0x1}]}, 0x1c}, 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002980)={0xffffffffffffffff}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000516000)) ioctl$KVM_SET_PIT2(r3, 0x4070aea0, &(0x7f0000000000)={[], 0xff}) ioctl$KVM_SET_PIT(r3, 0x8048ae66, &(0x7f000074af90)) listen(0xffffffffffffffff, 0x80000001) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e22, @multicast2=0xe0000002}}, 0x7bb7}, &(0x7f0000000500)=0x90) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000100)={0x0, 0x5, 0x41a, 0xfffffffffffffffa}, &(0x7f00000001c0)=0x10) sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f00000022c0)={&(0x7f00000021c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000002280)={&(0x7f0000000900)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYBLOB="20032bbd7000fedbdf25030000000800ed00bde88634b184053cc77f7c613c7e284c0e9ba3b2845f000000003cab80c5b07ca07d2cabee70f15584a3d73bff39db5f40e0688f2f81a638fbf6d1"], 0x2}, 0x1, 0x0, 0x0, 0x80}, 0x80) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000580)=@assoc_id=r4, 0x4) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="03000000"], 0x1}, 0x1, 0x0, 0x0, 0x20040801}, 0x40) r5 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000200)={0x31, 0x0, 0x8000, 0x10000, 0x8000, 0x0, 0xffffffff}, &(0x7f0000000240)=0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x7, 0xe, &(0x7f00000005c0)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x2}, @generic={0x0, 0x818d, 0x82e, 0x1000}, @map={0x18, 0x1, 0x1}, @map={0x18, 0x7, 0x1}, @alu={0x7, 0x4, 0x1, 0x0, 0x1, 0x138}, @ldst={0x0, 0x2, 0x6, 0x7, 0xb, 0x8, 0x4}, @exit={0x95}], &(0x7f00000006c0)='GPL\x00', 0xfffffffffffffff9, 0x98, &(0x7f0000000700)=""/152, 0x41f00, 0x1}, 0x48) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000840)=r6, 0x4) writev(r5, &(0x7f000051c000)=[{&(0x7f0000000140)="480000001400190d76a81014aed182f30284470080ffe00600000000000000a2bc5603ca0016087f89000000200000000101ff0000000309ff5bffff08c7e5ed5e00000000000000", 0x48}], 0x1) ioctl$DRM_IOCTL_CONTROL(r6, 0x40086414, &(0x7f0000002180)={0x1, 0xb40}) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000280)="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") ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f00000003c0)={'bpq0\x00', {0x2, 0x4e21, @multicast1=0xe0000001}}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000540)={'bond0\x00', 0xa00}) 2018/03/31 07:42:00 executing program 5: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000380)={'nr0\x00', {0x2, 0x4e23, @multicast2=0xe0000002}}) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000007c0)={{0xa, 0x4e24, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x9}, 0x0, [0x200, 0x7, 0x437, 0x0, 0x0, 0x22b1, 0x7fffffff, 0x9]}, 0x5c) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x100000000000002, 0xc, 0x0, 0x70bd28, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2=0xe0000002}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}]}, 0x60}, 0x1}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000b00), 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000400)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast2, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000100)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) getsockopt$inet6_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000b40)=""/4096, &(0x7f00000003c0)=0x1000) r2 = gettid() renameat2(r0, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x4) sched_rr_get_interval(r2, &(0x7f0000000340)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) prctl$seccomp(0x16, 0x2, &(0x7f0000000480)={0x7, &(0x7f0000000440)=[{0xffff, 0xa4, 0x22, 0xfffffffffffffe01}, {0x7fffffff, 0x0, 0x800}, {0x1f, 0x3, 0x4}, {0x0, 0x80, 0x0, 0x3}, {0x0, 0x1, 0x0, 0x5}, {0x225, 0xc34, 0x0, 0x4}, {0x0, 0x6, 0x2000000000000, 0x311925ba}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000880)=ANY=[], 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000080)=0x8) clone(0x0, &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000ce4000), &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cgroup.controllers\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000280)='/dev/sg#\x00', 0x6, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000100)="ecccc5cbd166c7986dd2bf33851e8dc5190e44848eee68a1a5efd3b51664426e6d017e67c9a0fe4a93ba", 0x2a, 0x40, &(0x7f00000001c0)=@nfc={0x27, 0x1, 0x2}, 0x80) connect(0xffffffffffffffff, &(0x7f0000000080)=@ipx={0x4, 0x0, 0x0, "ae24d2e4d0c5"}, 0x80) mmap(&(0x7f0000000000/0xfea000)=nil, 0xfea000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 2018/03/31 07:42:00 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x20011, r0, 0x0) sync_file_range(r0, 0x80, 0x8080000, 0x6) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008000)={0x44, 0x0, &(0x7f0000004fbc)=ANY=[@ANYBLOB='\x00c@@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00(\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f000026c000)=ANY=[@ANYBLOB='\x00\x00\x00', @ANYPTR=&(0x7f00004edf8a)=ANY=[@ANYBLOB='\x00'], @ANYBLOB="010000000000000000000000000000000000000000000000"], @ANYPTR=&(0x7f000000afd0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']], 0x0, 0x0, &(0x7f0000009000)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00001eafd0)={0x8, 0x0, &(0x7f0000d88000)=[@increfs={0x40046304, 0x1}], 0x0, 0x0, &(0x7f00004ec000)}) 2018/03/31 07:42:00 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0xaf01, &(0x7f0000307000)=&(0x7f0000989fff)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000000)=ANY=[]) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000140)={0x0, r1}) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000000)=r1) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000cef000)={0x1, 0x0, &(0x7f000062a000)=""/167, &(0x7f0000aac000)=""/21, &(0x7f00002fdf52)=""/174}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000040)=0x1) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000f82ffc)=0x4001) dup2(r1, r0) eventfd(0x0) 2018/03/31 07:42:00 executing program 7 (fault-call:10 fault-nth:36): r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4900, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000240)=0x4) getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) r1 = dup(0xffffffffffffff9c) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r2 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r2, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r2, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r2, &(0x7f0000000100)=""/65, 0x41) r3 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) fchdir(r2) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(r3, &(0x7f0000000200)='./file1\x00', r2, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r2, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000580)=""/80, 0x50}, {&(0x7f00000008c0)=""/4096, 0x1000}], 0x2, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x20) r5 = syz_open_dev$sndpcmp(&(0x7f00000018c0)='/dev/snd/pcmC#D#p\x00', 0x3, 0x10a00) ioctl$KVM_GET_DEVICE_ATTR(r5, 0x4018aee2, &(0x7f0000001940)={0x0, 0x100, 0x9, &(0x7f0000001900)}) recvfrom$ipx(r4, &(0x7f00000006c0)=""/52, 0x34, 0x100, &(0x7f0000000700)={0x4, 0x9a2, 0x4, "dc108d9d4391", 0x5}, 0x10) renameat(r2, &(0x7f0000001980)='./file1\x00', r5, &(0x7f00000019c0)='./file0/file0\x00') r6 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r6, 0x4, 0x0) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000040), 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r6, &(0x7f0000000200), 0xfffffe08) 2018/03/31 07:42:00 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) acct(&(0x7f0000001240)='./file0\x00') setrlimit(0xa, &(0x7f0000000380)={0x4, 0x1}) getsockname(0xffffffffffffff9c, &(0x7f0000001480)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f00000012c0)=0x80) socketpair(0x10, 0x0, 0x8, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000001580)={r3}) r4 = open(&(0x7f00000010c0)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000001300)={0x8, 0x0, 0x6, 0x58a, 0x0}, &(0x7f0000001340)=0x10) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x3052, r3, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f00000001c0)={'bond0\x00', {0x2, 0x4e20, @multicast2=0xe0000002}}) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f0000000280), 0x8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000400)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000040)=0x2) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000100)={r7, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000001380)={r5, @in6={{0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0xf}}}, 0x0, 0x7, 0x0, 0x8, 0x92}, &(0x7f0000001440)=0x98) eventfd(0xffffffff80000001) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000001140)={0x4, 0x8001, 0x40, 0xfffffffffffffffd, 0x0}, &(0x7f0000001180)=0x10) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f0000001500)) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000011c0)={0x95e, 0x101, 0x8009, 0x1ff, 0x31386ac8, 0x8, 0x1, 0x7, r8}, 0x20) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x1, 0x1) recvfrom(r1, &(0x7f00000015c0)=""/83, 0x53, 0x120, 0x0, 0x0) symlinkat(&(0x7f0000001080)='./file0\x00', r4, &(0x7f0000001100)='./file0\x00') close(r6) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={r4, r4, 0x4, 0x3}, 0x10) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) r11 = getegid() setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000002c0)={r9, r10, r11}, 0xc) getsockname$netlink(r1, &(0x7f0000000300), &(0x7f00000003c0)=0xc) 2018/03/31 07:42:00 executing program 2: r0 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)="c6cc8e60a78914d500bfeae773ddb642384ef9648af1058f5fbd2fd309524d989e8ca5c3e6e4d185de0489636bb4012cd2281d57a505b82ae678e253ab1603ef18da1e2b4f2acc3c7651ff1c670f5ed1de51a9a5a850687fc0664d9c81b66fefaf800714c085934bd42e3e21ae71d978f3e76fcbfdc2e66adff8be4d85633beb78581bf230f72954dd487c97d06409d3c6e2f7f22be6284a9b", 0x99, 0xfffffffffffffffb) keyctl$describe(0x6, r0, &(0x7f00000002c0)=""/200, 0xc8) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440)={0x0, 0x0, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20202, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x1010, r3, 0x0) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000000580)=ANY=[@ANYBLOB="030000000000000002004e22ac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e24ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000006ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ffffffffffffff000000000000000000000000000000000000000000000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e220000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) pwrite64(r3, &(0x7f00000004c0)="361cf8298589166f6c2d5823c3b913944a09f012cc6a80f1d50171bf0badb6b5ffdeeaef7d6bdec3b31ce16780d2546875ed31070c85d5735d1ca260f2fca2cc539989af5eafe394f9ae07fcd88029971829aeaf797a78f97cd7f8531aeeb62f497a6d2d8c61dc23348ec786a20e624fdf4c5b839bea2dc66b04b7756cc92f852e", 0x81, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000400)=0xfff, 0x4) fallocate(r3, 0x3, 0x0, 0x1000000000000081) ppoll(&(0x7f0000000080)=[{r2}, {r1, 0x208}, {r3, 0x28}], 0x3, &(0x7f00000000c0), &(0x7f0000000140)={0x70000000000}, 0x8) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f00000003c0)={r3, r3}) bind$bt_l2cap(r3, &(0x7f0000000040)={0x1f, 0x200, {0x6, 0x3, 0x3000000000000, 0x0, 0xfffffffffffffff9}, 0x0, 0x4}, 0xe) 2018/03/31 07:42:00 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000212ff8)='./file0\x00', &(0x7f000078eff8)='./file0\x00', &(0x7f0000982ff9)='mqueue\x00', 0x0, &(0x7f0000653fff)) r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x1, 0x40000) accept4$unix(r0, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e, 0x800) r1 = creat(&(0x7f0000015ff4)='./file0/bus\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e23, 0x40, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}, 0x4}}}, &(0x7f0000000280)=0x84) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f00000002c0)={r2, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, 0x84) mq_notify(r1, &(0x7f0000477fa0)={0x0, 0x0, 0x0, @thr={&(0x7f0000bc8000), &(0x7f0000589000)}}) connect$rds(r0, &(0x7f0000000180)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) close(r1) 2018/03/31 07:42:00 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0xaf01, &(0x7f0000307000)=&(0x7f0000989fff)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000000)=ANY=[]) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000140)={0x0, r1}) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000000)=r1) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000cef000)={0x1, 0x0, &(0x7f000062a000)=""/167, &(0x7f0000aac000)=""/21, &(0x7f00002fdf52)=""/174}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000040)=0x1) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000f82ffc)=0x4001) dup2(r1, r0) eventfd(0x0) [ 186.440457] FAULT_INJECTION: forcing a failure. [ 186.440457] name failslab, interval 1, probability 0, space 0, times 0 [ 186.451745] CPU: 1 PID: 14489 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #372 [ 186.459098] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 186.468435] Call Trace: [ 186.471007] dump_stack+0x194/0x24d [ 186.474621] ? arch_local_irq_restore+0x53/0x53 [ 186.479278] should_fail+0x8c0/0xa40 [ 186.482976] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 186.488060] ? rb_first_postorder+0xa0/0xa0 [ 186.492360] ? __mutex_lock+0x16f/0x1a80 [ 186.496405] ? trace_hardirqs_off+0x10/0x10 [ 186.500707] ? find_held_lock+0x35/0x1d0 [ 186.504751] ? __lock_is_held+0xb6/0x140 [ 186.508803] ? check_same_owner+0x320/0x320 [ 186.513101] ? lock_downgrade+0x980/0x980 [ 186.517228] ? rcu_note_context_switch+0x710/0x710 [ 186.522148] should_failslab+0xec/0x120 [ 186.526101] __kmalloc_track_caller+0x5f/0x760 [ 186.530667] ? string+0x180/0x200 [ 186.534097] ? kstrdup_const+0x39/0x50 [ 186.537967] kstrdup+0x39/0x70 [ 186.541143] kstrdup_const+0x39/0x50 [ 186.544842] __kernfs_new_node+0xa2/0x570 [ 186.548972] ? kernfs_dop_revalidate+0x380/0x380 [ 186.553718] ? snprintf+0xc0/0xf0 [ 186.557671] ? vsprintf+0x40/0x40 [ 186.561105] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 186.566021] ? cgroup_file_name+0x1d0/0x1d0 [ 186.570330] kernfs_new_node+0x80/0xe0 [ 186.574200] __kernfs_create_file+0x4b/0x320 [ 186.578589] cgroup_addrm_files+0x3c5/0xa70 [ 186.582897] ? cgroup_file_write+0x710/0x710 [ 186.587284] ? cpu_cgroup_css_alloc+0x30/0x30 [ 186.591769] ? __lock_is_held+0xb6/0x140 [ 186.595814] ? sched_online_group+0x4e0/0x4e0 [ 186.600287] ? cpu_cgroup_css_online+0x3a/0x50 [ 186.604847] ? online_css+0x224/0x2e0 [ 186.608628] css_populate_dir+0x198/0x420 [ 186.612761] cgroup_apply_control_enable+0x390/0xbc0 [ 186.617851] ? cgroup_propagate_control+0x570/0x570 [ 186.622852] ? css_populate_dir+0x289/0x420 [ 186.627156] cgroup_mkdir+0x56f/0xfc0 [ 186.630932] ? __lock_is_held+0xb6/0x140 [ 186.634975] ? cgroup_destroy_locked+0x750/0x750 [ 186.639709] ? rcu_read_lock_sched_held+0x108/0x120 [ 186.644706] ? kmem_cache_free+0x258/0x2a0 [ 186.648919] ? set_nlink+0xc1/0x160 [ 186.652524] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 186.657430] ? generic_permission+0x105/0x3c0 [ 186.661904] ? cgroup_destroy_locked+0x750/0x750 [ 186.666640] kernfs_iop_mkdir+0x153/0x1e0 [ 186.670769] vfs_mkdir+0x390/0x600 [ 186.674288] SyS_mkdirat+0x22b/0x2b0 [ 186.677983] ? SyS_mknod+0x480/0x480 [ 186.681673] ? trace_hardirqs_on+0xd/0x10 [ 186.685802] ? do_syscall_64+0xb7/0x940 [ 186.689755] ? SyS_mknod+0x480/0x480 [ 186.693450] do_syscall_64+0x281/0x940 [ 186.697318] ? vmalloc_sync_all+0x30/0x30 [ 186.701447] ? _raw_spin_unlock_irq+0x27/0x70 [ 186.705923] ? finish_task_switch+0x1c1/0x7e0 [ 186.710394] ? syscall_return_slowpath+0x550/0x550 [ 186.715303] ? syscall_return_slowpath+0x2ac/0x550 [ 186.720210] ? prepare_exit_to_usermode+0x350/0x350 [ 186.725218] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 186.730567] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 186.735391] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 186.740558] RIP: 0033:0x454e79 [ 186.743725] RSP: 002b:00007fe2ad9eac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 186.751412] RAX: ffffffffffffffda RBX: 00007fe2ad9eb6d4 RCX: 0000000000454e79 [ 186.758659] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 186.765905] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 186.773151] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 186.780396] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000024 2018/03/31 07:42:01 executing program 2: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$bt_hci(r0, 0x0, 0x0, &(0x7f0000000200)=""/104, &(0x7f0000000040)=0x68) r1 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000a40)="c6cc8e60a78914d500bfeae773ddb642384ef9648af1058f5fbd2fd309524d989e8ca5c3e6e4d185de0489636bb4012cd2281d57a505b82ae678e253ab1603ef18da1e2b4f2acc3c7651ff1c670f5ed1de51a9a5a850687fc0664d9c81b66fefaf800714c085934bd42e3e21ae71d978f3e76fcbfdc2e66adff8be4d85633beb78581bf230f72954dd487c97d06409d3c6e2f7f22be6284a9b", 0x99, 0xfffffffffffffffb) keyctl$describe(0x6, r1, &(0x7f00000002c0)=""/200, 0xc8) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440)={0x0, 0x0, 0xffffffffffffffff}) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20202, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x1010, r4, 0x0) setsockopt$inet_MCAST_MSFILTER(r4, 0x0, 0x30, &(0x7f0000000580)=ANY=[@ANYBLOB="030000000000000002004e22ac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e24ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000006ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ffffffffffffff000000000000000000000000000000000000000000000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e220000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) pwrite64(r4, &(0x7f00000004c0)="361cf8298589166f6c2d5823c3b913944a09f012cc6a80f1d50171bf0badb6b5ffdeeaef7d6bdec3b31ce16780d2546875ed31070c85d5735d1ca260f2fca2cc539989af5eafe394f9ae07fcd88029971829aeaf797a78f97cd7f8531aeeb62f497a6d2d8c61dc23348ec786a20e624fdf4c5b839bea2dc66b04b7756cc92f852e", 0x81, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f0000000400)=0xfff, 0x4) fallocate(r4, 0x3, 0x0, 0x81) ppoll(&(0x7f0000000080)=[{r3}, {r2, 0x208}, {r4, 0x28}], 0x3, &(0x7f00000000c0), &(0x7f0000000140)={0x70000000000}, 0x8) 2018/03/31 07:42:01 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) acct(&(0x7f0000001240)='./file0\x00') setrlimit(0xa, &(0x7f0000000380)={0x4, 0x1}) getsockname(0xffffffffffffff9c, &(0x7f0000001480)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f00000012c0)=0x80) socketpair(0x10, 0x0, 0x8, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000001580)={r3}) r4 = open(&(0x7f00000010c0)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000001300)={0x8, 0x0, 0x6, 0x58a, 0x0}, &(0x7f0000001340)=0x10) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x3052, r3, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f00000001c0)={'bond0\x00', {0x2, 0x4e20, @multicast2=0xe0000002}}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYBLOB="408615824f3f781ae75fcc9554f019621eaccb21d7ca5fb77c06ff41c0d07d78b6de0ed01fa10b1070cb77afb61679a7f893b0c78371e1195ef393dc87b1b329811e67705b9e1bb5dc00c5b14645b010d310e491c159a81b77145882a63f6206ecfb54b4f6b2ddf7963c2b2681ff1aa2dfd55f1e73b02e150e1f8e51e6ae3615336ed2b2b461fccd4ec00311dd4b00cf4316fb4bda9fa1a0a94d01d4db3209cd302a449b841dc10fcc2d63482b979cb70c21ef7000e655a7a1a18b57b6cd06267ef9f582b4783e42e60f460962921710e11ac51a3f9fa92e9118c5f0e1d8b2c342"], &(0x7f0000000040)=0x2) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000100)={r7, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000001380)={r5, @in6={{0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0xf}}}, 0x0, 0x7, 0x0, 0x8, 0x92}, &(0x7f0000001440)=0x98) eventfd(0xffffffff80000001) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000001140)={0x4, 0x8001, 0x40, 0xfffffffffffffffd, 0x0}, &(0x7f0000001180)=0x10) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f0000001500)) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000011c0)={0x95e, 0x101, 0x8009, 0x1ff, 0x31386ac8, 0x8, 0x1, 0x7, r8}, 0x20) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x1, 0x1) recvfrom(r1, &(0x7f00000015c0)=""/83, 0x53, 0x120, 0x0, 0x0) symlinkat(&(0x7f0000001080)='./file0\x00', r4, &(0x7f0000001100)='./file0\x00') close(r0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={r4, r4, 0x4, 0x3}, 0x10) getsockname$netlink(r1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) 2018/03/31 07:42:01 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00007a0000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000bba000)={&(0x7f00003a2000)=@abs, 0x8, &(0x7f00006c6ff0), 0x0, &(0x7f0000000240)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) sendmsg$unix(r2, &(0x7f000062e000)={&(0x7f0000690ff6)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f000000d000), 0x0, &(0x7f0000000ff0)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) close(r1) close(r0) ioprio_get$pid(0x3, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') readv(r3, &(0x7f0000000740)=[{&(0x7f0000000200)=""/41, 0x29}, {&(0x7f0000000440)=""/128, 0x80}, {&(0x7f00000002c0)=""/32, 0x20}, {&(0x7f00000005c0)=""/68, 0x44}, {&(0x7f0000000640)=""/240, 0xf0}], 0x5) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000180)={0x1000, 0x1, 0xff, 0x1, 0xf5d1}, 0xc) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$KDENABIO(r3, 0x4b36) recvmsg$netrom(r3, &(0x7f0000001080)={&(0x7f0000000780)=@ax25={0x3, {"3c1b7251c1894a"}}, 0x10, &(0x7f0000000fc0), 0x0, &(0x7f0000000ac0), 0x0, 0x80}, 0x40000140) sendto(r3, &(0x7f00000008c0), 0x0, 0x0, &(0x7f0000000900)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x1, 0x0, 0x2, {0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x9}}}, 0x80) ptrace$peek(0x1, 0x0, &(0x7f00000001c0)) mlockall(0x3) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)="ad413983dce8fda692b19ca665e8ec77fa460cd42977c0457fd5e513959b8c97ae621bb4901c4e02feb9c506bb7a185e14ce240442c0569367f41339a6de4e23d1c7ab2eec7dc1dc53ce1c19d3504046b72e65dabe993f437b12590fe45fc9a1236595beacd35ff917e5a427d696b47b636d7b8ab7a062ac1180123f81627f543e06398f178e65a5f2920a33200f49ae23b1750ee243d672a52ec9bcc307ac32ec5b8c81d340629118e2f350b2e2f6c2e234") ioctl$sock_inet6_udp_SIOCINQ(r3, 0x541b, &(0x7f0000000c80)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000a80)={0x1, &(0x7f0000000080)=[{0x8, 0x0, 0xdda3}]}, 0x10) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f00000008c0)='.', &(0x7f0000000a40)='./file0\x00', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000980)) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000a00)=0x439d0444) mount(&(0x7f000000a000)='.', &(0x7f0000852000)='.', &(0x7f0000a60000)='ramfs\x00', 0x0, &(0x7f0000d1cfff)="d6") preadv(r3, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) connect$vsock_stream(r3, &(0x7f0000000580)={0x28, 0x0, 0x2711, @host=0x2}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000500)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000ac0], 0x0, &(0x7f00000004c0), &(0x7f0000000ac0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffc}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x0, 0x63, 0x0, 'eql\x00', 'ipddp0\x00', 'nr0\x00', 'ip6gre0\x00', @empty, [0x0, 0x0, 0x0, 0xff, 0xff], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0xff], 0x70, 0xb8, 0xe0}, [@common=@log={'log\x00', 0x24, {{0x10001, "25d4237edf0250c72ef30c7f911844fe0b5b7267b1682a34651f081c5bc3", 0xb}}}]}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4, {{0xfffffffffffff52e}}}}]}, {0x0, '\x00', 0x1}]}, 0x1f8) gettid() [ 186.788201] cgroup: cgroup_addrm_files: failed to add weight.nice, err=-12 [ 186.801512] binder: 14485:14494 got transaction with invalid offset (0, min 0 max 40) or object. [ 186.831784] binder: 14485:14494 transaction failed 29201/-22, size 40-8 line 3026 2018/03/31 07:42:01 executing program 2: r0 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)="c6cc8e60a78914d500bfeae773ddb642384ef9648af1058f5fbd2fd309524d989e8ca5c3e6e4d185de0489636bb4012cd2281d57a505b82ae678e253ab1603ef18da1e2b4f2acc3c7651ff1c670f5ed1de51a9a5a850687fc0664d9c81b66fefaf800714c085934bd42e3e21ae71d978f3e76fcbfdc2e66adff8be4d85633beb78581bf230f72954dd487c97d06409d3c6e2f7f22be6284a9b", 0x99, 0xfffffffffffffffb) keyctl$describe(0x6, r0, &(0x7f00000002c0)=""/200, 0xc8) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440)={0x0, 0x0, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20202, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x8000001010, r3, 0x0) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000000580)=ANY=[@ANYBLOB="030000000000000002004e22ac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e24ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000006ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ffffffffffffff000000000000000000000000000000000000000000000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e220000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) pwrite64(r3, &(0x7f00000004c0)="361cf8298589166f6c2d5823c3b913944a09f012cc6a80f1d50171bf0badb6b5ffdeeaef7d6bdec3b31ce16780d2546875ed31070c85d5735d1ca260f2fca2cc539989af5eafe394f9ae07fcd88029971829aeaf797a78f97cd7f8531aeeb62f497a6d2d8c61dc23348ec786a20e624fdf4c5b839bea2dc66b04b7756cc92f852e", 0x81, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000400)=0xfff, 0x4) fallocate(r3, 0x3, 0x0, 0x81) ppoll(&(0x7f0000000080)=[{r2}, {r1, 0x208}, {r3, 0x28}], 0x3, &(0x7f00000000c0), &(0x7f0000000140)={0x70000000000}, 0x8) 2018/03/31 07:42:01 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000014c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003c1000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00004f0000)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000340)="11f0ce816e3e86e498ffde8e889d90a0e2094b9bb7a41a392264b1bbde25b30bdb6b7b64921a26363de055d9cbbf12998ec04f0e29a9c1f44fa642ff9ba5e94936fc03ad9e0e3ad1f0cc82444e6498e25bfddbad6a3b22ccee2edda118d6f29223705bd0962e340eac4e33050b73266fbeddcb61c7af3867bf7a6c20259edca9c494e0d35c6da163dd82e1b7bc1dfcc33b4aaf0214a452db86bd7b4cdb7787e1229162df", 0xa4}], 0x1, &(0x7f0000000000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18, 0x40000}, 0x0) recvmsg(r1, &(0x7f0000d43000)={&(0x7f000076c000)=@hci, 0x3, &(0x7f0000ae0fc0)=[{&(0x7f0000b9ff8b)=""/117, 0xa5}], 0x1, &(0x7f0000837f57)=""/169, 0xa9}, 0x0) [ 186.899851] binder: BINDER_SET_CONTEXT_MGR already set [ 186.905267] binder_alloc: 14485: binder_alloc_buf, no vma [ 186.910898] binder: 14485:14519 transaction failed 29189/-3, size 40-8 line 2963 [ 186.928456] binder: 14485:14494 ioctl 40046207 0 returned -16 2018/03/31 07:42:01 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0xaf01, &(0x7f0000307000)=&(0x7f0000989fff)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000000)=ANY=[]) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000140)={0x0, r1}) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000000)=r1) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000cef000)={0x1, 0x0, &(0x7f000062a000)=""/167, &(0x7f0000aac000)=""/21, &(0x7f00002fdf52)=""/174}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000040)=0x1) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000f82ffc)=0x4001) dup2(r1, r0) eventfd(0x0) 2018/03/31 07:42:01 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00007a0000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000bba000)={&(0x7f00003a2000)=@abs, 0x8, &(0x7f00006c6ff0), 0x0, &(0x7f0000000240)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) sendmsg$unix(r2, &(0x7f000062e000)={&(0x7f0000690ff6)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f000000d000), 0x0, &(0x7f0000000ff0)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) close(r0) ioprio_get$pid(0x3, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') readv(0xffffffffffffffff, &(0x7f0000000740)=[{&(0x7f0000000200)=""/41, 0x29}, {&(0x7f0000000440)=""/128, 0x80}, {&(0x7f00000002c0)=""/32, 0x20}, {&(0x7f00000005c0)=""/68, 0x44}, {&(0x7f0000000640)=""/240, 0xf0}], 0x5) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000180)={0x1000, 0x1, 0xff, 0x1, 0xf5d1}, 0xc) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$KDENABIO(r3, 0x4b36) recvmsg$netrom(0xffffffffffffffff, &(0x7f0000001080)={&(0x7f0000000780)=@ax25={0x3, {"3c1b7251c1894a"}}, 0x10, &(0x7f0000000fc0), 0x0, &(0x7f0000000ac0), 0x0, 0x80}, 0x40000140) sendto(0xffffffffffffffff, &(0x7f00000008c0), 0x0, 0x0, &(0x7f0000000900)=@pppol2tpv3in6={0x18, 0x1, {0x0, r3, 0x3, 0x1, 0x0, 0x2, {0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x9}}}, 0x80) ptrace$peek(0x1, 0x0, &(0x7f00000001c0)) mlockall(0x3) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x1, &(0x7f00000007c0)="ad413983dce8fda692b19ca665e8ec77fa460cd42977c0457fd5e513959b8c97ae621bb4901c4e02feb9c506bb7a185e14ce240442c0569367f41339a6de4e23d1c7ab2eec7dc1dc53ce1c19d3504046b72e65dabe993f437b12590fe45fc9a1236595beacd35ff917e5a427d696b47b636d7b8ab7a062ac1180123f81627f543e06398f178e65a5f2920a33200f49ae23b1750ee243d672a52ec9bcc307ac32ec5b8c81d340629118e2f350b2e2f6c2e234") mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000a80)={0x0, &(0x7f0000000080)}, 0x8) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f00000008c0)='.', &(0x7f0000000a40)='./file0\x00', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000980)) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000a00)=0x439d0444) mount(&(0x7f000000a000)='.', &(0x7f0000852000)='.', &(0x7f0000a60000)='ramfs\x00', 0x0, &(0x7f0000d1cfff)="d6") preadv(r3, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) connect$vsock_stream(r3, &(0x7f0000000580)={0x28, 0x0, 0x2711, @host=0x2}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000500)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000ac0], 0x0, &(0x7f00000004c0), &(0x7f0000000ac0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffc}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x0, 0x63, 0x0, 'eql\x00', 'ipddp0\x00', 'nr0\x00', 'ip6gre0\x00', @empty, [0x0, 0x0, 0x0, 0xff, 0xff], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0xff], 0x70, 0xb8, 0xe0}, [@common=@log={'log\x00', 0x24, {{0x10001, "25d4237edf0250c72ef30c7f911844fe0b5b7267b1682a34651f081c5bc3", 0xb}}}]}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4, {{0xfffffffffffff52e}}}}]}, {0x0, '\x00', 0x1}]}, 0x1f8) 2018/03/31 07:42:01 executing program 7 (fault-call:10 fault-nth:37): r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4900, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000240)=0x4) getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) r1 = dup(0xffffffffffffff9c) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r2 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r2, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r2, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r2, &(0x7f0000000100)=""/65, 0x41) r3 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) fchdir(r2) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(r3, &(0x7f0000000200)='./file1\x00', r2, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r2, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000580)=""/80, 0x50}, {&(0x7f00000008c0)=""/4096, 0x1000}], 0x2, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x20) r5 = syz_open_dev$sndpcmp(&(0x7f00000018c0)='/dev/snd/pcmC#D#p\x00', 0x3, 0x10a00) ioctl$KVM_GET_DEVICE_ATTR(r5, 0x4018aee2, &(0x7f0000001940)={0x0, 0x100, 0x9, &(0x7f0000001900)}) recvfrom$ipx(r4, &(0x7f00000006c0)=""/52, 0x34, 0x100, &(0x7f0000000700)={0x4, 0x9a2, 0x4, "dc108d9d4391", 0x5}, 0x10) renameat(r2, &(0x7f0000001980)='./file1\x00', r5, &(0x7f00000019c0)='./file0/file0\x00') r6 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r6, 0x4, 0x0) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000040), 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r6, &(0x7f0000000200), 0xfffffe08) 2018/03/31 07:42:01 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000fdaff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fd9ffc)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x4000, 0x0) ioctl$TCFLSH(r0, 0x540b, 0x1) r1 = memfd_create(&(0x7f0000000100)=']\x00', 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r2) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_pid(r3, &(0x7f0000000100)=ANY=[], 0x1023c) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) inotify_init1(0x800) fallocate(r3, 0x0, 0x0, 0xffff) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000180)={0x8, 0x206c413e, 0x7}) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r4, 0x84, 0x16, &(0x7f00000003c0)={0x5, [0x80000000, 0x9cd, 0x27, 0x80, 0x8000]}, 0xe) r5 = inotify_init1(0x0) r6 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) dup2(r5, r6) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000240), &(0x7f0000000280)=0xc) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0xffffffffffff2607, @mcast2={0xff, 0x2, [], 0x1}, 0x6}}, 0x0, 0x0, 0x8}, &(0x7f0000000380)=0x98) unshare(0x0) ioprio_set$pid(0x0, 0x0, 0x0) pipe(&(0x7f0000000480)) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000200)) exit_group(0x7) 2018/03/31 07:42:01 executing program 2: r0 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)="c6cc8e60a78914d500bfeae773ddb642384ef9648af1058f5fbd2fd309524d989e8ca5c3e6e4d185de0489636bb4012cd2281d57a505b82ae678e253ab1603ef18da1e2b4f2acc3c7651ff1c670f5ed1de51a9a5a850687fc0664d9c81b66fefaf800714c085934bd42e3e21ae71d978f3e76fcbfdc2e66adff8be4d85633beb78581bf230f72954dd487c97d06409d3c6e2f7f22be6284a9b", 0x99, 0xfffffffffffffffb) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x9, 0x200000) ioctl$sock_ipx_SIOCIPXNCPCONN(r1, 0x89e3, &(0x7f00000003c0)=0x4) keyctl$describe(0x6, r0, &(0x7f00000002c0)=""/200, 0xc8) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440)={0x0, 0x0, 0xffffffffffffffff}) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000000480)={r1, 0x0, 0x2, "9564269f499d9c806c3431eca9835de3b37842bcfd3546c02d42e88f42"}) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20202, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x1010, r4, 0x0) setsockopt$inet_MCAST_MSFILTER(r4, 0x0, 0x30, &(0x7f0000000580)=ANY=[@ANYBLOB="030000000000000002004e22ac1414aa00800000000000000000000000000000000000000000000000000000000000e9ffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e24ac1414aa000000000000000000000000000000000000000000000000a9000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000006ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ffffffffffffff000000000000000000000000000000000000000000000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000850d0cda15d29c1e000002004e20ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e220000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) pwrite64(r4, &(0x7f00000004c0)="361cf8298589166f6c2d5823c3b913944a09f012cc6a80f1d50171bf0badb6b5ffdeeaef7d6bdec3b31ce16780d2546875ed31070c85d5735d1ca260f2fca2cc539989af5eafe394f9ae07fcd88029971829aeaf797a78f97cd7f8531aeeb62f497a6d2d8c61dc23348ec786a20e624fdf4c5b839bea2dc66b04b7756cc92f852e", 0x81, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f0000000400)=0xfff, 0x4) fallocate(r4, 0x3, 0x0, 0x81) ppoll(&(0x7f0000000080)=[{r3}, {r2, 0x208}, {r4, 0x28}], 0x3, &(0x7f00000000c0), &(0x7f0000000140)={0x70000000000}, 0x8) [ 186.979974] binder: undelivered TRANSACTION_ERROR: 29189 [ 186.986753] binder: undelivered TRANSACTION_ERROR: 29201 2018/03/31 07:42:01 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0xaf01, &(0x7f0000307000)=&(0x7f0000989fff)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000000)=ANY=[]) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000140)={0x0, r1}) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000000)=r1) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000180)={0x0, 0x1, &(0x7f0000000280)=""/147, &(0x7f0000000340)=""/223, &(0x7f0000000580)=""/4096}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000040)=0x1) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000f82ffc)=0x4001) dup2(r1, r0) eventfd(0x0) 2018/03/31 07:42:01 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) acct(&(0x7f0000001240)='./file0\x00') setrlimit(0xa, &(0x7f0000000380)={0x4, 0x1}) getsockname(0xffffffffffffff9c, &(0x7f0000001480)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f00000012c0)=0x80) socketpair(0x10, 0x0, 0x8, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000001580)={r3}) r5 = open(&(0x7f00000010c0)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r5, 0x84, 0x22, &(0x7f0000001300)={0x8, 0x0, 0x6, 0x58a, 0x0}, &(0x7f0000001340)=0x10) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x3052, r3, 0x0) ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f00000001c0)={'bond0\x00', {0x2, 0x4e20, @multicast2=0xe0000002}}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYBLOB="408615824f3f781ae75fcc9554f019621eaccb21d7ca5fb77c06ff41c0d07d78b6de0ed01fa10b1070cb77afb61679a7f893b0c78371e1195ef393dc87b1b329811e67705b9e1bb5dc40c5b14645b010d310e491c159a81b77145882a63f6206ecfb54b4f6b2ddf7963c2b2681ff1aa2dfd55f1e73b02e150e1f8e51e6ae3615336ed2b2b461fccd6ec00311dd4b00cf4316fb4bda9fa1a0a94d01d4db63482b979cb70c21ef7000e655a7a1a38b57b6cd06267ef9f582b4783e42e60f460962921710e11ac51a3f9fa92e9118c5f0e1d8b2c342"], &(0x7f0000000040)=0x2) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000100)={r8, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000001380)={r6, @in6={{0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0xf}}}, 0x0, 0x7, 0x0, 0x8, 0x92}, &(0x7f0000001440)=0x98) eventfd(0xffffffff80000001) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, &(0x7f0000001500)) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000011c0)={0x95e, 0x101, 0x8009, 0x1ff, 0x31386ac8, 0x8, 0x1, 0x7}, 0x20) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x1, 0x1) recvfrom(r1, &(0x7f00000015c0)=""/83, 0x53, 0x120, 0x0, 0x0) ioctl$PPPIOCSFLAGS(r4, 0x40047459, &(0x7f0000000400)=0x80) symlinkat(&(0x7f0000001080)='./file0\x00', r5, &(0x7f0000001100)='./file0\x00') close(r0) r9 = openat$audio(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/audio\x00', 0x4000, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={r5, r5, 0x4, 0x3}, 0x10) getsockname$netlink(r1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) r10 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r9, &(0x7f00000006c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0xa05000}, 0xc, &(0x7f0000000680)={&(0x7f00000004c0)={0x1c0, r10, 0x300, 0x70bd2d, 0x25dfdbfe, {0x10}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2={0xff, 0x2, [], 0x1}}]}, @IPVS_CMD_ATTR_SERVICE={0x4c, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1, 0x8}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8, 0x10}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DEST={0x40, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x200}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xfffffffffffffff9}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xfff}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x4}]}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x0, 0xc}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7fffffff}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x4}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}]}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x41}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ipddp0\x00'}]}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'none\x00'}]}, @IPVS_CMD_ATTR_SERVICE={0x5c, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1={0xff, 0x1, [], 0x1}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x0, 0x8}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x16}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}]}]}, 0x1c0}, 0x1, 0x0, 0x0, 0x80}, 0x0) 2018/03/31 07:42:01 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00007a0000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000bba000)={&(0x7f00003a2000)=@abs, 0x8, &(0x7f00006c6ff0), 0x0, &(0x7f0000000240)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) sendmsg$unix(r2, &(0x7f000062e000)={&(0x7f0000690ff6)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f000000d000), 0x0, &(0x7f0000000ff0)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) close(r1) close(r0) ioprio_get$pid(0x3, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') readv(0xffffffffffffffff, &(0x7f0000000740)=[{&(0x7f0000000200)=""/41, 0x29}, {&(0x7f0000000380)=""/190, 0xbe}, {&(0x7f0000000440)=""/128, 0x80}, {&(0x7f00000002c0)=""/32, 0x20}, {&(0x7f00000005c0)=""/68, 0x44}, {&(0x7f0000000640)=""/240, 0xf0}], 0x6) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000180)={0x0, 0x1, 0xff, 0x1, 0xf5d1}, 0xc) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) sendto(r3, &(0x7f00000008c0), 0x0, 0x0, &(0x7f0000000900)=@pppol2tpv3in6={0x18, 0x1, {0x0, r3, 0x3, 0x1, 0x0, 0x2, {0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x9}}}, 0x80) ptrace$peek(0x1, 0x0, &(0x7f00000001c0)) mlockall(0x3) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x1, &(0x7f00000007c0)="ad413983dce8fda692b19ca665e8ec77fa460cd42977c0457fd5e513959b8c97ae621bb4901c4e02feb9c506bb7a185e14ce240442c0569367f41339a6de4e23d1c7ab2eec7dc1dc53ce1c19d3504046b72e65dabe993f437b12590fe45fc9a1236595beacd35ff917e5a427d696b47b636d7b8ab7a062ac1180123f81627f543e06398f178e65a5f2920a33200f49ae23b1750ee243d672a52ec9bcc307ac32ec5b8c81d340629118e2f350b2e2f6c2e234") mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000a80)={0x1, &(0x7f0000000080)=[{0x8, 0x0, 0xdda3}]}, 0x10) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f00000008c0)='.', &(0x7f0000000a40)='./file0\x00', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000980)) mount(&(0x7f000000a000)='.', &(0x7f0000852000)='.', &(0x7f0000a60000)='ramfs\x00', 0x0, &(0x7f0000d1cfff)="d6") preadv(r3, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) connect$vsock_stream(r3, &(0x7f0000000580)={0x28, 0x0, 0x2711, @host=0x2}, 0x10) 2018/03/31 07:42:01 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0xaf01, &(0x7f0000307000)=&(0x7f0000989fff)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000000)=ANY=[]) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000140)={0x0, r1}) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000000)=r1) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000180)={0x0, 0x1, &(0x7f0000000280)=""/147, &(0x7f0000000340)=""/223, &(0x7f0000000580)=""/4096}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000040)=0x1) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000f82ffc)=0x4001) dup2(r1, r0) eventfd(0x0) 2018/03/31 07:42:01 executing program 2: r0 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)="c6cc8e60a78914d500bfeae773ddb642384ef9648af1058f5fbd2fd309524d989e8ca5c3e6e4d185de0489636bb4012cd2281d57a505b82ae678e253ab1603ef18da1e2b4f2acc3c7651ff1c670f5ed1de51a9a5a850687fc0664d9c81b66fefaf800714c085934bd42e3e21ae71d978f3e76fcbfdc2e66adff8be4d85633beb78581bf230f72954dd487c97d06409d3c6e2f7f22be6284a9b", 0x99, 0xfffffffffffffffb) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x8, 0x20001) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r1, 0x402c5342, &(0x7f0000001700)={0x3, 0x5, 0x6, {}, 0x7, 0x5}) keyctl$describe(0x6, r0, &(0x7f00000002c0)=""/200, 0xc8) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440)={0x0, 0x0, 0xffffffffffffffff}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) r5 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20202, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x1010, r5, 0x0) setsockopt$inet_MCAST_MSFILTER(r5, 0x0, 0x30, &(0x7f00000006c0)=ANY=[@ANYRES32=r4, @ANYBLOB="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", @ANYPTR=&(0x7f0000000040)=ANY=[], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYRES64=r2, @ANYRES32=r2, @ANYPTR], @ANYRES16=r5, @ANYPTR64=&(0x7f00000005c0)=ANY=[@ANYBLOB="d367f46e84034ea1b344d495be0e38f4f7e5d1a4f800c6c8661436f69535f7dc1eb6f2617513958ea5b33891aefda075fde5eb7e272e06ecfe9f07ca1538f4f251338625f77cae4682fc5e36faaf4dfb2516423da6d6f65347ecb8dd665858ce3db7bc1f8cc039f3dc5fee9bbc2d0f06119eb2bb542f685e99da825b943caad9522435d6e7b4815e6a75b75f647e249dc2f55a37da5a3e3a267a04d7e2f46dd74b37cb95f0a5b0b225d64936f3189f63b4184ae945359f971ea3866d2250cb20b49e4ad4ac0df89e6fef546241729cadc80b0435c5af89f0c3f505dd7f0bd931b7f0ec17", @ANYRES32=r4]], 0x6) pwrite64(r5, &(0x7f00000004c0)="361cf8298589166f6c2d5823c3b913944a09f012cc6a80f1d50171bf0badb6b5ffdeeaef7d6bdec3b31ce16780d2546875ed31070c85d5735d1ca260f2fca2cc539989af5eafe394f9ae07fcd88029971829aeaf797a78f97cd7f8531aeeb62f497a6d2d8c61dc23348ec786a20e624fdf4c5b839bea2dc66b04b7756cc92f852e", 0x81, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r5, 0x84, 0x21, &(0x7f0000000400)=0xfff, 0x4) fallocate(r5, 0x3, 0x0, 0x81) ppoll(&(0x7f0000000080)=[{r4}, {r3, 0x208}, {r5, 0x28}], 0x3, &(0x7f00000000c0), &(0x7f0000000140)={0x70000000000}, 0x8) 2018/03/31 07:42:01 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0xaf01, &(0x7f0000307000)=&(0x7f0000989fff)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000000)=ANY=[]) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000140)={0x0, r1}) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000000)=r1) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000180)={0x0, 0x1, &(0x7f0000000280)=""/147, &(0x7f0000000340)=""/223, &(0x7f0000000580)=""/4096}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000040)=0x1) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000f82ffc)=0x4001) dup2(r1, r0) eventfd(0x0) 2018/03/31 07:42:01 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) acct(&(0x7f0000001240)='./file0\x00') setrlimit(0xa, &(0x7f0000000380)={0x4, 0x1}) getsockname(0xffffffffffffff9c, &(0x7f0000001480)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f00000012c0)=0x80) socketpair(0x10, 0x0, 0x8, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000001580)={r3}) r4 = open(&(0x7f00000010c0)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000001300)={0x8, 0x0, 0x6, 0x58a, 0x0}, &(0x7f0000001340)=0x10) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x3052, r3, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f00000001c0)={'bond0\x00', {0x2, 0x4e20, @multicast2=0xe0000002}}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYBLOB="408615824f3f781ae75fcc9554f019621eaccb21d7ca5fb77c06ff41c0d07d78b6de0ed01fa10b1070cb77afb61679a7f893b0c78371e1195ef393dc87b1b329811e67705b9e1bb5dc00c5b14645b010d310e491c159a81b77145882a63f6206ecfb54b4f6b2ddf7963c2b2681ff1aa2dfd55f1e73b02e150e1f8e51e6ae3615336ed2b2b461fccd4ec00311dd4b00cf4316fb4bda9fa1a0a94d01d4db3209cd302a449b841dc10fcc2d63482b979cb70c21ef7000e655a7a1a18b57b6cd06267ef9f582b4783e42e60f460962921710e11ac51a3f9fa92e9118c5f0e1d8b2c342"], &(0x7f0000000040)=0x2) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000100)={r7, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000001380)={r5, @in6={{0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0xf}}}, 0x0, 0x7, 0x0, 0x8, 0x92}, &(0x7f0000001440)=0x98) eventfd(0xffffffff80000001) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000001140)={0x4, 0x8001, 0x40, 0xfffffffffffffffd, 0x0}, &(0x7f0000001180)=0x10) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f0000001500)) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000011c0)={0x95e, 0x101, 0x8009, 0x1ff, 0x31386ac8, 0x8, 0x1, 0x7, r8}, 0x20) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x1, 0x1) recvfrom(r1, &(0x7f00000015c0)=""/83, 0x53, 0x120, 0x0, 0x0) symlinkat(&(0x7f0000001080)='./file0\x00', r4, &(0x7f0000001100)='./file0\x00') close(r0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={r4, r4, 0x4, 0x3}, 0x10) getsockname$netlink(r1, &(0x7f0000000480), &(0x7f0000000400)=0xfffffffffffffe8e) 2018/03/31 07:42:01 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0xaf01, &(0x7f0000307000)=&(0x7f0000989fff)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000000)=ANY=[]) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000140)={0x0, r1}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000cef000)={0x1, 0x0, &(0x7f000062a000)=""/167, &(0x7f0000aac000)=""/21, &(0x7f00002fdf52)=""/174}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000180)={0x0, 0x1, &(0x7f0000000280)=""/147, &(0x7f0000000340)=""/223, &(0x7f0000000580)=""/4096}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000040)=0x1) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000f82ffc)=0x4001) dup2(r1, r0) eventfd(0x0) [ 187.597382] FAULT_INJECTION: forcing a failure. [ 187.597382] name failslab, interval 1, probability 0, space 0, times 0 [ 187.608782] CPU: 0 PID: 14584 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #372 [ 187.616139] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 187.625478] Call Trace: [ 187.628065] dump_stack+0x194/0x24d [ 187.631691] ? arch_local_irq_restore+0x53/0x53 [ 187.636361] should_fail+0x8c0/0xa40 [ 187.640063] ? kstrdup+0x39/0x70 [ 187.643420] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 187.648516] ? cgroup_apply_control_enable+0x390/0xbc0 [ 187.653790] ? kernfs_iop_mkdir+0x153/0x1e0 [ 187.658103] ? vfs_mkdir+0x390/0x600 [ 187.661892] ? SyS_mkdirat+0x22b/0x2b0 [ 187.665771] ? do_syscall_64+0x281/0x940 [ 187.669824] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 187.675179] ? find_held_lock+0x35/0x1d0 [ 187.679242] ? find_held_lock+0x35/0x1d0 [ 187.683300] ? __lock_is_held+0xb6/0x140 [ 187.687359] ? check_same_owner+0x320/0x320 [ 187.691678] ? rcu_note_context_switch+0x710/0x710 [ 187.696595] ? rcu_read_lock_sched_held+0x108/0x120 [ 187.701602] should_failslab+0xec/0x120 [ 187.705570] kmem_cache_alloc+0x47/0x760 [ 187.709623] ? memcpy+0x45/0x50 [ 187.712901] ? kstrdup+0x59/0x70 [ 187.716265] __kernfs_new_node+0xe2/0x570 [ 187.720405] ? kernfs_dop_revalidate+0x380/0x380 [ 187.725155] ? snprintf+0xc0/0xf0 [ 187.728598] ? vsprintf+0x40/0x40 [ 187.732037] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 187.736954] ? cgroup_file_name+0x1d0/0x1d0 [ 187.741267] kernfs_new_node+0x80/0xe0 [ 187.745147] __kernfs_create_file+0x4b/0x320 [ 187.749544] cgroup_addrm_files+0x3c5/0xa70 [ 187.753860] ? cgroup_file_write+0x710/0x710 [ 187.758259] ? cpu_cgroup_css_alloc+0x30/0x30 [ 187.762750] ? __lock_is_held+0xb6/0x140 [ 187.766801] ? sched_online_group+0x4e0/0x4e0 [ 187.771284] ? cpu_cgroup_css_online+0x3a/0x50 [ 187.775850] ? online_css+0x224/0x2e0 [ 187.779640] css_populate_dir+0x198/0x420 [ 187.783785] cgroup_apply_control_enable+0x390/0xbc0 [ 187.788880] ? cgroup_propagate_control+0x570/0x570 [ 187.793885] ? css_populate_dir+0x289/0x420 [ 187.798194] cgroup_mkdir+0x56f/0xfc0 [ 187.801979] ? __lock_is_held+0xb6/0x140 [ 187.806031] ? cgroup_destroy_locked+0x750/0x750 [ 187.810777] ? rcu_read_lock_sched_held+0x108/0x120 [ 187.815780] ? kmem_cache_free+0x258/0x2a0 [ 187.820007] ? set_nlink+0xc1/0x160 [ 187.823622] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 187.828538] ? generic_permission+0x105/0x3c0 [ 187.833018] ? cgroup_destroy_locked+0x750/0x750 [ 187.837761] kernfs_iop_mkdir+0x153/0x1e0 [ 187.841902] vfs_mkdir+0x390/0x600 [ 187.845431] SyS_mkdirat+0x22b/0x2b0 [ 187.849133] ? SyS_mknod+0x480/0x480 [ 187.852829] ? trace_hardirqs_on+0xd/0x10 [ 187.856962] ? do_syscall_64+0xb7/0x940 [ 187.860922] ? SyS_mknod+0x480/0x480 [ 187.864622] do_syscall_64+0x281/0x940 [ 187.868501] ? vmalloc_sync_all+0x30/0x30 [ 187.872644] ? _raw_spin_unlock_irq+0x27/0x70 [ 187.877130] ? finish_task_switch+0x1c1/0x7e0 [ 187.881616] ? syscall_return_slowpath+0x550/0x550 [ 187.886541] ? syscall_return_slowpath+0x2ac/0x550 [ 187.891458] ? prepare_exit_to_usermode+0x350/0x350 [ 187.896464] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 187.901822] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 187.906664] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 187.911840] RIP: 0033:0x454e79 [ 187.915016] RSP: 002b:00007fe2ad9eac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 187.922711] RAX: ffffffffffffffda RBX: 00007fe2ad9eb6d4 RCX: 0000000000454e79 [ 187.929965] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 187.937223] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 187.944481] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 187.951734] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000025 [ 187.959075] cgroup: cgroup_addrm_files: failed to add weight.nice, err=-12 2018/03/31 07:42:02 executing program 1: 2018/03/31 07:42:02 executing program 4: r0 = socket(0xa, 0x2, 0x0) flock(r0, 0x6) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x1f}, 0x1c) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x6d}, &(0x7f00000004c0)=0x88) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000880)=@assoc_value={0x0, 0x7}, &(0x7f0000000b40)=0x8) sendmsg$netrom(r0, &(0x7f0000000480)={&(0x7f0000000140)=@ax25={0x3, {"07199610ddb2b6"}, 0x6}, 0x10, &(0x7f00000007c0), 0x0, &(0x7f0000000e80), 0x0, 0x10}, 0x0) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000540)=""/99, &(0x7f0000000780)=0x28c77c4c79f525cf) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) fchdir(r2) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000bc0)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000940)={&(0x7f0000000c40)={0x4c, 0x0, 0x400, 0x0, 0x0, {0x5}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5}, @IPVS_CMD_ATTR_SERVICE={0x4, 0x1}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x1d}]}]}, 0x4c}, 0x1}, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) fallocate(r3, 0x0, 0x8004, 0x0) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x8) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x4}, 0x1c) sendfile(r4, r4, &(0x7f0000000040), 0x80000001) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x0) sendfile(r4, r3, 0x0, 0xc08f) creat(&(0x7f0000000100)='./file1\x00', 0x0) mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000080)={0x2}, 0x10) mlockall(0x0) remap_file_pages(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x2, 0x0) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x7fff) 2018/03/31 07:42:02 executing program 5: 2018/03/31 07:42:02 executing program 7 (fault-call:10 fault-nth:38): r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4900, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000240)=0x4) getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) r1 = dup(0xffffffffffffff9c) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r2 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r2, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r2, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r2, &(0x7f0000000100)=""/65, 0x41) r3 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) fchdir(r2) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(r3, &(0x7f0000000200)='./file1\x00', r2, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r2, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000580)=""/80, 0x50}, {&(0x7f00000008c0)=""/4096, 0x1000}], 0x2, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x20) r5 = syz_open_dev$sndpcmp(&(0x7f00000018c0)='/dev/snd/pcmC#D#p\x00', 0x3, 0x10a00) ioctl$KVM_GET_DEVICE_ATTR(r5, 0x4018aee2, &(0x7f0000001940)={0x0, 0x100, 0x9, &(0x7f0000001900)}) recvfrom$ipx(r4, &(0x7f00000006c0)=""/52, 0x34, 0x100, &(0x7f0000000700)={0x4, 0x9a2, 0x4, "dc108d9d4391", 0x5}, 0x10) renameat(r2, &(0x7f0000001980)='./file1\x00', r5, &(0x7f00000019c0)='./file0/file0\x00') r6 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r6, 0x4, 0x0) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000040), 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r6, &(0x7f0000000200), 0xfffffe08) 2018/03/31 07:42:02 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0xaf01, &(0x7f0000307000)=&(0x7f0000989fff)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000000)=ANY=[]) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000140)={0x0, r1}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000cef000)={0x1, 0x0, &(0x7f000062a000)=""/167, &(0x7f0000aac000)=""/21, &(0x7f00002fdf52)=""/174}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000180)={0x0, 0x1, &(0x7f0000000280)=""/147, &(0x7f0000000340)=""/223, &(0x7f0000000580)=""/4096}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000040)=0x1) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000f82ffc)=0x4001) dup2(r1, r0) eventfd(0x0) 2018/03/31 07:42:02 executing program 2: r0 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)="c6cc8e60a78914d500bfeae773ddb642384ef9648af1058f5fbd2fd309524d989e8ca5c3e6e4d185de0489636bb4012cd2281d57a505b82ae678e253ab1603ef18da1e2b4f2acc3c7651ff1c670f5ed1de51a9a5a850687fc0664d9c81b66fefaf800714c085934bd42e3e21ae71d978f3e76fcbfdc2e66adff8be4d85633beb78581bf230f72954dd487c97d06409d3c6e2f7f22be6284a9b", 0x99, 0xfffffffffffffffb) keyctl$describe(0x6, r0, &(0x7f0000000b40)=""/200, 0xc8) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440)={0x0, 0x0, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20202, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x1010, r3, 0x0) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000000580)=ANY=[@ANYBLOB="030000000000000002004e22ac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e24ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000006ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ffffffffffffff000000000000000000000000000000000000000000000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e220000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000400)=0xfff, 0x4) fallocate(r3, 0x3, 0x0, 0x81) ppoll(&(0x7f0000000080)=[{r2}, {r1, 0x208}, {r3, 0x28}], 0x3, &(0x7f00000000c0), &(0x7f0000000140)={0x70000000000}, 0x8) fanotify_mark(r3, 0x1, 0x8000000, r3, &(0x7f0000000040)='./file0\x00') 2018/03/31 07:42:02 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) acct(&(0x7f0000001240)='./file0\x00') setrlimit(0xa, &(0x7f0000000380)={0x4, 0x1}) getsockname(0xffffffffffffff9c, &(0x7f0000001480)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f00000012c0)=0x80) socketpair(0x10, 0x0, 0x8, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000001580)={r3}) r5 = open(&(0x7f00000010c0)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r5, 0x84, 0x22, &(0x7f0000001300)={0x8, 0x0, 0x6, 0x58a, 0x0}, &(0x7f0000001340)=0x10) bind$netlink(r4, &(0x7f0000000240)={0x10, 0x0, 0x4, 0x2001100}, 0xc) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x40800, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x3052, r3, 0x0) ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f00000001c0)={'bond0\x00', {0x2, 0x4e20, @multicast2=0xe0000002}}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000040)=0x2) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r5, 0x84, 0x5, &(0x7f0000000100)={r8, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000001380)={r6, @in6={{0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0xf}}}, 0x0, 0x7, 0x0, 0x8, 0x92}, &(0x7f0000001440)=0x98) eventfd(0xffffffff80000001) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000001140)={0x4, 0x8001, 0x40, 0xfffffffffffffffd, 0x0}, &(0x7f0000001180)=0x10) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, &(0x7f0000001500)) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000011c0)={0x95e, 0x101, 0x8009, 0x1ff, 0x31386ac8, 0x8, 0x1, 0x7, r9}, 0x20) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x1, 0x1) recvfrom(r1, &(0x7f00000015c0)=""/83, 0x53, 0x120, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x82000, 0x0) symlinkat(&(0x7f0000001080)='./file0\x00', r5, &(0x7f0000001100)='./file0\x00') close(r0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={r5, r5, 0x4, 0x3}, 0x10) getsockname$netlink(r1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) r11 = add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000440)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000480), 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, r10, r11) 2018/03/31 07:42:02 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000fc7000)='./control\x00', 0x86000006) socket$inet(0x10, 0x3, 0xc) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000002000)="24000000100007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b356da5a80d18bec4c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) [ 188.126988] FAULT_INJECTION: forcing a failure. [ 188.126988] name failslab, interval 1, probability 0, space 0, times 0 [ 188.138313] CPU: 0 PID: 14609 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #372 [ 188.145665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 188.155007] Call Trace: [ 188.157595] dump_stack+0x194/0x24d [ 188.161229] ? arch_local_irq_restore+0x53/0x53 [ 188.165901] should_fail+0x8c0/0xa40 [ 188.169619] ? kstrdup+0x39/0x70 2018/03/31 07:42:02 executing program 2: r0 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)="c6cc8e60a78914d500bfeae773ddb642384ef9648af1058f5fbd2fd309524d989e8ca5c3e6e4d185de0489636bb4012cd2281d57a505b82ae678e253ab1603ef18da1e2b4f2acc3c7651ff1c670f5ed1de51a9a5a850687fc0664d9c81b66fefaf800714c085934bd42e3e21ae71d978f3e76fcbfdc2e66adff8be4d85633beb78581bf230f72954dd487c97d06409d3c6e2f7f22be6284a9b", 0x99, 0xfffffffffffffffb) keyctl$describe(0x6, r0, &(0x7f00000002c0)=""/200, 0xc8) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440)={0x0, 0x0, 0xffffffffffffffff}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dsp\x00', 0x400000, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000480)) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x1010, 0xffffffffffffffff, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000580)=ANY=[@ANYBLOB="030000000000000002004e22ac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e24ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000006ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ffffffffffffff000000000000000000000000000000000000000000000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e220000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) pwrite64(0xffffffffffffffff, &(0x7f00000004c0)="361cf8298589166f6c2d5823c3b913944a09f012cc6a80f1d50171bf0badb6b5ffdeeaef7d6bdec3b31ce16780d2546875ed31070c85d5735d1ca260f2fca2cc539989af5eafe394f9ae07fcd88029971829aeaf797a78f97cd7f8531aeeb62f497a6d2d8c61dc23348ec786a20e624fdf4c5b839bea2dc66b04b7756cc92f852e", 0x81, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a40)="42a9043926a2c2ff9d2715eb8ba33e90", 0x10) accept$ipx(r2, &(0x7f0000000a80), &(0x7f0000000ac0)=0x10) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000400)=0xfff, 0x4) fallocate(0xffffffffffffffff, 0x3, 0x0, 0x81) ppoll(&(0x7f0000000080)=[{r3}, {r1, 0x208}, {0xffffffffffffffff, 0x28}], 0x3, &(0x7f00000000c0), &(0x7f0000000140)={0x70000000000}, 0x8) setsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000040)=0xa9c9, 0x4) 2018/03/31 07:42:02 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0xaf01, &(0x7f0000307000)=&(0x7f0000989fff)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000000)=ANY=[]) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000140)={0x0, r1}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000cef000)={0x1, 0x0, &(0x7f000062a000)=""/167, &(0x7f0000aac000)=""/21, &(0x7f00002fdf52)=""/174}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000180)={0x0, 0x1, &(0x7f0000000280)=""/147, &(0x7f0000000340)=""/223, &(0x7f0000000580)=""/4096}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000040)=0x1) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000f82ffc)=0x4001) dup2(r1, r0) eventfd(0x0) 2018/03/31 07:42:02 executing program 2: r0 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)="c6cc8e60a78914d500bfeae773ddb642384ef9648af1058f5fbd2fd309524d989e8ca5c3e6e4d185de0489636bb4012cd2281d57a505b82ae678e253ab1603ef18da1e2b4f2acc3c7651ff1c670f5ed1de51a9a5a850687fc0664d9c81b66fefaf800714c085934bd42e3e21ae71d978f3e76fcbfdc2e66adff8be4d85633beb78581bf230f72954dd487c97d06409d3c6e2f7f22be6284a9b", 0x99, 0xfffffffffffffffb) keyctl$describe(0x6, r0, &(0x7f00000002c0)=""/200, 0xc8) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440)={0x0, 0x0, 0xffffffffffffffff}) r2 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x1, 0x4a8c1) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000a40)={0x400, {{0x2, 0x4e21, @multicast1=0xe0000001}}}, 0x88) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20202, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x1010, r4, 0x0) setsockopt$inet_MCAST_MSFILTER(r4, 0x0, 0x30, &(0x7f0000000580)=ANY=[@ANYBLOB="030000000000000002004e22ac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e24ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000006ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ffffffffffffff000000000000000000000000000000000000000000000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e220000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) pwrite64(r4, &(0x7f00000004c0)="361cf8298589166f6c2d5823c3b913944a09f012cc6a80f1d50171bf0badb6b5ffdeeaef7d6bdec3b31ce16780d2546875ed31070c85d5735d1ca260f2fca2cc539989af5eafe394f9ae07fcd88029971829aeaf797a78f97cd7f8531aeeb62f497a6d2d8c61dc23348ec786a20e624fdf4c5b839bea2dc66b04b7756cc92f852e", 0x81, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f0000000400)=0xfff, 0x4) fallocate(r4, 0x3, 0x0, 0x81) ppoll(&(0x7f0000000080)=[{r3}, {r1, 0x208}, {r4, 0x28}], 0x3, &(0x7f00000000c0), &(0x7f0000000140)={0x70000000000}, 0x8) [ 188.172989] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 188.178089] ? cgroup_apply_control_enable+0x390/0xbc0 [ 188.183360] ? kernfs_iop_mkdir+0x153/0x1e0 [ 188.187676] ? vfs_mkdir+0x390/0x600 [ 188.191385] ? SyS_mkdirat+0x22b/0x2b0 [ 188.195261] ? do_syscall_64+0x281/0x940 [ 188.199322] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 188.204683] ? find_held_lock+0x35/0x1d0 [ 188.208743] ? find_held_lock+0x35/0x1d0 [ 188.212806] ? __lock_is_held+0xb6/0x140 [ 188.216871] ? check_same_owner+0x320/0x320 [ 188.221194] ? rcu_note_context_switch+0x710/0x710 [ 188.226122] ? rcu_read_lock_sched_held+0x108/0x120 [ 188.231135] should_failslab+0xec/0x120 [ 188.235105] kmem_cache_alloc+0x47/0x760 [ 188.239155] ? memcpy+0x45/0x50 [ 188.242428] ? kstrdup+0x59/0x70 [ 188.245790] __kernfs_new_node+0xe2/0x570 [ 188.249930] ? kernfs_dop_revalidate+0x380/0x380 [ 188.254688] ? snprintf+0xc0/0xf0 [ 188.258132] ? vsprintf+0x40/0x40 [ 188.261579] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 188.266503] ? cgroup_file_name+0x1d0/0x1d0 [ 188.270818] kernfs_new_node+0x80/0xe0 [ 188.274703] __kernfs_create_file+0x4b/0x320 [ 188.279108] cgroup_addrm_files+0x3c5/0xa70 [ 188.283431] ? cgroup_file_write+0x710/0x710 [ 188.287838] ? cpu_cgroup_css_alloc+0x30/0x30 [ 188.292335] ? __lock_is_held+0xb6/0x140 [ 188.296391] ? sched_online_group+0x4e0/0x4e0 [ 188.300874] ? cpu_cgroup_css_online+0x3a/0x50 [ 188.305445] ? online_css+0x224/0x2e0 [ 188.309236] css_populate_dir+0x198/0x420 [ 188.313376] cgroup_apply_control_enable+0x390/0xbc0 [ 188.318468] ? cgroup_propagate_control+0x570/0x570 [ 188.323475] ? css_populate_dir+0x289/0x420 [ 188.327787] cgroup_mkdir+0x56f/0xfc0 [ 188.331573] ? __lock_is_held+0xb6/0x140 [ 188.335630] ? cgroup_destroy_locked+0x750/0x750 [ 188.340376] ? rcu_read_lock_sched_held+0x108/0x120 [ 188.345383] ? kmem_cache_free+0x258/0x2a0 [ 188.349626] ? set_nlink+0xc1/0x160 [ 188.353245] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 188.358164] ? generic_permission+0x105/0x3c0 [ 188.362654] ? cgroup_destroy_locked+0x750/0x750 [ 188.367388] kernfs_iop_mkdir+0x153/0x1e0 [ 188.371510] vfs_mkdir+0x390/0x600 [ 188.375033] SyS_mkdirat+0x22b/0x2b0 [ 188.378725] ? SyS_mknod+0x480/0x480 [ 188.382422] ? trace_hardirqs_on+0xd/0x10 [ 188.386561] ? do_syscall_64+0xb7/0x940 [ 188.390518] ? SyS_mknod+0x480/0x480 [ 188.394222] do_syscall_64+0x281/0x940 [ 188.398086] ? vmalloc_sync_all+0x30/0x30 [ 188.402213] ? _raw_spin_unlock_irq+0x27/0x70 [ 188.406685] ? finish_task_switch+0x1c1/0x7e0 [ 188.411161] ? syscall_return_slowpath+0x550/0x550 [ 188.416078] ? syscall_return_slowpath+0x2ac/0x550 [ 188.420991] ? prepare_exit_to_usermode+0x350/0x350 [ 188.425990] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 188.431340] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 188.436170] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 188.441340] RIP: 0033:0x454e79 [ 188.444519] RSP: 002b:00007fe2ad9eac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 188.452213] RAX: ffffffffffffffda RBX: 00007fe2ad9eb6d4 RCX: 0000000000454e79 [ 188.459466] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 188.466716] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 188.473964] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 188.481213] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000026 [ 188.489288] cgroup: cgroup_addrm_files: failed to add weight.nice, err=-12 2018/03/31 07:42:02 executing program 3: 2018/03/31 07:42:02 executing program 2: r0 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)="c6cc8e60a78914d500bfeae773ddb642384ef9648af1058f5fbd2fd309524d989e8ca5c3e6e4d185de0489636bb4012cd2281d57a505b82ae678e253ab1603ef18da1e2b4f2acc3c7651ff1c670f5ed1de51a9a5a850687fc0664d9c81b66fefaf800714c085934bd42e3e21ae71d978f3e76fcbfdc2e66adff8be4d85633beb78581bf230f72954dd487c97d06409d3c6e2f7f22be6284a9b", 0x99, 0xfffffffffffffffb) keyctl$describe(0x6, r0, &(0x7f00000002c0)=""/200, 0xc8) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440)={0x0, 0x0, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20202, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x1010, r3, 0x0) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000000a80)=ANY=[@ANYBLOB="030000000000000002004e22ac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e24ac1414aa0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000013148a936e54c8cfa1b70569d22b000000000002000006ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ffffffffffffff000000000000000000000000000000000000000000000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b70900000002004e220000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003cf216e1bda307de1be7d5a922621141069d4c00e307503bfbfc6914bf22c961fe7822e2782fd4fc02a9aafdf2ad6826c14e95c432f63bc2db67b9859bb70178e2f7bd18b88605136f425176c58e29243596646460e483c85072"], 0x1) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000480)={0x0, 0x3, 0x5, &(0x7f00000003c0)}) pwrite64(r3, &(0x7f00000004c0)="361cf8298589166f6c2d5823c3b913944a09f012cc6a80f1d50171bf0badb6b5ffdeeaef7d6bdec3b31ce16780d2546875ed31070c85d5735d1ca260f2fca2cc539989af5eafe394f9ae07fcd88029971829aeaf797a78f97cd7f8531aeeb62f497a6d2d8c61dc23348ec786a20e624fdf4c5b839bea2dc66b04b7756cc92f852e", 0x81, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000400)=0xfff, 0x4) ioctl$KVM_ASSIGN_SET_INTX_MASK(r3, 0x4040aea4, &(0x7f0000000040)={0x5, 0xffff, 0x3, 0x2, 0x4}) fallocate(r3, 0x3, 0x0, 0x81) ppoll(&(0x7f0000000080)=[{r2}, {r1, 0x208}, {r3, 0x28}], 0x3, &(0x7f00000000c0), &(0x7f0000000140)={0x70000000000}, 0x8) 2018/03/31 07:42:02 executing program 7 (fault-call:10 fault-nth:39): r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4900, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000240)=0x4) getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) r1 = dup(0xffffffffffffff9c) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r2 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r2, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r2, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r2, &(0x7f0000000100)=""/65, 0x41) r3 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) fchdir(r2) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(r3, &(0x7f0000000200)='./file1\x00', r2, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r2, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000580)=""/80, 0x50}, {&(0x7f00000008c0)=""/4096, 0x1000}], 0x2, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x20) r5 = syz_open_dev$sndpcmp(&(0x7f00000018c0)='/dev/snd/pcmC#D#p\x00', 0x3, 0x10a00) ioctl$KVM_GET_DEVICE_ATTR(r5, 0x4018aee2, &(0x7f0000001940)={0x0, 0x100, 0x9, &(0x7f0000001900)}) recvfrom$ipx(r4, &(0x7f00000006c0)=""/52, 0x34, 0x100, &(0x7f0000000700)={0x4, 0x9a2, 0x4, "dc108d9d4391", 0x5}, 0x10) renameat(r2, &(0x7f0000001980)='./file1\x00', r5, &(0x7f00000019c0)='./file0/file0\x00') r6 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r6, 0x4, 0x0) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000040), 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r6, &(0x7f0000000200), 0xfffffe08) 2018/03/31 07:42:02 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0xaf01, &(0x7f0000307000)=&(0x7f0000989fff)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000000)=ANY=[]) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000000)=r1) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000cef000)={0x1, 0x0, &(0x7f000062a000)=""/167, &(0x7f0000aac000)=""/21, &(0x7f00002fdf52)=""/174}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000180)={0x0, 0x1, &(0x7f0000000280)=""/147, &(0x7f0000000340)=""/223, &(0x7f0000000580)=""/4096}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000040)=0x1) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000f82ffc)=0x4001) dup2(r1, r0) eventfd(0x0) 2018/03/31 07:42:02 executing program 3: [ 188.622611] FAULT_INJECTION: forcing a failure. [ 188.622611] name failslab, interval 1, probability 0, space 0, times 0 [ 188.633924] CPU: 0 PID: 14631 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #372 [ 188.641278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 188.650623] Call Trace: [ 188.653207] dump_stack+0x194/0x24d [ 188.656836] ? arch_local_irq_restore+0x53/0x53 [ 188.661515] should_fail+0x8c0/0xa40 [ 188.665226] ? kstrdup+0x39/0x70 [ 188.668595] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 188.673696] ? cgroup_apply_control_enable+0x390/0xbc0 [ 188.678969] ? kernfs_iop_mkdir+0x153/0x1e0 [ 188.683288] ? vfs_mkdir+0x390/0x600 [ 188.687000] ? SyS_mkdirat+0x22b/0x2b0 [ 188.690880] ? do_syscall_64+0x281/0x940 [ 188.694935] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 188.700298] ? find_held_lock+0x35/0x1d0 [ 188.704357] ? find_held_lock+0x35/0x1d0 [ 188.708415] ? __lock_is_held+0xb6/0x140 [ 188.712483] ? check_same_owner+0x320/0x320 [ 188.716805] ? rcu_note_context_switch+0x710/0x710 [ 188.722031] ? rcu_read_lock_sched_held+0x108/0x120 [ 188.727053] should_failslab+0xec/0x120 [ 188.731023] kmem_cache_alloc+0x47/0x760 [ 188.735077] ? memcpy+0x45/0x50 [ 188.738358] ? kstrdup+0x59/0x70 [ 188.741725] __kernfs_new_node+0xe2/0x570 [ 188.745870] ? kernfs_dop_revalidate+0x380/0x380 [ 188.750629] ? snprintf+0xc0/0xf0 [ 188.754075] ? vsprintf+0x40/0x40 [ 188.757517] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 188.762439] ? cgroup_file_name+0x1d0/0x1d0 [ 188.766762] kernfs_new_node+0x80/0xe0 [ 188.770650] __kernfs_create_file+0x4b/0x320 [ 188.775055] cgroup_addrm_files+0x3c5/0xa70 [ 188.779381] ? cgroup_file_write+0x710/0x710 [ 188.783785] ? cpu_cgroup_css_alloc+0x30/0x30 [ 188.788284] ? __lock_is_held+0xb6/0x140 [ 188.792342] ? sched_online_group+0x4e0/0x4e0 [ 188.796823] ? cpu_cgroup_css_online+0x3a/0x50 [ 188.801393] ? online_css+0x224/0x2e0 [ 188.805189] css_populate_dir+0x198/0x420 [ 188.809332] cgroup_apply_control_enable+0x390/0xbc0 [ 188.814430] ? cgroup_propagate_control+0x570/0x570 [ 188.819439] ? css_populate_dir+0x289/0x420 [ 188.823752] cgroup_mkdir+0x56f/0xfc0 [ 188.827540] ? __lock_is_held+0xb6/0x140 [ 188.831592] ? cgroup_destroy_locked+0x750/0x750 [ 188.836334] ? rcu_read_lock_sched_held+0x108/0x120 [ 188.841340] ? kmem_cache_free+0x258/0x2a0 [ 188.845573] ? set_nlink+0xc1/0x160 [ 188.849190] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 188.854107] ? generic_permission+0x105/0x3c0 [ 188.858592] ? cgroup_destroy_locked+0x750/0x750 [ 188.863340] kernfs_iop_mkdir+0x153/0x1e0 [ 188.867477] vfs_mkdir+0x390/0x600 [ 188.871011] SyS_mkdirat+0x22b/0x2b0 [ 188.874716] ? SyS_mknod+0x480/0x480 [ 188.878416] ? trace_hardirqs_on+0xd/0x10 [ 188.882557] ? do_syscall_64+0xb7/0x940 [ 188.886515] ? SyS_mknod+0x480/0x480 [ 188.890215] do_syscall_64+0x281/0x940 [ 188.894090] ? vmalloc_sync_all+0x30/0x30 [ 188.898231] ? _raw_spin_unlock_irq+0x27/0x70 [ 188.902722] ? finish_task_switch+0x1c1/0x7e0 [ 188.907211] ? syscall_return_slowpath+0x550/0x550 [ 188.912131] ? syscall_return_slowpath+0x2ac/0x550 [ 188.917049] ? prepare_exit_to_usermode+0x350/0x350 [ 188.922060] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 188.927407] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 188.932242] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 188.937411] RIP: 0033:0x454e79 [ 188.940577] RSP: 002b:00007fe2ad9eac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 188.948266] RAX: ffffffffffffffda RBX: 00007fe2ad9eb6d4 RCX: 0000000000454e79 [ 188.955508] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 188.962750] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 188.969998] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 188.977256] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000027 [ 188.984832] cgroup: cgroup_addrm_files: failed to add max, err=-12 2018/03/31 07:42:03 executing program 1: 2018/03/31 07:42:03 executing program 3: 2018/03/31 07:42:03 executing program 4: 2018/03/31 07:42:03 executing program 2: r0 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)="c6cc8e60a78914d500bfeae773ddb642384ef9648af1058f5fbd2fd309524d989e8ca5c3e6e4d185de0489636bb4012cd2281d57a505b82ae678e253ab1603ef18da1e2b4f2acc3c7651ff1c670f5ed1de51a9a5a850687fc0664d9c81b66fefaf800714c085934bd42e3e21ae71d978f3e76fcbfdc2e66adff8be4d85633beb78581bf230f72954dd487c97d06409d3c6e2f7f22be6284a9b", 0x99, 0xfffffffffffffffb) keyctl$describe(0x6, r0, &(0x7f00000002c0)=""/200, 0xc8) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440)={0x0, 0x0, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20202, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x1010, r3, 0x0) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000000580)=ANY=[@ANYBLOB="030000000000000002004e22ac1414aa000000000000000000000000000000000000000000000000000000e0ffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e24ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000006ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ffffffffffffff000000000000000000000000000000000000000000000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414aa00000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e220000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000e8a2000000000000000000000000000002004e23ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) pwrite64(r3, &(0x7f00000004c0)="361cf8298589166f6c2d5823c3b913944a09f012cc6a80f1d50171bf0badb6b5ffdeeaef7d6bdec3b31ce16780d2546875ed31070c85d5735d1ca260f2fca2cc539989af5eafe394f9ae07fcd88029971829aeaf797a78f97cd7f8531aeeb62f497a6d2d8c61dc23348ec786a20e624fdf4c5b839bea2dc66b04b7756cc92f852e", 0x81, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000400)=0xfff, 0x4) fallocate(r3, 0x3, 0x0, 0x81) ppoll(&(0x7f0000000080)=[{r2}, {r1, 0x208}, {r3, 0x28}], 0x3, &(0x7f00000000c0), &(0x7f0000000140)={0x70000000000}, 0x8) 2018/03/31 07:42:03 executing program 7 (fault-call:10 fault-nth:40): r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4900, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000240)=0x4) getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) r1 = dup(0xffffffffffffff9c) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r2 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r2, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r2, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r2, &(0x7f0000000100)=""/65, 0x41) r3 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) fchdir(r2) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(r3, &(0x7f0000000200)='./file1\x00', r2, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r2, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000580)=""/80, 0x50}, {&(0x7f00000008c0)=""/4096, 0x1000}], 0x2, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x20) r5 = syz_open_dev$sndpcmp(&(0x7f00000018c0)='/dev/snd/pcmC#D#p\x00', 0x3, 0x10a00) ioctl$KVM_GET_DEVICE_ATTR(r5, 0x4018aee2, &(0x7f0000001940)={0x0, 0x100, 0x9, &(0x7f0000001900)}) recvfrom$ipx(r4, &(0x7f00000006c0)=""/52, 0x34, 0x100, &(0x7f0000000700)={0x4, 0x9a2, 0x4, "dc108d9d4391", 0x5}, 0x10) renameat(r2, &(0x7f0000001980)='./file1\x00', r5, &(0x7f00000019c0)='./file0/file0\x00') r6 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r6, 0x4, 0x0) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000040), 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r6, &(0x7f0000000200), 0xfffffe08) 2018/03/31 07:42:03 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0xaf01, &(0x7f0000307000)=&(0x7f0000989fff)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000000)=ANY=[]) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000000)=r1) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000cef000)={0x1, 0x0, &(0x7f000062a000)=""/167, &(0x7f0000aac000)=""/21, &(0x7f00002fdf52)=""/174}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000180)={0x0, 0x1, &(0x7f0000000280)=""/147, &(0x7f0000000340)=""/223, &(0x7f0000000580)=""/4096}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000040)=0x1) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000f82ffc)=0x4001) dup2(r1, r0) eventfd(0x0) 2018/03/31 07:42:03 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) mknod$loop(&(0x7f00000003c0)='./file0\x00', 0x6000, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) acct(&(0x7f0000001240)='./file0\x00') setrlimit(0xa, &(0x7f0000000380)={0x4, 0x1}) getsockname(0xffffffffffffff9c, &(0x7f0000001480)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f00000012c0)=0x80) socketpair(0x10, 0x0, 0x8, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000001580)={r3}) r5 = open(&(0x7f00000010c0)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r5, 0x84, 0x22, &(0x7f0000001300)={0x8, 0x0, 0x6, 0x58a, 0x0}, &(0x7f0000001340)=0x10) fallocate(r4, 0x1, 0x7, 0x7) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x3052, r5, 0x0) ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f00000001c0)={'bond0\x00', {0x2, 0x4e20, @multicast2=0xe0000002}}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYBLOB="408615824f3f781ae7e5ca5fb77c06ff41c0d07d78b6de0ed01fa10b1070cb77afb61679a7f893b0c78371e1195ef393dc87b1b329811e67705b9e1bb5dc00c5b14645b010d310e491c159a81b77145882a63f6206ecfb540bf6b2ddf7963c2b2681ff1aa2dfd55f1e73b02e150e1f8e51e6ae3615336ed2b2b461fccd4ec00311dd4b00cf4316fb4bda9fa1a0a94d01d4db3209cd302a449b843dc10fcc2d63482b979cb70c21ef7000e655a7a1a18b57b6cd06267ef9f58ab4783e42e60f460962921710e11ac51a3f9fa92e9118c5f0e1d8b2c342"], &(0x7f0000000040)=0x2) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000100)={r8, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000001380)={r6, @in6={{0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0xf}}}, 0x0, 0x7, 0x0, 0x8, 0x92}, &(0x7f0000001440)=0x98) eventfd(0xffffffff80000001) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000001140)={0x4, 0x8001, 0x40, 0xfffffffffffffffd, 0x0}, &(0x7f0000001180)=0x10) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, &(0x7f0000001500)) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000011c0)={0x95e, 0x101, 0x8009, 0x1ff, 0x31386ac8, 0x8, 0x1, 0x7, r9}, 0x20) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x1, 0x1) ioctl$KVM_SET_TSS_ADDR(r5, 0xae47, 0xd000) recvfrom(r1, &(0x7f00000015c0)=""/83, 0x53, 0x120, 0x0, 0x0) symlinkat(&(0x7f0000001080)='./file0\x00', r5, &(0x7f0000001100)='./file0\x00') close(r0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={r5, r5, 0x4, 0x3}, 0x10) getsockname$netlink(r1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) 2018/03/31 07:42:03 executing program 5: [ 189.563351] FAULT_INJECTION: forcing a failure. [ 189.563351] name failslab, interval 1, probability 0, space 0, times 0 [ 189.574986] CPU: 0 PID: 14658 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #372 [ 189.582347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 189.591692] Call Trace: [ 189.594265] dump_stack+0x194/0x24d [ 189.597873] ? arch_local_irq_restore+0x53/0x53 [ 189.602528] ? mutex_lock_io_nested+0x1900/0x1900 [ 189.607356] should_fail+0x8c0/0xa40 [ 189.611051] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 189.616133] ? trace_hardirqs_off+0x10/0x10 [ 189.620432] ? find_held_lock+0x35/0x1d0 [ 189.624470] ? __lock_is_held+0xb6/0x140 [ 189.628514] ? check_same_owner+0x320/0x320 [ 189.632812] ? rcu_note_context_switch+0x710/0x710 [ 189.637722] should_failslab+0xec/0x120 [ 189.641675] kmem_cache_alloc_trace+0x4b/0x740 [ 189.646240] blkcg_css_alloc+0xc8/0x6b0 [ 189.650194] ? blkcg_deactivate_policy+0x430/0x430 [ 189.655101] ? __lock_is_held+0xb6/0x140 [ 189.659149] cgroup_apply_control_enable+0x44d/0xbc0 [ 189.664238] ? cgroup_propagate_control+0x570/0x570 [ 189.669235] ? css_populate_dir+0x289/0x420 [ 189.673535] cgroup_mkdir+0x56f/0xfc0 [ 189.677312] ? __lock_is_held+0xb6/0x140 [ 189.681354] ? cgroup_destroy_locked+0x750/0x750 [ 189.686086] ? rcu_read_lock_sched_held+0x108/0x120 [ 189.691076] ? kmem_cache_free+0x258/0x2a0 [ 189.695288] ? set_nlink+0xc1/0x160 [ 189.698892] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 189.703795] ? generic_permission+0x105/0x3c0 [ 189.708266] ? cgroup_destroy_locked+0x750/0x750 [ 189.713001] kernfs_iop_mkdir+0x153/0x1e0 [ 189.717133] vfs_mkdir+0x390/0x600 [ 189.720651] SyS_mkdirat+0x22b/0x2b0 [ 189.724342] ? SyS_mknod+0x480/0x480 [ 189.728032] ? trace_hardirqs_on+0xd/0x10 [ 189.732155] ? do_syscall_64+0xb7/0x940 [ 189.736105] ? SyS_mknod+0x480/0x480 [ 189.739793] do_syscall_64+0x281/0x940 [ 189.743658] ? vmalloc_sync_all+0x30/0x30 [ 189.747781] ? _raw_spin_unlock_irq+0x27/0x70 [ 189.752252] ? finish_task_switch+0x1c1/0x7e0 [ 189.756721] ? syscall_return_slowpath+0x550/0x550 [ 189.761627] ? syscall_return_slowpath+0x2ac/0x550 [ 189.766530] ? prepare_exit_to_usermode+0x350/0x350 [ 189.771524] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 189.776866] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 189.781686] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 189.786852] RIP: 0033:0x454e79 [ 189.790023] RSP: 002b:00007fe2ad9eac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 189.797707] RAX: ffffffffffffffda RBX: 00007fe2ad9eb6d4 RCX: 0000000000454e79 [ 189.804952] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 2018/03/31 07:42:04 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000140)) rmdir(&(0x7f00000000c0)='./file0\x00') setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000040), 0xc) r2 = creat(&(0x7f0000001840)='./file0\x00', 0x0) memfd_create(&(0x7f0000001800)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x0) ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, &(0x7f0000000200)) accept$inet(r2, &(0x7f0000000000)={0x0, 0x0, @multicast2}, &(0x7f0000000080)=0x10) gettid() setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001880)=ANY=[@ANYBLOB="00000000000000000a00000000000000ff0100000000000000000000000000011f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000200000a00000000000000fe8000000000f7ffffff15000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000002000000ff010000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000"], 0x1) ioprio_get$uid(0x3, 0x0) 2018/03/31 07:42:04 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00007a0000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000bba000)={&(0x7f00003a2000)=@abs, 0x8, &(0x7f00006c6ff0), 0x0, &(0x7f0000000240)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) sendmsg$unix(r2, &(0x7f000062e000)={&(0x7f0000690ff6)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f000000d000), 0x0, &(0x7f0000000ff0)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) close(r1) close(r0) r3 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') readv(r3, &(0x7f0000000740)=[{&(0x7f0000000200)=""/41, 0x29}, {&(0x7f0000000380)=""/190, 0xbe}, {&(0x7f0000000440)=""/128, 0x80}, {&(0x7f00000005c0)=""/68, 0x44}, {&(0x7f0000000640)=""/240, 0xf0}], 0x5) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000180)={0x1000, 0x0, 0xff, 0x1, 0xf5d1}, 0xc) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$KDENABIO(r3, 0x4b36) recvmsg$netrom(r3, &(0x7f0000001080)={&(0x7f0000000780)=@ax25={0x3, {"3c1b7251c1894a"}}, 0x10, &(0x7f0000000fc0), 0x0, &(0x7f0000000ac0), 0x0, 0x80}, 0x40000140) sendto(r3, &(0x7f00000008c0), 0x0, 0x0, &(0x7f0000000900)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x1, 0x0, 0x2, {0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x80) ptrace$peek(0x1, 0x0, &(0x7f00000001c0)) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x1, &(0x7f00000007c0)="ad413983dce8fda692b19ca665e8ec77fa460cd42977c0457fd5e513959b8c97ae621bb4901c4e02feb9c506bb7a185e14ce240442c0569367f41339a6de4e23d1c7ab2eec7dc1dc53ce1c19d3504046b72e65dabe993f437b12590fe45fc9a1236595beacd35ff917e5a427d696b47b636d7b8ab7a062ac1180123f81627f543e06398f178e65a5f2920a33200f49ae23b1750ee243d672a52ec9bcc307ac32ec5b8c81d340629118e2f350b2e2f6c2e2") mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000a80)={0x1, &(0x7f0000000080)=[{0x8, 0x0, 0xdda3}]}, 0x10) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f00000008c0)='.', &(0x7f0000000a40)='./file0\x00', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000980)) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000a00)=0x439d0444) mount(&(0x7f000000a000)='.', &(0x7f0000852000)='.', &(0x7f0000a60000)='ramfs\x00', 0x0, &(0x7f0000d1cfff)="d6") preadv(r3, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) connect$vsock_stream(r3, &(0x7f0000000580)={0x28, 0x0, 0x2711, @host=0x2}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000500)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000ac0], 0x0, &(0x7f00000004c0), &(0x7f0000000ac0)=[{}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x0, 0x63, 0x0, 'eql\x00', 'ipddp0\x00', 'nr0\x00', 'ip6gre0\x00', @empty, [0x0, 0x0, 0x0, 0xff, 0xff], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0xff], 0x70, 0xb8, 0xe0}, [@common=@log={'log\x00', 0x24, {{0x10001, "25d4237edf0250c72ef30c7f911844fe0b5b7267b1682a34651f081c5bc3"}}}]}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x1}]}, 0x1f8) [ 189.812197] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 189.819439] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 189.826685] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000028 2018/03/31 07:42:04 executing program 1: r0 = socket(0xa, 0x2, 0x0) flock(r0, 0x6) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x6d}, &(0x7f00000004c0)=0x88) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000880)=@assoc_value={0x0, 0x7}, &(0x7f0000000b40)=0x8) sendmsg$netrom(r0, &(0x7f0000000480)={&(0x7f0000000140)=@ax25={0x3, {"07199610ddb2b6"}, 0x6}, 0x10, &(0x7f00000007c0), 0x0, &(0x7f0000000e80), 0x0, 0x10}, 0x0) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000540)=""/99, &(0x7f0000000780)=0x28c77c4c79f525cf) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) fchdir(r2) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000bc0)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000940)={&(0x7f0000000c40)={0x4c, 0x0, 0x400, 0x0, 0x0, {0x5}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5}, @IPVS_CMD_ATTR_SERVICE={0x4, 0x1}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x1d}]}]}, 0x4c}, 0x1}, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) fallocate(r3, 0x0, 0x8004, 0x0) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x8) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x4}, 0x1c) sendfile(r4, r4, &(0x7f0000000040), 0x80000001) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x0) sendfile(r4, r3, 0x0, 0xc08f) creat(&(0x7f0000000100)='./file1\x00', 0x0) mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000080)={0x2}, 0x10) mlockall(0x0) remap_file_pages(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x2, 0x0) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x0) 2018/03/31 07:42:04 executing program 4: mlockall(0x2) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) fchmod(r0, 0x10) remap_file_pages(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x3, 0x2, 0x10) chdir(&(0x7f0000f95000)='./file0\x00') r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000001580), 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x9a1d) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000240)=0x2, 0x4) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000580)=ANY=[@ANYBLOB="050000000000b9414f70dd0d8b55b8f4982107cd035f21faa9c5f0b38f6e4594f0691c27f2f7c0c1a1b9510396ff6026dbf16ff358b524c9a3fb6eb99e97dc9e09e5ea51"], &(0x7f00000000c0)=0x1) ftruncate(r1, 0x7fff) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2, 0x11, r2, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc\x00', 0x28240, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x88) gettid() ptrace$getenv(0x4201, 0x0, 0xffffffffffffffc0, &(0x7f0000000340)) fchdir(r3) pkey_mprotect(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) bind$ipx(r3, &(0x7f0000000280)={0x4, 0x6, 0xfffffffffffffbff, "cf18124e6736"}, 0x10) getsockopt$inet_udp_int(r3, 0x11, 0x65, &(0x7f00000001c0), &(0x7f0000000200)=0x4) open(&(0x7f0000000300)='./file1\x00', 0x80207, 0x4) keyctl$set_reqkey_keyring(0xe, 0x7) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/llc\x00') preadv(r4, &(0x7f00006c6000)=[{&(0x7f0000000b80)=""/202, 0xca}], 0x1, 0x0) r5 = request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000440)='\x00', 0xfffffffffffffffe) r6 = add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$search(0xa, r5, &(0x7f0000000480)='id_legacy\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a, 0x2}, r6) syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) 2018/03/31 07:42:04 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00007a0000)={0xffffffffffffffff}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000bba000)={&(0x7f00003a2000)=@abs, 0x6e, &(0x7f00006c6ff0), 0x0, &(0x7f0000000240)}, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f000062e000)={&(0x7f0000690ff6)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f000000d000), 0x0, &(0x7f0000000ff0)=[@rights={0x18, 0x1, 0x1, [0xffffffffffffffff]}], 0x18}, 0x0) close(0xffffffffffffffff) close(r0) ioprio_get$pid(0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') readv(r1, &(0x7f0000000740)=[{&(0x7f0000000200)=""/41, 0x29}, {&(0x7f0000000440)=""/128, 0x80}, {&(0x7f00000002c0)=""/32, 0x20}, {&(0x7f00000005c0)=""/68, 0x44}], 0x4) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000180)={0x1000, 0x1, 0xff, 0x1, 0xf5d1}, 0xc) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$KDENABIO(r1, 0x4b36) recvmsg$netrom(r1, &(0x7f0000001080)={&(0x7f0000000780)=@ax25={0x3, {"3c1b7251c1894a"}}, 0x10, &(0x7f0000000fc0), 0x0, &(0x7f0000000ac0), 0x0, 0x80}, 0x40000140) sendto(r1, &(0x7f00000008c0), 0x0, 0x0, &(0x7f0000000900)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x3, 0x1, 0x0, 0x2, {0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x9}}}, 0x80) ptrace$peek(0x1, 0x0, &(0x7f00000001c0)) mlockall(0x3) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)="ad413983dce8fda692b19ca665e8ec77fa460cd42977c0457fd5e513959b8c97ae621bb4901c4e02feb9c506bb7a185e14ce240442c0569367f41339a6de4e23d1c7ab2eec7dc1dc53ce1c19d3504046b72e65dabe993f437b12590fe45fc9a1236595beacd35ff917e5a427d696b47b636d7b8ab7a062ac1180123f81627f543e06398f178e65a5f2920a33200f49ae23b1750ee243d672a52ec9bcc307ac32ec5b8c81d340629118e2f350b2e2f6c2e234") ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000c80)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000a80)={0x1, &(0x7f0000000080)=[{0x8, 0x0, 0xdda3}]}, 0x10) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f00000008c0)='.', &(0x7f0000000a40)='./file0\x00', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000980)) mount(&(0x7f000000a000)='.', &(0x7f0000852000)='.', &(0x7f0000a60000)='ramfs\x00', 0x0, &(0x7f0000d1cfff)="d6") preadv(r1, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000580)={0x28, 0x0, 0x2711, @host=0x2}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000500)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000ac0], 0x0, &(0x7f00000004c0), &(0x7f0000000ac0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffc}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x0, 0x63, 0x0, 'eql\x00', 'ipddp0\x00', 'nr0\x00', 'ip6gre0\x00', @empty, [0x0, 0x0, 0x0, 0xff, 0xff], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0xff], 0x70, 0xb8, 0xe0}, [@common=@log={'log\x00', 0x24, {{0x10001, "25d4237edf0250c72ef30c7f911844fe0b5b7267b1682a34651f081c5bc3", 0xb}}}]}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4, {{0xfffffffffffff52e}}}}]}, {0x0, '\x00', 0x1}]}, 0x1f8) gettid() 2018/03/31 07:42:04 executing program 7 (fault-call:10 fault-nth:41): r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4900, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000240)=0x4) getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) r1 = dup(0xffffffffffffff9c) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r2 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r2, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r2, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r2, &(0x7f0000000100)=""/65, 0x41) r3 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) fchdir(r2) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(r3, &(0x7f0000000200)='./file1\x00', r2, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r2, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000580)=""/80, 0x50}, {&(0x7f00000008c0)=""/4096, 0x1000}], 0x2, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x20) r5 = syz_open_dev$sndpcmp(&(0x7f00000018c0)='/dev/snd/pcmC#D#p\x00', 0x3, 0x10a00) ioctl$KVM_GET_DEVICE_ATTR(r5, 0x4018aee2, &(0x7f0000001940)={0x0, 0x100, 0x9, &(0x7f0000001900)}) recvfrom$ipx(r4, &(0x7f00000006c0)=""/52, 0x34, 0x100, &(0x7f0000000700)={0x4, 0x9a2, 0x4, "dc108d9d4391", 0x5}, 0x10) renameat(r2, &(0x7f0000001980)='./file1\x00', r5, &(0x7f00000019c0)='./file0/file0\x00') r6 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r6, 0x4, 0x0) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000040), 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r6, &(0x7f0000000200), 0xfffffe08) 2018/03/31 07:42:04 executing program 3: r0 = socket$inet6(0xa, 0x2000000802, 0x0) connect$inet6(r0, &(0x7f000000cfe4)={0xa}, 0x1c) sendto$inet6(r0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @dev={0xfe, 0x80}}, 0x1c) lseek(0xffffffffffffffff, 0x3, 0x1) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) mmap(&(0x7f00004fd000/0x3000)=nil, 0x3000, 0x1, 0x810, 0xffffffffffffffff, 0x3) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}, &(0x7f00000002c0)=0x14) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000300)={0x0, 0xef, 0x0, 0x8, 0x6}, &(0x7f0000000340)=0x18) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000380)={0x0, @in={{0x2, 0x4e20}}}, &(0x7f0000000440)=0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000780)={0xa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000009c0)=0x2c) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000200)=ANY=[@ANYBLOB=' \x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000540)=0x1) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000000)=@in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10, &(0x7f0000000140), 0x0, &(0x7f0000000600)=[@sndinfo={0x20, 0x84, 0x2, {0x1, 0x0, 0x5}}, @init={0x18, 0x84, 0x0, {0x6, 0xec4, 0xd5, 0x98}}, @sndinfo={0x20, 0x84, 0x2, {0x7fffffff, 0x200, 0x10000, 0xfff}}], 0x90, 0x4000000}, 0x0) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a00)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$sock_SIOCOUTQ(r5, 0x5411, &(0x7f0000000a40)) r6 = socket$inet6(0xa, 0x8000000000000802, 0x0) sendmsg$inet_sctp(r1, &(0x7f0000000500)={&(0x7f0000000240)=@in6={0xa, 0x4e22, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0xfff}, 0x1c, &(0x7f00000004c0)=[{&(0x7f0000000480)="3cad0acf8cfa317558966049c4fd06f25ee210be978c330a9a", 0x19}], 0x1, &(0x7f0000000900)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8, 0x800, 0x0, r4}}, @sndinfo={0x20, 0x84, 0x2, {0x2, 0x8008, 0x10000, 0x1, r3}}, @sndinfo={0x20, 0x84, 0x2, {0x456b, 0x2, 0x1, 0x0, r2}}], 0x90, 0x4040040}, 0x8004) sendmsg$inet_sctp(r6, &(0x7f0000957000)={&(0x7f0000000040)=@in6={0xa, 0x4e23}, 0x1c}, 0x8000) sendto$inet6(r6, &(0x7f0000b0cf6e), 0x0, 0x0, &(0x7f000001b000)={0xa, 0x4e24, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x17}}}, 0x1c) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f00000000c0), &(0x7f00000001c0)=0x4) fdatasync(r6) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0x6, {{0xa, 0x0, 0x800, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x88) request_key(&(0x7f0000000580)='dns_resolver\x00', &(0x7f00000005c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000006c0)='/dev/ppp\x00', 0xfffffffffffffffb) r7 = add_key(&(0x7f0000000700)='big_key\x00', &(0x7f0000000740)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffffc) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000140)={0x80000001, 0x4, 0xa8b2, 0x14c, r4}, 0x10) keyctl$unlink(0x9, r7, 0x0) 2018/03/31 07:42:04 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0xaf01, &(0x7f0000307000)=&(0x7f0000989fff)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000000)=ANY=[]) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000000)=r1) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000cef000)={0x1, 0x0, &(0x7f000062a000)=""/167, &(0x7f0000aac000)=""/21, &(0x7f00002fdf52)=""/174}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000180)={0x0, 0x1, &(0x7f0000000280)=""/147, &(0x7f0000000340)=""/223, &(0x7f0000000580)=""/4096}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000040)=0x1) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000f82ffc)=0x4001) dup2(r1, r0) eventfd(0x0) 2018/03/31 07:42:04 executing program 2: r0 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)="c6cc8e60a78914d500bfeae773ddb642384ef9648af1058f5fbd2fd309524d989e8ca5c3e6e4d185de0489636bb4012cd2281d57a505b82ae678e253ab1603ef18da1e2b4f2acc3c7651ff1c670f5ed1de51a9a5a850687fc0664d9c81b66fefaf800714c085934bd42e3e21ae71d978f3e76fcbfdc2e66adff8be4d85633beb78581bf230f72954dd487c97d06409d3c6e2f7f22be6284a9b", 0x99, 0xfffffffffffffffb) keyctl$describe(0x6, r0, &(0x7f00000002c0)=""/200, 0xc8) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440)={0x0, 0x0, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20202, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x1010, r3, 0x0) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000000580)=ANY=[@ANYBLOB="030000000000000002004e22ac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e24ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000006ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ffffffffffffff000000000000000000000000000000000000000000000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e220000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) pwrite64(r3, &(0x7f00000004c0)="361cf8298589166f6c2d5823c3b913944a09f012cc6a80f1d50171bf0badb6b5ffdeeaef7d6bdec3b31ce16780d2546875ed31070c85d5735d1ca260f2fca2cc539989af5eafe394f9ae07fcd88029971829aeaf797a78f97cd7f8531aeeb62f497a6d2d8c61dc23348ec786a20e624fdf4c5b839bea2dc66b04b7756cc92f852e", 0x81, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000400)=0xfff, 0x4) fallocate(r3, 0x0, 0x0, 0x81) ppoll(&(0x7f0000000080)=[{r2}, {r1, 0x208}, {r3, 0x28}], 0x3, &(0x7f00000000c0), &(0x7f0000000140)={0x70000000000}, 0x8) signalfd(r1, &(0x7f0000000040)={0xffff}, 0x8) 2018/03/31 07:42:04 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) acct(&(0x7f0000001240)='./file0\x00') setrlimit(0xa, &(0x7f0000000380)={0x4, 0x1}) getsockname(0xffffffffffffff9c, &(0x7f0000001480)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f00000012c0)=0x80) socketpair(0x10, 0x0, 0x8, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000480)={r3}) r4 = open(&(0x7f00000010c0)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000001300)={0x8, 0x0, 0x6, 0x58a, 0x0}, &(0x7f0000001340)=0x10) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x3052, r3, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f00000001c0)={'bond0\x00', {0x2, 0x4e20, @multicast2=0xe0000002}}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYBLOB="408615824f3f781ae75fcc9554f019621eaccb21d7ca5fb77c06ff41c0d07d78b6de0ed01fa10b1070cb77afb61679a7f893b0c78371e1195ef393dc87b1b329811e67705b9e1bb5dc00c5b14645b010d310e491c159a81b77145882a63f6206ecfb54b4f6b2ddf7963c2b2681ff1aa2dfd55f1e73b02e150e1f8e51e6ae3615336ed2b2b461fccd4ec00311dd4b00cf4316fb4bda9fa1a0a94d01d4db3209cd302a449b841dc10fcc2d63482b979cb70c21ef7000e655a7a1a18b57b6cd06267ef9f582b4783e42e60f460962921710e11ac51a3f9fa92e9118c5f0e1d8b2c342"], &(0x7f0000000040)=0x2) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000100)={r5, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000001380)={r5, @in6={{0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0xf}}}, 0x0, 0x7, 0x0, 0x8, 0x92}, &(0x7f0000001440)=0x98) eventfd(0xa17) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000001140)={0x4, 0x8001, 0x40, 0xfffffffffffffffd, 0x0}, &(0x7f0000001180)=0x10) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f0000001500)) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000011c0)={0x95e, 0x101, 0x8009, 0x1ff, 0x31386ac8, 0x8, 0x1, 0x7, r7}, 0x20) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x1, 0x1) recvfrom(r1, &(0x7f00000015c0)=""/83, 0x53, 0x120, 0x0, 0x0) symlinkat(&(0x7f0000001080)='./file0\x00', r4, &(0x7f0000001100)='./file0\x00') close(r0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={r4, r4, 0x4, 0x3}, 0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000003c0)={r5, @in6={{0xa, 0x4e23, 0x5, @dev={0xfe, 0x80, [], 0x15}, 0x3}}, 0xfffffffffffffffd, 0x4, 0x100000000, 0x7, 0x8b}, &(0x7f00000004c0)=0x98) getsockname$netlink(r1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) 2018/03/31 07:42:04 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0xaf01, &(0x7f0000307000)=&(0x7f0000989fff)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000000)=ANY=[]) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000140)) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000000)) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000cef000)={0x1, 0x0, &(0x7f000062a000)=""/167, &(0x7f0000aac000)=""/21, &(0x7f00002fdf52)=""/174}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000180)={0x0, 0x1, &(0x7f0000000280)=""/147, &(0x7f0000000340)=""/223, &(0x7f0000000580)=""/4096}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000040)=0x1) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000f82ffc)=0x4001) dup2(0xffffffffffffffff, r0) eventfd(0x0) [ 190.338246] FAULT_INJECTION: forcing a failure. [ 190.338246] name failslab, interval 1, probability 0, space 0, times 0 [ 190.349557] CPU: 1 PID: 14685 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #372 [ 190.356918] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 190.366274] Call Trace: [ 190.368867] dump_stack+0x194/0x24d [ 190.372499] ? arch_local_irq_restore+0x53/0x53 [ 190.377166] ? unwind_get_return_address+0x61/0xa0 [ 190.382096] should_fail+0x8c0/0xa40 [ 190.385809] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 190.390911] ? save_stack+0x43/0xd0 [ 190.394545] ? kasan_kmalloc+0xad/0xe0 [ 190.398431] ? cgroup_mkdir+0x56f/0xfc0 [ 190.402400] ? kernfs_iop_mkdir+0x153/0x1e0 [ 190.406719] ? vfs_mkdir+0x390/0x600 [ 190.410431] ? SyS_mkdirat+0x22b/0x2b0 [ 190.414317] ? do_syscall_64+0x281/0x940 [ 190.418376] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 190.423752] ? find_held_lock+0x35/0x1d0 [ 190.427822] ? __lock_is_held+0xb6/0x140 [ 190.431887] ? check_same_owner+0x320/0x320 [ 190.436215] ? rcu_note_context_switch+0x710/0x710 [ 190.441135] ? __lock_is_held+0xb6/0x140 [ 190.445201] should_failslab+0xec/0x120 [ 190.449170] kmem_cache_alloc_trace+0x4b/0x740 [ 190.453749] ? rcu_read_lock_sched_held+0x108/0x120 [ 190.458759] ? kmem_cache_alloc_trace+0x459/0x740 [ 190.463602] cfq_cpd_alloc+0x54/0x90 [ 190.467309] blkcg_css_alloc+0x165/0x6b0 [ 190.471363] ? cfqg_set_weight_device+0x40/0x40 [ 190.476025] ? blkcg_deactivate_policy+0x430/0x430 [ 190.480956] ? __lock_is_held+0xb6/0x140 [ 190.485022] cgroup_apply_control_enable+0x44d/0xbc0 [ 190.490130] ? cgroup_propagate_control+0x570/0x570 [ 190.495151] ? css_populate_dir+0x289/0x420 [ 190.499472] cgroup_mkdir+0x56f/0xfc0 [ 190.503262] ? __lock_is_held+0xb6/0x140 [ 190.507316] ? cgroup_destroy_locked+0x750/0x750 [ 190.512063] ? rcu_read_lock_sched_held+0x108/0x120 [ 190.517070] ? kmem_cache_free+0x258/0x2a0 [ 190.521293] ? set_nlink+0xc1/0x160 [ 190.524914] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 190.529830] ? generic_permission+0x105/0x3c0 [ 190.534315] ? cgroup_destroy_locked+0x750/0x750 2018/03/31 07:42:04 executing program 1: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000380)={'nr0\x00', {0x2, 0x4e23, @multicast2=0xe0000002}}) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000007c0)={{0xa, 0x4e24, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x9}, 0x0, [0x200, 0x7, 0x437, 0x0, 0x0, 0x22b1, 0x7fffffff, 0x9]}, 0x5c) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x100000000000002, 0x11, 0x0, 0x70bd28, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2=0xe0000002}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x88}, 0x1}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000b00), 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000400)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast2, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000100)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) getsockopt$inet6_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000b40)=""/4096, &(0x7f00000003c0)=0x1000) r2 = gettid() renameat2(r0, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x4) sched_rr_get_interval(r2, &(0x7f0000000340)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) prctl$seccomp(0x16, 0x2, &(0x7f0000000480)={0x7, &(0x7f0000000440)=[{0xffff, 0xa4, 0x22, 0xfffffffffffffe01}, {0x7fffffff, 0x0, 0x800}, {0x1f, 0x3, 0x4}, {0x0, 0x80, 0x0, 0x3}, {0x0, 0x1, 0x0, 0x5}, {0x225, 0xc34, 0x0, 0x4}, {0x0, 0x6, 0x2000000000000, 0x311925ba}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000880)=ANY=[], 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000080)=0x8) clone(0x0, &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000ce4000), &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cgroup.controllers\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000280)='/dev/sg#\x00', 0x6, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000100)="ecccc5cbd166c7986dd2bf33851e8dc5190e44848eee68a1a5efd3b51664426e6d017e67c9a0fe4a93ba", 0x2a, 0x40, &(0x7f00000001c0)=@nfc={0x27, 0x1, 0x2}, 0x80) connect(0xffffffffffffffff, &(0x7f0000000080)=@ipx={0x4, 0x0, 0x0, "ae24d2e4d0c5"}, 0x80) mmap(&(0x7f0000000000/0xfea000)=nil, 0xfea000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 190.539060] kernfs_iop_mkdir+0x153/0x1e0 [ 190.543197] vfs_mkdir+0x390/0x600 [ 190.546730] SyS_mkdirat+0x22b/0x2b0 [ 190.550433] ? SyS_mknod+0x480/0x480 [ 190.554686] ? trace_hardirqs_on+0xd/0x10 [ 190.558823] ? do_syscall_64+0xb7/0x940 [ 190.562791] ? SyS_mknod+0x480/0x480 [ 190.566497] do_syscall_64+0x281/0x940 [ 190.570378] ? vmalloc_sync_all+0x30/0x30 [ 190.574521] ? _raw_spin_unlock_irq+0x27/0x70 [ 190.579009] ? finish_task_switch+0x1c1/0x7e0 [ 190.583499] ? syscall_return_slowpath+0x550/0x550 [ 190.588417] ? syscall_return_slowpath+0x2ac/0x550 [ 190.593324] ? prepare_exit_to_usermode+0x350/0x350 [ 190.598317] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 190.603657] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 190.608480] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 190.613645] RIP: 0033:0x454e79 [ 190.616810] RSP: 002b:00007fe2ad9eac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 190.624491] RAX: ffffffffffffffda RBX: 00007fe2ad9eb6d4 RCX: 0000000000454e79 [ 190.631735] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 190.638980] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 190.646221] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 190.653466] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000029 2018/03/31 07:42:05 executing program 2: r0 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)="c6cc8e60a78914d500bfeae773ddb642384ef9648af1058f5fbd2fd309524d989e8ca5c3e6e4d185de0489636bb4012cd2281d57a505b82ae678e253ab1603ef18da1e2b4f2acc3c7651ff1c670f5ed1de51a9a5a850687fc0664d9c81b66fefaf800714c085934bd42e3e21ae71d978f3e76fcbfdc2e66adff8be4d85633beb78581bf230f72954dd487c97d06409d3c6e2f7f22be6284a9b", 0x99, 0xfffffffffffffffb) keyctl$describe(0x6, r0, &(0x7f00000002c0)=""/200, 0xc8) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440)={0x0, 0x0, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20202, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x1010, r3, 0x0) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000000580)=ANY=[@ANYBLOB="030000000000000002004e22ac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e24ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000006ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ffffffffffffff000000000000000000000000000000000000000000000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e220000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) pwrite64(r3, &(0x7f00000004c0)="361cf8298589166f6c2d5823c3b913944a09f012cc6a80f1d50171bf0badb6b5ffdeeaef7d6bdec3b31ce16780d2546875ed31070c85d5735d1ca260f2fca2cc539989af5eafe394f9ae07fcd88029971829aeaf797a78f97cd7f8531aeeb62f497a6d2d8c61dc23348ec786a20e624fdf4c5b839bea2dc66b04b7756cc92f852e", 0x81, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000400)=0xfff, 0x4) fallocate(r3, 0x3, 0x0, 0x81) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f0000000b40)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x42000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000a40)={0xcc, r4, 0x100, 0x70bd2a, 0x25dfdbfd, {0xc}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x7f}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local={0xfe, 0x80, [], 0xaa}}]}, @IPVS_CMD_ATTR_DAEMON={0x4, 0x3}, @IPVS_CMD_ATTR_DAEMON={0x48, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'tunl0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x12}}}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xa89}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x200}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x3d1a8171}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xe57}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1f}]}, 0xcc}, 0x1, 0x0, 0x0, 0x48000}, 0x45) ppoll(&(0x7f0000000080)=[{r2}, {r1, 0x208}, {r3, 0x28}], 0x3, &(0x7f00000000c0), &(0x7f0000000140)={0x70000000000}, 0x8) 2018/03/31 07:42:05 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000000)=0x26, 0x4) sendmsg$nl_netfilter(r0, &(0x7f00000000c0)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000280)={0x14, 0x3, 0x2, 0x8000000000011, 0x0, 0x0, {0x200000000000}}, 0x14}, 0x1}, 0x0) 2018/03/31 07:42:05 executing program 1: sync() listxattr(&(0x7f0000005b40)='./file0\x00', &(0x7f0000005b80)=""/72, 0x48) r0 = memfd_create(&(0x7f0000000100)=']\x00', 0x0) clone(0x0, &(0x7f0000000200)="17dd6280de3693223b6fdbc70650db5722605e7d4cfec7dee9e7ca3a83bd750a10fca3bdd2c2fde305012a95b619af30af684bba6e9e2031b1eec7e667e9c22c674d6eb942b78258369909dc14f2f5bd60202d6a38d497b47baf3e89fbca89a91e4706f3efdb55b9e9857fa2e05fdd62de157a7f60228f2c807e86ce264193d1206f5402c6f095c94a510e0c705386635a3f1a5970fd087434c0bf52f98bc0c951a8c18f7b8221c007a7f1c8d5", &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000300)) getpid() gettid() r1 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom(r1, &(0x7f0000000280)=""/191, 0xbf, 0x40000040, &(0x7f0000000340)=@can={0x1d}, 0x80) r2 = syz_open_dev$loop(&(0x7f0000000600)='/dev/loop#\x00', 0x1, 0x82) r3 = memfd_create(&(0x7f00000008c0)="74086e750000000000000000008c00", 0x2) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r2) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/loop-control\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000640)={0x0, @in={{0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}}}, &(0x7f0000000700)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000100)={0x7, 0x80000000, 0x6, 0x4, r5}, &(0x7f00000000c0)=0x10) ioctl$DRM_IOCTL_WAIT_VBLANK(r3, 0xc018643a, &(0x7f0000000500)={0xc000000, 0x3ff, 0x2c}) fcntl$F_SET_RW_HINT(r4, 0x40c, &(0x7f0000000940)) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x100, 0x0) sendfile(r2, r2, &(0x7f0000000080)=0x5f, 0x102000004) ioctl$LOOP_CLR_FD(r0, 0x4c01) sync() ftruncate(r2, 0x2) getresuid(&(0x7f0000000580), &(0x7f0000000740), &(0x7f0000000780)) r6 = dup2(r3, r2) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x17}}, @in={0x2, 0x4e22, @rand_addr=0x1}, @in={0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}, @in={0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}, @in={0x2, 0x4e23, @broadcast=0xffffffff}], 0x50) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000480)=0x8, 0xfffffffffffffd9e) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f00000005c0)=0x3, 0x8) setsockopt$IP_VS_SO_SET_EDIT(r6, 0x0, 0x483, &(0x7f0000000540)={0x84, @multicast2=0xe0000002, 0x4e20, 0x0, 'dh\x00', 0x0, 0xfff, 0x13}, 0x2c) ioctl$sock_netdev_private(r3, 0x89fe, &(0x7f00000003c0)="0aab95906cbf78d0113b9b11c035ec1b838e455485a0ae0c1dc7ead287ca35d95f330970a765dba3809e348d3d739c34fcbb996a276d6eae518354b310b63d5e6d4f02c584c900b9eed1ccd8c2d601c345a16a9770811f407c4232bb44f3f941d8cfe9138c1c2a09b466a541396572c076d8f96f042779cc2bdc8794dff7d80969b0a082393a735bb99d9c59fd538646854b79ccff7fdd4025a5c58b1e2acca8fd4f9a") 2018/03/31 07:42:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/igmp\x00') ioctl$sock_netrom_SIOCGSTAMP(r1, 0x8906, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8917, &(0x7f0000000100)={'tunl0\x00', {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}}) ioctl$KIOCSOUND(r1, 0x4b2f, 0x7) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha1\x00'}, 0x58) accept4$ipx(r1, 0x0, &(0x7f0000000140), 0x80000) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000280)="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", 0x1000}, {&(0x7f00000000c0)="fc4b2706b61a195c26ad0494d2c29a83aac23c5682dfffb9c1bc0fae4c3044120dd5", 0x22}, {&(0x7f0000001280)="06fdca61308a90b66ee29f5f604e3329e3789fe187f8ec965ec1c4516b6d604951441de0ceab84d50051445d32f7364f8e06510a506c6c8d1533d100d99f0fe2caaabf60d7a88a59ee7bfd6cf7f7ba59302ef4edf0ed5845bdc12fb2c659863296384b68b4f8d4e2523edb8d86ba61be80de3f38541cf84341bb1e20b5ba", 0x7e}], 0x3, 0x0) fcntl$setflags(r0, 0x2, 0x1) sendfile(r2, r1, &(0x7f0000807000), 0x3f) ioctl$KVM_CHECK_EXTENSION(r1, 0xae03, 0x7) accept$alg(r1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000200)={0x1, 'ifb0\x00', 0x1}, 0x18) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f00000001c0)={0x3, r1}) 2018/03/31 07:42:05 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0xaf01, &(0x7f0000307000)=&(0x7f0000989fff)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000000)=ANY=[]) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000140)) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000000)) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000cef000)={0x1, 0x0, &(0x7f000062a000)=""/167, &(0x7f0000aac000)=""/21, &(0x7f00002fdf52)=""/174}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000180)={0x0, 0x1, &(0x7f0000000280)=""/147, &(0x7f0000000340)=""/223, &(0x7f0000000580)=""/4096}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000040)=0x1) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000f82ffc)=0x4001) dup2(0xffffffffffffffff, r0) eventfd(0x0) 2018/03/31 07:42:05 executing program 7 (fault-call:10 fault-nth:42): r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4900, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000240)=0x4) getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) r1 = dup(0xffffffffffffff9c) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r2 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r2, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r2, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r2, &(0x7f0000000100)=""/65, 0x41) r3 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) fchdir(r2) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(r3, &(0x7f0000000200)='./file1\x00', r2, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r2, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000580)=""/80, 0x50}, {&(0x7f00000008c0)=""/4096, 0x1000}], 0x2, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x20) r5 = syz_open_dev$sndpcmp(&(0x7f00000018c0)='/dev/snd/pcmC#D#p\x00', 0x3, 0x10a00) ioctl$KVM_GET_DEVICE_ATTR(r5, 0x4018aee2, &(0x7f0000001940)={0x0, 0x100, 0x9, &(0x7f0000001900)}) recvfrom$ipx(r4, &(0x7f00000006c0)=""/52, 0x34, 0x100, &(0x7f0000000700)={0x4, 0x9a2, 0x4, "dc108d9d4391", 0x5}, 0x10) renameat(r2, &(0x7f0000001980)='./file1\x00', r5, &(0x7f00000019c0)='./file0/file0\x00') r6 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r6, 0x4, 0x0) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000040), 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r6, &(0x7f0000000200), 0xfffffe08) 2018/03/31 07:42:05 executing program 5: clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) rt_sigtimedwait(&(0x7f0000000280)={0x3}, &(0x7f00000002c0), &(0x7f0000000340)={r0, r1+30000000}, 0x8) r2 = openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.threads\x00', 0x2, 0x0) open_by_handle_at(r2, &(0x7f0000000500)={0xf9, 0x81, "c97730d0237384fa68184e5286744b1b44a96d2d7d256b1b17d2a1101064714d4c8c87bf9677847d23755f1a77ff349b2082803b5b800d643a18bff10ef7cee06b9dd5d89e6584a66b672459c91826a79a92895509c29a064350728b60b754bbd2f5a5420ee486735a15dd0adb2dbd61dded9406eb773c427341d728e039087208f825910df322fa75890d01f8ef628ba69d10dc8726b37e87cdfb2a0bec1682420eadab4247063beee89f5485efc44ec3d1293d6efa4a168838e09b6da2fbc30c767ded1b9f512b198bbd169989127efd0f87a44fa473f968b32c75b4bb9805d3eb2aeda986eac65a3e4e791d785454a2"}, 0x7bcab142d99b11a8) r3 = socket$inet(0x2, 0x2, 0x0) r4 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x100, 0x10000) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000480)=ANY=[@ANYBLOB="05000000858a6fb737b9f00000000000000000000000c4d6235c08b0934775ed5994a00bd4f1b7a804bc1b9db412c419e6dce88d8293c5f50237f97c78565207a40e80d068b7ad536ad4da64380fbc209400000000000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f00000001c0)=0x18) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r4, 0x84, 0x77, &(0x7f0000000180)={0x0, 0x80, 0x2, [0x400, 0x100]}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000000440)={0x8, 0x9, 0x800043, 0x8001, r5}, &(0x7f0000000240)=0x2) setsockopt$inet_mreqn(r3, 0x0, 0x23, &(0x7f0000acc000)={@multicast2=0xe0000002, @multicast1=0xe0000001, 0x2}, 0xc) setsockopt$inet_MCAST_JOIN_GROUP(r3, 0x0, 0x2a, &(0x7f00000000c0)={0x1, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x88) setsockopt$inet_mreqsrc(r3, 0x0, 0x24, &(0x7f0000000000)={@dev={0xac, 0x14, 0x14, 0x11}, @multicast1=0xe0000001}, 0xc) ioctl$DMA_BUF_IOCTL_SYNC(r4, 0x40086200, &(0x7f0000000200)=0x4) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/hwrng\x00', 0x40000, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@multicast2, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000000900)=0xe8) getgid() setsockopt$packet_add_memb(r6, 0x107, 0x1, &(0x7f0000000940)={r7, 0x1, 0x6, @random="384e54b84cd3"}, 0x10) setsockopt$inet_udp_int(r3, 0x11, 0x400000065, &(0x7f0000000080)=0x5, 0x4) 2018/03/31 07:42:05 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) acct(&(0x7f0000001240)='./file0\x00') setrlimit(0xa, &(0x7f0000000380)={0x4, 0x1}) getsockname(0xffffffffffffff9c, &(0x7f0000001480)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f00000012c0)=0x80) socketpair(0x10, 0x0, 0x8, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000001580)={r3}) r4 = open(&(0x7f00000010c0)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000001300)={0x8, 0x0, 0x6, 0x58a, 0x0}, &(0x7f0000001340)=0x10) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x3052, r3, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f00000001c0)={'bond0\x00', {0x2, 0x4e20, @multicast2=0xe0000002}}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYBLOB="408615824f3f781ae75fcc9554f019621eaccb21d7ca5fb77c06ff41c0d07d78b6de0ed01fa10b1070cb77afb61679a7f893b0c78371e12f5ef393dc87b1b329811e67705b9e1bb5dc00c5b14645b010d310e491c159a81b77145882a63f6206ecfb54b4f6b2ddf7963c2b2681ff1aa2dfd55f1e73b02e150e1f8e51e6ae3615336ed2b2b461fccd4ec00311dd4b00cf4316fb4bda9fa1a0a94df1d3db3209cd302a449b841dc10fcc2d63482b979cb70c21ef7000e655a7a1a18b57b6cd06267ef9f582b4783e42e60f460962921710e11ac5a92e9118c5f0e1d8b2c342000000"], &(0x7f0000000040)=0x2) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000100)={r7, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000001380)={r5, @in6={{0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0xf}}}, 0x0, 0x7, 0x0, 0x8, 0x92}, &(0x7f0000001440)=0x98) eventfd(0xffffffff80000001) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000001140)={0x4, 0x8001, 0x40, 0xfffffffffffffffd, 0x0}, &(0x7f0000001180)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f00000003c0)={r8, @in6={{0xa, 0x4e20, 0x1, @loopback={0x0, 0x1}, 0x7}}, [0xffffffffffff7fff, 0xffffffff, 0x101, 0x6, 0x65, 0x2, 0x2, 0x3, 0x4, 0xfffffffffffffffa, 0x8000, 0x3ff, 0x20, 0x4, 0x4]}, &(0x7f00000004c0)=0x100) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f0000001500)) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000011c0)={0x95e, 0x101, 0x8009, 0x1ff, 0x31386ac8, 0x8, 0x1, 0x7, r8}, 0x20) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x1, 0x1) recvfrom(r1, &(0x7f0000000500)=""/83, 0x27, 0x120, 0x0, 0x0) symlinkat(&(0x7f0000001080)='./file0\x00', r4, &(0x7f0000001100)='./file0\x00') close(r0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={r4, r4, 0x4, 0x3}, 0x10) getsockname$netlink(r1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) 2018/03/31 07:42:05 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000004}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@getroute={0x14, 0x1a, 0x111}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x7fd, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000740)={0x0, 0x6, 0x7, 0x2, 0x0, 0x27c, 0x5, 0x7, {0x0, @in6={{0xa, 0x4e20, 0x7ff, @mcast2={0xff, 0x2, [], 0x1}, 0x80000000}}, 0x0, 0x80000000, 0xfffffffffffffffb, 0x0, 0x400}}, &(0x7f0000000680)=0xb0) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000800)={r2, 0xfffffffffffffb34, 0x7, 0x3}, 0x10) sendmsg$nl_route(r0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=@bridge_getlink={0x28, 0x12, 0x301, 0x0, 0x0, {0x7}, [@IFLA_EXT_MASK={0x8, 0x1d, 0x3}]}, 0x28}, 0x1}, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)=@setlink={0x30, 0x13, 0x0, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@IFLA_PROTO_DOWN={0x8, 0x27}, @IFLA_OPERSTATE={0x8, 0x10, 0x200}]}, 0x30}, 0x1, 0x0, 0x0, 0x20040001}, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x2631, 0x40000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x7f}, &(0x7f0000000240)=0x8) setsockopt$IP_VS_SO_SET_DEL(r3, 0x0, 0x484, &(0x7f0000000940)={0x0, @remote={0xac, 0x14, 0x14, 0xbb}, 0x4e24, 0x2, 'lblc\x00', 0x2, 0x100000001, 0x4b}, 0x2c) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000006c0), &(0x7f0000000500)=0x4) pipe(&(0x7f0000000980)) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000840)={r2, 0xfffffffffffffe01}, &(0x7f0000000880)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000400)={r4, 0xdf, "164ebe53354240da05038e1362c86028a521bd05b1e8535f7df6edeb783624736a0ba7d7eb60e8f9af64e110c8064970b07f36b931b95df5d6075080c58171394b6f89b7b2fab62fb77fd999a81ecfe2ba65bbd11c93940fa112adee7af634e7eec8f8d3de81d07e85f4860b4e78e14bda582dc5dd687f397bd50c4ce41701ee16c09fbb5c88e83d9856b1c5a496b0245f40a02fb354f903878fbe81c50188c2b270f16df5ba602e53099ea4d2e695ffd11226b4ec6e9272020c0616d9bb11664424f144f91d09444ee760e5b428882a7fe9a8f8fdea00834eba2dc2586ae3"}, &(0x7f0000000340)=0xe7) vmsplice(0xffffffffffffffff, &(0x7f0000000700)=[{&(0x7f0000000580)="380bdd6507183b742a656b2499abe14170ada503593933453f04e0b3fb4e1d9a5a98ffa218334a56a695e2738557642c9a63ba37be46bc4a33e05f2529c8e3f26a07d60f7f935fe9baafb085a83de6b635656d26055a1801507aff6f918eec615717f198c1c168b34cba28d15de2415709a1bad6b222faf5680309d82a8321b6cc2dd9", 0x83}], 0x1, 0x0) r5 = syz_open_dev$sndpcmp(&(0x7f0000000540)='/dev/snd/pcmC#D#p\x00', 0x0, 0x10000) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r5, 0xc008551a, &(0x7f00000008c0)=ANY=[@ANYBLOB="b6b70000140000f0105e530000000080020000000100000004080000a4f8900cee772243e90a50a1acb9453df969af38effdafb5c13dfa15cc0d"]) 2018/03/31 07:42:05 executing program 2: r0 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)="c6cc8e60a78914d500bfeae773ddb642384ef9648af1058f5fbd2fd309524d989e8ca5c3e6e4d185de0489636bb4012cd2281d57a505b82ae678e253ab1603ef18da1e2b4f2acc3c7651ff1c670f5ed1de51a9a5a850687fc0664d9c81b66fefaf800714c085934bd42e3e21ae71d978f3e76fcbfdc2e66adff8be4d85633beb78581bf230f72954dd487c97d06409d3c6e2f7f22be6284a9b", 0x99, 0xfffffffffffffffb) keyctl$describe(0x6, r0, &(0x7f00000002c0)=""/200, 0xc8) restart_syscall() ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440)={0x0, 0x0, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20202, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x1010, r3, 0x0) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000000580)=ANY=[@ANYBLOB="030000000000000002004e22ac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e24ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000006ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ffffffffffffff000000000000000000000000000000000000000000000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e220000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) pwrite64(r3, &(0x7f00000004c0)="361cf8298589166f6c2d5823c3b913944a09f012cc6a80f1d50171bf0badb6b5ffdeeaef7d6bdec3b31ce16780d2546875ed31070c85d5735d1ca260f2fca2cc539989af5eafe394f9ae07fcd88029971829aeaf797a78f97cd7f8531aeeb62f497a6d2d8c61dc23348ec786a20e624fdf4c5b839bea2dc66b04b7756cc92f852e", 0x81, 0x0) getsockopt$ax25_int(r3, 0x101, 0xf, &(0x7f0000000040), &(0x7f00000003c0)=0x4) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000400)=0xfff, 0x4) ioctl$EVIOCGREP(r3, 0x80084503, &(0x7f0000000a40)=""/103) fallocate(r3, 0x3, 0x0, 0x81) ppoll(&(0x7f0000000080)=[{r2}, {r1, 0x208}, {r3, 0x28}], 0x3, &(0x7f00000000c0), &(0x7f0000000140)={0x70000000000}, 0x8) [ 191.519881] FAULT_INJECTION: forcing a failure. [ 191.519881] name failslab, interval 1, probability 0, space 0, times 0 [ 191.531189] CPU: 1 PID: 14736 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #372 [ 191.538545] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 191.547899] Call Trace: [ 191.550488] dump_stack+0x194/0x24d [ 191.554115] ? arch_local_irq_restore+0x53/0x53 [ 191.558783] ? __save_stack_trace+0x7e/0xd0 [ 191.563105] should_fail+0x8c0/0xa40 2018/03/31 07:42:05 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0xaf01, &(0x7f0000307000)=&(0x7f0000989fff)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000000)=ANY=[]) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000140)) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000000)) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000cef000)={0x1, 0x0, &(0x7f000062a000)=""/167, &(0x7f0000aac000)=""/21, &(0x7f00002fdf52)=""/174}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000180)={0x0, 0x1, &(0x7f0000000280)=""/147, &(0x7f0000000340)=""/223, &(0x7f0000000580)=""/4096}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000040)=0x1) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000f82ffc)=0x4001) dup2(0xffffffffffffffff, r0) eventfd(0x0) [ 191.566823] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 191.571921] ? kasan_kmalloc+0xad/0xe0 [ 191.575802] ? kmem_cache_alloc_trace+0x136/0x740 [ 191.580644] ? cfq_cpd_alloc+0x54/0x90 [ 191.584536] ? blkcg_css_alloc+0x165/0x6b0 [ 191.588771] ? cgroup_apply_control_enable+0x44d/0xbc0 [ 191.594047] ? SyS_mkdirat+0x22b/0x2b0 [ 191.597931] ? do_syscall_64+0x281/0x940 [ 191.601986] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 191.607333] ? do_syscall_64+0x281/0x940 [ 191.611370] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 191.616714] ? find_held_lock+0x35/0x1d0 [ 191.620751] ? __lock_is_held+0xb6/0x140 [ 191.624794] ? check_same_owner+0x320/0x320 [ 191.629094] ? rcu_note_context_switch+0x710/0x710 [ 191.634004] should_failslab+0xec/0x120 [ 191.637958] kmem_cache_alloc_trace+0x4b/0x740 [ 191.642514] ? rcu_read_lock_sched_held+0x108/0x120 [ 191.647506] ? kmem_cache_alloc_trace+0x459/0x740 [ 191.652329] bfq_cpd_alloc+0x54/0x90 [ 191.656024] blkcg_css_alloc+0x165/0x6b0 [ 191.660058] ? bfq_pd_alloc+0xe0/0xe0 [ 191.663832] ? blkcg_deactivate_policy+0x430/0x430 [ 191.668738] ? __lock_is_held+0xb6/0x140 [ 191.672782] cgroup_apply_control_enable+0x44d/0xbc0 [ 191.677864] ? cgroup_propagate_control+0x570/0x570 [ 191.682863] ? css_populate_dir+0x289/0x420 [ 191.687163] cgroup_mkdir+0x56f/0xfc0 [ 191.690942] ? __lock_is_held+0xb6/0x140 [ 191.694980] ? cgroup_destroy_locked+0x750/0x750 [ 191.699711] ? rcu_read_lock_sched_held+0x108/0x120 [ 191.704705] ? kmem_cache_free+0x258/0x2a0 [ 191.708918] ? set_nlink+0xc1/0x160 [ 191.712523] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 191.717426] ? generic_permission+0x105/0x3c0 [ 191.721895] ? cgroup_destroy_locked+0x750/0x750 [ 191.726626] kernfs_iop_mkdir+0x153/0x1e0 [ 191.730750] vfs_mkdir+0x390/0x600 [ 191.734267] SyS_mkdirat+0x22b/0x2b0 [ 191.737956] ? SyS_mknod+0x480/0x480 [ 191.741643] ? trace_hardirqs_on+0xd/0x10 [ 191.745767] ? do_syscall_64+0xb7/0x940 [ 191.749715] ? SyS_mknod+0x480/0x480 [ 191.753403] do_syscall_64+0x281/0x940 [ 191.757267] ? vmalloc_sync_all+0x30/0x30 [ 191.761390] ? _raw_spin_unlock_irq+0x27/0x70 [ 191.765863] ? finish_task_switch+0x1c1/0x7e0 [ 191.770335] ? syscall_return_slowpath+0x550/0x550 [ 191.775238] ? syscall_return_slowpath+0x2ac/0x550 [ 191.780142] ? prepare_exit_to_usermode+0x350/0x350 [ 191.785133] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 191.790471] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 191.795293] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 191.800456] RIP: 0033:0x454e79 [ 191.803620] RSP: 002b:00007fe2ad9eac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 191.811307] RAX: ffffffffffffffda RBX: 00007fe2ad9eb6d4 RCX: 0000000000454e79 2018/03/31 07:42:06 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) bind(r0, &(0x7f00005d8f80)=@generic={0x1e, "0103000000000000e1ffffffffffffff09a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2030077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) r1 = socket(0x1e, 0x2, 0x0) bind(r1, &(0x7f0000afb000)=@generic={0x1e, "01030000000000b9000000004700000000a979f321b30c7bc8790405c7bad62e0a63a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb3151d24acef1f1622ca5bdb9c8ea31000077aeb81c90001b6d7c980400000000f70dc136cb184a"}, 0x80) r2 = socket(0x1e, 0x5, 0x0) sendmsg(r2, &(0x7f0000316000)={&(0x7f0000373000)=@generic={0x10000000001e, "010000000000e30000000001af268c573c5bf86c483724d41e14dd6a739eff090000000000000000d79f00000000000000076c3f010039d8f986ff03000000000000e550d5fe32c419d67bcbc7e3ad316a1983000000fc341c1fc75624281e27800ece70b076cf979ac40000bd767e2e7821dfd300981a1565b3b16d7436"}, 0x80, &(0x7f000033c000), 0x0, &(0x7f00002d4000)}, 0x0) [ 191.818550] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 191.825798] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 191.833040] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 191.840285] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 000000000000002a [ 191.861858] IPVS: set_ctl: invalid protocol: 0 172.20.20.187:20004 lblc 2018/03/31 07:42:06 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0xaf01, &(0x7f0000307000)=&(0x7f0000989fff)) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000140)={0x0, r1}) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000000)=r1) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000cef000)={0x1, 0x0, &(0x7f000062a000)=""/167, &(0x7f0000aac000)=""/21, &(0x7f00002fdf52)=""/174}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000180)={0x0, 0x1, &(0x7f0000000280)=""/147, &(0x7f0000000340)=""/223, &(0x7f0000000580)=""/4096}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000040)=0x1) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000f82ffc)=0x4001) dup2(r1, r0) eventfd(0x0) 2018/03/31 07:42:06 executing program 2: r0 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)="c6cc8e60a78914d500bfeae773ddb642384ef9648af1058f5fbd2fd309524d989e8ca5c3e6e4d185de0489636bb4012cd2281d57a505b82ae678e253ab1603ef18da1e2b4f2acc3c7651ff1c670f5ed1de51a9a5a850687fc0664d9c81b66fefaf800714c085934bd42e3e21ae71d978f3e76fcbfdc2e66adff8be4d85633beb78581bf230f72954dd487c97d06409d3c6e2f7f22be6284a9b", 0x99, 0xfffffffffffffffb) keyctl$describe(0x6, r0, &(0x7f00000002c0)=""/200, 0xc8) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440)={0x0, 0x0, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20202, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x1010, r3, 0x0) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000000580)=ANY=[@ANYBLOB="030000000000000002004e22ac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e24ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000002000006ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ffffffffffffff000000000000000000000000000000000000000000000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000002004e23ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e220000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) pwrite64(r3, &(0x7f00000004c0)="361cf8298589166f6c2d5823c3b913944a09f012cc6a80f1d50171bf0badb6b5ffdeeaef7d6bdec3b31ce16780d2546875ed31070c85d5735d1ca260f2fca2cc539989af5eafe394f9ae07fcd88029971829aeaf797a78f97cd7f8531aeeb62f497a6d2d8c61dc23348ec786a20e624fdf4c5b839bea2dc66b04b7756cc92f852e", 0x81, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000400)=0xfff, 0x4) fallocate(r3, 0x3, 0x0, 0x81) ppoll(&(0x7f0000000080)=[{r2}, {r1, 0x208}, {r3, 0x28}], 0x3, &(0x7f00000000c0), &(0x7f0000000140)={0x70000000000}, 0x8) [ 191.896561] IPVS: set_ctl: invalid protocol: 0 172.20.20.187:20004 lblc 2018/03/31 07:42:06 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) acct(&(0x7f0000001240)='./file0\x00') setrlimit(0xa, &(0x7f0000000380)={0x4, 0x1}) getsockname(0xffffffffffffff9c, &(0x7f0000001480)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f00000012c0)=0x80) socketpair(0x10, 0x0, 0x8, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000001580)={r3}) r4 = open(&(0x7f00000010c0)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000001300)={0x8, 0x0, 0x6, 0x58a, 0x0}, &(0x7f0000001340)=0x10) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x3052, r3, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f00000001c0)={'bond0\x00', {0x2, 0x4e20, @multicast2=0xe0000002}}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYBLOB="408615824f3f781ae75fcc9554f019621eaccb21d7ca5fb77c06ff41c0d07d78b6de0ed01fa10b1070cb77afb61679a7f893b0c78371e1195ef393dc87b1b329811e67705b9e1bb5dc00c5b14645b010d310e491c159a81b77145882a63f6206ecfb54b4f6b2ddf7963c2b2681ff1aa2dfd55f1e73b02e150e1f8e51e6ae3615336ed2b2b461fccd4ec00311dd4b00cf4316fb4bda9fa1a0a94d01d4db3209cd302a449b841dc10fcc2d63482b979cb70c21ef7000e655a7a1a18b57b6cd06267ef9f582b4783e42e60f460962921710e11ac51a3f9fa92e9118c5f0e1d8b2c342"], &(0x7f0000000040)=0x2) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000100)={r8, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000001380)={r5, @in6={{0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0xf}}}, 0x0, 0x7, 0x0, 0x8, 0x92}, &(0x7f0000001440)=0x98) eventfd(0xffffffff80000001) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000001140)={0x4, 0x8001, 0x40, 0xfffffffffffffffd, 0x0}, &(0x7f0000001180)=0x10) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f00000003c0)) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000011c0)={0x95e, 0x101, 0x8009, 0x1ff, 0x31386ac8, 0x8, 0x1, 0x7, r9}, 0x20) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x1, 0x1) recvfrom(r1, &(0x7f00000015c0)=""/83, 0x53, 0x120, 0x0, 0x0) symlinkat(&(0x7f0000001080)='./file0\x00', r4, &(0x7f0000001100)='./file0\x00') close(r7) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={r4, r4, 0x4, 0x3}, 0x10) getsockname$netlink(r1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) 2018/03/31 07:42:06 executing program 3: r0 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0xfffffffffffffffe, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000040)={r0}) perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000001000), &(0x7f0000000000)=0x4) 2018/03/31 07:42:06 executing program 4: r0 = semget$private(0x0, 0x6, 0x0) semctl$SEM_STAT(r0, 0x1, 0x12, &(0x7f0000000000)=""/57) semop(r0, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff8}, {}], 0x2) semctl$GETZCNT(r0, 0x5, 0xf, &(0x7f0000000080)=""/240) [ 192.828144] semctl(GETNCNT/GETZCNT) is since 3.16 Single Unix Specification compliant. [ 192.828144] The task syz-executor4 (14782) triggered the difference, watch for misbehavior. 2018/03/31 07:42:07 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0xaf01, &(0x7f0000307000)=&(0x7f0000989fff)) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000140)={0x0, r1}) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000000)=r1) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000cef000)={0x1, 0x0, &(0x7f000062a000)=""/167, &(0x7f0000aac000)=""/21, &(0x7f00002fdf52)=""/174}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000180)={0x0, 0x1, &(0x7f0000000280)=""/147, &(0x7f0000000340)=""/223, &(0x7f0000000580)=""/4096}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000040)=0x1) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000f82ffc)=0x4001) dup2(r1, r0) eventfd(0x0) 2018/03/31 07:42:07 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\x00', 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x2011, r0, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f0000000000)={0x2, 0x4}) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000000000/0x1000)=nil], &(0x7f0000000080)=[0x7, 0x6], &(0x7f0000000080), 0x0) ioctl$PPPIOCGFLAGS(r0, 0x8004745a, &(0x7f0000000040)) 2018/03/31 07:42:07 executing program 2: r0 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)="c6cc8e60a78914d500bfeae773ddb642384ef9648af1058f5fbd2fd309524d989e8ca5c3e6e4d185de0489636bb4012cd2281d57a505b82ae678e253ab1603ef18da1e2b4f2acc3c7651ff1c670f5ed1de51a9a5a850687fc0664d9c81b66fefaf800714c085934bd42e3e21ae71d978f3e76fcbfdc2e66adff8be4d85633beb78581bf230f72954dd487c97d06409d3c6e2f7f22be6284a9b", 0x99, 0xfffffffffffffffb) keyctl$describe(0x6, r0, &(0x7f00000002c0)=""/200, 0xc8) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440)={0x0, 0x0, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20202, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x1010, r3, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000003c0)={&(0x7f0000000040)='./file0\x00', r3}, 0x10) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000000580)=ANY=[@ANYBLOB="030000000000000002004e22ac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e24ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000006ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ffffffffffffff000000000000000000000000000000000000000000000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e220000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) pwrite64(r3, &(0x7f00000004c0)="361cf8298589166f6c2d5823c3b913944a09f012cc6a80f1d50171bf0badb6b5ffdeeaef7d6bdec3b31ce16780d2546875ed31070c85d5735d1ca260f2fca2cc539989af5eafe394f9ae07fcd88029971829aeaf797a78f97cd7f8531aeeb62f497a6d2d8c61dc23348ec786a20e624fdf4c5b839bea2dc66b04b7756cc92f852e", 0x81, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000400)=0xfff, 0x4) fallocate(r3, 0x3, 0x0, 0x81) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000000480)={'ip6gretap0\x00', {0x2, 0x4e21}}) ppoll(&(0x7f0000000080)=[{r2}, {r1, 0x208}, {r3, 0x28}], 0x3, &(0x7f00000000c0), &(0x7f0000000140)={0x70000000000}, 0x8) 2018/03/31 07:42:07 executing program 7 (fault-call:10 fault-nth:43): r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4900, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000240)=0x4) getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) r1 = dup(0xffffffffffffff9c) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r2 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r2, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r2, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r2, &(0x7f0000000100)=""/65, 0x41) r3 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) fchdir(r2) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(r3, &(0x7f0000000200)='./file1\x00', r2, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r2, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000580)=""/80, 0x50}, {&(0x7f00000008c0)=""/4096, 0x1000}], 0x2, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x20) r5 = syz_open_dev$sndpcmp(&(0x7f00000018c0)='/dev/snd/pcmC#D#p\x00', 0x3, 0x10a00) ioctl$KVM_GET_DEVICE_ATTR(r5, 0x4018aee2, &(0x7f0000001940)={0x0, 0x100, 0x9, &(0x7f0000001900)}) recvfrom$ipx(r4, &(0x7f00000006c0)=""/52, 0x34, 0x100, &(0x7f0000000700)={0x4, 0x9a2, 0x4, "dc108d9d4391", 0x5}, 0x10) renameat(r2, &(0x7f0000001980)='./file1\x00', r5, &(0x7f00000019c0)='./file0/file0\x00') r6 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r6, 0x4, 0x0) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000040), 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r6, &(0x7f0000000200), 0xfffffe08) 2018/03/31 07:42:07 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) acct(&(0x7f0000001240)='./file0\x00') setrlimit(0xa, &(0x7f0000000380)={0x4, 0x1}) getsockname(0xffffffffffffff9c, &(0x7f0000001480)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f00000012c0)=0x80) socketpair(0x10, 0x0, 0x8, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000001580)={r3}) r4 = open(&(0x7f00000010c0)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000001300)={0x8, 0x0, 0x6, 0x58a, 0x0}, &(0x7f0000001340)=0x10) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x3052, r3, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000500)={r4, &(0x7f00000003c0)="4252ee52f6444d7a5cc8d72ff81e9e6f7ced349e1d14307197f644a012ed6aef54b2735a10b6401d485accfb7fe939a7157b973bc31c455f26889f9714d4df05e995543fb8beecb75137f47f64fa4d1012f149557a9932b2d20387314de21ebaa8380c7ca538f74763955b4bd94d501e78393a236ea39ca3b97e697cc28167cf42c6274531b4512f4c179dbf934a4fe461096388e20699e8de7d7a5e27e5727ea1cac1b6e419a3498a4df36cdd822977c7e8dfbe38433dcff1d61135bc0fb16dcfd2258ead714ccc1a441b36630eda9d075dec7790f33e7379", &(0x7f00000004c0)=""/64}, 0x18) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f00000001c0)={'bond0\x00', {0x2, 0x4e20, @multicast2=0xe0000002}}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYBLOB="408615824f3f781ae75fcc9554f019621eaccb21d7ca5fb77c06ff41c0d07d78b6de0ed01fa10b1070cb77afb61679a7f893b0c78371e1195ef393dc87b1b329811e67705b9e1a671b36c5b14645b010d310e491c159a81b77145882a63f6206ecfb54b4f6b2ddf7963c2b2681ff1aa2dfd55f1e73b02e150e1f8e51e6ae3615336ed2b2b461fccd4ec00311dd4b00cf4316fb4bda9fa1a0a94d01d4db3209cd302a449b841dc10fcc2d63482b979cb70c21ef7000e655a7a1a18b57b6cd06267ef9f582b4783e42e60f460962121710e11ac51a3f9fa92e9118c5f0e1d8b2c342"], &(0x7f0000000040)=0x2) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000100)={r7, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000001380)={r5, @in6={{0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0xf}}}, 0x0, 0x7, 0x0, 0x8, 0x92}, &(0x7f0000001440)=0x98) eventfd(0xffffffff80000001) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000001140)={0x4, 0x8001, 0x40, 0xfffffffffffffffd, 0x0}, &(0x7f0000001180)=0x10) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f0000001500)) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000011c0)={0x95e, 0x101, 0x8009, 0x1ff, 0x31386ac8, 0x8, 0x1, 0x7, r8}, 0x20) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x1, 0x1) recvfrom(r1, &(0x7f00000015c0)=""/83, 0x53, 0x120, 0x0, 0x0) symlinkat(&(0x7f0000001080)='./file0\x00', r4, &(0x7f0000001100)='./file0\x00') close(r0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={r4, r4, 0x4, 0x3}, 0x10) getsockname$netlink(r1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) 2018/03/31 07:42:07 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) listen(r0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x402, 0x0) getsockopt$inet_int(r0, 0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f0000000180)=0xaf45) getsockname(r1, &(0x7f00000000c0)=@generic, &(0x7f0000000140)=0x80) bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x1, &(0x7f0000001fe8)=ANY=[@ANYBLOB="03c4010000571f8f74"], &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0xc3, &(0x7f0000009f3d)=""/195}, 0x48) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000ca7ff8), 0x8, 0x0) clock_gettime(0x0, &(0x7f0000835000)={0x0, 0x0}) ppoll(&(0x7f00007ac000)=[{}], 0x1, &(0x7f00004c1000)={0x0, r4+30000000}, &(0x7f0000d69ff8), 0xfffffffffffffe83) signalfd(r3, &(0x7f00008f4000), 0x8) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x25}, [@ldst={0x7}], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x437, &(0x7f000000cf3d)=""/195}, 0x48) getpeername$packet(r2, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f00000002c0)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000340)={@remote={0xfe, 0x80, [], 0xbb}, 0x6e, r6}) ustat(0x20000001, &(0x7f00000001c0)) mq_timedsend(r2, &(0x7f0000000300)="cf343ca4777dc154fec909", 0xb, 0x9, &(0x7f0000000240)={0x77359400}) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000280)={0x93a, 0x6}, 0x4) fcntl$getown(r5, 0x9) r7 = syz_open_procfs(0x0, &(0x7f0000fd1ff6)='net/tcp\x00') preadv(r7, &(0x7f00008e8fe0)=[{&(0x7f0000a9a000)=""/162, 0xa2}], 0x1, 0x100) ftruncate(r0, 0x4) 2018/03/31 07:42:07 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000140)=ANY=[@ANYBLOB="01000000421daa0c71000040000000a370e3ea"]) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/03/31 07:42:07 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) utime(&(0x7f0000000080)='./file0\x00', &(0x7f0000a98000)={0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000000000000034c564b000000006d364801901ec9e0fc76d8480ea989a500000000"]) r3 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000000c0)='\x00', 0x0) keyctl$setperm(0x5, r3, 0x0) [ 193.560314] FAULT_INJECTION: forcing a failure. [ 193.560314] name failslab, interval 1, probability 0, space 0, times 0 [ 193.571587] CPU: 0 PID: 14789 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #372 [ 193.578940] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 193.588295] Call Trace: [ 193.590886] dump_stack+0x194/0x24d [ 193.594505] ? arch_local_irq_restore+0x53/0x53 [ 193.599166] ? __save_stack_trace+0x7e/0xd0 [ 193.603472] should_fail+0x8c0/0xa40 [ 193.607171] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 193.612252] ? kasan_kmalloc+0xad/0xe0 [ 193.616117] ? kmem_cache_alloc_trace+0x136/0x740 [ 193.620935] ? cfq_cpd_alloc+0x54/0x90 [ 193.624797] ? blkcg_css_alloc+0x165/0x6b0 [ 193.629011] ? cgroup_apply_control_enable+0x44d/0xbc0 [ 193.634268] ? SyS_mkdirat+0x22b/0x2b0 [ 193.638133] ? do_syscall_64+0x281/0x940 [ 193.642176] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 193.647515] ? do_syscall_64+0x281/0x940 [ 193.651549] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 193.656892] ? find_held_lock+0x35/0x1d0 [ 193.660929] ? __lock_is_held+0xb6/0x140 [ 193.664970] ? check_same_owner+0x320/0x320 [ 193.669269] ? rcu_note_context_switch+0x710/0x710 [ 193.674181] should_failslab+0xec/0x120 [ 193.678136] kmem_cache_alloc_trace+0x4b/0x740 [ 193.682694] ? rcu_read_lock_sched_held+0x108/0x120 [ 193.687683] ? kmem_cache_alloc_trace+0x459/0x740 [ 193.692503] bfq_cpd_alloc+0x54/0x90 [ 193.696193] blkcg_css_alloc+0x165/0x6b0 [ 193.700230] ? bfq_pd_alloc+0xe0/0xe0 [ 193.704008] ? blkcg_deactivate_policy+0x430/0x430 [ 193.708918] ? __lock_is_held+0xb6/0x140 [ 193.712964] cgroup_apply_control_enable+0x44d/0xbc0 [ 193.718047] ? cgroup_propagate_control+0x570/0x570 [ 193.723043] ? css_populate_dir+0x289/0x420 [ 193.727345] cgroup_mkdir+0x56f/0xfc0 [ 193.731122] ? __lock_is_held+0xb6/0x140 [ 193.735163] ? cgroup_destroy_locked+0x750/0x750 [ 193.739896] ? rcu_read_lock_sched_held+0x108/0x120 [ 193.744889] ? kmem_cache_free+0x258/0x2a0 [ 193.749098] ? set_nlink+0xc1/0x160 [ 193.752700] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 193.757601] ? generic_permission+0x105/0x3c0 [ 193.762070] ? cgroup_destroy_locked+0x750/0x750 [ 193.766800] kernfs_iop_mkdir+0x153/0x1e0 [ 193.770922] vfs_mkdir+0x390/0x600 [ 193.774440] SyS_mkdirat+0x22b/0x2b0 [ 193.778132] ? SyS_mknod+0x480/0x480 [ 193.781822] ? trace_hardirqs_on+0xd/0x10 [ 193.785948] ? do_syscall_64+0xb7/0x940 [ 193.789898] ? SyS_mknod+0x480/0x480 [ 193.793586] do_syscall_64+0x281/0x940 [ 193.797450] ? vmalloc_sync_all+0x30/0x30 [ 193.801576] ? _raw_spin_unlock_irq+0x27/0x70 [ 193.806045] ? finish_task_switch+0x1c1/0x7e0 [ 193.810513] ? syscall_return_slowpath+0x550/0x550 [ 193.815417] ? syscall_return_slowpath+0x2ac/0x550 [ 193.820324] ? prepare_exit_to_usermode+0x350/0x350 [ 193.825318] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 193.830659] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 193.835481] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 193.840646] RIP: 0033:0x454e79 [ 193.843812] RSP: 002b:00007fe2ad9eac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 193.851494] RAX: ffffffffffffffda RBX: 00007fe2ad9eb6d4 RCX: 0000000000454e79 [ 193.858736] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 193.865978] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 193.873223] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 193.880466] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 000000000000002b 2018/03/31 07:42:08 executing program 3: rt_sigprocmask(0xffffffffffffffff, &(0x7f0000000000)={0x6}, &(0x7f0000000040), 0x8) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/cuse\x00', 0x24000, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f00000000c0)={0x3, 0xe5}) r1 = add_key(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000100)='pkcs7_test\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000002c0)="6054ced52f1078e77ca484e3dd979154cd6f9eefda42b57de3ed24e0645f14473c43b28d5ccaffddfb43ede78931964a4d93e831e0b7cd26d67bb37bdee682982c", 0x41, r1) fgetxattr(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="62747266732edc6258657600"], &(0x7f0000000380)=""/169, 0xa9) keyctl$search(0xa, r1, &(0x7f0000000200)='asymmetric\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, 0x0) 2018/03/31 07:42:08 executing program 2: r0 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)="c6cc8e60a78914d500bfeae773ddb642384ef9648af1058f5fbd2fd309524d989e8ca5c3e6e4d185de0489636bb4012cd2281d57a505b82ae678e253ab1603ef18da1e2b4f2acc3c7651ff1c670f5ed1de51a9a5a850687fc0664d9c81b66fefaf800714c085934bd42e3e21ae71d978f3e76fcbfdc2e66adff8be4d85633beb78581bf230f72954dd487c97d06409d3c6e2f7f22be6284a9b", 0x99, 0xfffffffffffffffb) keyctl$describe(0x6, r0, &(0x7f00000002c0)=""/200, 0xc8) r1 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000003c0)=0xe, 0x80000) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000ac0)={0x5, &(0x7f0000000480)=[{0x6, 0xe4, 0xf6, 0x24}, {0xffffffffffff15ad, 0x7, 0x1, 0x3f}, {0x38e5, 0x4, 0x0, 0x8}, {0x1, 0xed, 0x1, 0x6}, {0x0, 0x80, 0x10000, 0x80000001}]}, 0x10) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440)={0x0, 0x0, 0xffffffffffffffff}) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20202, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x1010, r4, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r4, 0x0, 0x487, &(0x7f0000000a40), &(0x7f0000000a80)=0xfffffffffffffe85) setsockopt$inet_MCAST_MSFILTER(r4, 0x0, 0x30, &(0x7f0000000580)=ANY=[@ANYBLOB="030000000000000002004e22ac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e24ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000006ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ffffffffffffff000000000000000000000000000000000000000000000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e2200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000efffffff000000000000000000000002004e23ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) pwrite64(r4, &(0x7f00000004c0)="361cf8298589166f6c2d5823c3b913944a09f012cc6a80f1d50171bf0badb6b5ffdeeaef7d6bdec3b31ce16780d2546875ed31070c85d5735d1ca260f2fca2cc539989af5eafe394f9ae07fcd88029971829aeaf797a78f97cd7f8531aeeb62f497a6d2d8c61dc23348ec786a20e624fdf4c5b839bea2dc66b04b7756cc92f852e", 0x81, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f0000000400)=0xfff, 0x4) fallocate(r4, 0x3, 0x0, 0x81) ppoll(&(0x7f0000000080)=[{r3}, {r2, 0x208}, {r4, 0x28}], 0x3, &(0x7f00000000c0), &(0x7f0000000140)={0x70000000000}, 0x8) 2018/03/31 07:42:08 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0xaf01, &(0x7f0000307000)=&(0x7f0000989fff)) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000140)={0x0, r1}) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000000)=r1) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000cef000)={0x1, 0x0, &(0x7f000062a000)=""/167, &(0x7f0000aac000)=""/21, &(0x7f00002fdf52)=""/174}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000180)={0x0, 0x1, &(0x7f0000000280)=""/147, &(0x7f0000000340)=""/223, &(0x7f0000000580)=""/4096}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000040)=0x1) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000f82ffc)=0x4001) dup2(r1, r0) eventfd(0x0) 2018/03/31 07:42:08 executing program 7 (fault-call:10 fault-nth:44): r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4900, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000240)=0x4) getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) r1 = dup(0xffffffffffffff9c) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r2 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r2, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r2, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r2, &(0x7f0000000100)=""/65, 0x41) r3 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) fchdir(r2) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(r3, &(0x7f0000000200)='./file1\x00', r2, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r2, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000580)=""/80, 0x50}, {&(0x7f00000008c0)=""/4096, 0x1000}], 0x2, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x20) r5 = syz_open_dev$sndpcmp(&(0x7f00000018c0)='/dev/snd/pcmC#D#p\x00', 0x3, 0x10a00) ioctl$KVM_GET_DEVICE_ATTR(r5, 0x4018aee2, &(0x7f0000001940)={0x0, 0x100, 0x9, &(0x7f0000001900)}) recvfrom$ipx(r4, &(0x7f00000006c0)=""/52, 0x34, 0x100, &(0x7f0000000700)={0x4, 0x9a2, 0x4, "dc108d9d4391", 0x5}, 0x10) renameat(r2, &(0x7f0000001980)='./file1\x00', r5, &(0x7f00000019c0)='./file0/file0\x00') r6 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r6, 0x4, 0x0) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000040), 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r6, &(0x7f0000000200), 0xfffffe08) [ 194.044890] FAULT_INJECTION: forcing a failure. [ 194.044890] name failslab, interval 1, probability 0, space 0, times 0 [ 194.056221] CPU: 1 PID: 14823 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #372 [ 194.063574] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 194.072919] Call Trace: [ 194.075510] dump_stack+0x194/0x24d [ 194.079139] ? arch_local_irq_restore+0x53/0x53 [ 194.083805] should_fail+0x8c0/0xa40 [ 194.087498] ? kstrdup+0x39/0x70 [ 194.090847] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 194.095926] ? cgroup_apply_control_enable+0x390/0xbc0 [ 194.101179] ? kernfs_iop_mkdir+0x153/0x1e0 [ 194.105477] ? vfs_mkdir+0x390/0x600 [ 194.109167] ? SyS_mkdirat+0x22b/0x2b0 [ 194.113034] ? do_syscall_64+0x281/0x940 [ 194.117073] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 194.122412] ? find_held_lock+0x35/0x1d0 [ 194.126452] ? find_held_lock+0x35/0x1d0 [ 194.130489] ? __lock_is_held+0xb6/0x140 [ 194.134533] ? check_same_owner+0x320/0x320 [ 194.138832] ? rcu_note_context_switch+0x710/0x710 [ 194.143735] ? rcu_read_lock_sched_held+0x108/0x120 [ 194.148732] should_failslab+0xec/0x120 [ 194.152684] kmem_cache_alloc+0x47/0x760 [ 194.156721] ? memcpy+0x45/0x50 [ 194.159981] ? kstrdup+0x59/0x70 [ 194.163329] __kernfs_new_node+0xe2/0x570 [ 194.167453] ? kernfs_dop_revalidate+0x380/0x380 [ 194.172184] ? delete_node+0x2db/0xbc0 [ 194.176048] ? snprintf+0xc0/0xf0 [ 194.179480] ? vsprintf+0x40/0x40 [ 194.182913] kernfs_new_node+0x80/0xe0 [ 194.186775] __kernfs_create_file+0x4b/0x320 [ 194.191163] cgroup_addrm_files+0x3c5/0xa70 [ 194.195464] ? cgroup_file_write+0x710/0x710 [ 194.199853] ? cgroup_idr_replace+0x3f/0x50 [ 194.204153] ? __lock_is_held+0xb6/0x140 [ 194.208193] ? __local_bh_enable_ip+0x121/0x230 [ 194.212836] ? online_css+0x224/0x2e0 [ 194.216612] css_populate_dir+0x198/0x420 [ 194.220737] cgroup_apply_control_enable+0x390/0xbc0 [ 194.225820] ? cgroup_propagate_control+0x570/0x570 [ 194.230812] ? css_populate_dir+0x289/0x420 [ 194.235110] cgroup_mkdir+0x56f/0xfc0 [ 194.238886] ? __lock_is_held+0xb6/0x140 [ 194.242921] ? cgroup_destroy_locked+0x750/0x750 [ 194.247652] ? rcu_read_lock_sched_held+0x108/0x120 [ 194.252643] ? kmem_cache_free+0x258/0x2a0 [ 194.256852] ? set_nlink+0xc1/0x160 [ 194.260456] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 194.265362] ? generic_permission+0x105/0x3c0 [ 194.269834] ? cgroup_destroy_locked+0x750/0x750 [ 194.274565] kernfs_iop_mkdir+0x153/0x1e0 [ 194.278691] vfs_mkdir+0x390/0x600 [ 194.282208] SyS_mkdirat+0x22b/0x2b0 [ 194.285896] ? SyS_mknod+0x480/0x480 [ 194.289586] ? trace_hardirqs_on+0xd/0x10 [ 194.293712] ? do_syscall_64+0xb7/0x940 [ 194.297661] ? SyS_mknod+0x480/0x480 [ 194.301349] do_syscall_64+0x281/0x940 [ 194.305210] ? vmalloc_sync_all+0x30/0x30 [ 194.309336] ? _raw_spin_unlock_irq+0x27/0x70 [ 194.313807] ? finish_task_switch+0x1c1/0x7e0 [ 194.318279] ? syscall_return_slowpath+0x550/0x550 [ 194.323183] ? syscall_return_slowpath+0x2ac/0x550 [ 194.328086] ? prepare_exit_to_usermode+0x350/0x350 [ 194.333082] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 194.338424] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 194.343245] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 194.348407] RIP: 0033:0x454e79 [ 194.351569] RSP: 002b:00007fe2ad9eac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 194.359257] RAX: ffffffffffffffda RBX: 00007fe2ad9eb6d4 RCX: 0000000000454e79 [ 194.366500] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 194.373743] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 194.380985] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 194.388232] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 000000000000002c 2018/03/31 07:42:08 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000000)=ANY=[]) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000140)={0x0, r1}) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000000)=r1) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000cef000)={0x1, 0x0, &(0x7f000062a000)=""/167, &(0x7f0000aac000)=""/21, &(0x7f00002fdf52)=""/174}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000180)={0x0, 0x1, &(0x7f0000000280)=""/147, &(0x7f0000000340)=""/223, &(0x7f0000000580)=""/4096}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000040)=0x1) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000f82ffc)=0x4001) dup2(r1, r0) eventfd(0x0) [ 194.396810] cgroup: cgroup_addrm_files: failed to add stat, err=-12 2018/03/31 07:42:08 executing program 1: clone(0x200, &(0x7f0000151000), &(0x7f0000000080), &(0x7f0000f8b000), &(0x7f0000000100)) mknod(&(0x7f0000000140)='./file0\x00', 0x2001001, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000240), &(0x7f0000000140)) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000180), 0x2) r0 = syz_open_procfs(0x0, &(0x7f000044b000)='io\x00') read$eventfd(r0, &(0x7f00000000c0), 0x8) accept4$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x2710, @hyper}, 0x10, 0x80000) lseek(r0, 0x0, 0x0) creat(&(0x7f0000b7a000)='./file0\x00', 0x0) 2018/03/31 07:42:08 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x20000, 0x0) sendto$inet(r0, &(0x7f0000000100)="7b2c09ced98ce71b835a4048a2fbf7c2db93a80a2a745b1f6cb3166d60a2314e9aaf510fff2b8038a45715b9ad48a688aca95be97fc2483622154303e379fd8567919330845b9fa67cac2c6c32e2b64af9131facbbf020965eddcf8c108c00f0a16709593fd937", 0x67, 0x20000000, 0x0, 0x0) add_key(&(0x7f00000002c0)='cifs.spnego\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000040)="3080048b", 0x4, 0xfffffffffffffffd) socket$inet(0x2, 0x6, 0xfffffffffffffffa) 2018/03/31 07:42:09 executing program 7 (fault-call:10 fault-nth:45): r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4900, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000240)=0x4) getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) r1 = dup(0xffffffffffffff9c) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r2 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r2, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r2, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r2, &(0x7f0000000100)=""/65, 0x41) r3 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) fchdir(r2) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(r3, &(0x7f0000000200)='./file1\x00', r2, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r2, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000580)=""/80, 0x50}, {&(0x7f00000008c0)=""/4096, 0x1000}], 0x2, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x20) r5 = syz_open_dev$sndpcmp(&(0x7f00000018c0)='/dev/snd/pcmC#D#p\x00', 0x3, 0x10a00) ioctl$KVM_GET_DEVICE_ATTR(r5, 0x4018aee2, &(0x7f0000001940)={0x0, 0x100, 0x9, &(0x7f0000001900)}) recvfrom$ipx(r4, &(0x7f00000006c0)=""/52, 0x34, 0x100, &(0x7f0000000700)={0x4, 0x9a2, 0x4, "dc108d9d4391", 0x5}, 0x10) renameat(r2, &(0x7f0000001980)='./file1\x00', r5, &(0x7f00000019c0)='./file0/file0\x00') r6 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r6, 0x4, 0x0) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000040), 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r6, &(0x7f0000000200), 0xfffffe08) 2018/03/31 07:42:09 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000943ffc)=0xa35) read(r1, &(0x7f00003fefff)=""/1, 0x1) r2 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r3, 0x5452, &(0x7f0000b28000)=0x3c) r5 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fb9000)) shutdown(r5, 0x0) fcntl$setsig(r3, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r4}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000140)={0x2, 0xffffffffffffffff, 0x5, 0x20, 0x5, 0x8, 0x1, 0x3, 0x0}, &(0x7f0000000200)=0x20) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000440)={r6, 0x8000}, &(0x7f0000000480)=0x8) r7 = dup2(r4, r4) fcntl$setown(r7, 0x8, r2) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r2, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000580)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0xe6, 0x2, {0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, 0xb64, 0xa, 0x9b, 0x5, 0xffff}}, &(0x7f00000000c0)=0xb0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 07:42:09 executing program 2: r0 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)="c6cc8e60a78914d500bfeae773ddb642384ef9648af1058f5fbd2fd309524d989e8ca5c3e6e4d185de0489636bb4012cd2281d57a505b82ae678e253ab1603ef18da1e2b4f2acc3c7651ff1c670f5ed1de51a9a5a850687fc0664d9c81b66fefaf800714c085934bd42e3e21ae71d978f3e76fcbfdc2e66adff8be4d85633beb78581bf230f72954dd487c97d06409d3c6e2f7f22be6284a9b", 0x99, 0xfffffffffffffffb) keyctl$describe(0x6, r0, &(0x7f00000002c0)=""/200, 0xc8) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440)={0x0, 0x0, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20202, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x1010, r3, 0x0) ioctl$sock_netrom_TIOCOUTQ(r3, 0x5411, &(0x7f0000000040)) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000000580)=ANY=[@ANYBLOB="030000000000000002004e22ac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e24ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000006ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ffffffffffffff000000000000000000000000000000000000000000000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e220000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) pwrite64(r3, &(0x7f00000004c0)="361cf8298589166f6c2d5823c3b913944a09f012cc6a80f1d50171bf0badb6b5ffdeeaef7d6bdec3b31ce16780d2546875ed31070c85d5735d1ca260f2fca2cc539989af5eafe394f9ae07fcd88029971829aeaf797a78f97cd7f8531aeeb62f497a6d2d8c61dc23348ec786a20e624fdf4c5b839bea2dc66b04b7756cc92f852e", 0x81, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000400)=0xfff, 0x4) fallocate(r3, 0x3, 0x0, 0x81) ppoll(&(0x7f0000000080)=[{r2}, {r1, 0x208}, {r3, 0x28}], 0x3, &(0x7f00000000c0), &(0x7f0000000140)={0x70000000000}, 0x8) 2018/03/31 07:42:09 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000000)=ANY=[]) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000140)={0x0, r1}) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000000)=r1) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000cef000)={0x1, 0x0, &(0x7f000062a000)=""/167, &(0x7f0000aac000)=""/21, &(0x7f00002fdf52)=""/174}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000180)={0x0, 0x1, &(0x7f0000000280)=""/147, &(0x7f0000000340)=""/223, &(0x7f0000000580)=""/4096}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000040)=0x1) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000f82ffc)=0x4001) dup2(r1, r0) eventfd(0x0) 2018/03/31 07:42:09 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) acct(&(0x7f0000001240)='./file0\x00') setrlimit(0x1000000a, &(0x7f00000003c0)={0x0, 0x1}) getsockname(0xffffffffffffff9c, &(0x7f0000001480)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f00000012c0)=0x80) socketpair(0x10, 0x0, 0x8, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5451) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000001580)={r3}) r4 = open(&(0x7f00000010c0)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000001300)={0x8, 0x0, 0x6, 0x58a, 0x0}, &(0x7f0000001340)=0x10) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x3052, r3, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f00000001c0)={'bond0\x00', {0x2, 0x4e20, @multicast2=0xe0000002}}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="408615824f3f781ae75fcc9554f019621eaccb21d7ca5fb77c06ff41c0d07d78b6de0ed01fa10b1070cb77afb61679a7f893b0c78371e1195ef393dc87b1b329811e67705b9e1bb5dc00c5d310e491c159a81b77145882a63f6206ecfb54b4f6b2ddf7963c2b2681ff1aa2dfd55f1e5f6a2e150e1f8e51e6ae3615330000008000000000c00311dd4b00cf4316fb4bda9fa1a0a94d01d4db32302a449b841dc10fcc2d63482b979cb70c21ef7000e655a7a1a18b57b6cd06267ef9f582b4783e42e60f460962921710e11ac51a3f9fa92e9118c5f0e1d8b2c342357f9180a2c4fcee6d2ad72072c30a2483f373b9ccef0a242b33d6f17cd0c4d4a65a9c61f10ea71f72182d4bd99d08a70e01d8dd48e503044d8905c3a458083525bb487f843bb7b4b37a999b4bb952c527238718865be3141d160c2f84d40ecc70f4586e0a97be211109d50ee1a737a4b6ac21f7e44c28a3f0b81ed2d06f7f2de2ddcfa38dfbf716bc219e8ef8883500ef65ade30703b1891dfccc1a47f80af0487c09c553a833f1c321938c1e8f19804f846bdfbab432be07ccdd5584a04768494cd99fb5e1ec8cc2ae3b1fd411e1e89f425909c3bfc36dc15756b61de9a5e4ec000021dc225d1062aa3a68b860546aabaa9ce9aaf9fa8906179306131774154f95ffbde9609e3603700d507dff30d7a39fec770c7914ac56af26e93e523e17b855930155cf9694aef477a7dc57d3992a2c6e8175d5ed7740a02e7efc0bcafcb6ef3a03f2426ea9033bf0b2665ab466ac0f81f4ab783f8d35b538a078c1e29e9916af85d87240aaed1691aeb62e6d8b54917cda6e06ab94dd5b125a48c5b162b5a466721fee159697c45e972ffeefa599b6aa067182ef"], &(0x7f0000000040)=0x2) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000100)={r7, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x84) sendto$inet6(r3, &(0x7f0000000300)="f95e682c9bec60bd07460e109b11e461a3b9b89771e19aec75bee709", 0x1c, 0x1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000001380)={r5, @in6={{0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0xf}}}, 0x0, 0x7, 0x0, 0x8, 0x92}, &(0x7f0000001440)=0x98) eventfd(0xffffffff80000001) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000001140)={0x4, 0x8001, 0x40, 0xfffffffffffffffd, 0x0}, &(0x7f0000001180)=0x10) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f0000001500)) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r4) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000011c0)={0x95e, 0x101, 0x8009, 0x1ff, 0x31386ac8, 0x8, 0x1, 0x7, r8}, 0x20) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x1, 0x1) recvfrom(r1, &(0x7f00000015c0)=""/83, 0x53, 0x120, 0x0, 0x0) getsockname$inet6(r1, &(0x7f0000000280), &(0x7f00000002c0)=0x1c) symlinkat(&(0x7f0000001080)='./file0\x00', r4, &(0x7f0000001100)='./file0\x00') close(r0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={r4, r4, 0x4, 0x3}, 0x10) getsockname$netlink(r1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) 2018/03/31 07:42:09 executing program 4: r0 = memfd_create(&(0x7f00000000c0)="769cfb85ba903a48d4161b3000", 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x3, 0x2012, r0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000000)={0x6, 0x7, 0x6, 0x80000000, 0x908a, 0x9b}) fallocate(r0, 0x0, 0x0, 0x87dc) prctl$setname(0xf, &(0x7f0000001fff)='\x00') clone(0x0, &(0x7f0000000100), &(0x7f0000000080), &(0x7f0000000200), &(0x7f0000000240)) 2018/03/31 07:42:09 executing program 5: mmap(&(0x7f0000000000/0xb3c000)=nil, 0xb3c000, 0x1ffffffffff, 0x1d, 0xffffffffffffffff, 0x100) socket$vsock_stream(0x28, 0x1, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x20) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x28, 0x6, &(0x7f0000581000)={{{@in=@rand_addr, @in6=@mcast2}}, {{}, 0x0, @in=@rand_addr}}, &(0x7f00000000c0)=0xe8) openat$cgroup_ro(r0, &(0x7f0000000000)='rdma.current\x00', 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0xc0880, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r1, 0x40bc5311, &(0x7f0000000100)={0x0, 0x1, 'client1\x00', 0x0, "39ac9b2147d0b6e1", "f3545cc547d1fc90f13f2cd7aea38158496c60a2aea204bdc685e7ae4ea423fc", 0x5, 0x5}) [ 195.401661] FAULT_INJECTION: forcing a failure. [ 195.401661] name failslab, interval 1, probability 0, space 0, times 0 [ 195.413059] CPU: 0 PID: 14846 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #372 [ 195.420411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 195.429741] Call Trace: [ 195.432310] dump_stack+0x194/0x24d [ 195.435914] ? arch_local_irq_restore+0x53/0x53 [ 195.440565] should_fail+0x8c0/0xa40 [ 195.444257] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 195.449335] ? rb_first_postorder+0xa0/0xa0 [ 195.453631] ? __mutex_lock+0x16f/0x1a80 [ 195.457666] ? save_stack+0x43/0xd0 [ 195.461266] ? kasan_kmalloc+0xad/0xe0 [ 195.465131] ? trace_hardirqs_off+0x10/0x10 [ 195.469432] ? find_held_lock+0x35/0x1d0 [ 195.473469] ? __lock_is_held+0xb6/0x140 [ 195.477513] ? check_same_owner+0x320/0x320 [ 195.481807] ? lock_downgrade+0x980/0x980 [ 195.485933] ? rcu_note_context_switch+0x710/0x710 [ 195.490842] should_failslab+0xec/0x120 [ 195.494791] __kmalloc_track_caller+0x5f/0x760 [ 195.499350] ? string+0x180/0x200 [ 195.502781] ? kstrdup_const+0x39/0x50 [ 195.506646] kstrdup+0x39/0x70 [ 195.509815] kstrdup_const+0x39/0x50 [ 195.513503] __kernfs_new_node+0xa2/0x570 [ 195.517629] ? kernfs_dop_revalidate+0x380/0x380 [ 195.522372] ? snprintf+0xc0/0xf0 [ 195.525800] ? vsprintf+0x40/0x40 [ 195.529227] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 195.534134] ? cgroup_file_name+0x1d0/0x1d0 [ 195.538434] kernfs_new_node+0x80/0xe0 [ 195.542298] __kernfs_create_file+0x4b/0x320 [ 195.546683] cgroup_addrm_files+0x3c5/0xa70 [ 195.550987] ? cgroup_file_write+0x710/0x710 [ 195.555374] ? cgroup_idr_replace+0x3f/0x50 [ 195.559673] ? __lock_is_held+0xb6/0x140 [ 195.563713] ? __local_bh_enable_ip+0x121/0x230 [ 195.568358] ? online_css+0x224/0x2e0 [ 195.572139] css_populate_dir+0x198/0x420 [ 195.576266] cgroup_apply_control_enable+0x390/0xbc0 [ 195.581346] ? cgroup_propagate_control+0x570/0x570 [ 195.586337] ? css_populate_dir+0x289/0x420 [ 195.590636] cgroup_mkdir+0x56f/0xfc0 [ 195.594410] ? __lock_is_held+0xb6/0x140 [ 195.598446] ? cgroup_destroy_locked+0x750/0x750 [ 195.603468] ? rcu_read_lock_sched_held+0x108/0x120 [ 195.608460] ? kmem_cache_free+0x258/0x2a0 [ 195.612670] ? set_nlink+0xc1/0x160 [ 195.616273] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 195.621175] ? generic_permission+0x105/0x3c0 [ 195.625645] ? cgroup_destroy_locked+0x750/0x750 [ 195.630378] kernfs_iop_mkdir+0x153/0x1e0 [ 195.634501] vfs_mkdir+0x390/0x600 [ 195.638021] SyS_mkdirat+0x22b/0x2b0 [ 195.641709] ? SyS_mknod+0x480/0x480 [ 195.645395] ? trace_hardirqs_on+0xd/0x10 [ 195.649521] ? do_syscall_64+0xb7/0x940 [ 195.653469] ? SyS_mknod+0x480/0x480 [ 195.657155] do_syscall_64+0x281/0x940 [ 195.661023] ? vmalloc_sync_all+0x30/0x30 [ 195.665147] ? syscall_return_slowpath+0x550/0x550 [ 195.670050] ? syscall_return_slowpath+0x2ac/0x550 [ 195.674953] ? prepare_exit_to_usermode+0x350/0x350 [ 195.679949] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 195.685294] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 195.690114] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 195.695277] RIP: 0033:0x454e79 2018/03/31 07:42:10 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000000)=ANY=[]) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000140)={0x0, r1}) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000000)=r1) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000cef000)={0x1, 0x0, &(0x7f000062a000)=""/167, &(0x7f0000aac000)=""/21, &(0x7f00002fdf52)=""/174}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000180)={0x0, 0x1, &(0x7f0000000280)=""/147, &(0x7f0000000340)=""/223, &(0x7f0000000580)=""/4096}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000040)=0x1) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000f82ffc)=0x4001) dup2(r1, r0) eventfd(0x0) 2018/03/31 07:42:10 executing program 1: gettid() setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000001500)=@broute={'broute\x00', 0x20, 0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200041c0], 0x0, &(0x7f00000014c0), &(0x7f0000005300)=ANY=[]}, 0x78) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) utime(&(0x7f0000000200)='./file0\x00', &(0x7f0000a98000)={0x3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000fc0)='/dev/snd/controlC#\x00', 0x2, 0x4401) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pread64(r3, &(0x7f0000000900)=""/195, 0xc3, 0x0) ioctl$KVM_SET_GSI_ROUTING(r4, 0x4008ae6a, &(0x7f00000007c0)=ANY=[@ANYBLOB="040000000000000000000000070000000000000000000000090000000800000000000000000000000000000000000000000000eeff00000000000800030000000000000000001000f7ffffff05000000000000000000000000000000000001000000000000000000010000000000000000000000000000000600000000086ef23047000000000000000000000000000000000000000000000600000004000000000000000000000007000000000000000300000000000000ff000000"]) keyctl$set_reqkey_keyring(0xe, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000080)) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000640)=@ioapic={0x0, 0x0, 0xd7, 0x5, 0x0, [{0x9, 0x1f, 0x8, [], 0x4}, {0x0, 0x4, 0x5, [], 0xfffffffffffffff8}, {0xfffffffffffff801, 0x8001, 0x7, [], 0x3}, {0x0, 0xffffffffffffff06, 0x40, [], 0xcde}, {0x8000, 0x0, 0x60dd, [], 0x3}, {0x1, 0x0, 0x4, [], 0x1ff}, {0x8, 0x8, 0xacb6, [], 0x5}, {0x8, 0x1ff, 0x5, [], 0x9}, {0x9, 0x8, 0x4, [], 0x1}, {0x200, 0x1, 0x7fff, [], 0xffffffffffffffff}, {0x101, 0x81, 0x4, [], 0x8}, {0x2, 0x38e, 0x2, [], 0x8}, {0x9, 0x9, 0x4, [], 0xffffffff}, {0x5, 0x3, 0x100000001, [], 0x81}, {0x5, 0x1ff, 0xcdd, [], 0x1}, {0x5, 0x3c3, 0x8, [], 0x3ff}, {0x1, 0x0, 0x1, [], 0x5968}, {0x7f, 0xe000000, 0xfffffffffffffffb, [], 0x400}, {0x0, 0x10000, 0x8001, [], 0x1}, {0x4, 0x4, 0x322, [], 0x10001}, {0x100, 0x2, 0x8, [], 0x80000001}, {0x1, 0x6, 0x4, [], 0xfffffffffffffffe}, {0x1, 0x0, 0x1, [], 0xffffffff}, {0x0, 0x2, 0x9, [], 0xfffffffffffffffe}]}) r5 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x16907e, 0x0) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000f80)=@assoc_value, 0x8) ftruncate(r2, 0x104) pwritev(r5, &(0x7f0000001400)=[{&(0x7f0000000180)="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", 0xd88}], 0x1, 0x4) ioctl$sock_SIOCSIFBR(r4, 0x8941, &(0x7f0000001080)=@get={0x1, &(0x7f0000000a00)=""/242, 0x81}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r3, 0xc4c85512, &(0x7f00000000c0)={{0x0, 0x0, 0x0, 0x0, "deb9d52d059beadfc4d05c877d7fc272d69092baa2542f21774ea89452bf346da279fd1d617e74b3177a5e1a"}}) r6 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000001040)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r6, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x10006, 0x0, 0x0, 0x1000, &(0x7f0000a98000/0x1000)=nil}) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x0, 0x80000) ioctl$GIO_UNISCRNMAP(r5, 0x4b69, &(0x7f0000001280)=""/103) ioctl$KVM_SMI(r2, 0xaeb7) getsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f00000000c0)=""/65, &(0x7f0000000140)=0x41) ioctl$KVM_RUN(r2, 0xae80, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x400400, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000c9bec8)={{0x0, 0xffffffffffffffff}, {0x0, 0xfffffffffffffffd}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {0x0, 0x0, 0x0, 0x0, 0x1}, {}, {}, {}, 0xfffffffffffffffc, 0x0, 0x0, 0x400060}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r7, 0x40505330, &(0x7f0000000240)={{0x101, 0x5}, {0xa8, 0x31d9}, 0x9f2, 0x4, 0x7}) mmap(&(0x7f0000000000/0xe62000)=nil, 0xe62000, 0x1000004, 0x400000000032, 0xffffffffffffffff, 0x0) [ 195.698443] RSP: 002b:00007fe2ad9eac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 195.706129] RAX: ffffffffffffffda RBX: 00007fe2ad9eb6d4 RCX: 0000000000454e79 [ 195.713372] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 195.720617] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 195.727859] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 195.735101] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 000000000000002d [ 195.742446] cgroup: cgroup_addrm_files: failed to add max, err=-12 2018/03/31 07:42:10 executing program 2: r0 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)="c6cc8e60a78914d500bfeae773ddb642384ef9648af1058f5fbd2fd309524d989e8ca5c3e6e4d185de0489636bb4012cd2281d57a505b82ae678e253ab1603ef18da1e2b4f2acc3c7651ff1c670f5ed1de51a9a5a850687fc0664d9c81b66fefaf800714c085934bd42e3e21ae71d978f3e76fcbfdc2e66adff8be4d85633beb78581bf230f72954dd487c97d06409d3c6e2f7f22be6284a9b", 0x99, 0xfffffffffffffffb) keyctl$describe(0x6, r0, &(0x7f00000002c0)=""/200, 0xc8) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440)={0x0, 0x0, 0xffffffffffffffff}) r2 = dup2(r1, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000040)={0x3, [0x0, 0x0, 0x0]}, &(0x7f00000003c0)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000480)={0x3, 0x392, 0x2, 0x8, 0x1ff, 0x355334d5, 0x1f, 0x4, r3}, &(0x7f0000000a40)=0x20) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) r5 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20202, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x1010, r5, 0x0) setsockopt$inet_MCAST_MSFILTER(r5, 0x0, 0x30, &(0x7f0000000580)=ANY=[@ANYBLOB="030000000000000002004e22ac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e24ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000006ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ffffffffffffff000000000000000000000000000000000000000000000002004e2100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e220000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) pwrite64(r1, &(0x7f00000004c0)="361cf8298589166f6c2d5823c3b913944a09f012cc6a80f1d50171bf0badb6b5ffdeeaef7d6bdec3b31ce16780d2546875ed31070c85d5735d1ca260f2fca2cc539989af5eafe394f9ae07fcd88029971829aeaf797a78f97cd7f8531aeeb62f497a6d2d8c61dc23348ec786a20e624fdf4c5b839bea2dc66b04b7756cc92f852e", 0x70, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r5, 0x84, 0x21, &(0x7f0000000400)=0xfff, 0x4) fallocate(r5, 0x3, 0x0, 0x81) ppoll(&(0x7f0000000080)=[{r4}, {r1, 0x208}, {r5, 0x28}], 0x3, &(0x7f00000000c0), &(0x7f0000000140)={0x70000000000}, 0x8) 2018/03/31 07:42:10 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x20000) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x0, &(0x7f0000000200)=""/40, &(0x7f00000001c0)=0xae) r2 = accept4$inet6(r1, &(0x7f0000000300)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000140)=0xffffffffffffffcb, 0x80800) getsockopt$inet6_tcp_buf(r2, 0x6, 0x1f, &(0x7f0000000240)=""/161, &(0x7f0000000100)=0x82) ppoll(&(0x7f0000000040)=[{r0}], 0x1, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x8) 2018/03/31 07:42:10 executing program 7 (fault-call:10 fault-nth:46): r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4900, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000240)=0x4) getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) r1 = dup(0xffffffffffffff9c) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r2 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r2, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r2, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r2, &(0x7f0000000100)=""/65, 0x41) r3 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) fchdir(r2) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(r3, &(0x7f0000000200)='./file1\x00', r2, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r2, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000580)=""/80, 0x50}, {&(0x7f00000008c0)=""/4096, 0x1000}], 0x2, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x20) r5 = syz_open_dev$sndpcmp(&(0x7f00000018c0)='/dev/snd/pcmC#D#p\x00', 0x3, 0x10a00) ioctl$KVM_GET_DEVICE_ATTR(r5, 0x4018aee2, &(0x7f0000001940)={0x0, 0x100, 0x9, &(0x7f0000001900)}) recvfrom$ipx(r4, &(0x7f00000006c0)=""/52, 0x34, 0x100, &(0x7f0000000700)={0x4, 0x9a2, 0x4, "dc108d9d4391", 0x5}, 0x10) renameat(r2, &(0x7f0000001980)='./file1\x00', r5, &(0x7f00000019c0)='./file0/file0\x00') r6 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r6, 0x4, 0x0) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000040), 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r6, &(0x7f0000000200), 0xfffffe08) 2018/03/31 07:42:10 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) acct(&(0x7f0000001240)='./file0\x00') setrlimit(0xa, &(0x7f0000000380)={0x4, 0x1}) getsockname(0xffffffffffffff9c, &(0x7f0000001480)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f00000012c0)=0x80) socketpair(0x10, 0x0, 0x8, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000001580)={r3}) r4 = open(&(0x7f00000010c0)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000001300)={0x8, 0x0, 0x6, 0x58a, 0x0}, &(0x7f0000001340)=0x10) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x3052, r3, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f00000001c0)={'bond0\x00', {0x2, 0x4e20, @multicast2=0xe0000002}}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYBLOB="408615824f3f781ae75fcc9554f019621eaccb21d7ca5fb77c06ff41c0d07d78b6de0ed01fa10b1070cb77afb61679a7f893b0c78371e1195ef393dc87b1b329811e67705b9e1bb5dc00c5b14645b010d310e491c159a81b77145882a63f6206ecfb54b4f6b2ddf7963c2b2681ff1aa2dfd55f1e73b02e150e1f8e51e6ae3615336ed2b2b461fccd4ec00311dd4b00cf4316fb4bda9fa1a0a94d01d4db3209cd302a449b841dc10fcc2d63482b979cb70c21ef7000e655a7a1a18b57b6cd06267ef9f582b4783e42e60f460962921710e11ac51a3f9fa92e9118c5f0e1d8b2c342"], &(0x7f0000000040)=0x2) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000100)={r7, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000001380)={r5, @in6={{0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0xf}}}, 0x0, 0x7, 0x0, 0x8, 0x92}, &(0x7f0000001440)=0x98) eventfd(0xffffffff80000001) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000001140)={0x4, 0x8001, 0x40, 0xfffffffffffffffd, 0x0}, &(0x7f0000001180)=0x10) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f0000001500)) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000011c0)={0x95e, 0x101, 0x8009, 0x1ff, 0x31386ac8, 0x8, 0x1, 0x7, r8}, 0x20) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x1, 0x1) recvfrom(r1, &(0x7f00000015c0)=""/83, 0x53, 0x120, 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r3, 0x4c09, 0x3) symlinkat(&(0x7f0000001080)='./file0\x00', r4, &(0x7f0000001100)='./file0\x00') close(r0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={r4, r4, 0x4, 0x3}, 0x10) ioctl$TCFLSH(r2, 0x540b, 0x1) getsockname$netlink(r1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) 2018/03/31 07:42:10 executing program 0: ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0xaf01, &(0x7f0000307000)=&(0x7f0000989fff)) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000000000)=ANY=[]) r0 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000140)={0x0, r0}) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f0000000000)=r0) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f0000cef000)={0x1, 0x0, &(0x7f000062a000)=""/167, &(0x7f0000aac000)=""/21, &(0x7f00002fdf52)=""/174}) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f0000000180)={0x0, 0x1, &(0x7f0000000280)=""/147, &(0x7f0000000340)=""/223, &(0x7f0000000580)=""/4096}) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f0000000040)=0x1) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f0000f82ffc)=0x4001) dup2(r0, 0xffffffffffffffff) eventfd(0x0) [ 195.897580] FAULT_INJECTION: forcing a failure. [ 195.897580] name failslab, interval 1, probability 0, space 0, times 0 [ 195.908861] CPU: 1 PID: 14878 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #372 [ 195.916219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 195.925562] Call Trace: [ 195.928150] dump_stack+0x194/0x24d [ 195.928783] *** Guest State *** [ 195.931776] ? arch_local_irq_restore+0x53/0x53 [ 195.931800] should_fail+0x8c0/0xa40 [ 195.931813] ? kstrdup+0x39/0x70 [ 195.931825] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 195.931836] ? cgroup_apply_control_enable+0x390/0xbc0 [ 195.931845] ? kernfs_iop_mkdir+0x153/0x1e0 [ 195.931851] ? vfs_mkdir+0x390/0x600 [ 195.931862] ? SyS_mkdirat+0x22b/0x2b0 [ 195.935392] CR0: actual=0xffffffff9ffffffc, shadow=0xfffffffffffffffc, gh_mask=fffffffffffffff7 [ 195.939950] ? do_syscall_64+0x281/0x940 [ 195.939965] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 195.939978] ? find_held_lock+0x35/0x1d0 [ 195.939992] ? find_held_lock+0x35/0x1d0 [ 195.943769] CR4: actual=0x0000000000402060, shadow=0x0000000000400060, gh_mask=ffffffffffffe871 [ 195.947040] ? __lock_is_held+0xb6/0x140 [ 195.947063] ? check_same_owner+0x320/0x320 [ 195.952159] CR3 = 0x0000000000000000 [ 195.957398] ? rcu_note_context_switch+0x710/0x710 [ 195.957409] ? rcu_read_lock_sched_held+0x108/0x120 [ 195.957425] should_failslab+0xec/0x120 [ 195.961750] PDPTR0 = 0x0000000000000003 PDPTR1 = 0x0000000000000000 [ 195.965405] kmem_cache_alloc+0x47/0x760 [ 195.965415] ? memcpy+0x45/0x50 [ 195.965426] ? kstrdup+0x59/0x70 [ 195.965444] __kernfs_new_node+0xe2/0x570 [ 195.969314] PDPTR2 = 0x0000000000000000 PDPTR3 = 0x0000000000000000 [ 195.978104] ? kernfs_dop_revalidate+0x380/0x380 [ 195.978122] ? snprintf+0xc0/0xf0 [ 195.978131] ? vsprintf+0x40/0x40 [ 195.978139] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 195.978151] ? cgroup_file_name+0x1d0/0x1d0 [ 195.982202] RSP = 0x0000000000000000 RIP = 0x0000000000008000 [ 195.987521] kernfs_new_node+0x80/0xe0 [ 195.987534] __kernfs_create_file+0x4b/0x320 [ 195.987547] cgroup_addrm_files+0x3c5/0xa70 [ 195.991597] RFLAGS=0x00010002 DR7 = 0x0000000000000400 [ 195.995619] ? cgroup_file_write+0x710/0x710 [ 195.995638] ? cgroup_idr_replace+0x3f/0x50 [ 196.004475] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 196.008498] ? __lock_is_held+0xb6/0x140 [ 196.008515] ? __local_bh_enable_ip+0x121/0x230 [ 196.008524] ? online_css+0x224/0x2e0 [ 196.008535] css_populate_dir+0x198/0x420 [ 196.008550] cgroup_apply_control_enable+0x390/0xbc0 [ 196.012861] CS: sel=0x0000, attr=0x10000, limit=0xffffffff, base=0x0000000000000000 2018/03/31 07:42:10 executing program 2: r0 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)="c6cc8e60a78914d500bfeae773ddb642384ef9648af1058f5fbd2fd309524d989e8ca5c3e6e4d185de0489636bb4012cd2281d57a505b82ae678e253ab1603ef18da1e2b4f2acc3c7651ff1c670f5ed1de51a9a5a850687fc0664d9c81b66fefaf800714c085934bd42e3e21ae71d978f3e76fcbfdc2e66adff8be4d85633beb78581bf230f72954dd487c97d06409d3c6e2f7f22be6284a9b", 0x99, 0xfffffffffffffffb) keyctl$describe(0x6, r0, &(0x7f00000002c0)=""/200, 0xc8) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440)={0x0, 0x0, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20202, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x1010, r3, 0x0) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000000580)=ANY=[@ANYBLOB="030000000000000002004e22ac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e24ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000006ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ffffffffffffff000000000000000000000000000000000000000000000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e220000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) pwrite64(r3, &(0x7f00000004c0)="361cf8298589166f6c2d5823c3b913944a09f012cc6a80f1d50171bf0badb6b5ffdeeaef7d6bdec3b31ce16780d2546875ed31070c85d5735d1ca260f2fca2cc539989af5eafe394f9ae07fcd88029971829aeaf797a78f97cd7f8531aeeb62f497a6d2d8c61dc23348ec786a20e624fdf4c5b839bea2dc66b04b7756cc92f852e", 0x81, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000400)=0xfff, 0x4) socket$can_raw(0x1d, 0x3, 0x1) fallocate(r3, 0x3, 0x0, 0x81) prctl$void(0x7) ppoll(&(0x7f0000000080)=[{r2}, {r1, 0x208}, {r3, 0x28}], 0x3, &(0x7f00000000c0), &(0x7f0000000140)={0x70000000000}, 0x8) 2018/03/31 07:42:10 executing program 0: ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0xaf01, &(0x7f0000307000)=&(0x7f0000989fff)) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000000000)=ANY=[]) r0 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000140)={0x0, r0}) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f0000000000)=r0) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f0000cef000)={0x1, 0x0, &(0x7f000062a000)=""/167, &(0x7f0000aac000)=""/21, &(0x7f00002fdf52)=""/174}) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f0000000180)={0x0, 0x1, &(0x7f0000000280)=""/147, &(0x7f0000000340)=""/223, &(0x7f0000000580)=""/4096}) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f0000000040)=0x1) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f0000f82ffc)=0x4001) dup2(r0, 0xffffffffffffffff) eventfd(0x0) 2018/03/31 07:42:10 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000180), &(0x7f00000001c0)=0x30) bind$alg(r1, &(0x7f0000e15000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000133ffc)="71e67a15", 0x4) r2 = accept4$alg(r1, 0x0, 0x0, 0x80800) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) r3 = gettid() socketpair(0x9, 0x7, 0x2, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$kcm(r4, &(0x7f0000002700)={0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000000080)="05d73cbcd4c4ca54bf15598a509ff98127457c784fc97db63752f4fc2db656fa3198a179a6466040cfbba7e8ca6c7c681111d4844c77c6772226f418380a66810627ae559b4b16c589943fa35169a00f5b5d372bf7586195faab1f6e3369f43784d646fb783114811999eb74e527d75760823bf5cd8b9338809443c5732b8efb8c01", 0x82}], 0x1, &(0x7f0000004e00)=ANY=[], 0x0, 0x4}, 0x4008000) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000000)=r3) readv(r2, &(0x7f00002d9fa0)=[{&(0x7f00003cb000)=""/4096, 0x1000}], 0x1) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f000000dc01)={&(0x7f0000016000)={0x10}, 0xc, &(0x7f000000b000)={&(0x7f0000027fd4)=@mpls_newroute={0x24, 0x18, 0x21, 0xffffffffffffffff, 0xffffffffffffffff, {0x1c, 0x14, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x1}, [@RTA_OIF={0x8, 0x4}]}, 0x24}, 0x1}, 0x0) socket$packet(0x11, 0x3, 0x300) recvmsg(r2, &(0x7f0000ea0000)={&(0x7f0000dbdff0)=@ax25, 0x10, &(0x7f0000621ff0)=[{&(0x7f0000d74fdd)=""/35, 0x23}], 0x1, &(0x7f0000933000)=""/16, 0x10}, 0x0) socket$key(0xf, 0x3, 0x2) r6 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r6, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}], 0x10) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d24000)=[@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r6, 0x84, 0x65, &(0x7f0000808000)=[@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f000000cfe4)={0xa}, 0x1c) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r7, &(0x7f0000000400)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f00000002c0)=@updpolicy={0xb8, 0x19, 0x213, 0x0, 0x0, {{@in=@loopback=0x7f000001, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1}, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000100)={'gretap0\x00', 0x0}) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000140)={@dev={0xfe, 0x80}, r8}, 0x14) [ 196.016536] ? cgroup_propagate_control+0x570/0x570 [ 196.016555] ? css_populate_dir+0x289/0x420 [ 196.021479] DS: sel=0x0000, attr=0x10000, limit=0xfffffffd, base=0x0000000000000000 [ 196.026448] cgroup_mkdir+0x56f/0xfc0 [ 196.026457] ? __lock_is_held+0xb6/0x140 [ 196.026472] ? cgroup_destroy_locked+0x750/0x750 [ 196.030443] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 196.036888] ? rcu_read_lock_sched_held+0x108/0x120 [ 196.036898] ? kmem_cache_free+0x258/0x2a0 [ 196.036909] ? set_nlink+0xc1/0x160 [ 196.036918] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 196.036927] ? generic_permission+0x105/0x3c0 [ 196.040985] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 196.044218] ? cgroup_destroy_locked+0x750/0x750 [ 196.044229] kernfs_iop_mkdir+0x153/0x1e0 [ 196.044241] vfs_mkdir+0x390/0x600 [ 196.044254] SyS_mkdirat+0x22b/0x2b0 [ 196.047613] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 196.051713] ? SyS_mknod+0x480/0x480 [ 196.051722] ? trace_hardirqs_on+0xd/0x10 [ 196.051732] ? do_syscall_64+0xb7/0x940 [ 196.051743] ? SyS_mknod+0x480/0x480 [ 196.058232] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 196.062936] do_syscall_64+0x281/0x940 [ 196.062947] ? vmalloc_sync_all+0x30/0x30 [ 196.062957] ? finish_task_switch+0x1c1/0x7e0 [ 196.062967] ? syscall_return_slowpath+0x550/0x550 [ 196.066428] GDTR: limit=0x00000000, base=0x0000000000000000 [ 196.069817] ? syscall_return_slowpath+0x2ac/0x550 [ 196.069828] ? prepare_exit_to_usermode+0x350/0x350 [ 196.069839] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 196.069852] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 196.074775] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 196.079049] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 196.079057] RIP: 0033:0x454e79 [ 196.079063] RSP: 002b:00007fe2ad9eac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 196.079075] RAX: ffffffffffffffda RBX: 00007fe2ad9eb6d4 RCX: 0000000000454e79 [ 196.085043] IDTR: limit=0x00000000, base=0x0000000000000000 [ 196.088875] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 196.088881] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 196.088887] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 196.088893] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 000000000000002e [ 196.089091] cgroup: cgroup_addrm_files: failed to add max, err=-12 [ 196.093316] TR: sel=0x0000, attr=0x00081, limit=0x00000000, base=0x0000000000000000 [ 196.394215] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 196.400664] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 196.408130] Interruptibility = 00000008 ActivityState = 00000000 [ 196.414390] *** Host State *** [ 196.417684] RIP = 0xffffffff811cdb66 RSP = 0xffff88017d8cf3b8 [ 196.423665] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 196.430076] FSBase=00007f1cc2d02700 GSBase=ffff8801db000000 TRBase=fffffe0000003000 [ 196.437878] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 196.443771] CR0=0000000080050033 CR3=00000001b1193006 CR4=00000000001626f0 [ 196.450792] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff87001610 [ 196.457460] EFER = 0x0000000000000d01 PAT = 0x0000000000000000 [ 196.463518] *** Control State *** [ 196.466970] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 196.473662] EntryControls=0000d1ff ExitControls=0023efff [ 196.479114] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 196.486054] VMEntry: intr_info=80000306 errcode=00000000 ilen=00000000 [ 196.492720] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 196.499310] reason=80000021 qualification=0000000000000000 [ 196.505625] IDTVectoring: info=00000000 errcode=00000000 [ 196.511079] TSC Offset = 0xffffff94bf853ec7 [ 196.515404] EPT pointer = 0x00000001cc6be01e 2018/03/31 07:42:11 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) acct(&(0x7f0000001240)='./file0\x00') setrlimit(0xa, &(0x7f0000000380)={0x4, 0x1}) getsockname(0xffffffffffffff9c, &(0x7f0000001480)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f00000012c0)=0x80) socketpair(0x10, 0x0, 0x8, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000001580)={r3}) r4 = open(&(0x7f00000010c0)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000001300)={0x8, 0x0, 0x6, 0x58a, 0x0}, &(0x7f0000001340)=0x10) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x3052, r3, 0x0) r7 = geteuid() ioprio_get$uid(0x3, r7) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f00000001c0)={'bond0\x00', {0x2, 0x4e20, @multicast2=0xe0000002}}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYBLOB="408615824f3f781ae75fcc9554f019621eaccb21d7ca5fb77c06ff41c0d07d78b6de0ed01fa10b1070cb77afb61679a7f893b0c78371e1195ef393dc87b1b329811e67705b9e1bb5dc00c5b14645b010d310e491c159a81b77145882a63f6206ecfb54b4f6b2ddf7963c2b2681ff1aa2dfd55f1e73b02e150e1f8e51e6ae3615336ed2b2b461fccd4ec00311dd5b00cf4316fb4bda9fa1a0a94d01d4db3209cd302a449b841dc10fcc2d63482b979cb70c21ef7000e655a7a1a18b57b6cd06267ef9f582b4783e42e60f460962921710e11ac51a3f9fa92e9118c5f0e1d8b2c342"], &(0x7f0000000040)=0x2) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000100)={r8, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000001380)={r5, @in6={{0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0xf}}}, 0x0, 0x7, 0x0, 0x8, 0x92}, &(0x7f0000001440)=0x98) eventfd(0xffffffff80000001) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000001140)={0x4, 0x8001, 0x40, 0xfffffffffffffffd, 0x0}, &(0x7f0000001180)=0x10) ioctl$ASHMEM_GET_PROT_MASK(r2, 0x7706, &(0x7f00000003c0)) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000011c0)={0x95e, 0x101, 0x8009, 0x1ff, 0x31386ac8, 0x8, 0x1, 0x7, r9}, 0x20) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x1, 0x1) recvfrom(r1, &(0x7f00000015c0)=""/83, 0x53, 0x120, 0x0, 0x0) symlinkat(&(0x7f0000001080)='./file0\x00', r4, &(0x7f0000001100)='./file0\x00') close(r0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={r4, r4, 0x4, 0x3}, 0x10) getsockname$netlink(r1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) 2018/03/31 07:42:11 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000efdffc)=0x1, 0xd2) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000000c0)={@in={{0x2, 0x0, @loopback=0x7f000001}}, 0x0, 0xa, 0x0, "70739a0ebe4ac9fea0d1f41b412878a5b6b09a357732eb1beaa5f7ffd5345333d326060f0cdeef303977eddb549970cadb75a15db7efaa43e8c3c79d29f15979133dd10315a3c2f16c7dd02273c10768"}, 0x301) sendto$inet(r0, &(0x7f0000a63fff), 0x0, 0x20020004, &(0x7f0000385ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000f43ffc)=0xfffffffffffffffc, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f000074847c)=[{0x8}, {}, {}, {}, {0x0, 0x80000000}, {}, {}, {}], 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000f8e000)={0x0, 0x77, 0x1000010004}, 0x14) sendto$inet(r0, &(0x7f00006e2000)='!', 0x1, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000000)='*', 0x1, 0x0, &(0x7f00000001c0)={0x2}, 0x10) 2018/03/31 07:42:11 executing program 2: r0 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)="c6cc8e60a78914d500bfeae773ddb642384ef9648af1058f5fbd2fd309524d989e8ca5c3e6e4d185de0489636bb4012cd2281d57a505b82ae678e253ab1603ef18da1e2b4f2acc3c7651ff1c670f5ed1de51a9a5a850687fc0664d9c81b66fefaf800714c085934bd42e3e21ae71d978f3e76fcbfdc2e66adff8be4d85633beb78581bf230f72954dd487c97d06409d3c6e2f7f22be6284a9b", 0x99, 0xfffffffffffffffb) keyctl$describe(0x6, r0, &(0x7f00000002c0)=""/200, 0xc8) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440)={0x0, 0x0, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20202, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x1010, r3, 0x0) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000000580)=ANY=[@ANYBLOB="030000000000000002004e22ac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e24ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000006ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ffffffffffffff000000000000000000000000000000000000000000000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e220000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) pwrite64(r3, &(0x7f00000004c0)="361cf8298589166f6c2d5823c3b913944a09f012cc6a80f1d50171bf0badb6b5ffdeeaef7d6bdec3b31ce16780d2546875ed31070c85d5735d1ca260f2fca2cc539989af5eafe394f9ae07fcd88029971829aeaf797a78f97cd7f8531aeeb62f497a6d2d8c61dc23348ec786a20e624fdf4c5b839bea2dc66b04b7756cc92f852e", 0x81, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000400)=0xfff, 0x4) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000040)=0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f00000003c0)={0x3}) fallocate(r3, 0x3, 0x0, 0x81) ppoll(&(0x7f0000000080)=[{r2}, {r1, 0x208}, {r3, 0x28}], 0x3, &(0x7f00000000c0), &(0x7f0000000140)={0x70000000000}, 0x8) 2018/03/31 07:42:11 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0xaf01, &(0x7f0000307000)=&(0x7f0000989fff)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000000)=ANY=[]) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000140)={0x0, r1}) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000000)=r1) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000cef000)={0x1, 0x0, &(0x7f000062a000)=""/167, &(0x7f0000aac000)=""/21, &(0x7f00002fdf52)=""/174}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000180)={0x0, 0x1, &(0x7f0000000280)=""/147, &(0x7f0000000340)=""/223, &(0x7f0000000580)=""/4096}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000040)=0x1) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000f82ffc)=0x4001) dup2(r1, r0) eventfd(0x0) 2018/03/31 07:42:11 executing program 7 (fault-call:10 fault-nth:47): r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4900, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000240)=0x4) getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) r1 = dup(0xffffffffffffff9c) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r2 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r2, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r2, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r2, &(0x7f0000000100)=""/65, 0x41) r3 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) fchdir(r2) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(r3, &(0x7f0000000200)='./file1\x00', r2, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r2, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000580)=""/80, 0x50}, {&(0x7f00000008c0)=""/4096, 0x1000}], 0x2, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x20) r5 = syz_open_dev$sndpcmp(&(0x7f00000018c0)='/dev/snd/pcmC#D#p\x00', 0x3, 0x10a00) ioctl$KVM_GET_DEVICE_ATTR(r5, 0x4018aee2, &(0x7f0000001940)={0x0, 0x100, 0x9, &(0x7f0000001900)}) recvfrom$ipx(r4, &(0x7f00000006c0)=""/52, 0x34, 0x100, &(0x7f0000000700)={0x4, 0x9a2, 0x4, "dc108d9d4391", 0x5}, 0x10) renameat(r2, &(0x7f0000001980)='./file1\x00', r5, &(0x7f00000019c0)='./file0/file0\x00') r6 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r6, 0x4, 0x0) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000040), 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r6, &(0x7f0000000200), 0xfffffe08) 2018/03/31 07:42:11 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000ed4000)=0x78, 0x4) bind$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) sendmmsg(r0, &(0x7f0000000ac0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000180)='\t', 0x1}], 0x1, &(0x7f0000001040)=ANY=[]}}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='ns/mnt\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000080)=0x14) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000000c0)={r2, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000280)='veno\x00', 0xffd7) sendmmsg(r0, &(0x7f0000003ec0)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000002640)="5b5331d25a71c6a64f00d90720f785f88f9e63f90f76c48feee314083a181eefab2af8a65643ebc8c2b907fdebdd7b6aabd04ebe5b3133ae10d25c8992f969f3462f985649a0d1aeb7d535535fe9ce30e21dc14811cdff61456d7141cc19a8c86d8c80ccc6639cbb396c5307933f3d1c5a346d2d3a47311974a4970abaccab9b06afbdf003eb24b16c82af83155e9b5533db3eeb4e9c0722105fdc7585c77f5238ae3d12f08c8ab6dcf0edb2490a54ac46932250eb853d86d10cff49f40797062fee0affd74773c63491ff752ddb49c505c78be21ac994dd5b3582e4d3939e431c8a98fc7fd2d6a6d34548cc47307dd4a623bb69da5d377058b49af3573e3dd190c1a950f9048a577e88c9aab27e60a4711a0c158edf8a1445deac67b943482ebfbdeceb1aafff69613a7754bd783424edae3c86005e50187e61696185fe8494a923559c39cdd418f335b65c06811e12a9b25d2bc58ab2bb49cda6a8699fe4a10689a1ffc64181f907271001d2de1cb402c33865031df009582ad070595aa7144a07fb006203e4e428cc30d8fc47b30a8b1d7a2e7cdc39e3187cf5dd4db519f5e3dd35b36c84553dfa3be3c06099cb22b3806af3b7a90e4659c41aa9c2a0b3ed4f1d81f56aa40b4afe3a61762aaa89abde22c2f1e44fb55290d0f3d042e20b2b7db5ae4485c50a14490e0f4965ff595d3736bb0b16f6cfe4d7bd17763779b5471a149d29e3ec439dbff3aca8402ad2aed98e3d8c78664045e2ab8694b912df8399a53b1a38350f4db71f6ed3f5949d4b1d1279c601c758cc948bb4cedade2bbd6d3440d23f0478d683cb35885354a5abcf820b5e5b586275d6142c4b0c05377a66db84b89c8b3101bb22d4c69fef98743f6983b1768bd170dc1c304a1af1cec8defb698ea8efe6b3c36028bc4ed4c453e499c5573296b2f5b78456c3d1663af9392474c3cf4e8af1b94dd055c71be6fc12a52646816ce59aaa6c7db0d9096139ae334d3056536448b2acccade9ffbd0d21bc4abc3c9cbd80ee95451b43d645905b9c12c6dc080121d44053092edd373f07bba0fce08ce81b7326839511e452920b7549ab98a0adacd4c46f60818b25fbda3d6589ae217215a9be3ca0b0d831029ce48e15d3ec2d75d6e220b46f03d8e54b248756e3cc136b833904416793d8b9d5b60ff999d86d2b11dd57fcff57b3d1e0299d1b307675d18a1ebf8cc69026366c79d20562e5afe0fd9fbfdeca6caaa99572f0139727a076e0678a8d0ae71e58312c559d6075f433aa5470edc34e15bb761b816aedf80765142cc1aebad3696d763a35ff2506aea52a6de15d45f079e4ac964f394e8209d3be5ff53af5abbdec85b4a5ec880265edc2ba6d4f8ff6bd64fce798504e475dbd73831c2507901407141dbdadc02180e64c1f6d4263f7e0d1aed5cb8fa216ec199eca1ea0be48d21b1c3c6f0d8135c9e25657e7e42edc07051275680055a7e70670ee6e3201347975195c33d02dba6c704f0b35674a39840f255fd67264883ebd45cab262967a2f559af9690d1ceee15d7a92836a41c0f00fef91c225ef69bd44e928538e75b59fcee67e528107731334c436c6ffb6993e00c5aa054a6ba32b928b833379f1aaf0444ed18c2849a77457964e3b7f22a7333b6aaaf25764b84189be5f224acbee0b83efb7edc06e66cf8b3049b41402607e39ef82989157877c84ba56b9ee627c6bdfc0314eecc57f84c4f6922694298d1ffd5608651b7859724209f20588405dbe9c5f6676413f34fa201d9c3f6bfacce4f9a0da75ef437216376ba3e23fa89ef119f522999bdd2d07a5666e1fe5bca544e5c04383f07967d0744ed307c1ed8f16b53960a6be54baf099b23d9c5732be429b3264196f6ceb3a5b069527793d90cadfac3826b37b65aa12fe99d3e140ceba37113bf6499904095483fd27954e9352fc84383d5ac69c1591095989d51a9bb0790b4b0801a37a88bdf301d676d7e79bdbe553bfd93698180174ab38a37cc98f3b69d52870f55c12f7919b90a213fa6009f17aa48b30d2e45366155b22a27ec0ecac8dd21d37e33759a9f0d67aa52896ebb2c288fb77076879247935835b0d250151b045e61365f6642c8120317c47e65129aba6c6916d8c1d9679e0c8d6561934b7e1d0643a47990e4ddf4afa3e633a5b33d6da9bf5f11740a54c00273021839eb0455ce71de701c5055ba815917991ca9a652f0bf3df54922ebc2396b7abf3129dd2b0f405b177631dcf63a4e847c657b9ef11d991edd2877a74d78a701d6178b478c7c8c9677f49dd1c3a922a12e9d6748048777f63e660ac6be2567255986571ed399201ada38680788b8b099410cad63f1b36bc0febd8c8296821b05bf7c03bbbc5246275565ecb270ece1dac1e2935d2e2445ed6b98c8a1405d1630409509ab39f93f4ed17ce7bbaa4d1d7414da66bff0fda914a17fc906fef8c13e4285c95b80df39ea299f4fd58f3272d4b5173d2ded98e8d87bd8db3670042d8af8351fc1b030b7ed3f64a7db9c4abb6e1d908eba5a13eca09d2ca5801f34c5abd9d2addcc6832237176d2975e3b63a49b0043cffe322167a1abf8582bf0d2a3b176e7", 0x730}], 0x1, &(0x7f0000003640)}}], 0x1, 0x0) 2018/03/31 07:42:11 executing program 4: r0 = socket(0xa, 0x3, 0x20) r1 = socket$inet6(0xa, 0x6, 0x200000000005) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f0000000980)=ANY=[]) getsockname$inet(r0, &(0x7f0000000100)={0x0, 0x0, @remote}, &(0x7f0000000440)=0x10) ioctl(r0, 0x8916, &(0x7f0000000000)) r2 = socket(0x2, 0x1, 0x4) connect$inet(r2, &(0x7f0000000080)={0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000480)="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", 0x500}], 0x1) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000a00), &(0x7f00000009c0)=0x4) r3 = socket(0xa, 0x1, 0x0) ioctl(r3, 0x8912, &(0x7f0000000240)="c62900000000c88a7c2d") getsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000bc0)={@ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0x1000, 0x0, 0x0, 0x6, 0x5, 0x10001, 0x8}, &(0x7f0000000c00)=0x20) ioctl(r0, 0x8936, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000c80)=ANY=[], &(0x7f0000000480)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000400)={0x3, 'irlan0\x00'}, 0x18) socketpair(0xa, 0x80807, 0x2000000000000004, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_GEM_OPEN(r4, 0xc010640b, &(0x7f0000000ac0)={0x0, 0x0, 0x7}) ioctl$DRM_IOCTL_GEM_OPEN(r5, 0xc010640b, &(0x7f0000000a80)={r6, 0x0, 0x64a9}) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffff9c, 0xc010640b, &(0x7f0000000a40)={r7, 0x0, 0x12c}) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f0000000180)={r8}) ioctl$DRM_IOCTL_SET_MASTER(r5, 0x641e) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e20, 0xa0000000000, @empty, 0x101}}}, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e24, 0x0, @loopback={0x0, 0x1}, 0x1}}, 0x100, 0x1fd5, 0x100000001}, &(0x7f0000000140)=0x98) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r5, 0x84, 0x18, &(0x7f00000000c0)={r9, 0x7}, &(0x7f0000000980)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000880)=ANY=[@ANYRES32=r9, @ANYBLOB="54002c419228ffbe0016e93d059837183a3f33ee362d777f6e2b68e06865904a093138ee32ef5ae0eac2a21044d382aeb069b3909a1e0771478dd7029afdaffeeeea8db158bd3697a99b264024915135a8ff312a03c0ee013aa72921e1"], &(0x7f0000000200)=0x2) ioctl$sock_inet_SIOCSIFADDR(r5, 0x8916, &(0x7f0000000040)={'tunl0\x00', {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000580)={@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, 0x0, 0x3, 0xff, 0x5, 0x5, 0xfffffffffffffff9, 0x800}, 0x20) setsockopt$inet6_MRT6_ADD_MFC(r4, 0x29, 0xcc, &(0x7f0000000300)={{0xa, 0x4e20, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x40008}, {0xa, 0x4e20, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x2}, 0x80000001, [0x67aeca71, 0xffffffffffffff80, 0x40, 0x0, 0xfffffffffffffffd, 0x80000000, 0xf79, 0x7fffffff]}, 0x5c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000000c40)={@empty, 0xc8e, 0x0, 0xff, 0xf, 0x0, 0xff, 0x4}, 0x20) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000380)=ANY=[@ANYBLOB="060014cf18190eef91f88a9d550000d7ffacb2810001040100fa09efb22479af70510ff6c0e326b4a0a79c7dce9b499a0ffe3bd989edd8a361ec803636e3f6e0d5b6058503887d78e1f1129b94ae24a4d2d3ddd1ed5dc150173ec10bd10a371c715600c35b6e712a0f8bbc0000000000"], &(0x7f0000000540)=0x1) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r4, 0x84, 0x6c, &(0x7f0000000080)=ANY=[], &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000004c0)={'bond0\x00', 0x1801}) 2018/03/31 07:42:11 executing program 3: r0 = memfd_create(&(0x7f0000000280)='/dev/dsp#\x00', 0x1) r1 = perf_event_open(&(0x7f00000005c0)={0x7, 0x70, 0x8, 0x0, 0x81f6, 0x8, 0x0, 0xfffffffffffffe01, 0x142, 0x1, 0xff, 0x3, 0x0, 0x0, 0x4, 0x5, 0x0, 0x8, 0x6, 0x9, 0x1, 0x8, 0x1, 0x800, 0x7, 0xfff, 0x0, 0xf4ca, 0x7, 0x4, 0x7, 0x800, 0x3ff, 0x0, 0x2, 0x0, 0x80000000, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000580), 0x1}, 0x10000, 0xfd, 0xb6, 0x7, 0x6, 0xf21, 0x976}, 0x0, 0x5, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x10) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x24201, 0x0) tee(0xffffffffffffffff, r2, 0x40, 0x0) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f00000003c0)=ANY=[@ANYBLOB="ff01000000000000030000000000000004000000010400000100000000000000030000000000000060000000000000000700000000000000000000000000000000000000000000000010000000000000000000000000000018f5c0cec6509204962aaa67e4239dfa21708adeeccc46dba4d9f31c3792b0afd71a5b12bc405cf3a540876c7a867b243d2a941f9b5d7db991a8ad6fbc4f76e0229d7cf38b2f20f01ce3899f5bcffd4049ce680bc1b30a8a088cf228060204087c529ea52ae08443603cd00cbcbb"]) r3 = getpgid(0xffffffffffffffff) ptrace$peek(0x1, r3, &(0x7f0000000540)) fallocate(r2, 0x11, 0x0, 0x8000000) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0xcc, &(0x7f00000002c0)=0x1000000, 0x4) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000700)='/dev/vcs\x00', 0x0, 0x0) r5 = dup3(r4, r2, 0x80000) clone(0x0, &(0x7f0000000000), &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$setmm(0x23, 0x7, &(0x7f0000ffd000/0x1000)=nil) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r6, 0xaf01, &(0x7f0000307000)=&(0x7f0000989fff)) ioctl$VHOST_SET_MEM_TABLE(r6, 0x4008af03, &(0x7f0000000000)=ANY=[]) bind$netlink(r5, &(0x7f0000000500)={0x10, 0x0, 0x25dfdbfe}, 0xc) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r6, 0x40bc5311, &(0x7f0000000300)={0x784b, 0x3, 'client1\x00', 0x1, "6dea700b8d591e55", "08f1496fa810039fdc1fc424a6c5849c7ec6764d0f37c177947bcb618e55c868", 0x7}) syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0xfff, 0x301000) alarm(0x2) r7 = eventfd2(0xd1b, 0xfffffffffffffffa) ioctl$VHOST_SET_LOG_FD(r6, 0x4004af07, &(0x7f0000000000)=r7) r8 = syz_open_dev$usbmon(&(0x7f00000006c0)='/dev/usbmon#\x00', 0x200, 0x200000) migrate_pages(0x0, 0x6a, &(0x7f0000000640)=0x2, &(0x7f0000000680)=0x3f) ioctl$DRM_IOCTL_AGP_INFO(r8, 0x80386433, &(0x7f0000000740)=""/204) ioctl$VHOST_SET_VRING_ADDR(r6, 0x4028af11, &(0x7f0000df5fd8)={0x0, 0x1, &(0x7f0000000200)=""/105, &(0x7f0000bf6000)=""/228, &(0x7f0000000080)=""/199}) ioctl$VHOST_SET_VRING_KICK(r6, 0x4008af20, &(0x7f0000000040)) 2018/03/31 07:42:11 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0xaf01, &(0x7f0000307000)=&(0x7f0000989fff)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000000)=ANY=[]) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000140)={0x0, r1}) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000000)=r1) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000cef000)={0x1, 0x0, &(0x7f000062a000)=""/167, &(0x7f0000aac000)=""/21, &(0x7f00002fdf52)=""/174}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000180)={0x0, 0x1, &(0x7f0000000280)=""/147, &(0x7f0000000340)=""/223, &(0x7f0000000580)=""/4096}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000040)=0x1) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000f82ffc)=0x4001) dup2(r1, r0) eventfd(0x0) [ 196.927681] FAULT_INJECTION: forcing a failure. [ 196.927681] name failslab, interval 1, probability 0, space 0, times 0 [ 196.938979] CPU: 0 PID: 14911 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #372 [ 196.946336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 196.955679] Call Trace: [ 196.958265] dump_stack+0x194/0x24d [ 196.961894] ? arch_local_irq_restore+0x53/0x53 [ 196.966570] should_fail+0x8c0/0xa40 [ 196.970282] ? fault_create_debugfs_attr+0x1f0/0x1f0 2018/03/31 07:42:11 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)=ANY=[@ANYBLOB="a6050000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f00000000c0)=0xc) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000100)={r1, 0x3, "2712f6"}, &(0x7f0000000140)=0xb) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000009c0)) connect$inet6(r0, &(0x7f0000000000)={0xa}, 0x1c) sendmmsg(r0, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000002200), 0x0, &(0x7f00000003c0)}}, {{&(0x7f00000004c0)=@in6={0xa, 0x4e22, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x80, &(0x7f0000000a00), 0x0, &(0x7f0000000040)=[{0x10, 0x29, 0x37}], 0x10}}], 0x2, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000980), 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000180)={'nat\x00', 0xa2, "e81b6233ff39fff5331bf6e812244b71b550b4b724f3212cea320893a858bf6189e6acacf14d1d7b4ca5216f94833639e13641ca50f23c6dcae22d6d1bb755c9ca705cdd02af4c0806ffb4d385fb77ba2a65611871035866be02575c85b33a876f7e68a9db98e1ab19928baa9b8b89c214f54d814c816af4e58447f026c0d53a374487434320f55014d231c1b9ab3d90a4d778d5c3ef56e5b0f0fdf1fcc76876fd76"}, &(0x7f0000000280)=0xc6) writev(r0, &(0x7f0000000880)=[{&(0x7f0000000300)="0f4931271f27ad26efa4a1b27f957ac6be0806cdf326073eedba9510ef555f927285a7bdcc665e2b3a862d282f095ab6416643d87ec358e8b5cbb2c3e3241901dda35a666b58e33bae5ce753c9dcec39a2a0117fd3dbd773605db4e8c3fe4cdf84a351f3f8d6d0696cac3daac83418a0bbd84bfc2d0c9d76c852c41197344e1e24cdb3c53ffb37bb44b8f5c6cacdbe06f955897f6186", 0x96}, {&(0x7f00000003c0)="b9845f6d96d6c386988265ad2a391c28bc78826e578009a00a82cad3e68fe8f530e05f09a913c7f469d53824e35cc50363383ee8e73ae10c37f7bd662b77715ef1e7a24e9a8033d46f5baffb572abe2723671352f9bd0325cbcce32c0cb1ac73aa129cf6a580f64dc044b368d8e094d74a45c79f9e6ee4928b0f7903a56a453d0f4d95796eb741250b5f4a529f2bd81a0eacb807871356fceffc6b9a989504bbc0676b29065a1a6306baeed17177623ad7844031354153c7c461c7bf081cca9ac1c18b52b504", 0xc6}, {&(0x7f0000000540)="a7e681b9880241edb8ccd910dea2445bd286d7b27e39e669ed0ef181aa412705c51b02bab24fe15ae6a0086eb5f11862f354d0dad836833f01ce928b3942bcf38a65f8719ac3b93f00b87993888dbfd5abe4f31bfedef0411bdea46da16014b1f9c9e453b9923bd9434d5bacaeca835c78a00e1a5b252616f69fa609ca14a7fcc38cc088d68854730d3ef0a94e4f54b8cfe716da60b842302a7bced255511a89d8055353aa745b880b8cbeb589302a91d94906c75d2562e058b439ac24e65e0a536149b0472dad895e059da94c9f79fad049f0ee2a18019c0a649169f884", 0xde}, {&(0x7f0000000640)="c458726911b66d4fc598dc5660d26dc9bfdb223aaecd422a5a344f00c630d76211f588e7e7b642ba3e62730be830cb9be6adb475df90412ea84dddc8663d34b6e07944a319dc6520ef1a36218a05f7686b08f4", 0xffffff59}, {&(0x7f00000006c0)="0b3797269863ec93cff2f6054dba3c33bb71329ce9215b68257c5e939ce4cb4d72361a9db4a03c91d46d4479fcd8ecf1cf485dee59896da1ba00d08944c611605609042b075ef3e0fde9a7292b654e1593e06bcfeb6671d6891aa1524c0c220e164e0ef86dab867f11d6ed3b359441137de0fea8adea26525ff1250ba3", 0x7d}, {&(0x7f0000000740)="e3936a8b686b9567c850259466126eea232329c519979c21e705f2950210c77528b98b9f700154382a7f73e95680444718e83f24041eb78b27fc", 0x3a}, {&(0x7f0000000780)="1fa7847f1bbe291762618f81d756202e0e7244fa1a43a48c6f22d4ed6eaac263728af82e522df35207d4dce1c32955d6fa300053a0b8ab4fdb615564dcbd3a24b24c14dd391d9826885a433c7ba469fe225ada65f8df450f1c67ca982de796b757cd0cc358fe5532f3273cd6604503234514556dce8e5fefe676c57fded62f3fca50af5725d838356bdfda34aec9c0c6ec8cfe796142b1efa4347614e5f95fdcfbfa063d8499d2e23961779fb3937ca5074bbea7e6c8564fc7710034143ee781d22f51931f03befcdd4d1a8c866710eb", 0xd0}], 0x7) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vga_arbiter\x00', 0x2400, 0x0) syz_mount_image$bfs(&(0x7f0000000900)='bfs\x00', &(0x7f0000000940)='./file0\x00', 0xaa7, 0x0, &(0x7f0000000980), 0x10000, 0x0) 2018/03/31 07:42:11 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0xaf01, &(0x7f0000307000)=&(0x7f0000989fff)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000000)=ANY=[]) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000140)={0x0, r1}) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000000)=r1) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000cef000)={0x1, 0x0, &(0x7f000062a000)=""/167, &(0x7f0000aac000)=""/21, &(0x7f00002fdf52)=""/174}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000180)={0x0, 0x1, &(0x7f0000000280)=""/147, &(0x7f0000000340)=""/223, &(0x7f0000000580)=""/4096}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000040)=0x1) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000f82ffc)=0x4001) dup2(r1, r0) eventfd(0x0) [ 196.975383] ? rb_first_postorder+0xa0/0xa0 [ 196.979703] ? __mutex_lock+0x16f/0x1a80 [ 196.983769] ? save_stack+0x43/0xd0 [ 196.987391] ? kasan_kmalloc+0xad/0xe0 [ 196.991295] ? trace_hardirqs_off+0x10/0x10 [ 196.995616] ? find_held_lock+0x35/0x1d0 [ 196.999675] ? __lock_is_held+0xb6/0x140 [ 197.003739] ? check_same_owner+0x320/0x320 [ 197.008057] ? lock_downgrade+0x980/0x980 [ 197.012207] ? rcu_note_context_switch+0x710/0x710 [ 197.017142] should_failslab+0xec/0x120 [ 197.021113] __kmalloc_track_caller+0x5f/0x760 2018/03/31 07:42:11 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0xaf01, &(0x7f0000307000)=&(0x7f0000989fff)) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000000000)=ANY=[]) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000140)={0x0, r1}) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000000)=r1) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000cef000)={0x1, 0x0, &(0x7f000062a000)=""/167, &(0x7f0000aac000)=""/21, &(0x7f00002fdf52)=""/174}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000180)={0x0, 0x1, &(0x7f0000000280)=""/147, &(0x7f0000000340)=""/223, &(0x7f0000000580)=""/4096}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000040)=0x1) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000f82ffc)=0x4001) dup2(r1, r0) eventfd(0x0) [ 197.025695] ? string+0x180/0x200 [ 197.029142] ? kstrdup_const+0x39/0x50 [ 197.033031] kstrdup+0x39/0x70 [ 197.036233] kstrdup_const+0x39/0x50 [ 197.039949] __kernfs_new_node+0xa2/0x570 [ 197.044104] ? kernfs_dop_revalidate+0x380/0x380 [ 197.048872] ? snprintf+0xc0/0xf0 [ 197.052321] ? vsprintf+0x40/0x40 [ 197.055768] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 197.060698] ? cgroup_file_name+0x1d0/0x1d0 [ 197.065016] kernfs_new_node+0x80/0xe0 [ 197.068904] __kernfs_create_file+0x4b/0x320 [ 197.073317] cgroup_addrm_files+0x3c5/0xa70 [ 197.077644] ? cgroup_file_write+0x710/0x710 [ 197.082053] ? cgroup_idr_replace+0x3f/0x50 [ 197.086378] ? __lock_is_held+0xb6/0x140 [ 197.090442] ? __local_bh_enable_ip+0x121/0x230 [ 197.095101] ? online_css+0x224/0x2e0 [ 197.098884] css_populate_dir+0x198/0x420 [ 197.103017] cgroup_apply_control_enable+0x390/0xbc0 [ 197.108103] ? cgroup_propagate_control+0x570/0x570 [ 197.113098] ? css_populate_dir+0x289/0x420 [ 197.117395] cgroup_mkdir+0x56f/0xfc0 [ 197.121169] ? __lock_is_held+0xb6/0x140 [ 197.125208] ? cgroup_destroy_locked+0x750/0x750 [ 197.129939] ? rcu_read_lock_sched_held+0x108/0x120 [ 197.134931] ? kmem_cache_free+0x258/0x2a0 [ 197.139142] ? set_nlink+0xc1/0x160 [ 197.142743] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 197.147647] ? generic_permission+0x105/0x3c0 [ 197.152119] ? cgroup_destroy_locked+0x750/0x750 [ 197.156855] kernfs_iop_mkdir+0x153/0x1e0 [ 197.160978] vfs_mkdir+0x390/0x600 [ 197.164496] SyS_mkdirat+0x22b/0x2b0 [ 197.168187] ? SyS_mknod+0x480/0x480 [ 197.171877] ? trace_hardirqs_on+0xd/0x10 [ 197.176001] ? do_syscall_64+0xb7/0x940 [ 197.179954] ? SyS_mknod+0x480/0x480 [ 197.183645] do_syscall_64+0x281/0x940 [ 197.187507] ? vmalloc_sync_all+0x30/0x30 [ 197.191629] ? _raw_spin_unlock_irq+0x27/0x70 [ 197.196100] ? finish_task_switch+0x1c1/0x7e0 [ 197.200572] ? syscall_return_slowpath+0x550/0x550 [ 197.205477] ? syscall_return_slowpath+0x2ac/0x550 [ 197.210383] ? prepare_exit_to_usermode+0x350/0x350 [ 197.215377] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 197.220714] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 197.225536] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 197.230701] RIP: 0033:0x454e79 [ 197.233867] RSP: 002b:00007fe2ad9eac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 197.241551] RAX: ffffffffffffffda RBX: 00007fe2ad9eb6d4 RCX: 0000000000454e79 [ 197.248793] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 197.256039] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 197.263282] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 197.270527] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 000000000000002f [ 197.278089] cgroup: cgroup_addrm_files: failed to add weight, err=-12 [ 197.396716] IPVS: Unknown mcast interface: irlan0 [ 197.435211] device bond0 left promiscuous mode 2018/03/31 07:42:11 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0xaf01, &(0x7f0000307000)=&(0x7f0000989fff)) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000000000)=ANY=[]) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000140)={0x0, r1}) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000000)=r1) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000cef000)={0x1, 0x0, &(0x7f000062a000)=""/167, &(0x7f0000aac000)=""/21, &(0x7f00002fdf52)=""/174}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000180)={0x0, 0x1, &(0x7f0000000280)=""/147, &(0x7f0000000340)=""/223, &(0x7f0000000580)=""/4096}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000040)=0x1) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000f82ffc)=0x4001) dup2(r1, r0) eventfd(0x0) 2018/03/31 07:42:11 executing program 2: r0 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)="c6cc8e60a78914d500bfeae773ddb642384ef9648af1058f5fbd2fd309524d989e8ca5c3e6e4d185de0489636bb4012cd2281d57a505b82ae678e253ab1603ef18da1e2b4f2acc3c7651ff1c670f5ed1de51a9a5a850687fc0664d9c81b66fefaf800714c085934bd42e3e21ae71d978f3e76fcbfdc2e66adff8be4d85633beb78581bf230f72954dd487c97d06409d3c6e2f7f22be6284a9b", 0x99, 0xfffffffffffffffb) keyctl$describe(0x6, r0, &(0x7f00000002c0)=""/200, 0xc8) r1 = dup(0xffffffffffffff9c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000040)={0x0, 0x80000}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440)={r2, 0x0, r1}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) r5 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20202, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x1010, r5, 0x0) setsockopt$inet_MCAST_MSFILTER(r5, 0x0, 0x30, &(0x7f0000000b00)=ANY=[@ANYBLOB="030000000000000002004e22ac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e24ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000006ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ffffffffffffff000000000000000000000000000000000000000000000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e220000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b0439065bb49e021507daa5c07f91e727d5d0ba09060bc99fddc3199ab7cce55a7b67599474b9d65db1bf9a667763db69ab17f9e9a3a2deb7a1eb6a59300e74e343edfe533d4d33f2f081f8f9cdd74e1817b7d394c5c63"], 0x1) pwrite64(r5, &(0x7f00000004c0)="361cf8298589166f6c2d5823c3b913944a09f012cc6a80f1d50171bf0badb6b5ffdeeaef7d6bdec3b31ce16780d2546875ed31070c85d5735d1ca260f2fca2cc539989af5eafe394f9ae07fcd88029971829aeaf797a78f97cd7f8531aeeb62f497a6d2d8c61dc23348ec786a20e624fdf4c5b839bea2dc66b04b7756cc92f852e", 0x81, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000480)={0x1, 0x2, 0x4, 0x3, 0x0}, &(0x7f0000000a40)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r5, 0x84, 0x72, &(0x7f0000000a80)={r6, 0x5}, &(0x7f0000000ac0)=0xc) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r5, 0x84, 0x21, &(0x7f0000000400)=0xfff, 0x4) fallocate(r5, 0x3, 0x0, 0x81) ppoll(&(0x7f0000000080)=[{r4}, {r3, 0x208}, {r5, 0x28}], 0x3, &(0x7f00000000c0), &(0x7f0000000140)={0x70000000000}, 0x8) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000003c0)=0x451c) 2018/03/31 07:42:11 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x81, 0x60200) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x123100, 0x0) epoll_pwait(r0, &(0x7f0000000040)=[{}, {}, {}], 0x3, 0xff, &(0x7f0000000080)={0x4}, 0x8) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000db5fc8)={&(0x7f00004aeb5c)=@generic={0x10000000001e, "030000000000000000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48007be61ffe06d79f00000000000000076c3f010039d8f986ff01000000000000af06d5fe32c419d67bcbc7e3ad316a198356edb9b7341c1fd45624281e27800ece70b076c3979ac40000bd767e2e78a1dfd300881a1565b3b16d7436"}, 0x80, &(0x7f0000b96000), 0x0, &(0x7f00002d4000)}, 0x0) sendmsg$netlink(r1, &(0x7f000078dfc8)={0x0, 0x0, &(0x7f0000013fc0), 0x0, &(0x7f0000b8c000)}, 0x0) recvmsg$kcm(r1, &(0x7f0000a27fc8)={0x0, 0xfffffe94, &(0x7f0000998fe0)=[{&(0x7f0000780000)=""/1, 0x1}], 0x1, &(0x7f00005edf5c)}, 0x0) 2018/03/31 07:42:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x1002000000007) sendmsg$nl_generic(r0, &(0x7f0000002180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000002140)={&(0x7f0000000700)={0x24, 0x2d, 0xffffffffffffffff, 0x0, 0x0, {}, [@nested={0x10, 0x0, [@typed={0xc, 0x0, @u64}]}]}, 0x24}, 0x1}, 0x0) 2018/03/31 07:42:11 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) acct(&(0x7f0000001240)='./file0\x00') setrlimit(0xa, &(0x7f0000000380)={0x4, 0x1}) getsockname(0xffffffffffffff9c, &(0x7f0000001480)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f00000012c0)=0x80) socketpair(0x10, 0x0, 0x8, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000001580)={r3}) r4 = open(&(0x7f00000010c0)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000001300)={0x8, 0x0, 0x6, 0x58a, 0x0}, &(0x7f0000001340)=0x10) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x3052, r3, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f00000001c0)={'bond0\x00', {0x2, 0x4e20, @multicast2=0xe0000002}}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000440)=ANY=[@ANYRES32=0x0, @ANYBLOB="408615824f3f781ae75fcc9554f019621eaccb21d7ca5fb77c06ff41c0d0bc78b6de0ed01fa10b1070cb77afb61679a7f893b0c78371e1195eb3c5b14645b009000000000000001b77145882a63f6206ecfb54b4f6b2ddf7963c2b2681ff1aa2dfd55f1e73b02e150e1f8e51e6ae3615336ed2b2b461fccd4ec083cfe6b400cf4316fb4bb881a1a0a94d01d4db3209cd4e2a449b84fcfea54a83d92883979cb70c31ef7000e655a7a1a18b57b6cd06267ef9f582b4783e42e60f460962921710e11ac51a3f9fa92e9118c5f0e1d8b2a6a6e521c9689ae1c34200000000000000000000000800000000"], &(0x7f0000000040)=0x2) r8 = getuid() getgroups(0x1, &(0x7f0000000400)=[0xffffffffffffffff]) chown(&(0x7f00000003c0)='./file0\x00', r8, r9) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000100)={r7, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000001380)={r5, @in6={{0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0xf}}}, 0x0, 0x7, 0x0, 0x8, 0x92}, &(0x7f0000001440)=0x98) eventfd(0xffffffff80000001) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000001140)={0x4, 0x8001, 0x40, 0xfffffffffffffffd, 0x0}, &(0x7f0000001180)=0x10) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f0000001500)) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000011c0)={0x95e, 0x101, 0x8009, 0x1ff, 0x31386ac8, 0x8, 0x1, 0x7, r10}, 0x20) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x1, 0x1) recvfrom(r1, &(0x7f00000015c0)=""/83, 0x53, 0x120, 0x0, 0x0) symlinkat(&(0x7f0000001080)='./file0\x00', r4, &(0x7f0000001100)='./file0\x00') close(r0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={r4, r4, 0x4, 0x3}, 0x10) getsockname$netlink(r1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) 2018/03/31 07:42:11 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000012000)=0x3fe, 0x4) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x8402, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000001c0)={&(0x7f0000000140)='./file1\x00', r1}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000eb3fe0)=[@in={0x2, 0x4e20, @local={0xac, 0x14, 0x0, 0xaa}}, @in={0x2, 0x4e20, @broadcast=0xffffffff}], 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x65, &(0x7f0000e2efd4)=[@in={0x2, 0x4e20, @local={0xac, 0x14, 0x0, 0xaa}}], 0x10) 2018/03/31 07:42:11 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r2 = socket$inet(0x2, 0x3, 0xfffffffffffffff8) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) dup3(r2, r0, 0x80000) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000080)={0x100000000006, r0, 0xfffffffffffffffe}) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x101000, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) select(0x40, &(0x7f0000000040)={0x3, 0x7, 0x20, 0x5, 0xff, 0x200, 0x100000000, 0x2}, &(0x7f00000002c0)={0x7, 0x3, 0x100, 0x9, 0x0, 0x386, 0x17, 0x6e7650c3}, &(0x7f0000000300)={0x81, 0x7fffffff, 0x81, 0x13d, 0x2, 0x8081, 0xffff, 0x3}, &(0x7f0000000340)={0x0, 0x7530}) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) r4 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_pid(r4, &(0x7f0000000100)=ANY=[], 0x1023c) write(r2, &(0x7f0000000180)="15", 0x1) r5 = open(&(0x7f0000b91ff9)='./file0\x00', 0x68042, 0x0) fallocate(r5, 0x0, 0xffff, 0x9) close(0xffffffffffffffff) syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x7ff, 0x20000) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x40100, 0x5) openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) r7 = syz_open_dev$binder(&(0x7f0000000240)='/dev/binder#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x20011, r7, 0x0) read(r6, &(0x7f00000000c0)=""/81, 0x51) write$evdev(r6, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) dup2(r0, r2) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) [ 197.468951] IPVS: Unknown mcast interface: irlan0 2018/03/31 07:42:11 executing program 7 (fault-call:10 fault-nth:48): r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4900, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000240)=0x4) getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) r1 = dup(0xffffffffffffff9c) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r2 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r2, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r2, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r2, &(0x7f0000000100)=""/65, 0x41) r3 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) fchdir(r2) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(r3, &(0x7f0000000200)='./file1\x00', r2, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r2, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000580)=""/80, 0x50}, {&(0x7f00000008c0)=""/4096, 0x1000}], 0x2, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x20) r5 = syz_open_dev$sndpcmp(&(0x7f00000018c0)='/dev/snd/pcmC#D#p\x00', 0x3, 0x10a00) ioctl$KVM_GET_DEVICE_ATTR(r5, 0x4018aee2, &(0x7f0000001940)={0x0, 0x100, 0x9, &(0x7f0000001900)}) recvfrom$ipx(r4, &(0x7f00000006c0)=""/52, 0x34, 0x100, &(0x7f0000000700)={0x4, 0x9a2, 0x4, "dc108d9d4391", 0x5}, 0x10) renameat(r2, &(0x7f0000001980)='./file1\x00', r5, &(0x7f00000019c0)='./file0/file0\x00') r6 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r6, 0x4, 0x0) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000040), 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r6, &(0x7f0000000200), 0xfffffe08) [ 197.526147] FAULT_INJECTION: forcing a failure. [ 197.526147] name failslab, interval 1, probability 0, space 0, times 0 [ 197.537436] CPU: 1 PID: 14986 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #372 [ 197.544794] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.554140] Call Trace: [ 197.556738] dump_stack+0x194/0x24d [ 197.560371] ? arch_local_irq_restore+0x53/0x53 [ 197.565046] should_fail+0x8c0/0xa40 [ 197.568757] ? kstrdup+0x39/0x70 [ 197.572124] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 197.577226] ? cgroup_apply_control_enable+0x390/0xbc0 [ 197.582499] ? kernfs_iop_mkdir+0x153/0x1e0 [ 197.586814] ? vfs_mkdir+0x390/0x600 [ 197.590522] ? SyS_mkdirat+0x22b/0x2b0 [ 197.594408] ? do_syscall_64+0x281/0x940 [ 197.598470] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 197.603835] ? find_held_lock+0x35/0x1d0 [ 197.607897] ? find_held_lock+0x35/0x1d0 [ 197.611955] ? __lock_is_held+0xb6/0x140 [ 197.616011] ? check_same_owner+0x320/0x320 [ 197.620328] ? rcu_note_context_switch+0x710/0x710 [ 197.625503] ? rcu_read_lock_sched_held+0x108/0x120 [ 197.630510] should_failslab+0xec/0x120 [ 197.634466] kmem_cache_alloc+0x47/0x760 [ 197.638506] ? memcpy+0x45/0x50 [ 197.641766] ? kstrdup+0x59/0x70 [ 197.645115] __kernfs_new_node+0xe2/0x570 [ 197.649244] ? kernfs_dop_revalidate+0x380/0x380 [ 197.653987] ? snprintf+0xc0/0xf0 [ 197.657423] ? vsprintf+0x40/0x40 [ 197.660871] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 197.665781] ? cgroup_file_name+0x1d0/0x1d0 [ 197.670087] kernfs_new_node+0x80/0xe0 [ 197.673957] __kernfs_create_file+0x4b/0x320 [ 197.678347] cgroup_addrm_files+0x3c5/0xa70 [ 197.682656] ? cgroup_file_write+0x710/0x710 [ 197.687053] ? cgroup_idr_replace+0x3f/0x50 [ 197.691360] ? __lock_is_held+0xb6/0x140 [ 197.695406] ? __local_bh_enable_ip+0x121/0x230 [ 197.700053] ? online_css+0x224/0x2e0 [ 197.703837] css_populate_dir+0x198/0x420 [ 197.707969] cgroup_apply_control_enable+0x390/0xbc0 [ 197.713060] ? cgroup_propagate_control+0x570/0x570 [ 197.718060] ? css_populate_dir+0x289/0x420 [ 197.722364] cgroup_mkdir+0x56f/0xfc0 [ 197.726144] ? __lock_is_held+0xb6/0x140 [ 197.730186] ? cgroup_destroy_locked+0x750/0x750 [ 197.734922] ? rcu_read_lock_sched_held+0x108/0x120 [ 197.739916] ? kmem_cache_free+0x258/0x2a0 [ 197.744128] ? set_nlink+0xc1/0x160 [ 197.747736] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 197.752641] ? generic_permission+0x105/0x3c0 [ 197.757114] ? cgroup_destroy_locked+0x750/0x750 [ 197.761850] kernfs_iop_mkdir+0x153/0x1e0 [ 197.765977] vfs_mkdir+0x390/0x600 [ 197.769497] SyS_mkdirat+0x22b/0x2b0 [ 197.773191] ? SyS_mknod+0x480/0x480 [ 197.776884] ? trace_hardirqs_on+0xd/0x10 [ 197.781015] ? do_syscall_64+0xb7/0x940 [ 197.784974] ? SyS_mknod+0x480/0x480 [ 197.788666] do_syscall_64+0x281/0x940 [ 197.792535] ? vmalloc_sync_all+0x30/0x30 [ 197.796662] ? _raw_spin_unlock_irq+0x27/0x70 [ 197.801138] ? finish_task_switch+0x1c1/0x7e0 [ 197.805614] ? syscall_return_slowpath+0x550/0x550 [ 197.810525] ? syscall_return_slowpath+0x2ac/0x550 [ 197.815434] ? prepare_exit_to_usermode+0x350/0x350 [ 197.820430] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 197.825775] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 197.830602] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 197.835770] RIP: 0033:0x454e79 [ 197.838938] RSP: 002b:00007fe2ad9eac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 197.846624] RAX: ffffffffffffffda RBX: 00007fe2ad9eb6d4 RCX: 0000000000454e79 [ 197.853870] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 197.861119] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 197.868364] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 2018/03/31 07:42:11 executing program 1: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x9) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x200000, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000140)=[{&(0x7f0000000000)=""/250, 0x1}], 0xdf, 0x0) 2018/03/31 07:42:11 executing program 4: time(&(0x7f0000000040)) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000200)={0x10, 0x0, &(0x7f00000000c0)=[@request_death={0x400c630e, 0x2}], 0xe8, 0x0, &(0x7f0000000100)="beadfe9705c94e1e90e409facb5cf34974bba8beff3ff8f1af61042086ef1caa304a587e921c319206d707c2eabad214135a290fbe36e45b543ee618b53d3101305afdd4f2930a512ee0f1ee40baac6e58cd0dbd165493be8d5d273c35297c7bce93b0319c5a78a38032fb4e0e5cea64bc6908a524c81b0070bca9f592cb6a9b3a274e46e19fe81a2345cc82f79e28691c7b7c0eea685709db030f4695fd97b4725dbdbfc8924a2427b5391a7dea3b8d220e2d67251938cb87f12f2889e0c149ff8436de67696a3777167ee97beb3e82082b9cd0ec474096b479bfea79313e1c08b9a3fbc275e442"}) r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040), 0x4) r2 = syz_open_dev$binder(&(0x7f000000fff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) eventfd2(0x9, 0x80800) close(r1) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xfff}) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000640)={0xc, 0x0, &(0x7f0000000400)=[@dead_binder_done={0x40086310, 0x1}], 0x0, 0x0, &(0x7f0000000540)}) 2018/03/31 07:42:11 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x3799, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r1, 0x111, 0x1, 0x100000001, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x1}, 0x1c) connect$inet6(r0, &(0x7f000000cfe4)={0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}}, 0x1c) r2 = syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0x6, 0x400000) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, &(0x7f00000001c0)=""/28) fcntl$addseals(r0, 0x409, 0x8) setsockopt$inet6_int(r0, 0x29, 0x4b, &(0x7f0000000180)=0x3fe, 0x4) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1) sendmmsg(r0, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000003c0)}}], 0x1, 0x0) 2018/03/31 07:42:12 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x14) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x440000, 0xa) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x4e23, @multicast1=0xe0000001}}, 0x5, 0x7, 0xff, "fbe103101d59ef22c5c5f5ce20952ad5488f7670f40b7617211be0d398a1317c6ebe210fc8993a1790ab24d1b051d9dc5c9274d70590c89efc0af995d9b8a033d9cd5d70fd153075c251668ffe0dbc46"}, 0xd8) ioctl$VHOST_RESET_OWNER(r0, 0xaf02, 0x0) [ 197.875611] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000030 [ 197.883414] cgroup: cgroup_addrm_files: failed to add weight, err=-12 2018/03/31 07:42:12 executing program 5: utimes(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)={{0x0, 0x2710}, {0x0, 0x2710}}) r0 = socket$alg(0x26, 0x5, 0x0) r1 = dup(r0) getsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000240)={@broadcast, @empty, 0x0}, &(0x7f0000000280)=0xc) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000002c0)={r2, @local={0xac, 0x14, 0x14, 0xaa}, @rand_addr=0x7}, 0xc) getsockopt$inet_dccp_buf(r1, 0x21, 0xf, &(0x7f0000000140)=""/185, &(0x7f0000000200)=0xb9) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(ecb-twofish-3way)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775b005e381e5b3b60ced5c54dbb7295df0df821728d598bf6c2c702ff314c1", 0x21) 2018/03/31 07:42:12 executing program 2: r0 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)="c6cc8e60a78914d500bfeae773ddb642384ef9648af1058f5fbd2fd309524d989e8ca5c3e6e4d185de0489636bb4012cd2281d57a505b82ae678e253ab1603ef18da1e2b4f2acc3c7651ff1c670f5ed1de51a9a5a850687fc0664d9c81b66fefaf800714c085934bd42e3e21ae71d978f3e76fcbfdc2e66adff8be4d85633beb78581bf230f72954dd487c97d06409d3c6e2f7f22be6284a9b", 0x99, 0xfffffffffffffffb) keyctl$describe(0x6, r0, &(0x7f00000002c0)=""/200, 0xc8) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440)={0x0, 0x0, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20202, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x1010, r3, 0x0) write$rdma_cm(r3, &(0x7f00000027c0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000002780)={0xffffffff}, 0x2, 0x3}}, 0x20) write$rdma_cm(r3, &(0x7f0000002800)=@notify={0xf, 0x8, 0xfa00, {r4, 0xb}}, 0x10) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000000580)=ANY=[@ANYBLOB="030000000000000002004e22ac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e24ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000006ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ffffffffffffff000000000000000000000000000000000000000000000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e220000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) pwrite64(r3, &(0x7f00000004c0)="361cf8298589166f6c2d5823c3b913944a09f012cc6a80f1d50171bf0badb6b5ffdeeaef7d6bdec3b31ce16780d2546875ed31070c85d5735d1ca260f2fca2cc539989af5eafe394f9ae07fcd88029971829aeaf797a78f97cd7f8531aeeb62f497a6d2d8c61dc23348ec786a20e624fdf4c5b839bea2dc66b04b7756cc92f852e", 0x81, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000400)=0xfff, 0x4) fallocate(r3, 0x3, 0x0, 0x81) ppoll(&(0x7f0000000080)=[{r2}, {r1, 0x208}, {r3, 0x28}], 0x3, &(0x7f00000000c0), &(0x7f0000000140)={0x70000000000}, 0x8) 2018/03/31 07:42:12 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0xaf01, &(0x7f0000307000)=&(0x7f0000989fff)) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000000000)=ANY=[]) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000140)={0x0, r1}) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000000)=r1) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000cef000)={0x1, 0x0, &(0x7f000062a000)=""/167, &(0x7f0000aac000)=""/21, &(0x7f00002fdf52)=""/174}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000180)={0x0, 0x1, &(0x7f0000000280)=""/147, &(0x7f0000000340)=""/223, &(0x7f0000000580)=""/4096}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000040)=0x1) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000f82ffc)=0x4001) dup2(r1, r0) eventfd(0x0) 2018/03/31 07:42:12 executing program 1: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x100000f, 0x40110, r0, 0x0) r1 = memfd_create(&(0x7f0000000000)='ip6gre0\x00', 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000040)=0x2) sendto$inet(r1, &(0x7f0000000140), 0x0, 0x4000, &(0x7f0000000180)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x12}}, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0c000000227abe3b80281a35000000006fb54b8bace04913023bed6cbe56c8a893640e7489d34cbf73bfbfdbacc921c0b60ec29e6fb719d341df"]}) 2018/03/31 07:42:12 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) acct(&(0x7f0000001240)='./file0\x00') setrlimit(0xa, &(0x7f0000000380)={0x4, 0x1}) getsockname(0xffffffffffffff9c, &(0x7f0000001480)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f00000012c0)=0x80) socketpair(0x10, 0x0, 0x8, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000001580)={r3}) r4 = open(&(0x7f00000010c0)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000001300)={0x8, 0x0, 0x6, 0x58a, 0x0}, &(0x7f0000001340)=0x10) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x3052, r3, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f00000001c0)={'bond0\x00', {0x2, 0x4e20, @multicast2=0xe0000002}}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYBLOB="408615824f3f781ae75fcc9554f019621eaccb21d7ca5fb77c06ff41c0d07d78b6de0ed01fa10b1070cb77afb61679a7f893b0c78371e1195ef393dc87b1b329811e67705b9e1bb5dc00c5b14645b010d310e491c159a81b77145882a63f6206ecfb54b4f6b2ddf7963c2b2681ff1aa2dfd55f1e73b02e150e1f8e51e6ae3615336ed2b2b461fccd4ec00311dd4b00cf4316fb4bda9fa1a0a94d01d4db3209cd302a449b841dc10fcc2d63482b979cb70c21ef7000e655a7a1a18b57b6cd06267ef9f582b4783e42e60f460962921710e11ac51a3f9fa92e9118c5f0e1d8b2c342"], &(0x7f0000000040)=0x2) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000100)={r7, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000001380)={r5, @in6={{0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0xf}}}, 0x0, 0x7, 0x0, 0x8, 0x92}, &(0x7f0000001440)=0x98) eventfd(0xffffffff80000001) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000001140)={0x4, 0x8001, 0x40, 0xfffffffffffffffd, 0x0}, &(0x7f0000001180)=0x10) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f0000001500)) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000011c0)={0x95e, 0x101, 0x8009, 0x1ff, 0x31386ac8, 0x8, 0x1, 0x7, r8}, 0x20) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x1, 0x1) faccessat(r4, &(0x7f00000003c0)='./file0\x00', 0x104, 0x300) recvfrom(r1, &(0x7f00000015c0)=""/83, 0x53, 0x120, 0x0, 0x0) symlinkat(&(0x7f0000001080)='./file0\x00', r4, &(0x7f0000001100)='./file0\x00') close(r0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={r4, r4, 0x4, 0x3}, 0x10) getsockname$netlink(r1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) [ 197.965499] binder: 14993:14997 BC_DEAD_BINDER_DONE 0000000000000001 not found 2018/03/31 07:42:12 executing program 7 (fault-call:10 fault-nth:49): r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4900, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000240)=0x4) getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) r1 = dup(0xffffffffffffff9c) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r2 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r2, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r2, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r2, &(0x7f0000000100)=""/65, 0x41) r3 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) fchdir(r2) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(r3, &(0x7f0000000200)='./file1\x00', r2, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r2, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000580)=""/80, 0x50}, {&(0x7f00000008c0)=""/4096, 0x1000}], 0x2, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x20) r5 = syz_open_dev$sndpcmp(&(0x7f00000018c0)='/dev/snd/pcmC#D#p\x00', 0x3, 0x10a00) ioctl$KVM_GET_DEVICE_ATTR(r5, 0x4018aee2, &(0x7f0000001940)={0x0, 0x100, 0x9, &(0x7f0000001900)}) recvfrom$ipx(r4, &(0x7f00000006c0)=""/52, 0x34, 0x100, &(0x7f0000000700)={0x4, 0x9a2, 0x4, "dc108d9d4391", 0x5}, 0x10) renameat(r2, &(0x7f0000001980)='./file1\x00', r5, &(0x7f00000019c0)='./file0/file0\x00') r6 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r6, 0x4, 0x0) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000040), 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r6, &(0x7f0000000200), 0xfffffe08) 2018/03/31 07:42:12 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) socketpair$inet6(0xa, 0x2, 0x7, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_getscheduler(r3) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000200)) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f00000003c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="4e000000a867e726c4cff7cd00906a0cf83c5e4e3b0ba725b0f0e56be988dcfb56c17dc37a4234ca4604f32898212b71670000170b0001fbe99311e9e57cf1c9044531a91b203fd284efcc198a0a1ff221bd0a75785d9c6fae0b0368ae92088183607eab1b43626760ad5666bbbc4687379a2fb60157e8d62398b438b7f8401bf3d7c999c3425cf0b5090ccb3077f1503055022fe5a7b44c8b250689e829b35d6c737965ae6e23"], &(0x7f0000000300)=0x2) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000340)=r4, 0x4) ioctl$int_in(r0, 0x5473, &(0x7f0000000180)=0x5) ioctl$sock_ifreq(r0, 0x80000089a3, &(0x7f0000000000)={"6272696467653000e7ffffff00", @ifru_settings={0x5, 0x0, @fr_pvc=&(0x7f0000000040)}}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f00000002c0)={0x3800, 0x0, 0x10001, 0x61}) ioctl$DRM_IOCTL_SG_ALLOC(r5, 0xc0106438, &(0x7f0000000380)={0x5, r6}) r7 = socket(0x2, 0x805, 0x42f3360d) setsockopt$IP_VS_SO_SET_TIMEOUT(r7, 0x0, 0x48a, &(0x7f0000000140)={0x1, 0x5, 0x401}, 0x1) getsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r8 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r5, 0xc1105518, &(0x7f0000000480)={{0x22841019, 0x2, 0x6, 0x2, "257aa564313813abc658d36bf8f14994b22fa600a4d1e3bdbecfbf4ee689fb2f177c9a1e3fafcbd6c77ac217", 0x7}, 0x0, 0x0, 0x4, r3, 0x80, 0xffffffffffff4879, "e8f7373f5cceec2de6ccb0818293de7c0aa3a55586a945055ccaa8f53f52a04df17a8f4733367990384f28be9708321d25c95237249659e59a790dc969c9e78d", &(0x7f00000001c0)="6272696467653000e7ffffff00", 0xd, [], [0x9, 0xeca3, 0x6, 0x2f3]}) ioctl$sock_inet6_udp_SIOCINQ(r8, 0x541b, &(0x7f0000000100)) [ 198.063156] binder: 14993:15008 BC_DEAD_BINDER_DONE 0000000000000001 not found [ 198.087577] FAULT_INJECTION: forcing a failure. [ 198.087577] name failslab, interval 1, probability 0, space 0, times 0 [ 198.098916] CPU: 1 PID: 15020 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #372 [ 198.106263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.115592] Call Trace: [ 198.118159] dump_stack+0x194/0x24d [ 198.121766] ? arch_local_irq_restore+0x53/0x53 [ 198.126418] should_fail+0x8c0/0xa40 [ 198.130112] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 198.135196] ? rb_first_postorder+0xa0/0xa0 [ 198.139491] ? __mutex_lock+0x16f/0x1a80 [ 198.143532] ? trace_hardirqs_off+0x10/0x10 [ 198.147835] ? find_held_lock+0x35/0x1d0 [ 198.151875] ? __lock_is_held+0xb6/0x140 [ 198.155918] ? check_same_owner+0x320/0x320 [ 198.160216] ? lock_downgrade+0x980/0x980 [ 198.164344] ? rcu_note_context_switch+0x710/0x710 [ 198.169259] should_failslab+0xec/0x120 [ 198.173209] __kmalloc_track_caller+0x5f/0x760 [ 198.177770] ? string+0x180/0x200 [ 198.181199] ? kstrdup_const+0x39/0x50 [ 198.185063] kstrdup+0x39/0x70 [ 198.188235] kstrdup_const+0x39/0x50 [ 198.191928] __kernfs_new_node+0xa2/0x570 [ 198.196054] ? kernfs_dop_revalidate+0x380/0x380 [ 198.200792] ? snprintf+0xc0/0xf0 [ 198.204220] ? vsprintf+0x40/0x40 [ 198.207649] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 198.212557] ? cgroup_file_name+0x1d0/0x1d0 [ 198.216862] kernfs_new_node+0x80/0xe0 [ 198.220726] __kernfs_create_file+0x4b/0x320 [ 198.225116] cgroup_addrm_files+0x3c5/0xa70 [ 198.229418] ? cgroup_file_write+0x710/0x710 [ 198.233859] ? cgroup_idr_replace+0x3f/0x50 [ 198.238162] ? __lock_is_held+0xb6/0x140 [ 198.242203] ? __local_bh_enable_ip+0x121/0x230 [ 198.246848] ? online_css+0x224/0x2e0 [ 198.250628] css_populate_dir+0x198/0x420 [ 198.254756] cgroup_apply_control_enable+0x390/0xbc0 [ 198.259839] ? cgroup_propagate_control+0x570/0x570 [ 198.264833] ? css_populate_dir+0x289/0x420 [ 198.269135] cgroup_mkdir+0x56f/0xfc0 [ 198.272912] ? __lock_is_held+0xb6/0x140 [ 198.276954] ? cgroup_destroy_locked+0x750/0x750 [ 198.281687] ? rcu_read_lock_sched_held+0x108/0x120 [ 198.286678] ? kmem_cache_free+0x258/0x2a0 [ 198.290890] ? set_nlink+0xc1/0x160 [ 198.294492] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 198.299396] ? generic_permission+0x105/0x3c0 [ 198.303869] ? cgroup_destroy_locked+0x750/0x750 [ 198.308603] kernfs_iop_mkdir+0x153/0x1e0 [ 198.312730] vfs_mkdir+0x390/0x600 [ 198.316253] SyS_mkdirat+0x22b/0x2b0 [ 198.319945] ? SyS_mknod+0x480/0x480 [ 198.323632] ? trace_hardirqs_on+0xd/0x10 [ 198.327758] ? do_syscall_64+0xb7/0x940 [ 198.331706] ? SyS_mknod+0x480/0x480 [ 198.335397] do_syscall_64+0x281/0x940 [ 198.339262] ? vmalloc_sync_all+0x30/0x30 [ 198.343388] ? _raw_spin_unlock_irq+0x27/0x70 [ 198.347860] ? finish_task_switch+0x1c1/0x7e0 [ 198.352332] ? syscall_return_slowpath+0x550/0x550 [ 198.357240] ? syscall_return_slowpath+0x2ac/0x550 [ 198.362146] ? prepare_exit_to_usermode+0x350/0x350 [ 198.367138] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 198.372478] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 198.377299] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 198.382462] RIP: 0033:0x454e79 [ 198.385626] RSP: 002b:00007fe2ad9eac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 198.393312] RAX: ffffffffffffffda RBX: 00007fe2ad9eb6d4 RCX: 0000000000454e79 [ 198.400558] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 198.407804] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 198.415051] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 198.422294] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000031 [ 198.429686] cgroup: cgroup_addrm_files: failed to add bfq.weight, err=-12 [ 198.476958] binder_alloc: binder_alloc_mmap_handler: 14982 20000000-20002000 already mapped failed -16 2018/03/31 07:42:12 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000f84ff0)={&(0x7f0000000280)=ANY=[@ANYBLOB="020400000c0005000600000000000a004e20000000000000008000000000000000000000000100000000000000000200010000d3e9cfbb0000000000000003000500816c0000000002004e2000000000000000000000000000000000000000000000a9b8a22ca1410b121e2a723886a7a535b5d7253cc398aa5ac22e652cb2011055f519d1d7ec474aa5e530824701328c26f3c9c2fa549bbe1ea633a90279032514285c"], 0x60}, 0x1}, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x80000000, 0x10200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000080)=[@in={0x2, 0x4e24}, @in6={0xa, 0x4e21, 0x8, @ipv4={[], [0xff, 0xff]}, 0x3}, @in6={0xa, 0x4e23, 0x8e4, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, @in={0x2, 0x4e23}, @in6={0xa, 0x4e22, 0x9, @empty, 0x3}, @in6={0xa, 0x4e20, 0xfffffffffffffff7, @mcast1={0xff, 0x1, [], 0x1}, 0x5}, @in6={0xa, 0x4e23, 0x6, @empty, 0x101}], 0xac) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000240), &(0x7f0000000180)=0x4) 2018/03/31 07:42:12 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0xaf01, &(0x7f0000307000)=&(0x7f0000989fff)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000000)=ANY=[]) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000140)={0x0, r1}) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000000)=r1) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000cef000)={0x1, 0x0, &(0x7f000062a000)=""/167, &(0x7f0000aac000)=""/21, &(0x7f00002fdf52)=""/174}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000180)={0x0, 0x1, &(0x7f0000000280)=""/147, &(0x7f0000000340)=""/223, &(0x7f0000000580)=""/4096}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000040)=0x1) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000f82ffc)=0x4001) dup2(r1, r0) eventfd(0x0) 2018/03/31 07:42:12 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00004da000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x32, &(0x7f0000982f5b)={@random="0352ba8e8227", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x4000000000000320, 0x4, 0x0, 0x0, 0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @multicast2=0xe0000002, @dev={0xac, 0x14}}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "2099e9", 0x0, "d085f5"}}}}}}, &(0x7f000004d000)) pipe2(&(0x7f0000000140), 0x80000) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000080), &(0x7f00000000c0)=0xb) get_mempolicy(&(0x7f0000000000), &(0x7f0000000100), 0x0, &(0x7f00002bd000/0x1000)=nil, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaa17aaaaaaaaaabb060d0100000026020000609a45669b5eb0e23fa45fc50c4bec313a3333888bfa7d84911144bc9d25d24e70ef1cec75bb642a7d7cc919452e4f3f5dc51301750f99f7b48000d2f681d5fa554d88733ffa73360663f7bf3b3436cd0100000000000000eac8bd80a85a6b8547b8a65562a657bf32671525"], 0x0) 2018/03/31 07:42:12 executing program 2: r0 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)="c6cc8e60a78914d500bfeae773ddb642384ef9648af1058f5fbd2fd309524d989e8ca5c3e6e4d185de0489636bb4012cd2281d57a505b82ae678e253ab1603ef18da1e2b4f2acc3c7651ff1c670f5ed1de51a9a5a850687fc0664d9c81b66fefaf800714c085934bd42e3e21ae71d978f3e76fcbfdc2e66adff8be4d85633beb78581bf230f72954dd487c97d06409d3c6e2f7f22be6284a9b", 0x99, 0xfffffffffffffffb) keyctl$describe(0x6, r0, &(0x7f00000002c0)=""/200, 0xc8) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440)={0x0, 0x0, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20202, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x1010, r3, 0x0) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000000580)=ANY=[@ANYBLOB="030000000000000002004e22ac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e24ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000006ac1414bb00000000f5ff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ffffffffffffff000000000000000000000000000000000000000000000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000002004e23ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e220000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) pwrite64(r3, &(0x7f00000004c0)="361cf8298589166f6c2d5823c3b913944a09f012cc6a80f1d50171bf0badb6b5ffdeeaef7d6bdec3b31ce16780d2546875ed31070c85d5735d1ca260f2fca2cc539989af5eafe394f9ae07fcd88029971829aeaf797a78f97cd7f8531aeeb62f497a6d2d8c61dc23348ec786a20e624fdf4c5b839bea2dc66b04b7756cc92f852e", 0x81, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000400)=0xfff, 0x4) fallocate(r3, 0x3, 0x0, 0x81) ppoll(&(0x7f0000000080)=[{r2}, {r1, 0x208}, {r3, 0x28}], 0x3, &(0x7f00000000c0), &(0x7f0000000140)={0x70000000000}, 0x8) 2018/03/31 07:42:12 executing program 7 (fault-call:10 fault-nth:50): r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4900, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000240)=0x4) getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) r1 = dup(0xffffffffffffff9c) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r2 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r2, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r2, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r2, &(0x7f0000000100)=""/65, 0x41) r3 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) fchdir(r2) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(r3, &(0x7f0000000200)='./file1\x00', r2, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r2, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000580)=""/80, 0x50}, {&(0x7f00000008c0)=""/4096, 0x1000}], 0x2, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x20) r5 = syz_open_dev$sndpcmp(&(0x7f00000018c0)='/dev/snd/pcmC#D#p\x00', 0x3, 0x10a00) ioctl$KVM_GET_DEVICE_ATTR(r5, 0x4018aee2, &(0x7f0000001940)={0x0, 0x100, 0x9, &(0x7f0000001900)}) recvfrom$ipx(r4, &(0x7f00000006c0)=""/52, 0x34, 0x100, &(0x7f0000000700)={0x4, 0x9a2, 0x4, "dc108d9d4391", 0x5}, 0x10) renameat(r2, &(0x7f0000001980)='./file1\x00', r5, &(0x7f00000019c0)='./file0/file0\x00') r6 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r6, 0x4, 0x0) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000040), 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r6, &(0x7f0000000200), 0xfffffe08) 2018/03/31 07:42:12 executing program 5: clone(0x200, &(0x7f0000fbf000), &(0x7f0000000000), &(0x7f0000000100), &(0x7f00000000c0)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x1, 0x435fa3ddea989531) sendto$ax25(r0, &(0x7f0000000080)="80aa7cb956811d417afd2f0bdc73b77cba2b1674cac43a", 0x17, 0x20004054, &(0x7f00000000c0)={0x3, {"2fe126807d88fd"}, 0x9}, 0x10) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000a7bfc8), &(0x7f00006fcff0)) r1 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r2, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r3, &(0x7f0000bf5000), 0x0, 0x0, &(0x7f0000d93ff6)=@abs, 0x8) r4 = getpid() fcntl$setown(r2, 0x8, r4) kcmp(r4, r4, 0x1, r2, r3) fcntl$setsig(r2, 0xa, 0x12) dup2(r2, r3) tkill(r1, 0x16) exit(0x0) open(&(0x7f0000363ff8)='./file0\x00', 0x401, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') 2018/03/31 07:42:12 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) acct(&(0x7f0000001240)='./file0\x00') setrlimit(0xa, &(0x7f0000000380)={0x4, 0x1}) socketpair(0x10, 0x0, 0x8, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000001580)={r2}) r3 = open(&(0x7f00000010c0)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000001300)={0x8, 0x0, 0x6, 0x58a, 0x0}, &(0x7f0000001340)=0x10) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x3052, r2, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f00000001c0)={'bond0\x00', {0x2, 0x4e20, @multicast2=0xe0000002}}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYBLOB="408615824f3f781ae75fcc9554f019621eaccb21d7ca5fb77c06ff41c0d07d78b6de0ed01fa10b1070cb77afb61679a7f893b0c78371e1195ef393dc87b1b329811e67705b9e1bb5dc00c5b14645b010d310e491c159a81b77145882a63f6206ecfb54b4f6b2ddf7963c2b2681ff1aa2dfd55f1e73b02e150e1f8e51e6ae3615336ed2b2b461fccd4ec00311dd4b00cf4316fb4bda9fa1a0a94d01d4db3209cd302a449b841dc10fcc2d63482b979cb70c21ef7000e655a7a1a18b57b6cd06267ef9f582b4783e42e60f460962921710e11ac51a3f9fa92e9118c5f0e1d8b2c342"], &(0x7f0000000040)=0x2) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000100)={r6, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000001380)={r4, @in6={{0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0xf}}}, 0x0, 0x7, 0x0, 0x8, 0x92}, &(0x7f0000001440)=0x98) eventfd(0xffffffff80000001) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000001140)={0x4, 0x8001, 0x40, 0xfffffffffffffffd, 0x0}, &(0x7f0000001180)=0x10) ioctl$ASHMEM_GET_PROT_MASK(r3, 0x7706, &(0x7f0000001500)) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000011c0)={0x95e, 0x101, 0x8009, 0x1ff, 0x31386ac8, 0x8, 0x1, 0x7, r7}, 0x20) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x1, 0x1) recvfrom(0xffffffffffffffff, &(0x7f00000015c0)=""/83, 0x53, 0x120, 0x0, 0x0) symlinkat(&(0x7f0000001080)='./file0\x00', r3, &(0x7f0000001100)='./file0\x00') close(r0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={r3, r3, 0x4, 0x3}, 0x10) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0xc) 2018/03/31 07:42:12 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000240)='notify_on_release\x00', 0x2, 0x0) write(r1, &(0x7f0000000300)='5', 0x1) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000100)="d82a8ddd35e2585efef99ca5fe14f5022334834cff2c08f307bf1f15c4d5fb4e6e7e71c2f7e2ec235e0fc0dfad8af47474073277f6b3abfc48806c41", 0x3c, 0xfffffffffffffffb) request_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000001c0)='cpusetkeyring}eth1#)$eth0&*\x00', 0xfffffffffffffffc) [ 198.623380] FAULT_INJECTION: forcing a failure. [ 198.623380] name failslab, interval 1, probability 0, space 0, times 0 [ 198.634702] CPU: 0 PID: 15050 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #372 [ 198.642063] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.651406] Call Trace: [ 198.653975] dump_stack+0x194/0x24d [ 198.657589] ? arch_local_irq_restore+0x53/0x53 [ 198.662251] should_fail+0x8c0/0xa40 [ 198.665944] ? kstrdup+0x39/0x70 [ 198.669291] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 198.674377] ? cgroup_apply_control_enable+0x390/0xbc0 [ 198.679640] ? kernfs_iop_mkdir+0x153/0x1e0 [ 198.683949] ? vfs_mkdir+0x390/0x600 [ 198.687640] ? SyS_mkdirat+0x22b/0x2b0 [ 198.691509] ? do_syscall_64+0x281/0x940 [ 198.695555] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 198.700900] ? find_held_lock+0x35/0x1d0 [ 198.704956] ? find_held_lock+0x35/0x1d0 [ 198.709007] ? __lock_is_held+0xb6/0x140 [ 198.713066] ? check_same_owner+0x320/0x320 [ 198.717369] ? rcu_note_context_switch+0x710/0x710 [ 198.722608] ? rcu_read_lock_sched_held+0x108/0x120 [ 198.727626] should_failslab+0xec/0x120 [ 198.731587] kmem_cache_alloc+0x47/0x760 [ 198.735636] ? memcpy+0x45/0x50 [ 198.738905] ? kstrdup+0x59/0x70 [ 198.742271] __kernfs_new_node+0xe2/0x570 [ 198.746406] ? kernfs_dop_revalidate+0x380/0x380 [ 198.751151] ? snprintf+0xc0/0xf0 [ 198.754598] ? vsprintf+0x40/0x40 [ 198.758044] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 198.762959] ? cgroup_file_name+0x1d0/0x1d0 [ 198.767259] kernfs_new_node+0x80/0xe0 [ 198.771126] __kernfs_create_file+0x4b/0x320 [ 198.775514] cgroup_addrm_files+0x3c5/0xa70 [ 198.779825] ? cgroup_file_write+0x710/0x710 [ 198.784228] ? cgroup_idr_replace+0x3f/0x50 [ 198.788545] ? __lock_is_held+0xb6/0x140 [ 198.792591] ? __local_bh_enable_ip+0x121/0x230 [ 198.797236] ? online_css+0x224/0x2e0 [ 198.801017] css_populate_dir+0x198/0x420 [ 198.805161] cgroup_apply_control_enable+0x390/0xbc0 [ 198.810249] ? cgroup_propagate_control+0x570/0x570 [ 198.815245] ? css_populate_dir+0x289/0x420 [ 198.819546] cgroup_mkdir+0x56f/0xfc0 [ 198.823333] ? __lock_is_held+0xb6/0x140 [ 198.827376] ? cgroup_destroy_locked+0x750/0x750 [ 198.832108] ? rcu_read_lock_sched_held+0x108/0x120 [ 198.837105] ? kmem_cache_free+0x258/0x2a0 [ 198.841324] ? set_nlink+0xc1/0x160 [ 198.844930] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 198.849843] ? generic_permission+0x105/0x3c0 [ 198.854321] ? cgroup_destroy_locked+0x750/0x750 [ 198.859060] kernfs_iop_mkdir+0x153/0x1e0 [ 198.863197] vfs_mkdir+0x390/0x600 [ 198.866730] SyS_mkdirat+0x22b/0x2b0 [ 198.870426] ? SyS_mknod+0x480/0x480 [ 198.874113] ? trace_hardirqs_on+0xd/0x10 [ 198.878244] ? do_syscall_64+0xb7/0x940 [ 198.882208] ? SyS_mknod+0x480/0x480 [ 198.885907] do_syscall_64+0x281/0x940 [ 198.889769] ? vmalloc_sync_all+0x30/0x30 [ 198.893897] ? _raw_spin_unlock_irq+0x27/0x70 [ 198.898367] ? finish_task_switch+0x1c1/0x7e0 [ 198.902843] ? syscall_return_slowpath+0x550/0x550 [ 198.907756] ? syscall_return_slowpath+0x2ac/0x550 [ 198.912664] ? prepare_exit_to_usermode+0x350/0x350 [ 198.917669] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 198.923023] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 198.927851] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 198.933016] RIP: 0033:0x454e79 [ 198.936192] RSP: 002b:00007fe2ad9eac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 198.943878] RAX: ffffffffffffffda RBX: 00007fe2ad9eb6d4 RCX: 0000000000454e79 [ 198.951120] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 198.958365] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 198.965613] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 2018/03/31 07:42:13 executing program 1: mmap(&(0x7f0000000000/0xd25000)=nil, 0xd25000, 0x0, 0x32, 0xffffffffffffffff, 0x0) seccomp(0x400000001, 0x0, &(0x7f0000000ff0)={0x2000000000000197, &(0x7f0000000080)=[{0x20, 0x10001, 0x3, 0xff}, {0x6, 0x30, 0x3, 0xe01}, {0x3, 0x5b6, 0x1, 0x8}, {0xffffffffffffff7f, 0x0, 0x4, 0x20000000}, {0x7cf, 0x3, 0x8, 0x4}]}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x20100, 0x0) 2018/03/31 07:42:13 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'gretap0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000018c0)={&(0x7f00000002c0)={0x10}, 0xc, &(0x7f0000001880)={&(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES32=r1, @ANYBLOB="000000000000000008002b0004000100"], 0x28}, 0x1}, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) [ 198.972865] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000032 [ 198.980655] cgroup: cgroup_addrm_files: failed to add bfq.weight, err=-12 2018/03/31 07:42:13 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0xaf01, &(0x7f0000307000)=&(0x7f0000989fff)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000000)=ANY=[]) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000140)={0x0, r1}) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000000)=r1) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000cef000)={0x1, 0x0, &(0x7f000062a000)=""/167, &(0x7f0000aac000)=""/21, &(0x7f00002fdf52)=""/174}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000180)={0x0, 0x1, &(0x7f0000000280)=""/147, &(0x7f0000000340)=""/223, &(0x7f0000000580)=""/4096}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000040)=0x1) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000f82ffc)=0x4001) dup2(r1, r0) eventfd(0x0) 2018/03/31 07:42:13 executing program 2: r0 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)="c6cc8e60a78914d500bfeae773ddb642384ef9648af1058f5fbd2fd309524d989e8ca5c3e6e4d185de0489636bb4012cd2281d57a505b82ae678e253ab1603ef18da1e2b4f2acc3c7651ff1c670f5ed1de51a9a5a850687fc0664d9c81b66fefaf800714c085934bd42e3e21ae71d978f3e76fcbfdc2e66adff8be4d85633beb78581bf230f72954dd487c97d06409d3c6e2f7f22be6284a9b", 0x99, 0xfffffffffffffffb) keyctl$describe(0x6, r0, &(0x7f00000002c0)=""/200, 0xc8) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440)={0x0, 0x0, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x20202, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x1010, r3, 0x0) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000000580)=ANY=[@ANYBLOB="030000000000000002004e22ac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e24ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000006ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ffffffffffffff000000000000000000000000000000000000000000000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e220000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) pwrite64(r3, &(0x7f00000004c0)="361cf8298589166f6c2d5823c3b913944a09f012cc6a80f1d50171bf0badb6b5ffdeeaef7d6bdec3b31ce16780d2546875ed31070c85d5735d1ca260f2fca2cc539989af5eafe394f9ae07fcd88029971829aeaf797a78f97cd7f8531aeeb62f497a6d2d8c61dc23348ec786a20e624fdf4c5b839bea2dc66b04b7756cc92f852e", 0x81, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000400)=0xfff, 0x4) linkat(r3, &(0x7f0000000100)='./file0\x00', r3, &(0x7f00000003c0)='./file0\x00', 0x400) fallocate(r3, 0x3, 0x0, 0x81) ppoll(&(0x7f0000000080)=[{r2}, {r1, 0x208}, {r3, 0x28}], 0x3, &(0x7f00000000c0), &(0x7f0000000140)={0x70000000000}, 0x8) 2018/03/31 07:42:13 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) acct(&(0x7f0000001240)='./file0\x00') setrlimit(0xa, &(0x7f0000000380)={0x4, 0x1}) getsockname(0xffffffffffffff9c, &(0x7f0000001480)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f00000012c0)=0x80) socketpair(0x10, 0x0, 0x8, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000001580)={r3}) r4 = open(&(0x7f00000010c0)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000001300)={0x8, 0x0, 0x7, 0x58a, 0x0}, &(0x7f0000001340)=0x10) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x3052, r3, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f00000001c0)={'bond0\x00', {0x2, 0x4e20, @multicast2=0xe0000002}}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYBLOB="408615824f3f781ae75fcc9554f019621eaccb21d7ca5fb77c06ff41c0d07d78b6de0ed01fa10b1070cb77afb61679a7f893b0c78371e1195ef393dc87b1b329811e67705b9e1bb5dc00c5b14645b010d310e491c159a81b77145882a63f6206ecfb54b4f6b2ddf7963c2b2681ff1aa2dfd55f1e73b02e150e1f8e51e6ae3615336ed2b2b461fccd4ec00311dd4b00cf4316fb4bda9fa1a0a94d01d4db3209cd302a449b841dc10fcc2d63482b979cb70c21ef7000e655a7a1a18b57b6cd06267ef9f582b4783e42e60f460962921710e11ac51a3f9fa92e9118c5f0e1d8b2c342"], &(0x7f0000000040)=0x2) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000100)={r7, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000001380)={r5, @in6={{0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0xf}}}, 0x0, 0x7, 0x0, 0x8, 0x92}, &(0x7f0000001440)=0x98) eventfd(0xffffffff80000001) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000001140)={0x4, 0x8001, 0x40, 0xfffffffffffffffd, 0x0}, &(0x7f0000001180)=0x10) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f0000001500)) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000011c0)={0x95e, 0x101, 0x8009, 0x1ff, 0x31386ac8, 0x8, 0x1, 0x7, r8}, 0x20) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x1, 0x1) recvfrom(r1, &(0x7f00000015c0)=""/83, 0x53, 0x120, 0x0, 0x0) symlinkat(&(0x7f0000001080)='./file0\x00', r4, &(0x7f0000001100)='./file0\x00') close(r0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={r4, r4, 0x4, 0x3}, 0x10) getsockname$netlink(r1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) 2018/03/31 07:42:13 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f00000004c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) tkill(r0, 0x32) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f00000001c0)=ANY=[@ANYBLOB="845b7c6d", @ANYBLOB="040026bd7000fbdbdf25010000000800050065fb000008000600ffffffff0800050000100000200001000c0007001700000000000000080004004e200000080004004e210000"], 0x2}, 0x1, 0x0, 0x0, 0x4040000}, 0x1) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000340)='sysfs\x00', &(0x7f0000000380)='sysfs\x00', &(0x7f00000003c0)='sysfs\x00', &(0x7f0000000400)='sysfs\x00', &(0x7f0000000440)='\x00', &(0x7f0000000480)='IPVS\x00', &(0x7f00000004c0)='IPVS\x00', &(0x7f0000000500)='IPVS\x00'], &(0x7f0000000600)=[&(0x7f0000000580)='sysfs\x00', &(0x7f00000005c0)='\x00']) 2018/03/31 07:42:13 executing program 7 (fault-call:10 fault-nth:51): r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4900, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000240)=0x4) getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) r1 = dup(0xffffffffffffff9c) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r2 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r2, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r2, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r2, &(0x7f0000000100)=""/65, 0x41) r3 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) fchdir(r2) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(r3, &(0x7f0000000200)='./file1\x00', r2, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r2, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000580)=""/80, 0x50}, {&(0x7f00000008c0)=""/4096, 0x1000}], 0x2, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x20) r5 = syz_open_dev$sndpcmp(&(0x7f00000018c0)='/dev/snd/pcmC#D#p\x00', 0x3, 0x10a00) ioctl$KVM_GET_DEVICE_ATTR(r5, 0x4018aee2, &(0x7f0000001940)={0x0, 0x100, 0x9, &(0x7f0000001900)}) recvfrom$ipx(r4, &(0x7f00000006c0)=""/52, 0x34, 0x100, &(0x7f0000000700)={0x4, 0x9a2, 0x4, "dc108d9d4391", 0x5}, 0x10) renameat(r2, &(0x7f0000001980)='./file1\x00', r5, &(0x7f00000019c0)='./file0/file0\x00') r6 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r6, 0x4, 0x0) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000040), 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r6, &(0x7f0000000200), 0xfffffe08) [ 199.075884] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. 2018/03/31 07:42:13 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0xaf01, &(0x7f0000307000)=&(0x7f0000989fff)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000000)=ANY=[]) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000140)={0x0, r1}) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000000)=r1) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000cef000)={0x1, 0x0, &(0x7f000062a000)=""/167, &(0x7f0000aac000)=""/21, &(0x7f00002fdf52)=""/174}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000180)={0x0, 0x1, &(0x7f0000000280)=""/147, &(0x7f0000000340)=""/223, &(0x7f0000000580)=""/4096}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000040)=0x1) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000f82ffc)=0x4001) dup2(r1, r0) eventfd(0x0) 2018/03/31 07:42:13 executing program 1: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x80) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f00000001c0)=0x7fffffff, 0x4) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x52a01, 0x41) r2 = getegid() fstat(r1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_netrom_TIOCINQ(r1, 0x541b, &(0x7f0000000080)) modify_ldt$write2(0x11, &(0x7f0000000040)={0x3f, 0x1000, 0x400, 0x24000000000000, 0x101, 0x40, 0x7, 0x0, 0xa6b, 0xfff}, 0x10) getgroups(0x4, &(0x7f00000002c0)=[r2, 0x0, r3, 0xffffffffffffffff]) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x6, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff]) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) getgroups(0x7, &(0x7f0000000540)=[0x0, r2, r3, r4, r5, r6, r7]) getsockopt$inet6_tcp_int(r1, 0x6, 0x6, &(0x7f0000000100), &(0x7f0000000140)=0x4) syz_emit_ethernet(0x6e, &(0x7f0000000580)=ANY=[@ANYBLOB="0180c2000000b42d87402e523aa38fa868b516ab664fef004cec8400fe8000000000000000000000000000ffff0200000000000000000000000000010200907800000000600a07ec00002900fe80003b9e00000000000000000000ff00000000000000000002ffb30000000000000b266b0b21016c2a0213a94cec364d7b5fab2d0e3f68f2e4d0fcef59b9d867aaaa8510abb5945d92c774e40fb2c68a504f39e692be67631539c6e2de64904c9bfe028e3c3bccf3528d61c4cfaa3160f3848e083751bce915"], &(0x7f0000000000)) [ 199.150632] FAULT_INJECTION: forcing a failure. [ 199.150632] name failslab, interval 1, probability 0, space 0, times 0 [ 199.162051] CPU: 1 PID: 15085 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #372 [ 199.169408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.178757] Call Trace: [ 199.181349] dump_stack+0x194/0x24d [ 199.184981] ? arch_local_irq_restore+0x53/0x53 [ 199.189659] should_fail+0x8c0/0xa40 [ 199.193370] ? kstrdup+0x39/0x70 [ 199.196736] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 199.201838] ? cgroup_apply_control_enable+0x390/0xbc0 [ 199.207114] ? kernfs_iop_mkdir+0x153/0x1e0 [ 199.211439] ? vfs_mkdir+0x390/0x600 [ 199.215163] ? SyS_mkdirat+0x22b/0x2b0 [ 199.219045] ? do_syscall_64+0x281/0x940 [ 199.223109] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 199.228473] ? find_held_lock+0x35/0x1d0 [ 199.232536] ? find_held_lock+0x35/0x1d0 [ 199.236589] ? __lock_is_held+0xb6/0x140 [ 199.240638] ? check_same_owner+0x320/0x320 [ 199.244949] ? rcu_note_context_switch+0x710/0x710 [ 199.249864] ? rcu_read_lock_sched_held+0x108/0x120 [ 199.254862] should_failslab+0xec/0x120 [ 199.258815] kmem_cache_alloc+0x47/0x760 [ 199.262853] ? memcpy+0x45/0x50 [ 199.266112] ? kstrdup+0x59/0x70 [ 199.269460] __kernfs_new_node+0xe2/0x570 [ 199.273587] ? kernfs_dop_revalidate+0x380/0x380 [ 199.278325] ? snprintf+0xc0/0xf0 [ 199.281756] ? vsprintf+0x40/0x40 [ 199.285187] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 199.290096] ? cgroup_file_name+0x1d0/0x1d0 [ 199.294393] kernfs_new_node+0x80/0xe0 [ 199.298260] __kernfs_create_file+0x4b/0x320 [ 199.302650] cgroup_addrm_files+0x3c5/0xa70 [ 199.306957] ? cgroup_file_write+0x710/0x710 [ 199.311345] ? cgroup_idr_replace+0x3f/0x50 [ 199.315650] ? __lock_is_held+0xb6/0x140 [ 199.319694] ? __local_bh_enable_ip+0x121/0x230 [ 199.324337] ? online_css+0x224/0x2e0 [ 199.328116] css_populate_dir+0x198/0x420 [ 199.332245] cgroup_apply_control_enable+0x390/0xbc0 [ 199.337328] ? cgroup_propagate_control+0x570/0x570 [ 199.342323] ? css_populate_dir+0x289/0x420 [ 199.346624] cgroup_mkdir+0x56f/0xfc0 [ 199.350398] ? __lock_is_held+0xb6/0x140 [ 199.354439] ? cgroup_destroy_locked+0x750/0x750 [ 199.359170] ? rcu_read_lock_sched_held+0x108/0x120 [ 199.364171] ? kmem_cache_free+0x258/0x2a0 [ 199.368383] ? set_nlink+0xc1/0x160 [ 199.371986] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 199.376894] ? generic_permission+0x105/0x3c0 [ 199.381366] ? cgroup_destroy_locked+0x750/0x750 [ 199.386099] kernfs_iop_mkdir+0x153/0x1e0 [ 199.390226] vfs_mkdir+0x390/0x600 [ 199.393744] SyS_mkdirat+0x22b/0x2b0 [ 199.397437] ? SyS_mknod+0x480/0x480 [ 199.401125] ? trace_hardirqs_on+0xd/0x10 [ 199.405251] ? do_syscall_64+0xb7/0x940 [ 199.409204] ? SyS_mknod+0x480/0x480 [ 199.412893] do_syscall_64+0x281/0x940 [ 199.416760] ? vmalloc_sync_all+0x30/0x30 [ 199.420884] ? _raw_spin_unlock_irq+0x27/0x70 [ 199.425356] ? finish_task_switch+0x1c1/0x7e0 [ 199.429827] ? syscall_return_slowpath+0x550/0x550 [ 199.434731] ? syscall_return_slowpath+0x2ac/0x550 [ 199.439636] ? prepare_exit_to_usermode+0x350/0x350 [ 199.444632] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 199.449973] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 199.454794] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 199.459959] RIP: 0033:0x454e79 [ 199.463123] RSP: 002b:00007fe2ad9eac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 199.470808] RAX: ffffffffffffffda RBX: 00007fe2ad9eb6d4 RCX: 0000000000454e79 [ 199.478056] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 199.485300] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 199.492545] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 2018/03/31 07:42:13 executing program 4: r0 = memfd_create(&(0x7f00000003c0)='\'@^!)posix_acl_access\x00', 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000400)='/dev/dsp#\x00', 0x3f, 0x101000) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af22, &(0x7f0000000440)={0x0, r1}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000000)=@full={{0x3, {"ca39d3a6aaf1ea"}, 0x7}, [{"9466da9f9b9c34"}, {"bf630ee589192b"}, {"a87c1ff7d40d3a"}, {"146ad28c233047"}, {"ccdf8179897ff9"}, {"d5e34e54557076"}, {"3f85aad50a1b3a"}, {"81e97fa888125b"}]}, 0x48) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x0, 0x5, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7, 0xdc, 0x5}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r2, &(0x7f00000005c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[]}, 0x1, 0x0, 0x0, 0x4000005}, 0x5) ioctl$sock_netrom_SIOCGSTAMPNS(r2, 0x8907, &(0x7f00000002c0)) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000240)={r3}, 0x8) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r2, 0x5609, &(0x7f0000000380)={0x8, 0x0, 0x8ce}) ioctl$TCSETS(r4, 0x40045431, &(0x7f00003b9fdc)) setsockopt$inet6_tcp_buf(r2, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3bea74c6", 0x34) r5 = syz_open_pts(r4, 0x11) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000500)={@mcast2={0xff, 0x2, [], 0x1}, 0x36}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000080)={0x2, 0x2000000008005, 0x3, 0x8, r3}, &(0x7f0000000340)=0x10) write(r5, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000000c0)=0x3) dup2(r5, r4) 2018/03/31 07:42:13 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x54, 0x0) fcntl$notify(r0, 0x402, 0x2a) recvfrom$unix(r0, &(0x7f0000000580)=""/123, 0x7b, 0x0, &(0x7f0000000600)=@abs, 0x6e) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000440)) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chmod(&(0x7f0000000400)='./file0\x00', 0x0) ptrace$peekuser(0x3, 0x0, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20202, 0x0) write$tun(r1, &(0x7f0000000500)=ANY=[@ANYBLOB], 0x1) fallocate(r1, 0x3, 0x0, 0x81) timerfd_settime(r0, 0x1, &(0x7f0000000680)={{0x77359400}, {0x77359400}}, &(0x7f00000006c0)) clock_gettime(0x0, &(0x7f0000000740)) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000240), &(0x7f0000000500)=0x4) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) ioctl$DRM_IOCTL_MODE_GETCRTC(r1, 0xc06864a1, &(0x7f0000000080)={&(0x7f0000000040)=[0x44f, 0x7c, 0x9, 0x8000, 0x606], 0x5, 0x91, 0x7fff, 0x400, 0x69d, 0xe0, {0x600000000, 0x7, 0x6, 0xc511, 0x4, 0x6064, 0x0, 0x1, 0x5, 0x3f, 0x7f, 0x7, 0x5, 0x5, "ed0f65bd0bdc2ef0dc26c370f61fb5014d54f3cac1cd088044ea5a5dafd4909d"}}) listen(0xffffffffffffffff, 0xffff) 2018/03/31 07:42:13 executing program 2: r0 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)="c6cc8e60a78914d500bfeae773ddb642384ef9648af1058f5fbd2fd309524d989e8ca5c3e6e4d185de0489636bb4012cd2281d57a505b82ae678e253ab1603ef18da1e2b4f2acc3c7651ff1c670f5ed1de51a9a5a850687fc0664d9c81b66fefaf800714c085934bd42e3e21ae71d978f3e76fcbfdc2e66adff8be4d85633beb78581bf230f72954dd487c97d06409d3c6e2f7f22be6284a9b", 0x99, 0xfffffffffffffffb) keyctl$describe(0x6, r0, &(0x7f00000002c0)=""/200, 0xc8) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x400, 0x12000) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000440)={0x0, 0x0, 0xffffffffffffffff}) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20202, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x1010, r4, 0x0) setsockopt$inet_MCAST_MSFILTER(r4, 0x0, 0x30, &(0x7f0000000580)=ANY=[@ANYBLOB="030000000000000002004e22ac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e24ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000006ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ffffffffffffff000000000000000000000000000000000000000000000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e220000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) pwrite64(r4, &(0x7f00000004c0)="361cf8298589166f6c2d5823c3b913944a09f012cc6a80f1d50171bf0badb6b5ffdeeaef7d6bdec3b31ce16780d2546875ed31070c85d5735d1ca260f2fca2cc539989af5eafe394f9ae07fcd88029971829aeaf797a78f97cd7f8531aeeb62f497a6d2d8c61dc23348ec786a20e624fdf4c5b839bea2dc66b04b7756cc92f852e", 0x81, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f0000000400)=0xfff, 0x4) fallocate(r4, 0x3, 0x0, 0x81) ppoll(&(0x7f0000000080)=[{r3}, {r2, 0x208}, {r4, 0x28}], 0x3, &(0x7f00000000c0), &(0x7f0000000140)={0x70000000000}, 0x8) ioctl$LOOP_GET_STATUS64(r4, 0x4c05, &(0x7f0000000a40)) [ 199.499789] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000033 [ 199.507162] cgroup: cgroup_addrm_files: failed to add bfq.weight, err=-12 2018/03/31 07:42:13 executing program 1: pipe2(&(0x7f0000000200)={0x0, 0x0}, 0x4000) fallocate(r1, 0x0, 0x0, 0xfff) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f0000000000)={0x3f, 0x6, 0x4, 0x0, 0x0, [], [], [], 0x1, 0x2}) 2018/03/31 07:42:13 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000d0cfa8)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-avx2\x00'}, 0x58) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x24001) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x22000, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000080)={0x2, 0x10, 0x1, r2}) r3 = accept$alg(r0, 0x0, 0x0) r4 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r4, 0x0, 0x0, 0x40007) sendmsg$alg(r3, &(0x7f0000ddffc8)={0x0, 0x0, &(0x7f00003f3fc0)=[{&(0x7f0000279fb8)='?', 0x1}], 0x1}, 0x8880) sendfile(r3, r4, &(0x7f0000ccb000), 0x357) 2018/03/31 07:42:13 executing program 4: r0 = memfd_create(&(0x7f00000000c0)='-@cpuset[md5sum[\x00', 0x0) write(r0, &(0x7f0000a17000)='\t', 0x1) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000000)=""/86, &(0x7f0000000080)=0x56) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x10, r0, 0x0) getsockopt$sock_buf(r0, 0x1, 0x3f, &(0x7f00000005c0)=""/252, &(0x7f00000006c0)=0xfc) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000700)) ioctl$fiemap(r1, 0x40086602, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x7, [{0x100000000, 0x8000, 0x0, 0x0, 0x0, 0x1}, {0x1, 0x4, 0xea7, 0x0, 0x0, 0x9}, {0x7, 0x2d1, 0x8, 0x0, 0x0, 0x1000}, {0x2, 0x57bd, 0x3f, 0x0, 0x0, 0x4}, {0x4, 0xfffffffffffffffd, 0xfffffffffffff000, 0x0, 0x0, 0x400}, {0x7, 0x1ff, 0x100000000}, {0x3f, 0x0, 0x3, 0x0, 0x0, 0x400}]}) execve(&(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='$em1\x00', &(0x7f0000000380)='/exe\x00'], &(0x7f0000000580)=[&(0x7f0000000400)="fb00", &(0x7f0000000440)='*]\x00', &(0x7f0000000480)='-@cpuset[md5sum[\x00', &(0x7f00000004c0)='-@cpuset[md5sum[\x00', &(0x7f0000000500)='/exe\x00', &(0x7f0000000540)='eth0$\x00']) 2018/03/31 07:42:13 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0xaf01, &(0x7f0000307000)=&(0x7f0000989fff)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000000)=ANY=[]) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000140)) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000000)=r1) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000cef000)={0x1, 0x0, &(0x7f000062a000)=""/167, &(0x7f0000aac000)=""/21, &(0x7f00002fdf52)=""/174}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000180)={0x0, 0x1, &(0x7f0000000280)=""/147, &(0x7f0000000340)=""/223, &(0x7f0000000580)=""/4096}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000040)=0x1) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000f82ffc)=0x4001) dup2(r1, r0) eventfd(0x0) 2018/03/31 07:42:13 executing program 7 (fault-call:10 fault-nth:52): r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4900, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000240)=0x4) getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) r1 = dup(0xffffffffffffff9c) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r2 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r2, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r2, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r2, &(0x7f0000000100)=""/65, 0x41) r3 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) fchdir(r2) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(r3, &(0x7f0000000200)='./file1\x00', r2, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r2, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000580)=""/80, 0x50}, {&(0x7f00000008c0)=""/4096, 0x1000}], 0x2, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x20) r5 = syz_open_dev$sndpcmp(&(0x7f00000018c0)='/dev/snd/pcmC#D#p\x00', 0x3, 0x10a00) ioctl$KVM_GET_DEVICE_ATTR(r5, 0x4018aee2, &(0x7f0000001940)={0x0, 0x100, 0x9, &(0x7f0000001900)}) recvfrom$ipx(r4, &(0x7f00000006c0)=""/52, 0x34, 0x100, &(0x7f0000000700)={0x4, 0x9a2, 0x4, "dc108d9d4391", 0x5}, 0x10) renameat(r2, &(0x7f0000001980)='./file1\x00', r5, &(0x7f00000019c0)='./file0/file0\x00') r6 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r6, 0x4, 0x0) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000040), 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r6, &(0x7f0000000200), 0xfffffe08) [ 199.675938] FAULT_INJECTION: forcing a failure. [ 199.675938] name failslab, interval 1, probability 0, space 0, times 0 [ 199.687291] CPU: 0 PID: 15117 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #372 [ 199.694657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.704009] Call Trace: [ 199.706596] dump_stack+0x194/0x24d [ 199.710207] ? arch_local_irq_restore+0x53/0x53 [ 199.714855] should_fail+0x8c0/0xa40 [ 199.718547] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 199.723631] ? rcu_read_lock_sched_held+0x108/0x120 [ 199.728632] ? find_held_lock+0x35/0x1d0 [ 199.732671] ? __lock_is_held+0xb6/0x140 [ 199.736715] ? check_same_owner+0x320/0x320 [ 199.741018] ? rcu_note_context_switch+0x710/0x710 [ 199.745926] should_failslab+0xec/0x120 [ 199.749875] kmem_cache_alloc_node_trace+0x5a/0x760 [ 199.754868] ? idr_alloc_u32+0x390/0x390 [ 199.758907] mem_cgroup_css_alloc+0x3b6/0x19c0 [ 199.763464] ? setup_cpu_cache+0x1c0/0x1c0 [ 199.767673] ? __kernfs_new_node+0x3f5/0x570 [ 199.772058] ? kernfs_dop_revalidate+0x380/0x380 [ 199.776792] ? trace_hardirqs_off+0x10/0x10 [ 199.781092] ? kernfs_link_sibling+0x27d/0x380 [ 199.785652] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 199.790557] ? cgroup_kn_set_ugid+0x2c7/0x370 [ 199.795031] ? cgroup_file_name+0x1d0/0x1d0 [ 199.799326] ? mutex_unlock+0xd/0x10 [ 199.803019] ? __lock_is_held+0xb6/0x140 [ 199.807059] ? cgroup_addrm_files+0x67f/0xa70 [ 199.811532] ? trace_hardirqs_off+0x10/0x10 [ 199.815828] ? cgroup_file_write+0x710/0x710 [ 199.820216] ? cgroup_idr_replace+0x3f/0x50 [ 199.824514] ? trace_hardirqs_off+0x10/0x10 [ 199.828814] ? __lock_is_held+0xb6/0x140 [ 199.832857] ? __local_bh_enable_ip+0x121/0x230 [ 199.837503] ? __lock_is_held+0xb6/0x140 [ 199.841548] cgroup_apply_control_enable+0x44d/0xbc0 [ 199.846632] ? cgroup_propagate_control+0x570/0x570 [ 199.851626] ? css_populate_dir+0x289/0x420 [ 199.855924] cgroup_mkdir+0x56f/0xfc0 [ 199.859697] ? __lock_is_held+0xb6/0x140 [ 199.863736] ? cgroup_destroy_locked+0x750/0x750 [ 199.868469] ? rcu_read_lock_sched_held+0x108/0x120 [ 199.873462] ? kmem_cache_free+0x258/0x2a0 [ 199.877675] ? set_nlink+0xc1/0x160 [ 199.881278] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 199.886180] ? generic_permission+0x105/0x3c0 [ 199.890650] ? cgroup_destroy_locked+0x750/0x750 [ 199.895380] kernfs_iop_mkdir+0x153/0x1e0 [ 199.899502] vfs_mkdir+0x390/0x600 [ 199.903024] SyS_mkdirat+0x22b/0x2b0 [ 199.906713] ? SyS_mknod+0x480/0x480 [ 199.910399] ? trace_hardirqs_on+0xd/0x10 [ 199.914519] ? do_syscall_64+0xb7/0x940 [ 199.918468] ? SyS_mknod+0x480/0x480 [ 199.922156] do_syscall_64+0x281/0x940 [ 199.926025] ? vmalloc_sync_all+0x30/0x30 [ 199.930147] ? _raw_spin_unlock_irq+0x27/0x70 [ 199.934620] ? finish_task_switch+0x1c1/0x7e0 [ 199.939088] ? syscall_return_slowpath+0x550/0x550 [ 199.943992] ? syscall_return_slowpath+0x2ac/0x550 [ 199.948900] ? prepare_exit_to_usermode+0x350/0x350 [ 199.953891] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 199.959233] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 199.964055] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 199.969220] RIP: 0033:0x454e79 [ 199.972384] RSP: 002b:00007fe2ad9eac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 199.980068] RAX: ffffffffffffffda RBX: 00007fe2ad9eb6d4 RCX: 0000000000454e79 [ 199.987311] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 199.994555] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 200.001800] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 200.009041] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000034 [ 200.016776] kasan: CONFIG_KASAN_INLINE enabled [ 200.021730] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 200.029153] general protection fault: 0000 [#1] SMP KASAN [ 200.034678] Dumping ftrace buffer: [ 200.038200] (ftrace buffer empty) [ 200.041897] Modules linked in: [ 200.045089] CPU: 0 PID: 15117 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #372 [ 200.052444] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.061806] RIP: 0010:__mem_cgroup_free+0x71/0x110 [ 200.061811] RSP: 0018:ffff8801cb0975a8 EFLAGS: 00010206 [ 200.061819] RAX: 0000000000000011 RBX: 0000000000000000 RCX: ffffffff8310cdfd [ 200.061824] RDX: 0000000000040000 RSI: ffffc90007ee0000 RDI: 0000000000000088 [ 200.061829] RBP: ffff8801cb0975c8 R08: 0000000000000000 R09: ffff8801cb0973a0 [ 200.061833] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 200.061840] R13: ffff88017d3bab80 R14: dffffc0000000000 R15: ffff88017d3bab80 [ 200.108298] FS: 00007fe2ad9eb700(0000) GS:ffff8801db000000(0000) knlGS:0000000000000000 [ 200.116495] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 200.122347] CR2: 00000000004d8884 CR3: 00000001d78da006 CR4: 00000000001626f0 [ 200.129594] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 200.136836] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 200.144079] Call Trace: [ 200.146644] mem_cgroup_css_alloc+0x403/0x19c0 [ 200.151198] ? setup_cpu_cache+0x1c0/0x1c0 [ 200.155406] ? __kernfs_new_node+0x3f5/0x570 [ 200.159787] ? kernfs_dop_revalidate+0x380/0x380 [ 200.164519] ? trace_hardirqs_off+0x10/0x10 [ 200.168813] ? kernfs_link_sibling+0x27d/0x380 [ 200.173369] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 200.178271] ? cgroup_kn_set_ugid+0x2c7/0x370 [ 200.182740] ? cgroup_file_name+0x1d0/0x1d0 [ 200.187031] ? mutex_unlock+0xd/0x10 [ 200.190719] ? __lock_is_held+0xb6/0x140 [ 200.194755] ? cgroup_addrm_files+0x67f/0xa70 [ 200.199224] ? trace_hardirqs_off+0x10/0x10 [ 200.203516] ? cgroup_file_write+0x710/0x710 [ 200.207899] ? cgroup_idr_replace+0x3f/0x50 [ 200.212191] ? trace_hardirqs_off+0x10/0x10 [ 200.216486] ? __lock_is_held+0xb6/0x140 [ 200.220520] ? __local_bh_enable_ip+0x121/0x230 [ 200.225160] ? __lock_is_held+0xb6/0x140 [ 200.229196] cgroup_apply_control_enable+0x44d/0xbc0 [ 200.234272] ? cgroup_propagate_control+0x570/0x570 [ 200.239262] ? css_populate_dir+0x289/0x420 [ 200.243555] cgroup_mkdir+0x56f/0xfc0 [ 200.247333] ? __lock_is_held+0xb6/0x140 [ 200.251366] ? cgroup_destroy_locked+0x750/0x750 [ 200.256095] ? rcu_read_lock_sched_held+0x108/0x120 [ 200.261083] ? kmem_cache_free+0x258/0x2a0 [ 200.265290] ? set_nlink+0xc1/0x160 [ 200.268891] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 200.273794] ? generic_permission+0x105/0x3c0 [ 200.278263] ? cgroup_destroy_locked+0x750/0x750 [ 200.282991] kernfs_iop_mkdir+0x153/0x1e0 [ 200.287113] vfs_mkdir+0x390/0x600 [ 200.290629] SyS_mkdirat+0x22b/0x2b0 [ 200.294317] ? SyS_mknod+0x480/0x480 [ 200.298003] ? trace_hardirqs_on+0xd/0x10 [ 200.302125] ? do_syscall_64+0xb7/0x940 [ 200.306074] ? SyS_mknod+0x480/0x480 [ 200.309763] do_syscall_64+0x281/0x940 [ 200.313624] ? vmalloc_sync_all+0x30/0x30 [ 200.317747] ? _raw_spin_unlock_irq+0x27/0x70 [ 200.322216] ? finish_task_switch+0x1c1/0x7e0 [ 200.326683] ? syscall_return_slowpath+0x550/0x550 [ 200.331584] ? syscall_return_slowpath+0x2ac/0x550 [ 200.336485] ? prepare_exit_to_usermode+0x350/0x350 [ 200.341473] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 200.346808] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 200.351625] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 200.356788] RIP: 0033:0x454e79 [ 200.359950] RSP: 002b:00007fe2ad9eac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 200.367632] RAX: ffffffffffffffda RBX: 00007fe2ad9eb6d4 RCX: 0000000000454e79 [ 200.374872] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 200.382114] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 200.389356] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 200.396597] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000034 [ 200.403842] Code: 00 00 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 99 00 00 00 4f 8b a4 e5 f0 09 00 00 49 8d bc 24 88 00 00 00 48 89 f8 48 c1 e8 03 <42> 80 3c 30 00 0f 85 88 00 00 00 49 8b bc 24 88 00 00 00 e8 77 [ 200.422944] RIP: __mem_cgroup_free+0x71/0x110 RSP: ffff8801cb0975a8 2018/03/31 07:42:14 executing program 1: clone(0x200, &(0x7f000074a000), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000804000)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000a7bfc8), &(0x7f00006fcff0)) r0 = gettid() syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080)="5662acfca1bee435144a28b5ee82f1f6f4088f67b86c2605eb197d4466d338f9321ca47c733d1af2d7ede62e6db2d78079d93ac81da3a259c9baf57e36c0661604f5a554bdcec27983a4e1c74ab47d08774dd99edefb3f26398178287845ec6f492fffbecdbe251309cfcbb5b1ecc0315828455e8b026671d4b23b66b06fb0d67f63d406c53c8d46e1", 0x89, 0x2}, {&(0x7f0000000140)="9b76b21ab6b122e6236a0eb2ba9fb393e63a774ac3c42eebeeef0c98baf06041222b0bb72884c203f00f5bec843a4d8ba0675f44c2d45b91996dafd2b51cae6c69ac3a8dc8dad705bee73d33795ba24de2186ee38c8eee775144731510cfea57c753b544b5ea1bd700cedd69e667782fe93420cf09c7fb1ce973c02add825db759d6f261af0c440c6770606f38bb2b5a6cd8e06bc38ec6013414878afdca7f292bc4837c3bd38e44a78c438c88c83f1947063a0478c9ccd4e830ae1cdcc4e6d12ff28e6e19515e0138ddc7c54f563b6a", 0xd0, 0x101}, {&(0x7f0000000380)="78cbefad9da0f58f9b27af46da2e83d27f111679e6f2dc350028cf47de8a70454b76b90ba0d51e5f4b59293999876d1410710cfdac3caf6aebff62485de3c3b2e6ad1f83a214", 0x46, 0xffffffffffffff80}], 0x800000, &(0x7f0000000340)=ANY=[@ANYBLOB='noquota,hash=tea,replayoVly,grpj,\x00\x00\x00\x00\x00\x00']) socketpair$unix(0x1, 0x400000000000001, 0x0, &(0x7f0000919000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r2, &(0x7f0000bf5000), 0x0, 0x0, &(0x7f0000d93ff6)=@abs, 0x8) syz_open_procfs(r0, &(0x7f00005b7000)='smaps\x00') fcntl$setown(r1, 0x8, r0) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) exit(0x0) open(&(0x7f0000363ff8)='./file0\x00', 0x401, 0x0) 2018/03/31 07:42:14 executing program 2: r0 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)="c6cc8e60a78914d500bfeae773ddb642384ef9648af1058f5fbd2fd309524d989e8ca5c3e6e4d185de0489636bb4012cd2281d57a505b82ae678e253ab1603ef18da1e2b4f2acc3c7651ff1c670f5ed1de51a9a5a850687fc0664d9c81b66fefaf800714c085934bd42e3e21ae71d978f3e76fcbfdc2e66adff8be4d85633beb78581bf230f72954dd487c97d06409d3c6e2f7f22be6284a9b", 0x99, 0xfffffffffffffffb) keyctl$describe(0x6, r0, &(0x7f00000002c0)=""/200, 0xc8) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440)={0x0, 0x0, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20202, 0x0) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r5, &(0x7f00000003c0), r3, &(0x7f0000000480), 0x0, 0x8) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x1010, r3, 0x0) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000000f80)=ANY=[@ANYPTR64=&(0x7f0000000f40)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYRES16=r0, @ANYRES64=r0, @ANYPTR64=&(0x7f0000000f00)=ANY=[@ANYPTR, @ANYRES64=r1, @ANYRES64=r3, @ANYRES32=r4]]], 0x1) pwrite64(r3, &(0x7f00000004c0)="361cf8298589166f6c2d5823c3b913944a09f012cc6a80f1d50171bf0badb6b5ffdeeaef7d6bdec3b31ce16780d2546875ed31070c85d5735d1ca260f2fca2cc539989af5eafe394f9ae07fcd88029971829aeaf797a78f97cd7f8531aeeb62f497a6d2d8c61dc23348ec786a20e624fdf4c5b839bea2dc66b04b7756cc92f852e", 0x81, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000400)=0xfffffffffffffdca, 0x4) fallocate(r3, 0x3, 0x0, 0x81) ppoll(&(0x7f0000000080)=[{r2}, {r1, 0x208}, {r3, 0x28}], 0x3, &(0x7f00000000c0), &(0x7f0000000140)={0x70000000000}, 0x8) [ 200.429530] ---[ end trace 6e06824ffd8fe4fc ]--- [ 200.434320] Kernel panic - not syncing: Fatal exception [ 200.434744] Dumping ftrace buffer: [ 200.434748] (ftrace buffer empty) [ 200.434751] Kernel Offset: disabled [ 200.450867] Rebooting in 86400 seconds..