140)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000500)={@local={0xfe, 0x80, [], 0xaa}, r1}, 0x14) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000540)={{0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}, {0x306, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0xa, {0x2, 0x4e21, @loopback=0x7f000001}, 'gre0\x00'}) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:26 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000072fee)='/dev/input/event#\x00', 0x2, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{{}, 0x0, 0x100000001}, {}], 0x30) 2018/05/06 05:51:26 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000340)=0x6, 0x4) sendto$inet6(r0, &(0x7f00000000c0)="040100000009cb396da100d81e591e7945419600e5c3598d3fc4ac054a3dc552", 0x20, 0x0, &(0x7f0000005fe4)={0xa, 0x800000894f, 0x401, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_cache\x00') ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f0000000140)) 2018/05/06 05:51:26 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"62726964676530000000000000000003", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:26 executing program 3: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x200000000000, 0x2, 0x0, 0x0, 0x1000, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) socket$inet_udp(0x2, 0x2, 0x0) socket$packet(0x11, 0x3, 0x300) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@mcast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@dev}}, &(0x7f0000000140)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000500)={@local={0xfe, 0x80, [], 0xaa}, r1}, 0x14) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001540)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(tea)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000052000)="21130000000000000000000000000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f00000003c0)="44180c5030827edcf6bf39b97527f6f21443881bb2a1f64db2727897a0d1f3a55d000100007667b83ce7046eb086be4413b96bb4d6bc226737336a656cba4e5fa6a03d222835d12356b961885d6a5d93d15d9c5165522024d4a2115a1220000000a597f8ec92f6c647bc5dae46c7c115cca5db7843dac321aec80792327b78a8f4e92d801249313849e470e794d7231f83aedf08234c16ffba97e7ccf978ae94d471c096ef33d4ac30ef6c2fafbd18eb", 0xb0) readv(r1, &(0x7f00006e8ff0)=[{&(0x7f000070bf52)=""/174, 0xfffffde9}], 0x1) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) ioprio_get$uid(0x2, r2) 2018/05/06 05:51:26 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0xa, 0x10006) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x80000000, 0x4) connect$inet6(r0, &(0x7f0000f6dfe4)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0xd}}}, 0x1c) 2018/05/06 05:51:27 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"6272696467653000000300", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:27 executing program 2: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x200000000000, 0x2, 0x0, 0x0, 0x1000, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@mcast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@dev}}, &(0x7f0000000140)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000500)={@local={0xfe, 0x80, [], 0xaa}, r3}, 0x14) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000540)={{0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}, {0x306, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0xa, {0x2, 0x4e21, @loopback=0x7f000001}, 'gre0\x00'}) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:27 executing program 3: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x200000000000, 0x2, 0x0, 0x0, 0x1000, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) socket$inet_udp(0x2, 0x2, 0x0) socket$packet(0x11, 0x3, 0x300) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@mcast2, @in=@multicast2}}, {{}, 0x0, @in=@dev}}, &(0x7f0000000140)=0xe8) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:27 executing program 4: r0 = timerfd_create(0x8, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x1000) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x4, 0x600000) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080), 0x2) r3 = accept4(r1, &(0x7f0000975000)=@can, &(0x7f0000000140)=0x80, 0x0) sendto$inet(r2, &(0x7f0000531fff), 0x0, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(r3, &(0x7f0000b76fc8)={&(0x7f0000715000)={0x10}, 0xc, &(0x7f000066f000)={&(0x7f0000896000)=ANY=[]}, 0x1}, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000100)) sendmmsg(r3, &(0x7f000000b880)=[{{0x0, 0x0, &(0x7f0000002140), 0x0, &(0x7f0000002180)}}], 0x1, 0x0) write(r2, &(0x7f0000f8aff1), 0xff8f) sendmmsg(r2, &(0x7f0000003280)=[{{&(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000840), 0x0, &(0x7f00000008c0)}}, {{&(0x7f0000002c40)=@ethernet={0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f0000002f80), 0x0, &(0x7f0000003000)}}], 0x2, 0x0) sendmsg$nl_crypto(r3, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=@del={0x100, 0x11, 0x100, 0x70bd28, 0x25dfdbfc, {{'authenc(sha256,ecb(arc4))\x00'}, [], [], 0x400, 0x400}, [{0x8, 0x1, 0x7}, {0x8, 0x1, 0xfff}, {0x8, 0x1, 0x9}, {0x8, 0x1, 0xc58}]}, 0x100}, 0x1}, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timerfd_settime(r0, 0x1, &(0x7f0000000180)={{}, {0x0, r4+10000000}}, &(0x7f00000001c0)) 2018/05/06 05:51:27 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) r2 = getpid() r3 = geteuid() getgroups(0x3, &(0x7f0000000280)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff]) r5 = getpgid(0x0) stat(&(0x7f0000000400)='./control/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) sendmmsg$unix(r1, &(0x7f0000000600)=[{&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000100)=[{&(0x7f00000001c0)="8c0a59de86ce03ffceeb823a14016543b8b4f004a4d67fb8edd6c2945cdea2f427385aed9f0b001f1c2726690ef0aa7fa837afd11389bbce6ce9c54e25f09553334c", 0x42}, {&(0x7f0000000300)="a7788496a4e8333d796ff9b054dd235af91bbe9c6bf67bb515f0c40d520661ebc0aa93b16661cf6b72d5cfa209d01ce650f8414b6b05593891be7f96d553484a1c6495484b669f56d587e66155e5a162868871a43068f8cfc83a4c3c4ef487e3f9e9bc04013632d42b7692bc45e97a3b28ab5a9b27f63ec2eee46f3160e66278668cb2a84550188de8cc67a7ec2e230d7431813f6a452336c8e810f93ef6dca8a819929463c059bec9162b087fce5a16410df71ae5bff24279ff2e045e4df2d45cd769914c00144d433b510c42", 0xcd}], 0x2, &(0x7f0000000540)=[@rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r2, r3, r4}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r5, r6, r7}], 0xb0, 0x4000000}], 0x1, 0x1) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r8 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r8, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, &(0x7f0000000640)={@loopback={0x0, 0x1}, 0x3, 0x0, 0x3, 0x4, 0x6, 0x7, 0x2798}, &(0x7f0000000680)=0x20) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:51:27 executing program 6: setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x7, &(0x7f0000000040), 0x4) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x20000, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) r1 = semget$private(0x0, 0x1, 0x14) semctl$GETPID(r1, 0x2, 0xb, &(0x7f0000000080)) 2018/05/06 05:51:27 executing program 7: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0xffffffffffffff00, 0x8, 'queue0\x00', 0x1ff}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x3, 0x800) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}}, [0x1, 0x7, 0x2, 0x6, 0x6, 0x5a1, 0x1, 0xffffffff00000001, 0x510, 0x5, 0x3, 0x5, 0x4, 0x817, 0x4a]}, &(0x7f00000002c0)=0x100) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000300)={r2, 0x3, 0x6, 0xfff}, &(0x7f0000000340)=0x10) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:51:27 executing program 1: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x200000000000, 0x2, 0x0, 0x0, 0x1000, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@mcast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@dev}}, &(0x7f0000000140)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000500)={@local={0xfe, 0x80, [], 0xaa}, r3}, 0x14) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000540)={{0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}, {0x306, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0xa, {0x2, 0x4e21, @loopback=0x7f000001}, 'gre0\x00'}) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet(r1, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:27 executing program 6: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req={0x7f}, 0x10) syz_mount_image$nfs4(&(0x7f0000000080)='nfs4\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x2, &(0x7f0000000180)=[{&(0x7f0000000100)="0dc9bb362415aeea7412", 0xa, 0x2}, {&(0x7f0000000140)="024665db8e577b3a7b2aeb61e97656bf78faef2a08d9cd01af4bc19e38", 0x1d, 0x3}], 0x20, &(0x7f00000001c0)='-\x00') bind$packet(r0, &(0x7f00004a9000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa], 0xffffffffffffffff}}, 0x0) close(r0) 2018/05/06 05:51:27 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"62726964676530000000000000000001", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:27 executing program 3: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x200000000000, 0x2, 0x0, 0x0, 0x1000, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) socket$inet_udp(0x2, 0x2, 0x0) socket$packet(0x11, 0x3, 0x300) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:27 executing program 2: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x200000000000, 0x2, 0x0, 0x0, 0x1000, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@mcast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@dev}}, &(0x7f0000000140)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000500)={@local={0xfe, 0x80, [], 0xaa}, r2}, 0x14) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000540)={{0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}, {0x306, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0xa, {0x2, 0x4e21, @loopback=0x7f000001}, 'gre0\x00'}) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff60061187a"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xb, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="00000000000000000000000000000000050000000000000000000000000000009500000000000000"], &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/05/06 05:51:27 executing program 3: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x200000000000, 0x2, 0x0, 0x0, 0x1000, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) socket$inet_udp(0x2, 0x2, 0x0) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:27 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) recvmmsg(r0, &(0x7f0000000780)=[{{&(0x7f0000000000)=@rc, 0x80, &(0x7f0000000300)=[{&(0x7f0000000080)=""/41, 0x29}, {&(0x7f0000001200)=""/4096, 0x1000}, {&(0x7f0000000180)=""/198, 0xc6}, {&(0x7f0000000280)=""/78, 0x4e}], 0x4, &(0x7f0000000340)=""/89, 0x59, 0x8}, 0x4}, {{&(0x7f00000003c0)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)=""/122, 0x7a}, {&(0x7f00000004c0)=""/167, 0xa7}, {&(0x7f0000000580)=""/210, 0xd2}], 0x3, &(0x7f00000006c0)=""/149, 0x95}, 0xdf0}], 0x2, 0x1, &(0x7f0000000900)={0x0, 0x1c9c380}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00003d1ffc)='bbr\x00', 0x4) bind$unix(r1, &(0x7f0000000940)=@file={0x1, './file0\x00'}, 0x6e) sendto$inet(r0, &(0x7f0000001100)="1ead7755d47bd6975c78c3765d65736f918745774ce7ce945bfa9268d5eb6deb1fca6318a507beaec853f16e463ba20747330037ef4c09961231f637024afbc06f850dbcffe9890bb1fc7c89ca10a6af35038920fe8dae329e4cc489ed5abce0ab9fbf8ba64aa7f0eb726434dd18b3976d1dfd61b6ba66558ce0d57fd8acc7e36a629d2a865a3853ad85d8d65176c69f350cf73bea4e9d0d9c7eae26956690dea2c9d0a0e94f57c01f7c643ca78f819a28ae070aa400039889f3e25fec01ed47a5a5539494a1967a80", 0xc9, 0x0, &(0x7f00000000c0)={0x2}, 0x10) recvmmsg(r0, &(0x7f0000003dc0)=[{{&(0x7f0000000100)=@in={0x0, 0x0, @rand_addr}, 0x80, &(0x7f0000000680), 0x74, &(0x7f0000000800)=""/197, 0xc5, 0x6}}], 0x435, 0x100, &(0x7f0000003f40)={0x0, 0x989680}) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f00000009c0)=0x7f, 0x4) shutdown(r0, 0x1) 2018/05/06 05:51:27 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"62726964676530000300", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 169.493619] dccp_close: ABORT with 65423 bytes unread 2018/05/06 05:51:27 executing program 6: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) sendmsg$unix(r0, &(0x7f0000000440)={&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000400)=[{&(0x7f0000000100)="17635ab7a6ae7326e951abd23b926d27a9ec8817ab2c96e5f8ec02a9ba5e5b1e88e18adc14d12273f0bbb0830c86cbca32eb3c7616eb494d5199a22c14c9c76b2f7f2408ffb7a79f7982862a3081c0891c8e4d2bc27bf326d3d0d0f094b79d6036d12df20f2f097bcb92e36d82f3242e54b0fdbe6f49366cbb2d549fdbc2131ce810ff58ffdb996efb38c5fefa5ac2141378136cb6366a8902b4b2d962b7c23670c4bfd8f6a8fe64e601e5bae727dc64a1455b490c9759f637919010", 0xbc}, {&(0x7f00000001c0)="17b740a0e55f097ae261be3a134b86173d365ba51fb7be7e1f4bbe699d36f949a21935c66f101cc5d6a3e7917cd056b21b92b334f3de53", 0x37}, {&(0x7f0000000200)="5b69c57e4aed33b3fea55b847973e6d36a71e1e6e1bc3fff7db4a6cf7512503334bee0d2121321116954a2d26ba70d696b7ea1a8e2393657f03f204dc2e48a76578a6d0757ce3c2a4b5f0b85125c772792c5d76f9bd44d9ee0b33ffec5d5397c02df74126c60395ea563c1bef36638e3639b5872e88ab9c42219338d02a89a08bc7f6fa63e2775a4366e353ae3a96d5f152fca29fee372eec15d2a49fc631005c734204e8e324844238538093f30e1372e3a67eee75d135d1ac4dd27c0dd8106df1397692a5967f42d36992bd50d964f0800445b4c479c4dc6a1b5b32e20fa9c8b7ec1807927156fb8", 0xe9}, {&(0x7f0000000300)="cf0a18a8f5760b36638c600223701ae41130af559f46a061691b0b7b64d0a5663abb7bfd0b13a43ad5a696ce39ee0556ba9c7c3996ebc8178f48bb4cb9ac79fd028bd981f959e116c30bfacc08e431ce1f639f4b458c1f348cd5d55908abc4d3afd422132a4438209700d13ab8a076da1c60f50ae885f39a260b96480ab6430ef6a473495f65548b474dffcd600891ebd96a20fd1ddc4f9d022d46e6d84d04a30fa1d3ca0ef97730f3b2c4f33fd621abab51cef3bbb1afd1f73dc7aade1d41823249b40aaf7f4abb4b7e0ff3d260b1d264ccba23080bfe", 0xd7}], 0x4, 0x0, 0x0, 0x20000000}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'tunl0\x00', &(0x7f0000000000)=@ethtool_eee={0x0, 0x4, 0x0, 0x6, 0xfffffffffffffbc5, 0x3, 0x5e0, 0x4, [0x7, 0x7]}}) 2018/05/06 05:51:28 executing program 1: r0 = socket$kcm(0xa, 0x3, 0x11) sync_file_range(r0, 0x4, 0x10001, 0x4) sendmsg$kcm(r0, &(0x7f0000001300)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000001280), 0x0, &(0x7f0000002b00)=ANY=[@ANYBLOB="14001a0000f81629000000080000000200aaf9"], 0x14}, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x1, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000100)={0x6, r1}) ioctl$KVM_SET_CLOCK(r1, 0x4030ae7b, &(0x7f00000000c0)={0x100000000, 0x1ff}) 2018/05/06 05:51:28 executing program 2: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x200000000000, 0x2, 0x0, 0x0, 0x1000, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) socket$inet_udp(0x2, 0x2, 0x0) socket$packet(0x11, 0x3, 0x300) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@mcast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@dev}}, &(0x7f0000000140)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000500)={@local={0xfe, 0x80, [], 0xaa}, r1}, 0x14) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000540)={{0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}, {0x306, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0xa, {0x2, 0x4e21, @loopback=0x7f000001}, 'gre0\x00'}) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:28 executing program 3: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x200000000000, 0x2, 0x0, 0x0, 0x1000, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:28 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00@', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:28 executing program 4: io_setup(0xdc, &(0x7f0000000080)=0x0) r1 = socket(0x2, 0x803, 0x1) connect$inet(r1, &(0x7f0000000100)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) io_submit(r0, 0x1, &(0x7f0000000040)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f00000000c0)}]) 2018/05/06 05:51:28 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820faeb995298992ea54c7be", 0x10) r1 = accept$alg(r0, 0x0, 0x0) bind$llc(r1, &(0x7f0000000280)={0x1a, 0x321, 0x4, 0x5, 0x7, 0x7}, 0x10) socket$nl_route(0x10, 0x3, 0x0) sendmsg$can_raw(r1, &(0x7f0000477000)={&(0x7f0000000080)={0x1d}, 0x10, &(0x7f0000000240)={&(0x7f00000001c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "b5a419fb5df128c83ad9430362a22a5abf1e4123efccc641602c2da3630b58d04766c58b254ff2a965ccb226c8c7355c33306c99adaa0aa59006f8dc9b01b737"}, 0xff89}, 0x1}, 0x0) recvmmsg(r1, &(0x7f0000003340)=[{{&(0x7f00000000c0)=@sco, 0x8, &(0x7f0000000100), 0x0, &(0x7f0000000140)=""/94, 0x5e}}, {{&(0x7f0000002f40)=@pptp={0x0, 0x0, {0x0, @dev}}, 0x20, &(0x7f0000003200)=[{&(0x7f0000003100)=""/226, 0xffffff4a}], 0x1, &(0x7f0000000440)=""/239, 0xef}}], 0x2, 0x0, 0x0) 2018/05/06 05:51:28 executing program 7: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0xffffffffffffff00, 0x8, 'queue0\x00', 0x1ff}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x3, 0x800) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}}, [0x1, 0x7, 0x2, 0x6, 0x6, 0x5a1, 0x1, 0xffffffff00000001, 0x510, 0x5, 0x3, 0x5, 0x4, 0x817, 0x4a]}, &(0x7f00000002c0)=0x100) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000300)={r2, 0x3, 0x6, 0xfff}, &(0x7f0000000340)=0x10) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:51:28 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) r2 = getpid() r3 = geteuid() getgroups(0x3, &(0x7f0000000280)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff]) r5 = getpgid(0x0) stat(&(0x7f0000000400)='./control/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) sendmmsg$unix(r1, &(0x7f0000000600)=[{&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000100)=[{&(0x7f00000001c0)="8c0a59de86ce03ffceeb823a14016543b8b4f004a4d67fb8edd6c2945cdea2f427385aed9f0b001f1c2726690ef0aa7fa837afd11389bbce6ce9c54e25f09553334c", 0x42}, {&(0x7f0000000300)="a7788496a4e8333d796ff9b054dd235af91bbe9c6bf67bb515f0c40d520661ebc0aa93b16661cf6b72d5cfa209d01ce650f8414b6b05593891be7f96d553484a1c6495484b669f56d587e66155e5a162868871a43068f8cfc83a4c3c4ef487e3f9e9bc04013632d42b7692bc45e97a3b28ab5a9b27f63ec2eee46f3160e66278668cb2a84550188de8cc67a7ec2e230d7431813f6a452336c8e810f93ef6dca8a819929463c059bec9162b087fce5a16410df71ae5bff24279ff2e045e4df2d45cd769914c00144d433b510c42", 0xcd}], 0x2, &(0x7f0000000540)=[@rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r2, r3, r4}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r5, r6, r7}], 0xb0, 0x4000000}], 0x1, 0x1) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r8 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r8, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, &(0x7f0000000640)={@loopback={0x0, 0x1}, 0x3, 0x0, 0x3, 0x4, 0x6, 0x7, 0x2798}, &(0x7f0000000680)=0x20) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:51:28 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"6272696467653000000000000000000f", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:28 executing program 6: syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x249, &(0x7f0000000500), 0x0, &(0x7f0000000100)={[{@nodecompose='nodecompose', 0x2c}]}) io_setup(0x6, &(0x7f0000000000)=0x0) io_destroy(r0) 2018/05/06 05:51:28 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x200400, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000001740), &(0x7f0000001780)=0x4) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_ifreq(r2, 0x89f2, &(0x7f0000000040)={'ip6tnl0\x00', @ifru_data=&(0x7f0000000180)="d61a072afa6a2e6e9105a65cf0b08be4d57565e1a85eff283ee23d954743a2e3"}) 2018/05/06 05:51:28 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000180)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f00000000c0)="d79eb5bc6cc27f4edc38f7fef61110315b064a7595c247162a3f000000000000000000006c905b2f20ce05e97ca3a5610bfae12586deab9e5636"}, 0xfffffffffffffd65) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0}, 0x10) 2018/05/06 05:51:28 executing program 3: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:28 executing program 2: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x200000000000, 0x2, 0x0, 0x0, 0x1000, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) socket$inet_udp(0x2, 0x2, 0x0) socket$packet(0x11, 0x3, 0x300) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@mcast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@dev}}, &(0x7f0000000140)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000500)={@local={0xfe, 0x80, [], 0xaa}, r1}, 0x14) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:28 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"62726964676530000000000400", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 170.376865] hfsplus: unable to find HFS+ superblock [ 170.428357] hfsplus: unable to find HFS+ superblock 2018/05/06 05:51:29 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) sysfs$3(0x3) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) perf_event_open(&(0x7f00000017c0)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000004c0)=@broute={'broute\x00', 0x20, 0x4, 0x610, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000cc0], 0x0, &(0x7f0000000240), &(0x7f0000000cc0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff02000000050000000000000000006c6f00000000000000000000000000006263736630000000000000000000000069726c616e300000000000000000000069705f76746930000000000000000000000000000000000000000000aaaaaaaaaa0000000000000000002001000020010000580100007374617469737469630000000000000000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000073747000000000000000000000000000000000000000000000000000000000004800000000000000000000000000000000000180c20000000000000000000000000000000000000000000000aaaaaaaaaaaa0000000000000000000000000000000000000000000000000000800600006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000ffffffff00000000050000000000000000006966623000000000000000000000000065727370616e3000000000000000000069666230000000000000000000000000726f7365300000000000000000000000aaaaaaaaaa00000000000000ffffffffffff000000000000000070000000d0000000200100004e4651554555450000000000000000000000000000000000000000000000000008000000000000000000000000000000434f4e4e5345434d41524b0000000000000000000000000000000000000000003800000000000000000000000000000049444c4554494d4552000000000000000000000000000000000000000000000028000000000000000000000073797a31000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff01000000110000000000000000006970366772657461703000000000000073797a5f74756e000000000000000000626f6e6430000000000000000000000073797a5f74756e0000000000000000000180c2000000000000000000aaaaaaaaaabb0000000000000000a00000003801000088010000706b747479706500000000000000000000000000000000000000000000000000080000000000000000000000000000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a30000000000000000000000000000000000000000000000000000000004c45440000000000000000000000000000000000000000000000000000000000280000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000049444c4554494d4552000000000000000000000000000000000000000000000028000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000000ffffffff010000000500000000000000000073797a6b616c6c65723000000000000074756e6c3000000000000000000000007369743000000000000000000000000069666230000000000000000000000000000000000000000000ffffffffffff0000000000000000300100003001000080010000697036000000000000000000000000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000ffffac1414aa0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c696d6974000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000004c45440000000000000000000000000000000000000000000000000000000000280000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000"]}, 0x685) 2018/05/06 05:51:29 executing program 7: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0xffffffffffffff00, 0x8, 'queue0\x00', 0x1ff}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x3, 0x800) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}}, [0x1, 0x7, 0x2, 0x6, 0x6, 0x5a1, 0x1, 0xffffffff00000001, 0x510, 0x5, 0x3, 0x5, 0x4, 0x817, 0x4a]}, &(0x7f00000002c0)=0x100) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000300)={r2, 0x3, 0x6, 0xfff}, &(0x7f0000000340)=0x10) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:51:29 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = epoll_create1(0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x80, 0x80000) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000180)={0x0, 0x1, 0x8}, &(0x7f00000001c0)=0x354) setsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000200)=@assoc_value={r3, 0x3f}, 0x8) getrusage(0x1, &(0x7f0000000340)) creat(&(0x7f00000000c0)='./file0/file0\x00', 0x100) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000240)={r3, 0xfffffffffffffffc, 0x10}, &(0x7f0000000280)=0xc) getsockopt$IP_VS_SO_GET_INFO(r2, 0x0, 0x481, &(0x7f0000000100), &(0x7f0000000140)=0xc) r4 = creat(&(0x7f0000000080)='./file0\x00', 0x3) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000040)=[{0xb, 0x9}, {0x7}, {0x0, 0xfffffffffffffffe}, {0x3, 0x2}, {0x8, 0x4}, {0x75dd94898e138796, 0xa2}], 0x6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000300)) 2018/05/06 05:51:29 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"62726964676530000200", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:29 executing program 6: r0 = socket$inet6(0xa, 0x2000000000001, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000040)=@srh={0x0, 0x0, 0x4}, 0x8) socket$inet6(0xa, 0x802, 0xebf) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f0000000080), 0x0) 2018/05/06 05:51:29 executing program 2: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x200000000000, 0x2, 0x0, 0x0, 0x1000, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) socket$inet_udp(0x2, 0x2, 0x0) socket$packet(0x11, 0x3, 0x300) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@mcast2, @in=@multicast2}}, {{}, 0x0, @in=@dev}}, &(0x7f0000000140)=0xe8) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:29 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) r2 = getpid() r3 = geteuid() getgroups(0x3, &(0x7f0000000280)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff]) r5 = getpgid(0x0) stat(&(0x7f0000000400)='./control/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) sendmmsg$unix(r1, &(0x7f0000000600)=[{&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000100)=[{&(0x7f00000001c0)="8c0a59de86ce03ffceeb823a14016543b8b4f004a4d67fb8edd6c2945cdea2f427385aed9f0b001f1c2726690ef0aa7fa837afd11389bbce6ce9c54e25f09553334c", 0x42}, {&(0x7f0000000300)="a7788496a4e8333d796ff9b054dd235af91bbe9c6bf67bb515f0c40d520661ebc0aa93b16661cf6b72d5cfa209d01ce650f8414b6b05593891be7f96d553484a1c6495484b669f56d587e66155e5a162868871a43068f8cfc83a4c3c4ef487e3f9e9bc04013632d42b7692bc45e97a3b28ab5a9b27f63ec2eee46f3160e66278668cb2a84550188de8cc67a7ec2e230d7431813f6a452336c8e810f93ef6dca8a819929463c059bec9162b087fce5a16410df71ae5bff24279ff2e045e4df2d45cd769914c00144d433b510c42", 0xcd}], 0x2, &(0x7f0000000540)=[@rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r2, r3, r4}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r5, r6, r7}], 0xb0, 0x4000000}], 0x1, 0x1) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r8 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r8, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, &(0x7f0000000640)={@loopback={0x0, 0x1}, 0x3, 0x0, 0x3, 0x4, 0x6, 0x7, 0x2798}, &(0x7f0000000680)=0x20) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:51:29 executing program 3: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:29 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"627269646765300000000000ffffffc3", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:29 executing program 6: r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0xc) setreuid(0x0, r1) r2 = inotify_init1(0x80800) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x22) ioctl$KVM_ASSIGN_SET_INTX_MASK(r3, 0x4040aea4, &(0x7f0000000040)={0x7, 0x4, 0xc3e, 0x6, 0x5}) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000300)={0x0, 0x0}) connect$rds(r3, &(0x7f0000000080)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x15}}, 0x10) tkill(r4, 0x0) [ 171.120721] kernel msg: ebtables bug: please report to author: Wrong len argument [ 171.151323] kernel msg: ebtables bug: please report to author: Wrong len argument 2018/05/06 05:51:29 executing program 2: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x200000000000, 0x2, 0x0, 0x0, 0x1000, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) socket$inet_udp(0x2, 0x2, 0x0) socket$packet(0x11, 0x3, 0x300) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:29 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f000048b000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) getpeername$netlink(r0, &(0x7f0000000000), &(0x7f0000000040)=0xc) mmap$binder(&(0x7f0000fbd000/0x1000)=nil, 0x1000, 0x0, 0x2011, r0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000140)={r0, r0, 0xe0}) 2018/05/06 05:51:29 executing program 3: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:29 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"6272696467653000000f00", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:29 executing program 1: r0 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) r1 = socket$nl_crypto(0x10, 0x3, 0x15) r2 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x6000) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000000100)=""/180, &(0x7f0000000040)=0xb4) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'ipddp0\x00'}) socket$inet_icmp_raw(0x2, 0x3, 0x1) 2018/05/06 05:51:29 executing program 6: r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000001fc0)="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", 0x146, r0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/cuse\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000340)={0x0, @in={{0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}}, [0x2, 0x401, 0x0, 0x100000000, 0x2, 0xf86, 0x400, 0x5, 0xd4, 0x4, 0x401, 0x8, 0x0, 0x1, 0xffff]}, &(0x7f0000000040)=0x100) syz_open_dev$sndpcmp(&(0x7f00000023c0)='/dev/snd/pcmC#D#p\x00', 0xfffffffffffffffd, 0x101000) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000440)={r3, @in={{0x2, 0x4e23}}, 0x2, 0x4}, 0x90) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000600)=ANY=[@ANYRES32=r3, @ANYBLOB="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"], &(0x7f0000000800)=0x100) ioctl$KVM_DEASSIGN_DEV_IRQ(r2, 0x4040ae75, &(0x7f0000002140)={0xfffffffffffffff7, 0x0, 0x75, 0x204}) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000080)={0x0, 0x3}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000240)={r4, 0x2c, &(0x7f0000000140)=[@in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e20, 0xfffffffffffffffa, @loopback={0x0, 0x1}, 0x9}]}, &(0x7f0000000280)=0x10) setrlimit(0xf, &(0x7f0000000100)={0x50000, 0x8}) keyctl$unlink(0x9, r1, r0) socket$l2tp(0x18, 0x1, 0x1) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x3, 0x0) r5 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r5, 0x84, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r6 = syz_open_dev$sg(&(0x7f000051b000)='/dev/sg#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000480)) clock_gettime(0x0, &(0x7f00000004c0)) clock_gettime(0x0, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) timerfd_settime(r6, 0x1, &(0x7f0000000500)={{0x77359400}, {r7, r8+10000000}}, &(0x7f0000000580)) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0xc0481273, &(0x7f000084cf90)={[{}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x2, 0x8, 0x0, 0x5}, {0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}]}) r9 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r9, 0x84, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) connect$bt_l2cap(r9, &(0x7f00000002c0)={0x1f, 0x38000, {0x5, 0x401, 0xfff, 0xbb, 0x4, 0x2e4dc424}, 0x8000, 0x100}, 0xe) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r6, 0x84, 0x65, &(0x7f0000000300)=[@in={0x2, 0x4e20, @multicast2=0xe0000002}, @in={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e20, @rand_addr=0x80}, @in6={0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x19}, 0x5}, @in6={0xa, 0x4e24, 0x4, @mcast1={0xff, 0x1, [], 0x1}}, @in6={0xa, 0x4e24, 0xfffffffffffffe01, @mcast2={0xff, 0x2, [], 0x1}, 0x1}], 0x481) accept4$vsock_stream(r6, &(0x7f0000000000)={0x28, 0x0, 0x2710, @reserved=0x1}, 0x10, 0x0) timer_create(0x7, &(0x7f00000003c0)={0x0, 0x2d}, &(0x7f0000000400)) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/05/06 05:51:29 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000fafff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000040)=ANY=[@ANYBLOB="0100000000000000030100c000000000000000000000000032f82e13e698f25fbac7fa33ed20ea1aee7aac174228"]) 2018/05/06 05:51:30 executing program 3: write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x200000000000, 0x2, 0x0, 0x0, 0x1000, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:30 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000c6eff6)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x2004c2, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f0000000040)={0x303, 0x33}, 0x4) write(r0, &(0x7f0000000100)='\x00', 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xffffffffffffff13}) read(r1, &(0x7f0000000380)=""/181, 0xb5) 2018/05/06 05:51:30 executing program 6: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x46b, 0x0) connect$netrom(r0, &(0x7f0000000040)=@full={{0x3, {"174e7d56cbcf64"}, 0x800}, [{"81ea051f6c3c75"}, {"ca2be44b9be69a"}, {"da87477496eef8"}, {"2c2aebac4e64ca"}, {"6b474a3fee918e"}, {"4a36185a8f3676"}, {"d8b19673a66432"}, {"0e6c7d0590440b"}]}, 0x48) r1 = socket$inet6(0xa, 0x20008000000001, 0x8010000000000084) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000000c0)={0x0, 0xfffffffffffffff8, 0x8}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={r2, 0x4}, 0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r2, 0x100000001}, 0x8) getsockopt(r1, 0x84, 0x8000000006d, &(0x7f0000feeff8)=""/8, &(0x7f00003e4ffc)=0x291) 2018/05/06 05:51:30 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) r2 = getpid() r3 = geteuid() getgroups(0x3, &(0x7f0000000280)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff]) r5 = getpgid(0x0) stat(&(0x7f0000000400)='./control/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) sendmmsg$unix(r1, &(0x7f0000000600)=[{&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000100)=[{&(0x7f00000001c0)="8c0a59de86ce03ffceeb823a14016543b8b4f004a4d67fb8edd6c2945cdea2f427385aed9f0b001f1c2726690ef0aa7fa837afd11389bbce6ce9c54e25f09553334c", 0x42}, {&(0x7f0000000300)="a7788496a4e8333d796ff9b054dd235af91bbe9c6bf67bb515f0c40d520661ebc0aa93b16661cf6b72d5cfa209d01ce650f8414b6b05593891be7f96d553484a1c6495484b669f56d587e66155e5a162868871a43068f8cfc83a4c3c4ef487e3f9e9bc04013632d42b7692bc45e97a3b28ab5a9b27f63ec2eee46f3160e66278668cb2a84550188de8cc67a7ec2e230d7431813f6a452336c8e810f93ef6dca8a819929463c059bec9162b087fce5a16410df71ae5bff24279ff2e045e4df2d45cd769914c00144d433b510c42", 0xcd}], 0x2, &(0x7f0000000540)=[@rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r2, r3, r4}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r5, r6, r7}], 0xb0, 0x4000000}], 0x1, 0x1) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r8 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r8, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:51:30 executing program 7: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0xffffffffffffff00, 0x8, 'queue0\x00', 0x1ff}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x3, 0x800) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}}, [0x1, 0x7, 0x2, 0x6, 0x6, 0x5a1, 0x1, 0xffffffff00000001, 0x510, 0x5, 0x3, 0x5, 0x4, 0x817, 0x4a]}, &(0x7f00000002c0)=0x100) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000300)={r2, 0x3, 0x6, 0xfff}, &(0x7f0000000340)=0x10) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:51:30 executing program 2: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x200000000000, 0x2, 0x0, 0x0, 0x1000, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) socket$inet_udp(0x2, 0x2, 0x0) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:30 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"62726964676530000000000000000004", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:30 executing program 1: r0 = socket(0x18, 0x0, 0x8000000000001) sendmmsg(0xffffffffffffffff, &(0x7f00009d7000)=[{{&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}, 0x80, &(0x7f0000293000)=[{&(0x7f0000002000)="4c5614c00401a0dbf8a669ebdedd102c4f7a79e606457dfdf09e2ec2ed253b", 0x1f}], 0x1, &(0x7f0000000080)}}], 0x1, 0x0) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000080)) connect(r0, &(0x7f0000002000)=@sco={0x1f, {0x1}}, 0x26) sendto(r0, &(0x7f000097f000), 0x360cc1, 0x0, &(0x7f0000bdb000)=@sco={0x1f}, 0x3) 2018/05/06 05:51:30 executing program 3: write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x200000000000, 0x2, 0x0, 0x0, 0x1000, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:30 executing program 4: r0 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r0, &(0x7f0000f50f90)=[{&(0x7f00001f2000)="aa", 0x1}], 0x1, 0x81003) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'vmac(aes)\x00'}, 0x58) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f0000000000)={0x1, 0xffff}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000f3eff0)="01010000000ef40000000300409d9254", 0x10) r2 = accept4(r1, 0x0, &(0x7f0000000140)=0x4e, 0x0) syz_mount_image$nfs4(&(0x7f0000000100)='nfs4\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x7, &(0x7f0000001480)=[{&(0x7f00000001c0)="fc417e6e4ee4fc120143257ab07b1fb911e8b6c1a1780bf1b6222b6b7ee508c99b12c75bfd12a5f44a4f623c34289a4dab487c0b6ae8b72d077b156b9261db82a21d49ad810cc81bce49778696f33c0461afe4f0e08a29281b607d4e342e142c35b948ca377df191b38d926475ac79c09e06c890d54cb8606fb4bdfd1d76b96c74e60f18c6b78a095ffee54d7d6932dbfb2a3908030a0dcd7ffcdd24e939eb8d541a2a47b24308c0ecdb24e2b08ac5e731d827f661b795354f249bfddefe2c7c165a08437ec495dabc46971eb3404f0ee6a8e890b24f8aa7411a5380a2ffe2d64b3bb07120e66f6f5583da5e2d6d0b657059bc438f094b3553", 0xf9, 0x5}, {&(0x7f00000002c0)="9b81bc36", 0x4, 0x100000001}, {&(0x7f0000000300)="4c300902c0cf780d6989c7d3e4d554800532de35e95d933c2232fab6dd98c54865a04f3e522d9702e6d495b9bd4aa89159ff2fd4228aa11d90db864c46a18533", 0x40, 0x3}, {&(0x7f0000000340)="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", 0x1000, 0x244}, {&(0x7f0000001340)="6e73a9a2b497820285b3ea416584672b77e560507763ba5b09bbe558985b103f50aa988cacf8684e9e4acc3a8143b8b3ec9ced98ed20218ea77ea51a0890a4d8a29568fde8afb4da7f99b60095a87e5cae161c7c720c9d39cb874fbe2722c5c62f833ae591f6466d2daccf2b8af9c85dbfc9ec400199c8d2d5f0dc00", 0x7c}, {&(0x7f00000013c0)="33cddea47b548ef3b003c2f0c0", 0xd, 0x40}, {&(0x7f0000001400)="5815fa1d5326313b461abb71db0ab3b8694391a183c63cb0ef934bf45067c8f4817337f8c36b0ef35657b65d954a36b4866a0b66f2156a621e33b502d892b4d50d1479c316", 0x45, 0x2}], 0x2000000, &(0x7f0000001540)='&&/keyringnodev\x00') sendfile(r2, r0, &(0x7f00000ddff8), 0x3) 2018/05/06 05:51:30 executing program 6: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x400, 0x14000) accept4$ax25(r0, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x8000000000000800) socket$netlink(0x10, 0x3, 0x10) 2018/05/06 05:51:30 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) socketpair(0xb, 0xb, 0x800000000020, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$VHOST_VSOCK_SET_GUEST_CID(r2, 0x4008af60, &(0x7f0000000240)={@hyper}) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0xf0ffff}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="14000000aafe7838444060164bd16690113626931ca9d6edf5332176bc882d44e8ddb731a06ec40ce2cb1b88d78b42c7d8a9b8d96f087bdfe194d5eb913fbcfbb7108671a450f4dcb353f1ef4605c0937ebc", @ANYRES16=r0, @ANYBLOB="0100000000000000000010000000"], 0x14}, 0x1}, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$SG_SET_COMMAND_Q(r3, 0x2271, &(0x7f00000000c0)=0x1) unlinkat(r2, &(0x7f0000000200)='./file0\x00', 0x200) getsockopt$netrom_NETROM_T4(r3, 0x103, 0x6, &(0x7f0000000300)=0xfff, &(0x7f0000000340)=0xff20) 2018/05/06 05:51:30 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00\x00@\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:30 executing program 2: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x200000000000, 0x2, 0x0, 0x0, 0x1000, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:30 executing program 3: write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x200000000000, 0x2, 0x0, 0x0, 0x1000, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:30 executing program 6: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) syz_mount_image$nfs(&(0x7f0000000000)='nfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x20, &(0x7f0000000680)='cgroup2\x00') perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) 2018/05/06 05:51:30 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"627269646765300000000000fffffdfd", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 172.303010] cgroup: cgroup2: unknown option "cgroup2" [ 172.379203] cgroup: cgroup2: unknown option "cgroup2" 2018/05/06 05:51:31 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x1, 0x4, 0x4, 0x1, 0x0, 0x1}, 0xfffffffffffffea2) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000080)}, 0x10) 2018/05/06 05:51:31 executing program 3: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x200000000000, 0x2, 0x0, 0x0, 0x1000, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:31 executing program 2: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:31 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r0, &(0x7f0000000000)={0x1f}, 0x8) mmap(&(0x7f0000000000/0xf50000)=nil, 0xf50000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000080), 0x3) 2018/05/06 05:51:31 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xf, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180205000000ffff0000000000100000850000002c0000000500000000000000950000030000000276f34ee55664e069f8ac24e345c73c1922e703deb0807b1b8a7be0eaf6a8f9ff4ed43b1cc21c3f01421b355f"], &(0x7f0000000280)='syzkaller\x00', 0x1, 0xce, &(0x7f0000000180)=""/206}, 0x48) socketpair(0x5, 0x0, 0x7, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000040)={0x40000000}) ioctl$sock_ipx_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000100)={'ip6_vti0\x00', {0x4, 0x20, 0x0, "38c1cedc1555", 0x6}}) ioctl$KVM_GET_NR_MMU_PAGES(r1, 0xae45, 0x3) 2018/05/06 05:51:31 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"627269646765300000000000fffffffe", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:31 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) r2 = getpid() r3 = geteuid() getgroups(0x3, &(0x7f0000000280)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff]) r5 = getpgid(0x0) stat(&(0x7f0000000400)='./control/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) sendmmsg$unix(r1, &(0x7f0000000600)=[{&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000100)=[{&(0x7f00000001c0)="8c0a59de86ce03ffceeb823a14016543b8b4f004a4d67fb8edd6c2945cdea2f427385aed9f0b001f1c2726690ef0aa7fa837afd11389bbce6ce9c54e25f09553334c", 0x42}, {&(0x7f0000000300)="a7788496a4e8333d796ff9b054dd235af91bbe9c6bf67bb515f0c40d520661ebc0aa93b16661cf6b72d5cfa209d01ce650f8414b6b05593891be7f96d553484a1c6495484b669f56d587e66155e5a162868871a43068f8cfc83a4c3c4ef487e3f9e9bc04013632d42b7692bc45e97a3b28ab5a9b27f63ec2eee46f3160e66278668cb2a84550188de8cc67a7ec2e230d7431813f6a452336c8e810f93ef6dca8a819929463c059bec9162b087fce5a16410df71ae5bff24279ff2e045e4df2d45cd769914c00144d433b510c42", 0xcd}], 0x2, &(0x7f0000000540)=[@rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r2, r3, r4}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r5, r6, r7}], 0xb0, 0x4000000}], 0x1, 0x1) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) creat(&(0x7f0000000240)='./control/file0\x00', 0x0) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:51:31 executing program 7: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0xffffffffffffff00, 0x8, 'queue0\x00', 0x1ff}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x3, 0x800) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}}, [0x1, 0x7, 0x2, 0x6, 0x6, 0x5a1, 0x1, 0xffffffff00000001, 0x510, 0x5, 0x3, 0x5, 0x4, 0x817, 0x4a]}, &(0x7f00000002c0)=0x100) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000300)={r2, 0x3, 0x6, 0xfff}, &(0x7f0000000340)=0x10) close(r0) 2018/05/06 05:51:31 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"62726964676530000000000100", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:31 executing program 4: mknod(&(0x7f0000000500)='./file0\x00', 0x83, 0x8) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000080)={0x0, 0x1}, 0x7) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000480), &(0x7f00006fcff0)) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000540)={0x0, 0x0}) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x8000, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f0000000280)={{0x4, 0x5}, 'port1\x00', 0x6f40b7c95600a1ec, 0x20400, 0xff0000, 0x0, 0x8, 0x9000000000, 0x401, 0x0, 0x2, 0xe4}) r3 = getpgrp(0x0) kcmp(r3, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x400000, 0x0) setsockopt$packet_int(r4, 0x107, 0x7, &(0x7f0000000740)=0x2, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000380)="d1d35c28c9a2940ff92d92cf5ba99dbd095c407a47aee16bd9fba4aa14c8b45950fc2ab852e6d0beb1087f244343358f379574c393d75b0d12d48fa3caa8455d0e9c92d2c81682adb435103b73129d829a840c501aa5c4284cdbc4d1729fb7666889febd3c69f3d47e8d03d1d931768918a07a614ccd6dd70e01808b3288dc1a2c203ab3252cda9e26aefcd1d5a0d633af9407d2d4bcf067a896cae139c19d2491f723dda8d03445824da761af13cad98310c06c3cfc1c03e84784a88cb75bd08c373e05cf1fd629c62714e5595e28323552b147f54a56c12801d1") ioctl$sock_ipx_SIOCIPXCFGDATA(0xffffffffffffffff, 0x89e2, &(0x7f00000005c0)) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000240)=[{0x4, 0x9}, {0xf, 0x9}], 0x2) r5 = socket$inet(0x2, 0xfffffffffffffffd, 0x0) connect(r5, &(0x7f0000000600)=@nfc_llcp={0x27, 0x1, 0x2, 0x5, 0x4, 0x80, "ab7d48bfd11a3e7a60aa13ac7038ef595132145fd73a3831bf9ebbf8ba02fddd251584133faf65deeb9e6b927bda4629855f75a594a70a003ee8e259f5ef07", 0x31}, 0x80) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000000c0)="a33af9140719e3bb3bfa5097cbfa66e055f5e5aff0eea326a7738177fd5ddac52529c334c8a4cc1e1d663365fd3f5d8b1c460b1a8064b854af4e59028c0c4e84f3c9", 0x42) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000140)={@multicast2=0xe0000002}, 0x8) r6 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x4000000000007, 0x181000) socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x89e1, &(0x7f0000000180)) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) getsockopt$sock_linger(r4, 0x1, 0xd, &(0x7f0000000300), &(0x7f0000000340)=0xffffffffffffff6d) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r7, 0x84, 0x6e, &(0x7f0000000080), 0xffffffffffffff51) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000780)={{{@in=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000200)={@empty, r8}, 0x14) bind(r6, &(0x7f0000000980)=@in6={0xa, 0x4e20, 0x447, @remote={0xfe, 0x80, [], 0xbb}, 0x1}, 0x34791ba1609d0bd5) r9 = shmget(0x0, 0x9000, 0x402, &(0x7f0000ff7000/0x9000)=nil) shmctl$SHM_STAT(r9, 0xd, &(0x7f0000000280)=""/86) 2018/05/06 05:51:31 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) r2 = getpid() r3 = geteuid() getgroups(0x3, &(0x7f0000000280)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff]) r5 = getpgid(0x0) stat(&(0x7f0000000400)='./control/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) sendmmsg$unix(r1, &(0x7f0000000600)=[{&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000100)=[{&(0x7f00000001c0)="8c0a59de86ce03ffceeb823a14016543b8b4f004a4d67fb8edd6c2945cdea2f427385aed9f0b001f1c2726690ef0aa7fa837afd11389bbce6ce9c54e25f09553334c", 0x42}, {&(0x7f0000000300)="a7788496a4e8333d796ff9b054dd235af91bbe9c6bf67bb515f0c40d520661ebc0aa93b16661cf6b72d5cfa209d01ce650f8414b6b05593891be7f96d553484a1c6495484b669f56d587e66155e5a162868871a43068f8cfc83a4c3c4ef487e3f9e9bc04013632d42b7692bc45e97a3b28ab5a9b27f63ec2eee46f3160e66278668cb2a84550188de8cc67a7ec2e230d7431813f6a452336c8e810f93ef6dca8a819929463c059bec9162b087fce5a16410df71ae5bff24279ff2e045e4df2d45cd769914c00144d433b510c42", 0xcd}], 0x2, &(0x7f0000000540)=[@rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r2, r3, r4}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r5, r6, r7}], 0xb0, 0x4000000}], 0x1, 0x1) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) creat(&(0x7f0000000240)='./control/file0\x00', 0x0) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:51:31 executing program 7: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0xffffffffffffff00, 0x8, 'queue0\x00', 0x1ff}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x3, 0x800) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}}, [0x1, 0x7, 0x2, 0x6, 0x6, 0x5a1, 0x1, 0xffffffff00000001, 0x510, 0x5, 0x3, 0x5, 0x4, 0x817, 0x4a]}, &(0x7f00000002c0)=0x100) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000300)={r2, 0x3, 0x6, 0xfff}, &(0x7f0000000340)=0x10) close(r0) 2018/05/06 05:51:31 executing program 1: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) r2 = getpid() r3 = geteuid() getgroups(0x3, &(0x7f0000000280)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff]) r5 = getpgid(0x0) stat(&(0x7f0000000400)='./control/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) sendmmsg$unix(r1, &(0x7f0000000600)=[{&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000100)=[{&(0x7f00000001c0)="8c0a59de86ce03ffceeb823a14016543b8b4f004a4d67fb8edd6c2945cdea2f427385aed9f0b001f1c2726690ef0aa7fa837afd11389bbce6ce9c54e25f09553334c", 0x42}, {&(0x7f0000000300)="a7788496a4e8333d796ff9b054dd235af91bbe9c6bf67bb515f0c40d520661ebc0aa93b16661cf6b72d5cfa209d01ce650f8414b6b05593891be7f96d553484a1c6495484b669f56d587e66155e5a162868871a43068f8cfc83a4c3c4ef487e3f9e9bc04013632d42b7692bc45e97a3b28ab5a9b27f63ec2eee46f3160e66278668cb2a84550188de8cc67a7ec2e230d7431813f6a452336c8e810f93ef6dca8a819929463c059bec9162b087fce5a16410df71ae5bff24279ff2e045e4df2d45cd769914c00144d433b510c42", 0xcd}], 0x2, &(0x7f0000000540)=[@rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r2, r3, r4}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r5, r6, r7}], 0xb0, 0x4000000}], 0x1, 0x1) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) creat(&(0x7f0000000240)='./control/file0\x00', 0x0) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:51:31 executing program 6: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e21}, 0x10) syz_emit_ethernet(0xffe4, &(0x7f00003f3fd5)={@random="17ca660a423b", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1=0xe0000001}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) syz_emit_ethernet(0xffffffffffffffac, &(0x7f0000000080)={@link_local={0x1, 0x80, 0xc2}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@ipx={0x8137, {0xffff, 0xfd, 0x64e, 0x4, {@random, @random="c998e9fc8c73", 0x1}, {@broadcast=0xffffffff, @random="018f2c92751a", 0x81}, "2654832ef1fc05ac5910c6402411e25ed824be7ac99d154664cd04ea9261673a494800b46fd53b5454b211b106bccada2202b24e69a4c3a816cdd4ba4a10ec9f01ce01548b28fdde1942c5a9d46efad7bb805ac35ad1bebb06eeb84ebafb27a280d27b14d6987e8bbae7770d2220406a054aea8ff287940649af8a1da233c6a1a924c5f4e36ea8abc348c0811537f21e635d66e7e481e0e31f5db06ec2a2b56911a661f931eb28de8e9b1dca0b9d69440e9351427b3b2ffcf6c32a29e53a886ea9728552da76cf38b92c1ae7525212ad2b9b07d52acbdc6b4bbcffb9f8480f"}}}}, &(0x7f0000000200)={0x0, 0x3, [0x860, 0x352, 0xb1, 0x8d9]}) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@random="17ca660a423b", @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty=0xe0000000, @multicast1=0xe0000001}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 2018/05/06 05:51:31 executing program 2: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:31 executing program 3: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x200000000000, 0x2, 0x0, 0x0, 0x1000, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:31 executing program 7: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0xffffffffffffff00, 0x8, 'queue0\x00', 0x1ff}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x3, 0x800) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}}, [0x1, 0x7, 0x2, 0x6, 0x6, 0x5a1, 0x1, 0xffffffff00000001, 0x510, 0x5, 0x3, 0x5, 0x4, 0x817, 0x4a]}, &(0x7f00000002c0)=0x100) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000300)={r2, 0x3, 0x6, 0xfff}, &(0x7f0000000340)=0x10) close(r0) 2018/05/06 05:51:31 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"62726964676530000000000200", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:31 executing program 6: r0 = syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000000)={0x200003}) 2018/05/06 05:51:31 executing program 4: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$KVM_CHECK_EXTENSION(r2, 0xae03, 0x6) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000080)={0x2, 0x0, [0x0, 0x0]}) 2018/05/06 05:51:31 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"6272696467653000ffffffc300", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:31 executing program 1: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) r2 = getpid() r3 = geteuid() getgroups(0x3, &(0x7f0000000280)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff]) r5 = getpgid(0x0) stat(&(0x7f0000000400)='./control/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) sendmmsg$unix(r1, &(0x7f0000000600)=[{&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000100)=[{&(0x7f00000001c0)="8c0a59de86ce03ffceeb823a14016543b8b4f004a4d67fb8edd6c2945cdea2f427385aed9f0b001f1c2726690ef0aa7fa837afd11389bbce6ce9c54e25f09553334c", 0x42}, {&(0x7f0000000300)="a7788496a4e8333d796ff9b054dd235af91bbe9c6bf67bb515f0c40d520661ebc0aa93b16661cf6b72d5cfa209d01ce650f8414b6b05593891be7f96d553484a1c6495484b669f56d587e66155e5a162868871a43068f8cfc83a4c3c4ef487e3f9e9bc04013632d42b7692bc45e97a3b28ab5a9b27f63ec2eee46f3160e66278668cb2a84550188de8cc67a7ec2e230d7431813f6a452336c8e810f93ef6dca8a819929463c059bec9162b087fce5a16410df71ae5bff24279ff2e045e4df2d45cd769914c00144d433b510c42", 0xcd}], 0x2, &(0x7f0000000540)=[@rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r2, r3, r4}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r5, r6, r7}], 0xb0, 0x4000000}], 0x1, 0x1) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) creat(&(0x7f0000000240)='./control/file0\x00', 0x0) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:51:31 executing program 7: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0xffffffffffffff00, 0x8, 'queue0\x00', 0x1ff}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x3, 0x800) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}}, [0x1, 0x7, 0x2, 0x6, 0x6, 0x5a1, 0x1, 0xffffffff00000001, 0x510, 0x5, 0x3, 0x5, 0x4, 0x817, 0x4a]}, &(0x7f00000002c0)=0x100) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:51:31 executing program 3: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x200000000000, 0x2, 0x0, 0x0, 0x1000, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:31 executing program 2: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:31 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000ef0fe4)={0x3, 0x1, 0x2, 0x200000000000000f, 0x0, 0xffffffffffffffff, 0x2}, 0x2c) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={r0, 0x1, 0x1, 0x2, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8}, 0x20) ioctl$TCFLSH(r1, 0x540b, 0x6) bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xd, 0x200, 0x4, 0x101000001, 0x0, r0}, 0x2c) 2018/05/06 05:51:31 executing program 6: syz_mount_image$minix(&(0x7f0000000340)='minix\x00', &(0x7f0000000540)='./file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000580), 0x0, 0x1a8}], 0x0, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xff, 0x400000) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x1}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000000c0)={0x9, 0x200, 0x2, 0x8001, 0x3, 0x7fff, 0x7, 0x2, r1}, 0x20) 2018/05/06 05:51:31 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) r2 = getpid() r3 = geteuid() getgroups(0x3, &(0x7f0000000280)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff]) r5 = getpgid(0x0) stat(&(0x7f0000000400)='./control/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) sendmmsg$unix(r1, &(0x7f0000000600)=[{&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000100)=[{&(0x7f00000001c0)="8c0a59de86ce03ffceeb823a14016543b8b4f004a4d67fb8edd6c2945cdea2f427385aed9f0b001f1c2726690ef0aa7fa837afd11389bbce6ce9c54e25f09553334c", 0x42}, {&(0x7f0000000300)="a7788496a4e8333d796ff9b054dd235af91bbe9c6bf67bb515f0c40d520661ebc0aa93b16661cf6b72d5cfa209d01ce650f8414b6b05593891be7f96d553484a1c6495484b669f56d587e66155e5a162868871a43068f8cfc83a4c3c4ef487e3f9e9bc04013632d42b7692bc45e97a3b28ab5a9b27f63ec2eee46f3160e66278668cb2a84550188de8cc67a7ec2e230d7431813f6a452336c8e810f93ef6dca8a819929463c059bec9162b087fce5a16410df71ae5bff24279ff2e045e4df2d45cd769914c00144d433b510c42", 0xcd}], 0x2, &(0x7f0000000540)=[@rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r2, r3, r4}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r5, r6, r7}], 0xb0, 0x4000000}], 0x1, 0x1) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) creat(&(0x7f0000000240)='./control/file0\x00', 0x0) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) [ 173.565533] MINIX-fs: unable to read superblock 2018/05/06 05:51:32 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"6272696467653000fdfdffff00", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:32 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) r2 = getpid() r3 = geteuid() getgroups(0x3, &(0x7f0000000280)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff]) r5 = getpgid(0x0) stat(&(0x7f0000000400)='./control/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) sendmmsg$unix(r1, &(0x7f0000000600)=[{&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000100)=[{&(0x7f00000001c0)="8c0a59de86ce03ffceeb823a14016543b8b4f004a4d67fb8edd6c2945cdea2f427385aed9f0b001f1c2726690ef0aa7fa837afd11389bbce6ce9c54e25f09553334c", 0x42}, {&(0x7f0000000300)="a7788496a4e8333d796ff9b054dd235af91bbe9c6bf67bb515f0c40d520661ebc0aa93b16661cf6b72d5cfa209d01ce650f8414b6b05593891be7f96d553484a1c6495484b669f56d587e66155e5a162868871a43068f8cfc83a4c3c4ef487e3f9e9bc04013632d42b7692bc45e97a3b28ab5a9b27f63ec2eee46f3160e66278668cb2a84550188de8cc67a7ec2e230d7431813f6a452336c8e810f93ef6dca8a819929463c059bec9162b087fce5a16410df71ae5bff24279ff2e045e4df2d45cd769914c00144d433b510c42", 0xcd}], 0x2, &(0x7f0000000540)=[@rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r2, r3, r4}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r5, r6, r7}], 0xb0, 0x4000000}], 0x1, 0x1) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) creat(&(0x7f0000000240)='./control/file0\x00', 0x0) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) [ 173.590996] MINIX-fs: unable to read superblock 2018/05/06 05:51:32 executing program 3: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x1000, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:32 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) r2 = getpid() r3 = geteuid() getgroups(0x3, &(0x7f0000000280)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff]) r5 = getpgid(0x0) stat(&(0x7f0000000400)='./control/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) sendmmsg$unix(r1, &(0x7f0000000600)=[{&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000100)=[{&(0x7f00000001c0)="8c0a59de86ce03ffceeb823a14016543b8b4f004a4d67fb8edd6c2945cdea2f427385aed9f0b001f1c2726690ef0aa7fa837afd11389bbce6ce9c54e25f09553334c", 0x42}, {&(0x7f0000000300)="a7788496a4e8333d796ff9b054dd235af91bbe9c6bf67bb515f0c40d520661ebc0aa93b16661cf6b72d5cfa209d01ce650f8414b6b05593891be7f96d553484a1c6495484b669f56d587e66155e5a162868871a43068f8cfc83a4c3c4ef487e3f9e9bc04013632d42b7692bc45e97a3b28ab5a9b27f63ec2eee46f3160e66278668cb2a84550188de8cc67a7ec2e230d7431813f6a452336c8e810f93ef6dca8a819929463c059bec9162b087fce5a16410df71ae5bff24279ff2e045e4df2d45cd769914c00144d433b510c42", 0xcd}], 0x2, &(0x7f0000000540)=[@rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r2, r3, r4}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r5, r6, r7}], 0xb0, 0x4000000}], 0x1, 0x1) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(0xffffffffffffffff, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:51:32 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"6272696467653000feffffff00", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:32 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)="6664696e666f007d214b39ec34fa6f1e9139db64c421979431572b412eeab600000000") getdents64(r0, &(0x7f0000000400)=""/234, 0xea) renameat(r0, &(0x7f0000003ffe)='./file0\x00', r0, &(0x7f0000003ff8)='./file0\x00') 2018/05/06 05:51:32 executing program 2: write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x200000000000, 0x2, 0x0, 0x0, 0x1000, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:32 executing program 3: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:32 executing program 4: syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac22, &(0x7f0000000080), 0x0, &(0x7f00000008c0)={'nouuid,', {[{@largeio='largeio', 0x2c}]}}) 2018/05/06 05:51:32 executing program 7: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0xffffffffffffff00, 0x8, 'queue0\x00', 0x1ff}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x3, 0x800) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:51:32 executing program 6: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0xffffffffffffff00, 0x8, 'queue0\x00', 0x1ff}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x3, 0x800) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}}, [0x1, 0x7, 0x2, 0x6, 0x6, 0x5a1, 0x1, 0xffffffff00000001, 0x510, 0x5, 0x3, 0x5, 0x4, 0x817, 0x4a]}, &(0x7f00000002c0)=0x100) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:51:32 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) r2 = getpid() r3 = geteuid() getgroups(0x3, &(0x7f0000000280)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff]) r5 = getpgid(0x0) stat(&(0x7f0000000400)='./control/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) sendmmsg$unix(r1, &(0x7f0000000600)=[{&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000100)=[{&(0x7f00000001c0)="8c0a59de86ce03ffceeb823a14016543b8b4f004a4d67fb8edd6c2945cdea2f427385aed9f0b001f1c2726690ef0aa7fa837afd11389bbce6ce9c54e25f09553334c", 0x42}, {&(0x7f0000000300)="a7788496a4e8333d796ff9b054dd235af91bbe9c6bf67bb515f0c40d520661ebc0aa93b16661cf6b72d5cfa209d01ce650f8414b6b05593891be7f96d553484a1c6495484b669f56d587e66155e5a162868871a43068f8cfc83a4c3c4ef487e3f9e9bc04013632d42b7692bc45e97a3b28ab5a9b27f63ec2eee46f3160e66278668cb2a84550188de8cc67a7ec2e230d7431813f6a452336c8e810f93ef6dca8a819929463c059bec9162b087fce5a16410df71ae5bff24279ff2e045e4df2d45cd769914c00144d433b510c42", 0xcd}], 0x2, &(0x7f0000000540)=[@rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r2, r3, r4}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r5, r6, r7}], 0xb0, 0x4000000}], 0x1, 0x1) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(0xffffffffffffffff, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:51:32 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"6272696467653000000200", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:32 executing program 1: r0 = socket(0xa, 0x2000000001, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, &(0x7f0000fedf98)={&(0x7f000000d000)=[0x7, 0x6], 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "8cfbc89fefc282b0e9ffd61e04cf4149e674b06ccbd9dee8c886586975b5446e"}}) accept$packet(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000040)=0x14) getsockopt(r0, 0x0, 0x53, &(0x7f000000d000)=""/8, &(0x7f0000000100)=0x8) 2018/05/06 05:51:32 executing program 2: write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x200000000000, 0x2, 0x0, 0x0, 0x1000, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:32 executing program 3: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:32 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) r2 = getpid() r3 = geteuid() getgroups(0x3, &(0x7f0000000280)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff]) r5 = getpgid(0x0) stat(&(0x7f0000000400)='./control/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) sendmmsg$unix(r1, &(0x7f0000000600)=[{&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000100)=[{&(0x7f00000001c0)="8c0a59de86ce03ffceeb823a14016543b8b4f004a4d67fb8edd6c2945cdea2f427385aed9f0b001f1c2726690ef0aa7fa837afd11389bbce6ce9c54e25f09553334c", 0x42}, {&(0x7f0000000300)="a7788496a4e8333d796ff9b054dd235af91bbe9c6bf67bb515f0c40d520661ebc0aa93b16661cf6b72d5cfa209d01ce650f8414b6b05593891be7f96d553484a1c6495484b669f56d587e66155e5a162868871a43068f8cfc83a4c3c4ef487e3f9e9bc04013632d42b7692bc45e97a3b28ab5a9b27f63ec2eee46f3160e66278668cb2a84550188de8cc67a7ec2e230d7431813f6a452336c8e810f93ef6dca8a819929463c059bec9162b087fce5a16410df71ae5bff24279ff2e045e4df2d45cd769914c00144d433b510c42", 0xcd}], 0x2, &(0x7f0000000540)=[@rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r2, r3, r4}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r5, r6, r7}], 0xb0, 0x4000000}], 0x1, 0x1) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(0xffffffffffffffff, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) [ 174.454312] XFS (loop4): unknown mount option [l]. 2018/05/06 05:51:32 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"62726964676530000000000000ffffff", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:32 executing program 1: unshare(0x60000000) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000001780)='/dev/zero\x00', 0x404200, 0x0) lgetxattr(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)=@known='security.selinux\x00', &(0x7f0000001c00)=""/130, 0x82) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f00000017c0)=0x45) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001e80)="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") getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000001a40)=@assoc_value={0x0, 0x1000}, &(0x7f0000001d40)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000001d80)={r2, @in={{0x2, 0x4e20, @loopback=0x7f000001}}, 0x5, 0x7f, 0x9, 0x1, 0xffffffffffffffc1}, &(0x7f0000001e40)=0x98) sendfile(r1, r1, &(0x7f0000000040)=0x1a, 0x100000001) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000000)=0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001840)={{{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000001940)=0xe8) accept4$packet(r0, &(0x7f0000001980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000019c0)=0x14, 0x80000) sendmsg$nl_route(r1, &(0x7f0000001ac0)={&(0x7f0000001800)={0x10, 0x0, 0x0, 0x840}, 0xc, &(0x7f0000001a80)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="540000001c0000010000007aac0c93fc812b55b002f8c8f70293f83e843075", @ANYRES32=r4, @ANYBLOB="020004030800070001800000080005000400000008000a00bfe5000008000800", @ANYRES32=r5, @ANYBLOB="080005000000000008000100e000000108000100e0000002"], 0x54}, 0x1}, 0x40001) getsockopt$inet_tcp_int(r1, 0x6, 0x19, &(0x7f0000001b00), &(0x7f0000001b40)=0x4) process_vm_writev(r3, &(0x7f00000016c0)=[{&(0x7f0000000080)=""/20, 0x14}, {&(0x7f00000000c0)=""/92, 0x5c}, {&(0x7f0000000300)=""/218, 0xda}, {&(0x7f0000000400)=""/186, 0xba}, {&(0x7f00000004c0)=""/142, 0x8e}, {&(0x7f0000000140)=""/94, 0x5e}, {&(0x7f0000000580)=""/182, 0xb6}, {&(0x7f0000000640)=""/99, 0x63}, {&(0x7f00000006c0)=""/4096, 0x1000}], 0x9, &(0x7f0000001780), 0x0, 0x0) r6 = semget$private(0x0, 0x3, 0x104) semctl$SEM_INFO(r6, 0x0, 0x13, &(0x7f0000001a00)=""/64) [ 174.603742] XFS (loop4): unknown mount option [l]. [ 174.615984] IPVS: ftp: loaded support on port[0] = 21 2018/05/06 05:51:33 executing program 2: write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x200000000000, 0x2, 0x0, 0x0, 0x1000, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:33 executing program 3: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:33 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"6272696467653000000000000f00", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:33 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:33 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) r2 = getpid() r3 = geteuid() getgroups(0x3, &(0x7f0000000280)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff]) r5 = getpgid(0x0) stat(&(0x7f0000000400)='./control/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) sendmmsg$unix(r1, &(0x7f0000000600)=[{&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000100)=[{&(0x7f00000001c0)="8c0a59de86ce03ffceeb823a14016543b8b4f004a4d67fb8edd6c2945cdea2f427385aed9f0b001f1c2726690ef0aa7fa837afd11389bbce6ce9c54e25f09553334c", 0x42}, {&(0x7f0000000300)="a7788496a4e8333d796ff9b054dd235af91bbe9c6bf67bb515f0c40d520661ebc0aa93b16661cf6b72d5cfa209d01ce650f8414b6b05593891be7f96d553484a1c6495484b669f56d587e66155e5a162868871a43068f8cfc83a4c3c4ef487e3f9e9bc04013632d42b7692bc45e97a3b28ab5a9b27f63ec2eee46f3160e66278668cb2a84550188de8cc67a7ec2e230d7431813f6a452336c8e810f93ef6dca8a819929463c059bec9162b087fce5a16410df71ae5bff24279ff2e045e4df2d45cd769914c00144d433b510c42", 0xcd}], 0x2, &(0x7f0000000540)=[@rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r2, r3, r4}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r5, r6, r7}], 0xb0, 0x4000000}], 0x1, 0x1) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) r8 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r8, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:51:33 executing program 1: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) r2 = getpid() r3 = geteuid() getgroups(0x3, &(0x7f0000000280)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff]) r5 = getpgid(0x0) stat(&(0x7f0000000400)='./control/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) sendmmsg$unix(r1, &(0x7f0000000600)=[{&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000100)=[{&(0x7f00000001c0)="8c0a59de86ce03ffceeb823a14016543b8b4f004a4d67fb8edd6c2945cdea2f427385aed9f0b001f1c2726690ef0aa7fa837afd11389bbce6ce9c54e25f09553334c", 0x42}, {&(0x7f0000000300)="a7788496a4e8333d796ff9b054dd235af91bbe9c6bf67bb515f0c40d520661ebc0aa93b16661cf6b72d5cfa209d01ce650f8414b6b05593891be7f96d553484a1c6495484b669f56d587e66155e5a162868871a43068f8cfc83a4c3c4ef487e3f9e9bc04013632d42b7692bc45e97a3b28ab5a9b27f63ec2eee46f3160e66278668cb2a84550188de8cc67a7ec2e230d7431813f6a452336c8e810f93ef6dca8a819929463c059bec9162b087fce5a16410df71ae5bff24279ff2e045e4df2d45cd769914c00144d433b510c42", 0xcd}], 0x2, &(0x7f0000000540)=[@rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r2, r3, r4}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r5, r6, r7}], 0xb0, 0x4000000}], 0x1, 0x1) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(0xffffffffffffffff, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:51:33 executing program 7: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0xffffffffffffff00, 0x8, 'queue0\x00', 0x1ff}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:51:33 executing program 6: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'lo\x00', &(0x7f0000000040)=@ethtool_dump={0x3e}}) 2018/05/06 05:51:33 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"627269646765300000ffffffc300", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:33 executing program 2: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x200000000000, 0x2, 0x0, 0x0, 0x1000, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:33 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:33 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) r2 = getpid() r3 = geteuid() getgroups(0x3, &(0x7f0000000280)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff]) r5 = getpgid(0x0) stat(&(0x7f0000000400)='./control/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) sendmmsg$unix(r1, &(0x7f0000000600)=[{&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000100)=[{&(0x7f00000001c0)="8c0a59de86ce03ffceeb823a14016543b8b4f004a4d67fb8edd6c2945cdea2f427385aed9f0b001f1c2726690ef0aa7fa837afd11389bbce6ce9c54e25f09553334c", 0x42}, {&(0x7f0000000300)="a7788496a4e8333d796ff9b054dd235af91bbe9c6bf67bb515f0c40d520661ebc0aa93b16661cf6b72d5cfa209d01ce650f8414b6b05593891be7f96d553484a1c6495484b669f56d587e66155e5a162868871a43068f8cfc83a4c3c4ef487e3f9e9bc04013632d42b7692bc45e97a3b28ab5a9b27f63ec2eee46f3160e66278668cb2a84550188de8cc67a7ec2e230d7431813f6a452336c8e810f93ef6dca8a819929463c059bec9162b087fce5a16410df71ae5bff24279ff2e045e4df2d45cd769914c00144d433b510c42", 0xcd}], 0x2, &(0x7f0000000540)=[@rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r2, r3, r4}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r5, r6, r7}], 0xb0, 0x4000000}], 0x1, 0x1) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) r8 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r8, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:51:33 executing program 3: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:33 executing program 1: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) r2 = getpid() r3 = geteuid() getgroups(0x3, &(0x7f0000000280)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff]) r5 = getpgid(0x0) stat(&(0x7f0000000400)='./control/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) sendmmsg$unix(r1, &(0x7f0000000600)=[{&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000100)=[{&(0x7f00000001c0)="8c0a59de86ce03ffceeb823a14016543b8b4f004a4d67fb8edd6c2945cdea2f427385aed9f0b001f1c2726690ef0aa7fa837afd11389bbce6ce9c54e25f09553334c", 0x42}, {&(0x7f0000000300)="a7788496a4e8333d796ff9b054dd235af91bbe9c6bf67bb515f0c40d520661ebc0aa93b16661cf6b72d5cfa209d01ce650f8414b6b05593891be7f96d553484a1c6495484b669f56d587e66155e5a162868871a43068f8cfc83a4c3c4ef487e3f9e9bc04013632d42b7692bc45e97a3b28ab5a9b27f63ec2eee46f3160e66278668cb2a84550188de8cc67a7ec2e230d7431813f6a452336c8e810f93ef6dca8a819929463c059bec9162b087fce5a16410df71ae5bff24279ff2e045e4df2d45cd769914c00144d433b510c42", 0xcd}], 0x2, &(0x7f0000000540)=[@rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r2, r3, r4}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r5, r6, r7}], 0xb0, 0x4000000}], 0x1, 0x1) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(0xffffffffffffffff, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:51:33 executing program 6: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0xffffffffffffff00, 0x8, 'queue0\x00', 0x1ff}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x3, 0x800) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:51:33 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"6272696467653000000000000300", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:33 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:33 executing program 3: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:34 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) r2 = getpid() r3 = geteuid() getgroups(0x3, &(0x7f0000000280)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff]) r5 = getpgid(0x0) stat(&(0x7f0000000400)='./control/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) sendmmsg$unix(r1, &(0x7f0000000600)=[{&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000100)=[{&(0x7f00000001c0)="8c0a59de86ce03ffceeb823a14016543b8b4f004a4d67fb8edd6c2945cdea2f427385aed9f0b001f1c2726690ef0aa7fa837afd11389bbce6ce9c54e25f09553334c", 0x42}, {&(0x7f0000000300)="a7788496a4e8333d796ff9b054dd235af91bbe9c6bf67bb515f0c40d520661ebc0aa93b16661cf6b72d5cfa209d01ce650f8414b6b05593891be7f96d553484a1c6495484b669f56d587e66155e5a162868871a43068f8cfc83a4c3c4ef487e3f9e9bc04013632d42b7692bc45e97a3b28ab5a9b27f63ec2eee46f3160e66278668cb2a84550188de8cc67a7ec2e230d7431813f6a452336c8e810f93ef6dca8a819929463c059bec9162b087fce5a16410df71ae5bff24279ff2e045e4df2d45cd769914c00144d433b510c42", 0xcd}], 0x2, &(0x7f0000000540)=[@rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r2, r3, r4}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r5, r6, r7}], 0xb0, 0x4000000}], 0x1, 0x1) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) r8 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r8, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:51:34 executing program 2: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x200000000000, 0x2, 0x0, 0x0, 0x1000, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:34 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:34 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"6272696467653000000000000400", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:34 executing program 1: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) r2 = getpid() r3 = geteuid() getgroups(0x3, &(0x7f0000000280)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff]) r5 = getpgid(0x0) stat(&(0x7f0000000400)='./control/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) sendmmsg$unix(r1, &(0x7f0000000600)=[{&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000100)=[{&(0x7f00000001c0)="8c0a59de86ce03ffceeb823a14016543b8b4f004a4d67fb8edd6c2945cdea2f427385aed9f0b001f1c2726690ef0aa7fa837afd11389bbce6ce9c54e25f09553334c", 0x42}, {&(0x7f0000000300)="a7788496a4e8333d796ff9b054dd235af91bbe9c6bf67bb515f0c40d520661ebc0aa93b16661cf6b72d5cfa209d01ce650f8414b6b05593891be7f96d553484a1c6495484b669f56d587e66155e5a162868871a43068f8cfc83a4c3c4ef487e3f9e9bc04013632d42b7692bc45e97a3b28ab5a9b27f63ec2eee46f3160e66278668cb2a84550188de8cc67a7ec2e230d7431813f6a452336c8e810f93ef6dca8a819929463c059bec9162b087fce5a16410df71ae5bff24279ff2e045e4df2d45cd769914c00144d433b510c42", 0xcd}], 0x2, &(0x7f0000000540)=[@rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r2, r3, r4}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r5, r6, r7}], 0xb0, 0x4000000}], 0x1, 0x1) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(0xffffffffffffffff, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:51:34 executing program 6: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0xffffffffffffff00, 0x8, 'queue0\x00', 0x1ff}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x3, 0x800) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:51:34 executing program 3: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:34 executing program 7: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0xffffffffffffff00, 0x8, 'queue0\x00', 0x1ff}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:51:34 executing program 3: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:34 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00\x00\x00\x00\x00@\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:34 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) r2 = getpid() r3 = geteuid() getgroups(0x3, &(0x7f0000000280)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff]) r5 = getpgid(0x0) stat(&(0x7f0000000400)='./control/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) sendmmsg$unix(r1, &(0x7f0000000600)=[{&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000100)=[{&(0x7f00000001c0)="8c0a59de86ce03ffceeb823a14016543b8b4f004a4d67fb8edd6c2945cdea2f427385aed9f0b001f1c2726690ef0aa7fa837afd11389bbce6ce9c54e25f09553334c", 0x42}, {&(0x7f0000000300)="a7788496a4e8333d796ff9b054dd235af91bbe9c6bf67bb515f0c40d520661ebc0aa93b16661cf6b72d5cfa209d01ce650f8414b6b05593891be7f96d553484a1c6495484b669f56d587e66155e5a162868871a43068f8cfc83a4c3c4ef487e3f9e9bc04013632d42b7692bc45e97a3b28ab5a9b27f63ec2eee46f3160e66278668cb2a84550188de8cc67a7ec2e230d7431813f6a452336c8e810f93ef6dca8a819929463c059bec9162b087fce5a16410df71ae5bff24279ff2e045e4df2d45cd769914c00144d433b510c42", 0xcd}], 0x2, &(0x7f0000000540)=[@rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r2, r3, r4}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r5, r6, r7}], 0xb0, 0x4000000}], 0x1, 0x1) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r8 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r8, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:51:34 executing program 1: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) r2 = getpid() r3 = geteuid() getgroups(0x3, &(0x7f0000000280)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff]) r5 = getpgid(0x0) stat(&(0x7f0000000400)='./control/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) sendmmsg$unix(r1, &(0x7f0000000600)=[{&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000100)=[{&(0x7f00000001c0)="8c0a59de86ce03ffceeb823a14016543b8b4f004a4d67fb8edd6c2945cdea2f427385aed9f0b001f1c2726690ef0aa7fa837afd11389bbce6ce9c54e25f09553334c", 0x42}, {&(0x7f0000000300)="a7788496a4e8333d796ff9b054dd235af91bbe9c6bf67bb515f0c40d520661ebc0aa93b16661cf6b72d5cfa209d01ce650f8414b6b05593891be7f96d553484a1c6495484b669f56d587e66155e5a162868871a43068f8cfc83a4c3c4ef487e3f9e9bc04013632d42b7692bc45e97a3b28ab5a9b27f63ec2eee46f3160e66278668cb2a84550188de8cc67a7ec2e230d7431813f6a452336c8e810f93ef6dca8a819929463c059bec9162b087fce5a16410df71ae5bff24279ff2e045e4df2d45cd769914c00144d433b510c42", 0xcd}], 0x2, &(0x7f0000000540)=[@rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r2, r3, r4}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r5, r6, r7}], 0xb0, 0x4000000}], 0x1, 0x1) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(0xffffffffffffffff, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') 2018/05/06 05:51:34 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:34 executing program 2: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x200000000000, 0x2, 0x0, 0x0, 0x1000, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:35 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"627269646765300000feffffff00", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:35 executing program 3: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:35 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) r2 = getpid() r3 = geteuid() getgroups(0x3, &(0x7f0000000280)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff]) r5 = getpgid(0x0) stat(&(0x7f0000000400)='./control/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) sendmmsg$unix(r1, &(0x7f0000000600)=[{&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000100)=[{&(0x7f00000001c0)="8c0a59de86ce03ffceeb823a14016543b8b4f004a4d67fb8edd6c2945cdea2f427385aed9f0b001f1c2726690ef0aa7fa837afd11389bbce6ce9c54e25f09553334c", 0x42}, {&(0x7f0000000300)="a7788496a4e8333d796ff9b054dd235af91bbe9c6bf67bb515f0c40d520661ebc0aa93b16661cf6b72d5cfa209d01ce650f8414b6b05593891be7f96d553484a1c6495484b669f56d587e66155e5a162868871a43068f8cfc83a4c3c4ef487e3f9e9bc04013632d42b7692bc45e97a3b28ab5a9b27f63ec2eee46f3160e66278668cb2a84550188de8cc67a7ec2e230d7431813f6a452336c8e810f93ef6dca8a819929463c059bec9162b087fce5a16410df71ae5bff24279ff2e045e4df2d45cd769914c00144d433b510c42", 0xcd}], 0x2, &(0x7f0000000540)=[@rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r2, r3, r4}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r5, r6, r7}], 0xb0, 0x4000000}], 0x1, 0x1) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r8 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r8, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:51:35 executing program 1: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) r2 = getpid() r3 = geteuid() getgroups(0x3, &(0x7f0000000280)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff]) r5 = getpgid(0x0) stat(&(0x7f0000000400)='./control/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) sendmmsg$unix(r1, &(0x7f0000000600)=[{&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000100)=[{&(0x7f00000001c0)="8c0a59de86ce03ffceeb823a14016543b8b4f004a4d67fb8edd6c2945cdea2f427385aed9f0b001f1c2726690ef0aa7fa837afd11389bbce6ce9c54e25f09553334c", 0x42}, {&(0x7f0000000300)="a7788496a4e8333d796ff9b054dd235af91bbe9c6bf67bb515f0c40d520661ebc0aa93b16661cf6b72d5cfa209d01ce650f8414b6b05593891be7f96d553484a1c6495484b669f56d587e66155e5a162868871a43068f8cfc83a4c3c4ef487e3f9e9bc04013632d42b7692bc45e97a3b28ab5a9b27f63ec2eee46f3160e66278668cb2a84550188de8cc67a7ec2e230d7431813f6a452336c8e810f93ef6dca8a819929463c059bec9162b087fce5a16410df71ae5bff24279ff2e045e4df2d45cd769914c00144d433b510c42", 0xcd}], 0x2, &(0x7f0000000540)=[@rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r2, r3, r4}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r5, r6, r7}], 0xb0, 0x4000000}], 0x1, 0x1) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(0xffffffffffffffff, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:51:35 executing program 2: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x1000, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:35 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:35 executing program 7: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0xffffffffffffff00, 0x8, 'queue0\x00', 0x1ff}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:51:35 executing program 6: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0xffffffffffffff00, 0x8, 'queue0\x00', 0x1ff}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x3, 0x800) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:51:35 executing program 2: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:35 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:35 executing program 3: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:35 executing program 1: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) r2 = getpid() r3 = geteuid() getgroups(0x3, &(0x7f0000000280)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff]) r5 = getpgid(0x0) stat(&(0x7f0000000400)='./control/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) sendmmsg$unix(r1, &(0x7f0000000600)=[{&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000100)=[{&(0x7f00000001c0)="8c0a59de86ce03ffceeb823a14016543b8b4f004a4d67fb8edd6c2945cdea2f427385aed9f0b001f1c2726690ef0aa7fa837afd11389bbce6ce9c54e25f09553334c", 0x42}, {&(0x7f0000000300)="a7788496a4e8333d796ff9b054dd235af91bbe9c6bf67bb515f0c40d520661ebc0aa93b16661cf6b72d5cfa209d01ce650f8414b6b05593891be7f96d553484a1c6495484b669f56d587e66155e5a162868871a43068f8cfc83a4c3c4ef487e3f9e9bc04013632d42b7692bc45e97a3b28ab5a9b27f63ec2eee46f3160e66278668cb2a84550188de8cc67a7ec2e230d7431813f6a452336c8e810f93ef6dca8a819929463c059bec9162b087fce5a16410df71ae5bff24279ff2e045e4df2d45cd769914c00144d433b510c42", 0xcd}], 0x2, &(0x7f0000000540)=[@rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r2, r3, r4}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r5, r6, r7}], 0xb0, 0x4000000}], 0x1, 0x1) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(0xffffffffffffffff, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:51:35 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) r2 = getpid() r3 = geteuid() getgroups(0x3, &(0x7f0000000280)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff]) r5 = getpgid(0x0) stat(&(0x7f0000000400)='./control/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) sendmmsg$unix(r1, &(0x7f0000000600)=[{&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000100)=[{&(0x7f00000001c0)="8c0a59de86ce03ffceeb823a14016543b8b4f004a4d67fb8edd6c2945cdea2f427385aed9f0b001f1c2726690ef0aa7fa837afd11389bbce6ce9c54e25f09553334c", 0x42}, {&(0x7f0000000300)="a7788496a4e8333d796ff9b054dd235af91bbe9c6bf67bb515f0c40d520661ebc0aa93b16661cf6b72d5cfa209d01ce650f8414b6b05593891be7f96d553484a1c6495484b669f56d587e66155e5a162868871a43068f8cfc83a4c3c4ef487e3f9e9bc04013632d42b7692bc45e97a3b28ab5a9b27f63ec2eee46f3160e66278668cb2a84550188de8cc67a7ec2e230d7431813f6a452336c8e810f93ef6dca8a819929463c059bec9162b087fce5a16410df71ae5bff24279ff2e045e4df2d45cd769914c00144d433b510c42", 0xcd}], 0x2, &(0x7f0000000540)=[@rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r2, r3, r4}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r5, r6, r7}], 0xb0, 0x4000000}], 0x1, 0x1) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r8 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r8, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:51:35 executing program 4: write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:35 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"6272696467653000000000000100", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:35 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) getpid() geteuid() getgroups(0x3, &(0x7f0000000280)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff]) getpgid(0x0) stat(&(0x7f0000000400)='./control/file0\x00', &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:51:35 executing program 4: write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:35 executing program 3: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:35 executing program 2: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:36 executing program 3: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:36 executing program 4: write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:36 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"627269646765300000000f00", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:36 executing program 7: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0xffffffffffffff00, 0x8, 'queue0\x00', 0x1ff}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) 2018/05/06 05:51:36 executing program 2: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:36 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) getpid() geteuid() getgroups(0x3, &(0x7f0000000280)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff]) getpgid(0x0) stat(&(0x7f0000000400)='./control/file0\x00', &(0x7f0000000440)) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:51:36 executing program 6: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0xffffffffffffff00, 0x8, 'queue0\x00', 0x1ff}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x3, 0x800) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) 2018/05/06 05:51:36 executing program 1: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) r2 = getpid() r3 = geteuid() getgroups(0x3, &(0x7f0000000280)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff]) r5 = getpgid(0x0) stat(&(0x7f0000000400)='./control/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) sendmmsg$unix(r1, &(0x7f0000000600)=[{&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000100)=[{&(0x7f00000001c0)="8c0a59de86ce03ffceeb823a14016543b8b4f004a4d67fb8edd6c2945cdea2f427385aed9f0b001f1c2726690ef0aa7fa837afd11389bbce6ce9c54e25f09553334c", 0x42}, {&(0x7f0000000300)="a7788496a4e8333d796ff9b054dd235af91bbe9c6bf67bb515f0c40d520661ebc0aa93b16661cf6b72d5cfa209d01ce650f8414b6b05593891be7f96d553484a1c6495484b669f56d587e66155e5a162868871a43068f8cfc83a4c3c4ef487e3f9e9bc04013632d42b7692bc45e97a3b28ab5a9b27f63ec2eee46f3160e66278668cb2a84550188de8cc67a7ec2e230d7431813f6a452336c8e810f93ef6dca8a819929463c059bec9162b087fce5a16410df71ae5bff24279ff2e045e4df2d45cd769914c00144d433b510c42", 0xcd}], 0x2, &(0x7f0000000540)=[@rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r2, r3, r4}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r5, r6, r7}], 0xb0, 0x4000000}], 0x1, 0x1) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:51:36 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"627269646765300000fdfdffff00", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:36 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:36 executing program 1: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) r2 = getpid() r3 = geteuid() getgroups(0x3, &(0x7f0000000280)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff]) r5 = getpgid(0x0) stat(&(0x7f0000000400)='./control/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) sendmmsg$unix(r1, &(0x7f0000000600)=[{&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000100)=[{&(0x7f00000001c0)="8c0a59de86ce03ffceeb823a14016543b8b4f004a4d67fb8edd6c2945cdea2f427385aed9f0b001f1c2726690ef0aa7fa837afd11389bbce6ce9c54e25f09553334c", 0x42}, {&(0x7f0000000300)="a7788496a4e8333d796ff9b054dd235af91bbe9c6bf67bb515f0c40d520661ebc0aa93b16661cf6b72d5cfa209d01ce650f8414b6b05593891be7f96d553484a1c6495484b669f56d587e66155e5a162868871a43068f8cfc83a4c3c4ef487e3f9e9bc04013632d42b7692bc45e97a3b28ab5a9b27f63ec2eee46f3160e66278668cb2a84550188de8cc67a7ec2e230d7431813f6a452336c8e810f93ef6dca8a819929463c059bec9162b087fce5a16410df71ae5bff24279ff2e045e4df2d45cd769914c00144d433b510c42", 0xcd}], 0x2, &(0x7f0000000540)=[@rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r2, r3, r4}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r5, r6, r7}], 0xb0, 0x4000000}], 0x1, 0x1) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:51:36 executing program 3: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:36 executing program 2: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:37 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"6272696467653000000400", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:37 executing program 2: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:37 executing program 1: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) r2 = getpid() r3 = geteuid() getgroups(0x3, &(0x7f0000000280)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff]) r5 = getpgid(0x0) stat(&(0x7f0000000400)='./control/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) sendmmsg$unix(r1, &(0x7f0000000600)=[{&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000100)=[{&(0x7f00000001c0)="8c0a59de86ce03ffceeb823a14016543b8b4f004a4d67fb8edd6c2945cdea2f427385aed9f0b001f1c2726690ef0aa7fa837afd11389bbce6ce9c54e25f09553334c", 0x42}, {&(0x7f0000000300)="a7788496a4e8333d796ff9b054dd235af91bbe9c6bf67bb515f0c40d520661ebc0aa93b16661cf6b72d5cfa209d01ce650f8414b6b05593891be7f96d553484a1c6495484b669f56d587e66155e5a162868871a43068f8cfc83a4c3c4ef487e3f9e9bc04013632d42b7692bc45e97a3b28ab5a9b27f63ec2eee46f3160e66278668cb2a84550188de8cc67a7ec2e230d7431813f6a452336c8e810f93ef6dca8a819929463c059bec9162b087fce5a16410df71ae5bff24279ff2e045e4df2d45cd769914c00144d433b510c42", 0xcd}], 0x2, &(0x7f0000000540)=[@rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r2, r3, r4}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r5, r6, r7}], 0xb0, 0x4000000}], 0x1, 0x1) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:51:37 executing program 3: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:37 executing program 6: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0xffffffffffffff00, 0x8, 'queue0\x00', 0x1ff}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x3, 0x800) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) 2018/05/06 05:51:37 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:37 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) getpid() geteuid() getgroups(0x3, &(0x7f0000000280)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff]) getpgid(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:51:37 executing program 7: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0xffffffffffffff00, 0x8, 'queue0\x00', 0x1ff}) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:51:37 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"6272696467653000000300", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:37 executing program 1: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) userfaultfd(0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) getpid() geteuid() getgroups(0x3, &(0x7f0000000280)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff]) getpgid(0x0) stat(&(0x7f0000000400)='./control/file0\x00', &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:51:37 executing program 3: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:37 executing program 2: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:37 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:37 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:37 executing program 3: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:37 executing program 1: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) userfaultfd(0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) getpid() geteuid() getgroups(0x3, &(0x7f0000000280)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff]) getpgid(0x0) stat(&(0x7f0000000400)='./control/file0\x00', &(0x7f0000000440)) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:51:38 executing program 2: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:38 executing program 1: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) userfaultfd(0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) getpid() geteuid() getgroups(0x3, &(0x7f0000000280)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff]) getpgid(0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:51:38 executing program 3: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:38 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"6272696467653000000000000200", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:38 executing program 6: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0xffffffffffffff00, 0x8, 'queue0\x00', 0x1ff}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x3, 0x800) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) 2018/05/06 05:51:38 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:38 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) getpid() geteuid() getgroups(0x3, &(0x7f0000000280)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff]) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:51:38 executing program 7: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0xffffffffffffff00, 0x8, 'queue0\x00', 0x1ff}) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:51:38 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"627269646765300000000300", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:38 executing program 2: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:38 executing program 3: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8), 0x1000) 2018/05/06 05:51:38 executing program 1: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) userfaultfd(0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) getpid() geteuid() getgroups(0x3, &(0x7f0000000280)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff]) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:51:38 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:38 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"627269646765300000c3ffffff00", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:38 executing program 2: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:38 executing program 3: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8), 0x1000) 2018/05/06 05:51:39 executing program 1: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) userfaultfd(0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) getpid() geteuid() syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:51:39 executing program 2: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:39 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:39 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:39 executing program 6: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0xffffffffffffff00, 0x8, 'queue0\x00', 0x1ff}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:51:39 executing program 3: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8), 0x1000) 2018/05/06 05:51:39 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) getpid() geteuid() ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:51:39 executing program 7: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0xffffffffffffff00, 0x8, 'queue0\x00', 0x1ff}) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:51:39 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"62726964676530000000000000ffffff", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:39 executing program 3: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x0) 2018/05/06 05:51:39 executing program 2: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:39 executing program 1: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) userfaultfd(0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) getpid() syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:51:39 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:39 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"627269646765300000fffffdfd00", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:39 executing program 3: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x0) 2018/05/06 05:51:39 executing program 2: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:40 executing program 1: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) userfaultfd(0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) getpid() syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:51:40 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) getpid() ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:51:40 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"62726964676530000000000000ffffff", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:40 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:40 executing program 7: ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:51:40 executing program 2: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:40 executing program 6: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0xffffffffffffff00, 0x8, 'queue0\x00', 0x1ff}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) 2018/05/06 05:51:40 executing program 3: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x0) 2018/05/06 05:51:40 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:40 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0xffffffffffffff00, 0x8, 'queue0\x00', 0x1ff}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:51:40 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:40 executing program 2: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:40 executing program 1: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) userfaultfd(0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:51:40 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"62726964676530000000000000fffffd", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:41 executing program 2: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:41 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:41 executing program 1: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) userfaultfd(0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:51:41 executing program 7: ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:51:41 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:41 executing program 6: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0xffffffffffffff00, 0x8, 'queue0\x00', 0x1ff}) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) 2018/05/06 05:51:41 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0xffffffffffffff00, 0x8, 'queue0\x00', 0x1ff}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:51:41 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:51:41 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00\x00\x00@\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:41 executing program 1: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:51:41 executing program 2: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:41 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:41 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"6272696467653000000f00", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:41 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:41 executing program 2: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8), 0x1000) 2018/05/06 05:51:41 executing program 1: mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:51:41 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:42 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:42 executing program 7: ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:51:42 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"627269646765300000fffffffe00", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:42 executing program 2: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8), 0x1000) 2018/05/06 05:51:42 executing program 1: syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:51:42 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0xffffffffffffff00, 0x8, 'queue0\x00', 0x1ff}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:51:42 executing program 6: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) 2018/05/06 05:51:42 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:51:42 executing program 1: syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:51:42 executing program 2: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8), 0x1000) 2018/05/06 05:51:42 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:42 executing program 1: syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:51:42 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:42 executing program 2: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x0) 2018/05/06 05:51:42 executing program 1: mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:51:42 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:42 executing program 2: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x0) 2018/05/06 05:51:43 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:43 executing program 1: mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:51:43 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"6272696467653000000000000000ffff", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:43 executing program 2: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x0) 2018/05/06 05:51:43 executing program 6: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) close(0xffffffffffffffff) 2018/05/06 05:51:43 executing program 7: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0xffffffffffffff00, 0x8, 'queue0\x00', 0x1ff}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:51:43 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r0 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r0, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(0xffffffffffffffff) 2018/05/06 05:51:43 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0xffffffffffffff00, 0x8, 'queue0\x00', 0x1ff}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) close(r0) 2018/05/06 05:51:43 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0xffffffffffffff00, 0x8, 'queue0\x00', 0x1ff}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) close(r0) 2018/05/06 05:51:43 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"627269646765300000000000000100", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:43 executing program 6: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) close(0xffffffffffffffff) 2018/05/06 05:51:43 executing program 1: mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:51:43 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:43 executing program 2: ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:51:43 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0xffffffffffffff00, 0x8, 'queue0\x00', 0x1ff}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) close(r0) 2018/05/06 05:51:43 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"62726964676530000000feffffff00", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:43 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r0 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r0, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(0xffffffffffffffff) 2018/05/06 05:51:43 executing program 6: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) close(0xffffffffffffffff) 2018/05/06 05:51:44 executing program 6: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) userfaultfd(0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) getpid() syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:51:44 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0xffffffffffffff00, 0x8, 'queue0\x00', 0x1ff}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) 2018/05/06 05:51:44 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:44 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r0 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r0, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(0xffffffffffffffff) 2018/05/06 05:51:44 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"6272696467653000000000000000ffff", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:44 executing program 2: ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:51:44 executing program 7: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0xffffffffffffff00, 0x8, 'queue0\x00', 0x1ff}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:51:44 executing program 1: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:44 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"62726964676530000000fffffffe00", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:44 executing program 6: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"627269646765300000c3ffffff00", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:44 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8), 0x1000) 2018/05/06 05:51:44 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:51:44 executing program 1: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r0 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r0, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(0xffffffffffffffff) 2018/05/06 05:51:45 executing program 6: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:45 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"627269646765300000000000000f00", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:45 executing program 1: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) userfaultfd(0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) getpid() geteuid() getgroups(0x3, &(0x7f0000000280)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff]) getpgid(0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:51:45 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:51:45 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8), 0x1000) 2018/05/06 05:51:45 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0xffffffffffffff00, 0x8, 'queue0\x00', 0x1ff}) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:51:45 executing program 2: ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:51:45 executing program 7: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0xffffffffffffff00, 0x8, 'queue0\x00', 0x1ff}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:51:45 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00\x00\x00\x00@\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:45 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8), 0x1000) 2018/05/06 05:51:45 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"627269646765300000000200", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:45 executing program 6: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) r2 = getpid() r3 = geteuid() getgroups(0x3, &(0x7f0000000280)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff]) r5 = getpgid(0x0) stat(&(0x7f0000000400)='./control/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) sendmmsg$unix(r1, &(0x7f0000000600)=[{&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000100)=[{&(0x7f00000001c0)="8c0a59de86ce03ffceeb823a14016543b8b4f004a4d67fb8edd6c2945cdea2f427385aed9f0b001f1c2726690ef0aa7fa837afd11389bbce6ce9c54e25f09553334c", 0x42}, {&(0x7f0000000300)="a7788496a4e8333d796ff9b054dd235af91bbe9c6bf67bb515f0c40d520661ebc0aa93b16661cf6b72d5cfa209d01ce650f8414b6b05593891be7f96d553484a1c6495484b669f56d587e66155e5a162868871a43068f8cfc83a4c3c4ef487e3f9e9bc04013632d42b7692bc45e97a3b28ab5a9b27f63ec2eee46f3160e66278668cb2a84550188de8cc67a7ec2e230d7431813f6a452336c8e810f93ef6dca8a819929463c059bec9162b087fce5a16410df71ae5bff24279ff2e045e4df2d45cd769914c00144d433b510c42", 0xcd}], 0x2, &(0x7f0000000540)=[@rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r2, r3, r4}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r5, r6, r7}], 0xb0, 0x4000000}], 0x1, 0x1) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:51:45 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:51:45 executing program 1: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:45 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x0) 2018/05/06 05:51:45 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"6272696467653000000000000000ffff", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:45 executing program 6: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) r2 = getpid() r3 = geteuid() getgroups(0x3, &(0x7f0000000280)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff]) r5 = getpgid(0x0) stat(&(0x7f0000000400)='./control/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) sendmmsg$unix(r1, &(0x7f0000000600)=[{&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000100)=[{&(0x7f00000001c0)="8c0a59de86ce03ffceeb823a14016543b8b4f004a4d67fb8edd6c2945cdea2f427385aed9f0b001f1c2726690ef0aa7fa837afd11389bbce6ce9c54e25f09553334c", 0x42}, {&(0x7f0000000300)="a7788496a4e8333d796ff9b054dd235af91bbe9c6bf67bb515f0c40d520661ebc0aa93b16661cf6b72d5cfa209d01ce650f8414b6b05593891be7f96d553484a1c6495484b669f56d587e66155e5a162868871a43068f8cfc83a4c3c4ef487e3f9e9bc04013632d42b7692bc45e97a3b28ab5a9b27f63ec2eee46f3160e66278668cb2a84550188de8cc67a7ec2e230d7431813f6a452336c8e810f93ef6dca8a819929463c059bec9162b087fce5a16410df71ae5bff24279ff2e045e4df2d45cd769914c00144d433b510c42", 0xcd}], 0x2, &(0x7f0000000540)=[@rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r2, r3, r4}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r5, r6, r7}], 0xb0, 0x4000000}], 0x1, 0x1) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r8 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r8, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:51:46 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:51:46 executing program 2: ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) 2018/05/06 05:51:46 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"62726964676530000000ffffffc300", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:46 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x0) 2018/05/06 05:51:46 executing program 1: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x200000000000, 0x2, 0x0, 0x0, 0x1000, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x3f, 0x0, 0x20, 0x5, 0x0, 0x4}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:46 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:51:46 executing program 6: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) r2 = getpid() r3 = geteuid() getgroups(0x3, &(0x7f0000000280)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff]) r5 = getpgid(0x0) stat(&(0x7f0000000400)='./control/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) sendmmsg$unix(r1, &(0x7f0000000600)=[{&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000100)=[{&(0x7f00000001c0)="8c0a59de86ce03ffceeb823a14016543b8b4f004a4d67fb8edd6c2945cdea2f427385aed9f0b001f1c2726690ef0aa7fa837afd11389bbce6ce9c54e25f09553334c", 0x42}, {&(0x7f0000000300)="a7788496a4e8333d796ff9b054dd235af91bbe9c6bf67bb515f0c40d520661ebc0aa93b16661cf6b72d5cfa209d01ce650f8414b6b05593891be7f96d553484a1c6495484b669f56d587e66155e5a162868871a43068f8cfc83a4c3c4ef487e3f9e9bc04013632d42b7692bc45e97a3b28ab5a9b27f63ec2eee46f3160e66278668cb2a84550188de8cc67a7ec2e230d7431813f6a452336c8e810f93ef6dca8a819929463c059bec9162b087fce5a16410df71ae5bff24279ff2e045e4df2d45cd769914c00144d433b510c42", 0xcd}], 0x2, &(0x7f0000000540)=[@rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r2, r3, r4}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r5, r6, r7}], 0xb0, 0x4000000}], 0x1, 0x1) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(0xffffffffffffffff, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') 2018/05/06 05:51:46 executing program 7: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0x0, 0x8, 'queue0\x00', 0x1ff}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:51:46 executing program 6: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) r2 = getpid() r3 = geteuid() getgroups(0x3, &(0x7f0000000280)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff]) r5 = getpgid(0x0) stat(&(0x7f0000000400)='./control/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) sendmmsg$unix(r1, &(0x7f0000000600)=[{&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000100)=[{&(0x7f00000001c0)="8c0a59de86ce03ffceeb823a14016543b8b4f004a4d67fb8edd6c2945cdea2f427385aed9f0b001f1c2726690ef0aa7fa837afd11389bbce6ce9c54e25f09553334c", 0x42}, {&(0x7f0000000300)="a7788496a4e8333d796ff9b054dd235af91bbe9c6bf67bb515f0c40d520661ebc0aa93b16661cf6b72d5cfa209d01ce650f8414b6b05593891be7f96d553484a1c6495484b669f56d587e66155e5a162868871a43068f8cfc83a4c3c4ef487e3f9e9bc04013632d42b7692bc45e97a3b28ab5a9b27f63ec2eee46f3160e66278668cb2a84550188de8cc67a7ec2e230d7431813f6a452336c8e810f93ef6dca8a819929463c059bec9162b087fce5a16410df71ae5bff24279ff2e045e4df2d45cd769914c00144d433b510c42", 0xcd}], 0x2, &(0x7f0000000540)=[@rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r2, r3, r4}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r5, r6, r7}], 0xb0, 0x4000000}], 0x1, 0x1) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(0xffffffffffffffff, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') 2018/05/06 05:51:46 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x0) 2018/05/06 05:51:46 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"62726964676530000000000f00", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:46 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:51:46 executing program 1 (fault-call:1 fault-nth:0): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:51:46 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"6272696467653000000000000000ffff", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 188.043906] FAULT_INJECTION: forcing a failure. [ 188.043906] name failslab, interval 1, probability 0, space 0, times 0 [ 188.055251] CPU: 1 PID: 13992 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 188.062534] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 188.071892] Call Trace: [ 188.074493] dump_stack+0x1b9/0x294 [ 188.078133] ? dump_stack_print_info.cold.2+0x52/0x52 [ 188.083333] ? graph_lock+0x170/0x170 [ 188.087156] should_fail.cold.4+0xa/0x1a [ 188.091228] ? lock_downgrade+0x8e0/0x8e0 [ 188.095391] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 188.100508] ? find_held_lock+0x36/0x1c0 [ 188.104589] ? find_held_lock+0x36/0x1c0 [ 188.108676] ? hash_netportnet6_add+0x1900/0x2e40 [ 188.113546] ? check_same_owner+0x320/0x320 [ 188.117889] ? rcu_note_context_switch+0x710/0x710 [ 188.122840] ? wait_for_completion+0x870/0x870 [ 188.127434] __should_failslab+0x124/0x180 [ 188.131685] should_failslab+0x9/0x14 [ 188.135507] kmem_cache_alloc+0x2af/0x760 [ 188.139678] getname_flags+0xd0/0x5a0 [ 188.143495] getname+0x19/0x20 [ 188.146701] do_sys_open+0x39a/0x740 [ 188.150436] ? filp_open+0x80/0x80 [ 188.153989] ? __ia32_sys_mknod+0xb0/0xb0 [ 188.158165] __x64_sys_open+0x7e/0xc0 [ 188.161983] do_syscall_64+0x1b1/0x800 [ 188.165883] ? finish_task_switch+0x1ca/0x810 [ 188.170395] ? syscall_return_slowpath+0x5c0/0x5c0 [ 188.175338] ? syscall_return_slowpath+0x30f/0x5c0 [ 188.180286] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 188.185654] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 188.190508] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 188.195707] RIP: 0033:0x40fbd1 [ 188.198892] RSP: 002b:00007fe77d61a800 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 188.206615] RAX: ffffffffffffffda RBX: 00007fe77d61b6d4 RCX: 000000000040fbd1 [ 188.213871] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 00000000004ba29e [ 188.221128] RBP: 0000000000008000 R08: 0000000000000000 R09: 0000000000000000 [ 188.228383] R10: 0000000020000180 R11: 0000000000000293 R12: 0000000000000000 [ 188.235635] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 2018/05/06 05:51:47 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:51:47 executing program 4 (fault-call:2 fault-nth:0): r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:47 executing program 6: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) r2 = getpid() r3 = geteuid() getgroups(0x3, &(0x7f0000000280)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff]) r5 = getpgid(0x0) stat(&(0x7f0000000400)='./control/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) sendmmsg$unix(r1, &(0x7f0000000600)=[{&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000100)=[{&(0x7f00000001c0)="8c0a59de86ce03ffceeb823a14016543b8b4f004a4d67fb8edd6c2945cdea2f427385aed9f0b001f1c2726690ef0aa7fa837afd11389bbce6ce9c54e25f09553334c", 0x42}, {&(0x7f0000000300)="a7788496a4e8333d796ff9b054dd235af91bbe9c6bf67bb515f0c40d520661ebc0aa93b16661cf6b72d5cfa209d01ce650f8414b6b05593891be7f96d553484a1c6495484b669f56d587e66155e5a162868871a43068f8cfc83a4c3c4ef487e3f9e9bc04013632d42b7692bc45e97a3b28ab5a9b27f63ec2eee46f3160e66278668cb2a84550188de8cc67a7ec2e230d7431813f6a452336c8e810f93ef6dca8a819929463c059bec9162b087fce5a16410df71ae5bff24279ff2e045e4df2d45cd769914c00144d433b510c42", 0xcd}], 0x2, &(0x7f0000000540)=[@rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r2, r3, r4}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r5, r6, r7}], 0xb0, 0x4000000}], 0x1, 0x1) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(0xffffffffffffffff, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') 2018/05/06 05:51:47 executing program 2: ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) 2018/05/06 05:51:47 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"627269646765300000000300", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:47 executing program 1 (fault-call:1 fault-nth:1): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:51:47 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:51:47 executing program 7: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0x0, 0x0, 'queue0\x00', 0x1ff}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) [ 188.750810] FAULT_INJECTION: forcing a failure. [ 188.750810] name failslab, interval 1, probability 0, space 0, times 0 [ 188.762115] CPU: 0 PID: 14008 Comm: syz-executor4 Not tainted 4.17.0-rc3+ #35 [ 188.769396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 188.778982] Call Trace: [ 188.781594] dump_stack+0x1b9/0x294 [ 188.785244] ? dump_stack_print_info.cold.2+0x52/0x52 [ 188.790448] ? find_held_lock+0x36/0x1c0 [ 188.794533] should_fail.cold.4+0xa/0x1a 2018/05/06 05:51:47 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 188.798611] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 188.803725] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 188.809277] ? proc_fail_nth_write+0x96/0x1f0 [ 188.813787] ? proc_cwd_link+0x1d0/0x1d0 [ 188.817869] ? find_held_lock+0x36/0x1c0 [ 188.821963] ? check_same_owner+0x320/0x320 [ 188.826311] ? rcu_note_context_switch+0x710/0x710 [ 188.831263] __should_failslab+0x124/0x180 [ 188.835514] should_failslab+0x9/0x14 [ 188.839323] kmem_cache_alloc+0x2af/0x760 [ 188.843144] FAULT_INJECTION: forcing a failure. [ 188.843144] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 188.843485] ? ksys_write+0x1a6/0x250 [ 188.859074] getname_flags+0xd0/0x5a0 [ 188.862876] __x64_sys_execveat+0xd4/0x130 [ 188.867106] do_syscall_64+0x1b1/0x800 [ 188.870983] ? finish_task_switch+0x1ca/0x810 [ 188.875468] ? syscall_return_slowpath+0x5c0/0x5c0 [ 188.880387] ? syscall_return_slowpath+0x30f/0x5c0 [ 188.885310] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 188.890666] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 188.895503] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 188.900678] RIP: 0033:0x455979 [ 188.903856] RSP: 002b:00007f2b106b9c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 188.911554] RAX: ffffffffffffffda RBX: 00007f2b106ba6d4 RCX: 0000000000455979 [ 188.918810] RDX: 0000000020000580 RSI: 0000000020ff7000 RDI: 0000000000000013 [ 188.926070] RBP: 000000000072bea0 R08: 0000000000001000 R09: 0000000000000000 [ 188.933333] R10: 000000002034bff8 R11: 0000000000000246 R12: 0000000000000014 [ 188.940589] R13: 0000000000000079 R14: 00000000006f4bf8 R15: 0000000000000000 2018/05/06 05:51:47 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:51:47 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 188.947867] CPU: 1 PID: 14017 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 188.956018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 188.965377] Call Trace: [ 188.967980] dump_stack+0x1b9/0x294 [ 188.971620] ? dump_stack_print_info.cold.2+0x52/0x52 [ 188.976919] should_fail.cold.4+0xa/0x1a [ 188.980992] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 188.986114] ? debug_check_no_locks_freed+0x310/0x310 [ 188.991315] ? _parse_integer+0x13b/0x190 [ 188.995469] ? graph_lock+0x170/0x170 2018/05/06 05:51:47 executing program 4 (fault-call:2 fault-nth:1): r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) [ 188.999297] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 189.004843] ? _kstrtoull+0x180/0x230 [ 189.008650] ? _parse_integer+0x190/0x190 [ 189.012811] ? graph_lock+0x170/0x170 [ 189.016617] ? lock_release+0xa10/0xa10 [ 189.020598] ? check_same_owner+0x320/0x320 [ 189.024928] ? find_held_lock+0x36/0x1c0 [ 189.028991] ? graph_lock+0x170/0x170 [ 189.032806] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 189.038352] ? should_fail+0x21b/0xbcd [ 189.042248] ? lock_downgrade+0x8e0/0x8e0 [ 189.046408] __alloc_pages_nodemask+0x34e/0xd70 [ 189.051079] ? find_held_lock+0x36/0x1c0 [ 189.055162] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 189.060194] ? find_held_lock+0x36/0x1c0 [ 189.064285] ? check_same_owner+0x320/0x320 [ 189.066708] FAULT_INJECTION: forcing a failure. [ 189.066708] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 189.068622] cache_grow_begin+0x72/0x6c0 [ 189.084455] kmem_cache_alloc+0x689/0x760 [ 189.088605] getname_flags+0xd0/0x5a0 [ 189.092398] getname+0x19/0x20 [ 189.095584] do_sys_open+0x39a/0x740 [ 189.099290] ? filp_open+0x80/0x80 [ 189.102819] ? __ia32_sys_mknod+0xb0/0xb0 [ 189.106963] __x64_sys_open+0x7e/0xc0 [ 189.110760] do_syscall_64+0x1b1/0x800 [ 189.114639] ? finish_task_switch+0x1ca/0x810 [ 189.119129] ? syscall_return_slowpath+0x5c0/0x5c0 [ 189.124051] ? syscall_return_slowpath+0x30f/0x5c0 [ 189.128973] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 189.135135] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 189.139974] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 189.145154] RIP: 0033:0x40fbd1 [ 189.148331] RSP: 002b:00007fe77d61a800 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 189.156031] RAX: ffffffffffffffda RBX: 00007fe77d61b6d4 RCX: 000000000040fbd1 [ 189.163291] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 00000000004ba29e [ 189.170586] RBP: 0000000000008000 R08: 0000000000000000 R09: 0000000000000000 [ 189.177846] R10: 0000000020000180 R11: 0000000000000293 R12: 0000000000000000 [ 189.185106] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 [ 189.192384] CPU: 0 PID: 14032 Comm: syz-executor4 Not tainted 4.17.0-rc3+ #35 [ 189.199662] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 189.209024] Call Trace: [ 189.211627] dump_stack+0x1b9/0x294 [ 189.215261] ? dump_stack_print_info.cold.2+0x52/0x52 [ 189.220441] ? __lock_acquire+0x7f5/0x5140 [ 189.224668] should_fail.cold.4+0xa/0x1a [ 189.228714] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 189.233803] ? debug_check_no_locks_freed+0x310/0x310 [ 189.238979] ? find_held_lock+0x36/0x1c0 [ 189.243037] ? graph_lock+0x170/0x170 [ 189.246825] ? lock_downgrade+0x8e0/0x8e0 [ 189.250954] ? find_held_lock+0x36/0x1c0 [ 189.255000] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 189.260525] ? should_fail+0x21b/0xbcd [ 189.264395] __alloc_pages_nodemask+0x34e/0xd70 [ 189.269056] ? proc_fail_nth_write+0x96/0x1f0 [ 189.273537] ? proc_cwd_link+0x1d0/0x1d0 [ 189.277581] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 189.282584] ? find_held_lock+0x36/0x1c0 [ 189.286636] ? check_same_owner+0x320/0x320 [ 189.290954] cache_grow_begin+0x72/0x6c0 [ 189.295004] kmem_cache_alloc+0x689/0x760 [ 189.299153] ? ksys_write+0x1a6/0x250 [ 189.303460] getname_flags+0xd0/0x5a0 [ 189.307246] __x64_sys_execveat+0xd4/0x130 [ 189.311467] do_syscall_64+0x1b1/0x800 [ 189.315337] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 189.320177] ? syscall_return_slowpath+0x5c0/0x5c0 [ 189.325103] ? syscall_return_slowpath+0x30f/0x5c0 [ 189.330029] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 189.335383] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 189.340211] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 189.345379] RIP: 0033:0x455979 2018/05/06 05:51:47 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"627269646765300000000400", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 189.348565] RSP: 002b:00007f2b106b9c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 189.356254] RAX: ffffffffffffffda RBX: 00007f2b106ba6d4 RCX: 0000000000455979 [ 189.363519] RDX: 0000000020000580 RSI: 0000000020ff7000 RDI: 0000000000000013 [ 189.370767] RBP: 000000000072bea0 R08: 0000000000001000 R09: 0000000000000000 [ 189.378024] R10: 000000002034bff8 R11: 0000000000000246 R12: 0000000000000014 [ 189.385288] R13: 0000000000000079 R14: 00000000006f4bf8 R15: 0000000000000001 2018/05/06 05:51:47 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:51:47 executing program 6 (fault-call:0 fault-nth:0): syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) 2018/05/06 05:51:47 executing program 1 (fault-call:1 fault-nth:2): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) [ 189.502520] FAULT_INJECTION: forcing a failure. [ 189.502520] name failslab, interval 1, probability 0, space 0, times 0 [ 189.513859] CPU: 1 PID: 14042 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 189.521138] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 189.528301] FAULT_INJECTION: forcing a failure. [ 189.528301] name failslab, interval 1, probability 0, space 0, times 0 [ 189.530497] Call Trace: [ 189.530521] dump_stack+0x1b9/0x294 [ 189.530549] ? dump_stack_print_info.cold.2+0x52/0x52 [ 189.553096] should_fail.cold.4+0xa/0x1a [ 189.557156] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 189.562257] ? debug_check_no_locks_freed+0x310/0x310 [ 189.567440] ? print_usage_bug+0xc0/0xc0 [ 189.571498] ? find_held_lock+0x36/0x1c0 [ 189.575568] ? check_same_owner+0x320/0x320 [ 189.579889] ? rcu_note_context_switch+0x710/0x710 [ 189.584814] __should_failslab+0x124/0x180 [ 189.589048] should_failslab+0x9/0x14 [ 189.592843] kmem_cache_alloc+0x2af/0x760 [ 189.596987] ? debug_check_no_locks_freed+0x310/0x310 [ 189.602181] get_empty_filp+0x125/0x520 [ 189.606150] ? proc_nr_files+0x60/0x60 [ 189.610034] ? lock_downgrade+0x8e0/0x8e0 [ 189.614178] ? graph_lock+0x170/0x170 [ 189.617971] ? kasan_check_read+0x11/0x20 [ 189.622112] ? rcu_is_watching+0x85/0x140 [ 189.626254] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 189.631439] path_openat+0x116/0x4e20 [ 189.635243] ? unwind_get_return_address+0x61/0xa0 [ 189.640167] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 189.645174] ? path_lookupat.isra.44+0xbd0/0xbd0 [ 189.649924] ? find_held_lock+0x36/0x1c0 [ 189.653992] ? lock_downgrade+0x8e0/0x8e0 [ 189.658134] ? do_sys_open+0x39a/0x740 [ 189.662032] ? kasan_check_read+0x11/0x20 [ 189.666178] ? do_raw_spin_unlock+0x9e/0x2e0 [ 189.670582] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 189.675153] ? __lock_is_held+0xb5/0x140 [ 189.679216] ? _raw_spin_unlock+0x22/0x30 [ 189.683355] ? __alloc_fd+0x346/0x700 [ 189.687149] ? usercopy_warn+0x120/0x120 [ 189.691212] do_filp_open+0x249/0x350 [ 189.695010] ? may_open_dev+0x100/0x100 [ 189.698980] ? strncpy_from_user+0x3b6/0x500 [ 189.703386] ? mpi_free.cold.1+0x19/0x19 [ 189.707442] ? get_unused_fd_flags+0x121/0x190 [ 189.712016] ? getname_flags+0xd0/0x5a0 [ 189.715991] ? getname_flags+0x26e/0x5a0 [ 189.720064] do_sys_open+0x56f/0x740 [ 189.723776] ? filp_open+0x80/0x80 [ 189.727309] ? __ia32_sys_mknod+0xb0/0xb0 [ 189.731459] __x64_sys_open+0x7e/0xc0 [ 189.735261] do_syscall_64+0x1b1/0x800 [ 189.739141] ? finish_task_switch+0x1ca/0x810 [ 189.743634] ? syscall_return_slowpath+0x5c0/0x5c0 [ 189.748556] ? syscall_return_slowpath+0x30f/0x5c0 [ 189.753479] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 189.758837] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 189.763676] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 189.768856] RIP: 0033:0x40fbd1 [ 189.772033] RSP: 002b:00007fe77d61a800 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 189.779736] RAX: ffffffffffffffda RBX: 00007fe77d61b6d4 RCX: 000000000040fbd1 [ 189.786996] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 00000000004ba29e [ 189.794257] RBP: 0000000000008000 R08: 0000000000000000 R09: 0000000000000000 2018/05/06 05:51:48 executing program 4 (fault-call:2 fault-nth:2): r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:48 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"627269646765300000000000000200", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 189.801519] R10: 0000000020000180 R11: 0000000000000293 R12: 0000000000000000 [ 189.808775] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 [ 189.816051] CPU: 0 PID: 14044 Comm: syz-executor6 Not tainted 4.17.0-rc3+ #35 [ 189.823337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 189.832694] Call Trace: [ 189.835295] dump_stack+0x1b9/0x294 [ 189.838934] ? dump_stack_print_info.cold.2+0x52/0x52 [ 189.844138] ? kasan_check_read+0x11/0x20 [ 189.848289] ? do_raw_spin_unlock+0x9e/0x2e0 2018/05/06 05:51:48 executing program 7: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0x0, 0x0, 'queue0\x00', 0x1ff}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) [ 189.852707] should_fail.cold.4+0xa/0x1a [ 189.856777] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 189.861885] ? _raw_spin_unlock+0x22/0x30 [ 189.866038] ? __handle_mm_fault+0x93a/0x4310 [ 189.870544] ? vm_insert_mixed_mkwrite+0x40/0x40 [ 189.875305] ? graph_lock+0x170/0x170 [ 189.879116] ? find_held_lock+0x36/0x1c0 [ 189.883203] ? check_same_owner+0x320/0x320 [ 189.887532] ? rcu_note_context_switch+0x710/0x710 [ 189.892469] ? lock_downgrade+0x8e0/0x8e0 [ 189.896624] __should_failslab+0x124/0x180 [ 189.900866] should_failslab+0x9/0x14 [ 189.904665] kmem_cache_alloc+0x2af/0x760 [ 189.908813] ? __handle_mm_fault+0x4310/0x4310 [ 189.913406] getname_flags+0xd0/0x5a0 [ 189.917210] getname+0x19/0x20 [ 189.920405] do_sys_open+0x39a/0x740 [ 189.924139] ? __do_page_fault+0x2/0xe40 [ 189.928203] ? filp_open+0x80/0x80 [ 189.931746] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 189.937299] __x64_sys_open+0x7e/0xc0 [ 189.941113] do_syscall_64+0x1b1/0x800 [ 189.945012] ? finish_task_switch+0x1ca/0x810 [ 189.949514] ? syscall_return_slowpath+0x5c0/0x5c0 2018/05/06 05:51:48 executing program 2: ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) 2018/05/06 05:51:48 executing program 1 (fault-call:1 fault-nth:3): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:51:48 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:48 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) [ 189.954446] ? syscall_return_slowpath+0x30f/0x5c0 [ 189.959387] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 189.964924] ? retint_user+0x18/0x18 [ 189.968651] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 189.973502] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 189.978690] RIP: 0033:0x40fbd1 [ 189.981877] RSP: 002b:00007f96757a47a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 189.989587] RAX: ffffffffffffffda RBX: cccccccccccccccd RCX: 000000000040fbd1 [ 189.996857] RDX: 0000000000000000 RSI: 0000000000000081 RDI: 00007f96757a4850 [ 190.004131] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 190.011333] FAULT_INJECTION: forcing a failure. [ 190.011333] name failslab, interval 1, probability 0, space 0, times 0 [ 190.011413] R10: 0000000020000080 R11: 0000000000000293 R12: 0000000000000013 [ 190.029845] R13: 00000000000006e4 R14: 00000000006fe600 R15: 0000000000000000 [ 190.037129] CPU: 1 PID: 14060 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 190.044406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 190.053759] Call Trace: [ 190.056351] dump_stack+0x1b9/0x294 [ 190.059994] ? dump_stack_print_info.cold.2+0x52/0x52 [ 190.065190] ? unwind_get_return_address+0x61/0xa0 [ 190.070128] ? __save_stack_trace+0x7e/0xd0 [ 190.074474] should_fail.cold.4+0xa/0x1a [ 190.075430] FAULT_INJECTION: forcing a failure. [ 190.075430] name failslab, interval 1, probability 0, space 0, times 0 [ 190.078539] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 190.078559] ? save_stack+0x43/0xd0 [ 190.078600] ? __kasan_slab_free+0x11a/0x170 [ 190.102832] ? kasan_slab_free+0xe/0x10 [ 190.106796] ? kmem_cache_free+0x86/0x2d0 [ 190.110948] ? do_sys_open+0x554/0x740 [ 190.114827] ? __x64_sys_open+0x7e/0xc0 [ 190.118796] ? do_syscall_64+0x1b1/0x800 [ 190.122847] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 190.128207] ? find_held_lock+0x36/0x1c0 [ 190.132280] ? check_same_owner+0x320/0x320 [ 190.136602] ? rcu_is_watching+0x85/0x140 [ 190.140743] ? rcu_note_context_switch+0x710/0x710 [ 190.145668] __should_failslab+0x124/0x180 [ 190.149897] should_failslab+0x9/0x14 [ 190.153689] __kmalloc_track_caller+0x2c4/0x760 [ 190.158351] ? strncpy_from_user+0x500/0x500 [ 190.162753] ? strndup_user+0x77/0xd0 [ 190.166548] memdup_user+0x2c/0xa0 [ 190.170087] strndup_user+0x77/0xd0 [ 190.173709] ksys_mount+0x3c/0x140 [ 190.177242] __x64_sys_mount+0xbe/0x150 [ 190.181205] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 190.186214] do_syscall_64+0x1b1/0x800 [ 190.190091] ? finish_task_switch+0x1ca/0x810 [ 190.194586] ? syscall_return_slowpath+0x5c0/0x5c0 [ 190.199510] ? syscall_return_slowpath+0x30f/0x5c0 [ 190.204434] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 190.209791] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 190.214629] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 190.219809] RIP: 0033:0x455979 [ 190.222989] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 190.230690] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 190.237948] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 190.245207] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 190.252468] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 190.259725] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 [ 190.267006] CPU: 0 PID: 14054 Comm: syz-executor4 Not tainted 4.17.0-rc3+ #35 [ 190.274283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 190.283728] Call Trace: [ 190.286335] dump_stack+0x1b9/0x294 [ 190.289980] ? dump_stack_print_info.cold.2+0x52/0x52 [ 190.295179] ? print_usage_bug+0xc0/0xc0 [ 190.299252] should_fail.cold.4+0xa/0x1a 2018/05/06 05:51:48 executing program 6 (fault-call:0 fault-nth:1): syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) 2018/05/06 05:51:48 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"627269646765300000000000000300", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 190.303320] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 190.308462] ? debug_check_no_locks_freed+0x310/0x310 [ 190.313681] ? __lock_acquire+0x7f5/0x5140 [ 190.317935] ? find_held_lock+0x36/0x1c0 [ 190.322053] ? check_same_owner+0x320/0x320 [ 190.326407] ? debug_check_no_locks_freed+0x310/0x310 [ 190.331612] ? rcu_note_context_switch+0x710/0x710 [ 190.336553] __should_failslab+0x124/0x180 [ 190.340799] should_failslab+0x9/0x14 [ 190.344604] kmem_cache_alloc+0x2af/0x760 [ 190.348753] ? print_usage_bug+0xc0/0xc0 [ 190.352823] ? print_usage_bug+0xc0/0xc0 [ 190.353854] FAULT_INJECTION: forcing a failure. [ 190.353854] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 190.356892] dup_fd+0x114/0xf40 [ 190.371930] ? graph_lock+0x170/0x170 [ 190.375726] ? lock_acquire+0x1dc/0x520 [ 190.379692] ? __fdget_pos+0x1a9/0x1e0 [ 190.383568] ? graph_lock+0x170/0x170 [ 190.387359] ? ksys_dup3+0x670/0x670 [ 190.391068] ? find_held_lock+0x36/0x1c0 [ 190.395125] ? lock_downgrade+0x8e0/0x8e0 [ 190.399266] ? kasan_check_read+0x11/0x20 [ 190.403401] ? rcu_is_watching+0x85/0x140 [ 190.407539] unshare_fd+0x1ec/0x2a0 [ 190.411158] ? mmdrop_async_fn+0x20/0x20 [ 190.415210] ? is_bpf_text_address+0xd7/0x170 [ 190.419698] ? __unwind_start+0x166/0x330 [ 190.423836] ? __kernel_text_address+0xd/0x40 [ 190.428322] ? unwind_get_return_address+0x61/0xa0 [ 190.433243] unshare_files+0xa3/0x280 [ 190.437034] ? __ia32_sys_unshare+0x40/0x40 [ 190.441354] do_execveat_common.isra.34+0x362/0x2590 [ 190.446446] ? kmem_cache_alloc+0x12e/0x760 [ 190.450767] ? getname_flags+0xd0/0x5a0 [ 190.454746] ? __x64_sys_execveat+0xd4/0x130 [ 190.459143] ? do_syscall_64+0x1b1/0x800 [ 190.463196] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 190.468562] ? find_held_lock+0x36/0x1c0 [ 190.472615] ? prepare_bprm_creds+0x120/0x120 [ 190.477365] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 190.482555] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 190.487562] ? __check_object_size+0x95/0x5d9 [ 190.492056] ? usercopy_warn+0x120/0x120 [ 190.496108] ? kasan_check_read+0x11/0x20 [ 190.500245] ? do_raw_spin_unlock+0x9e/0x2e0 [ 190.504644] ? kasan_check_read+0x11/0x20 [ 190.508784] ? rcu_is_watching+0x85/0x140 [ 190.512923] ? rcu_pm_notify+0xc0/0xc0 [ 190.516805] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 190.522338] ? strncpy_from_user+0x3b6/0x500 [ 190.526743] ? mpi_free.cold.1+0x19/0x19 [ 190.530797] ? ksys_write+0x1a6/0x250 [ 190.534591] ? getname_flags+0xd0/0x5a0 [ 190.538560] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 190.544091] ? getname_flags+0x26e/0x5a0 [ 190.548150] __x64_sys_execveat+0xeb/0x130 [ 190.552382] do_syscall_64+0x1b1/0x800 [ 190.556262] ? finish_task_switch+0x1ca/0x810 [ 190.560754] ? syscall_return_slowpath+0x5c0/0x5c0 [ 190.565677] ? syscall_return_slowpath+0x30f/0x5c0 [ 190.570602] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 190.575962] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 190.580798] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 190.586235] RIP: 0033:0x455979 [ 190.589415] RSP: 002b:00007f2b106b9c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 190.597118] RAX: ffffffffffffffda RBX: 00007f2b106ba6d4 RCX: 0000000000455979 [ 190.604379] RDX: 0000000020000580 RSI: 0000000020ff7000 RDI: 0000000000000013 [ 190.611637] RBP: 000000000072bea0 R08: 0000000000001000 R09: 0000000000000000 [ 190.618896] R10: 000000002034bff8 R11: 0000000000000246 R12: 0000000000000014 [ 190.626153] R13: 0000000000000079 R14: 00000000006f4bf8 R15: 0000000000000002 [ 190.633435] CPU: 1 PID: 14069 Comm: syz-executor6 Not tainted 4.17.0-rc3+ #35 [ 190.640714] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 190.650072] Call Trace: [ 190.652674] dump_stack+0x1b9/0x294 [ 190.656316] ? dump_stack_print_info.cold.2+0x52/0x52 [ 190.661526] should_fail.cold.4+0xa/0x1a [ 190.665601] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 190.670720] ? debug_check_no_locks_freed+0x310/0x310 [ 190.675921] ? find_held_lock+0x36/0x1c0 [ 190.679999] ? lock_downgrade+0x8e0/0x8e0 [ 190.684159] ? find_held_lock+0x36/0x1c0 [ 190.688237] ? do_raw_spin_unlock+0x9e/0x2e0 [ 190.692660] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 190.697256] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 190.702799] ? should_fail+0x21b/0xbcd [ 190.706703] __alloc_pages_nodemask+0x34e/0xd70 [ 190.711379] ? __handle_mm_fault+0x93a/0x4310 [ 190.715883] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 190.720996] ? vm_insert_mixed_mkwrite+0x40/0x40 [ 190.725760] ? graph_lock+0x170/0x170 [ 190.729579] ? find_held_lock+0x36/0x1c0 [ 190.733661] ? check_same_owner+0x320/0x320 [ 190.738001] cache_grow_begin+0x72/0x6c0 [ 190.742073] kmem_cache_alloc+0x689/0x760 [ 190.746238] getname_flags+0xd0/0x5a0 [ 190.750047] getname+0x19/0x20 [ 190.753247] do_sys_open+0x39a/0x740 [ 190.756967] ? __do_page_fault+0x2/0xe40 [ 190.761040] ? filp_open+0x80/0x80 [ 190.764586] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 190.770136] __x64_sys_open+0x7e/0xc0 [ 190.773944] do_syscall_64+0x1b1/0x800 [ 190.777841] ? finish_task_switch+0x1ca/0x810 [ 190.782352] ? syscall_return_slowpath+0x5c0/0x5c0 [ 190.787296] ? syscall_return_slowpath+0x30f/0x5c0 [ 190.792248] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 190.797800] ? retint_user+0x18/0x18 [ 190.801540] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 190.806394] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 190.811591] RIP: 0033:0x40fbd1 [ 190.814781] RSP: 002b:00007f96757a47a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 190.822507] RAX: ffffffffffffffda RBX: cccccccccccccccd RCX: 000000000040fbd1 [ 190.829783] RDX: 0000000000000000 RSI: 0000000000000081 RDI: 00007f96757a4850 [ 190.837042] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 190.844298] R10: 0000000020000080 R11: 0000000000000293 R12: 0000000000000013 [ 190.851559] R13: 00000000000006e4 R14: 00000000006fe600 R15: 0000000000000001 2018/05/06 05:51:49 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:51:49 executing program 1 (fault-call:1 fault-nth:4): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:51:49 executing program 4 (fault-call:2 fault-nth:3): r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:49 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"62726964676530000000000300", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:49 executing program 7: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0x0, 0x0, 'queue0\x00', 0x1ff}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:51:49 executing program 2: ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) 2018/05/06 05:51:49 executing program 6 (fault-call:0 fault-nth:2): syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) 2018/05/06 05:51:49 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0xffffffffffffff00, 0x8, 'queue0\x00', 0x1ff}) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) [ 190.953677] FAULT_INJECTION: forcing a failure. [ 190.953677] name failslab, interval 1, probability 0, space 0, times 0 [ 190.965077] CPU: 1 PID: 14096 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 190.972359] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 190.980527] FAULT_INJECTION: forcing a failure. [ 190.980527] name failslab, interval 1, probability 0, space 0, times 0 [ 190.981731] Call Trace: [ 190.981757] dump_stack+0x1b9/0x294 [ 190.981779] ? dump_stack_print_info.cold.2+0x52/0x52 [ 190.981805] should_fail.cold.4+0xa/0x1a [ 190.981836] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 191.013540] ? save_stack+0x43/0xd0 [ 191.017164] ? kasan_kmalloc+0xc4/0xe0 [ 191.021047] ? __kmalloc_track_caller+0x14a/0x760 [ 191.025887] ? memdup_user+0x2c/0xa0 [ 191.029595] ? strndup_user+0x77/0xd0 [ 191.033390] ? graph_lock+0x170/0x170 [ 191.037184] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 191.042545] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 191.047908] ? find_held_lock+0x36/0x1c0 [ 191.051979] ? check_same_owner+0x320/0x320 [ 191.056291] ? lock_release+0xa10/0xa10 [ 191.060261] ? rcu_note_context_switch+0x710/0x710 [ 191.065183] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 191.070193] ? __check_object_size+0x95/0x5d9 [ 191.074682] __should_failslab+0x124/0x180 [ 191.078911] should_failslab+0x9/0x14 [ 191.082706] __kmalloc_track_caller+0x2c4/0x760 [ 191.087369] ? strncpy_from_user+0x500/0x500 [ 191.091775] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 191.097303] ? strndup_user+0x77/0xd0 [ 191.101097] memdup_user+0x2c/0xa0 [ 191.104631] strndup_user+0x77/0xd0 [ 191.108253] ksys_mount+0x73/0x140 [ 191.111789] __x64_sys_mount+0xbe/0x150 [ 191.115757] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 191.120769] do_syscall_64+0x1b1/0x800 [ 191.124651] ? finish_task_switch+0x1ca/0x810 [ 191.129141] ? syscall_return_slowpath+0x5c0/0x5c0 [ 191.134910] ? syscall_return_slowpath+0x30f/0x5c0 [ 191.139836] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 191.145198] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 191.150039] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 191.155219] RIP: 0033:0x455979 [ 191.158400] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 191.166101] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 191.173362] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 191.180619] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 191.187876] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 191.195132] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 [ 191.202410] CPU: 0 PID: 14100 Comm: syz-executor6 Not tainted 4.17.0-rc3+ #35 [ 191.203933] FAULT_INJECTION: forcing a failure. [ 191.203933] name failslab, interval 1, probability 0, space 0, times 0 [ 191.209682] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 191.209687] Call Trace: [ 191.209705] dump_stack+0x1b9/0x294 [ 191.209721] ? dump_stack_print_info.cold.2+0x52/0x52 [ 191.209742] should_fail.cold.4+0xa/0x1a [ 191.209755] ? print_usage_bug+0xc0/0xc0 [ 191.209777] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 191.254792] ? debug_check_no_locks_freed+0x310/0x310 [ 191.259978] ? graph_lock+0x170/0x170 [ 191.263777] ? find_held_lock+0x36/0x1c0 [ 191.267846] ? check_same_owner+0x320/0x320 [ 191.272163] ? rcu_note_context_switch+0x710/0x710 [ 191.277087] __should_failslab+0x124/0x180 [ 191.281318] should_failslab+0x9/0x14 [ 191.285112] kmem_cache_alloc+0x2af/0x760 [ 191.289254] ? debug_check_no_locks_freed+0x310/0x310 [ 191.294440] get_empty_filp+0x125/0x520 [ 191.298409] ? proc_nr_files+0x60/0x60 [ 191.302868] ? lock_downgrade+0x8e0/0x8e0 [ 191.307022] ? graph_lock+0x170/0x170 [ 191.310817] ? kasan_check_read+0x11/0x20 [ 191.314958] ? rcu_is_watching+0x85/0x140 [ 191.319107] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 191.324292] path_openat+0x116/0x4e20 [ 191.328100] ? unwind_get_return_address+0x61/0xa0 [ 191.333027] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 191.338042] ? path_lookupat.isra.44+0xbd0/0xbd0 [ 191.342793] ? find_held_lock+0x36/0x1c0 [ 191.346858] ? lock_downgrade+0x8e0/0x8e0 [ 191.351002] ? do_sys_open+0x39a/0x740 [ 191.354894] ? kasan_check_read+0x11/0x20 [ 191.359035] ? do_raw_spin_unlock+0x9e/0x2e0 [ 191.363435] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 191.368016] ? __lock_is_held+0xb5/0x140 [ 191.372078] ? _raw_spin_unlock+0x22/0x30 [ 191.376223] ? __alloc_fd+0x346/0x700 [ 191.380015] ? usercopy_warn+0x120/0x120 [ 191.384082] do_filp_open+0x249/0x350 [ 191.387879] ? may_open_dev+0x100/0x100 [ 191.391847] ? strncpy_from_user+0x3b6/0x500 [ 191.396253] ? mpi_free.cold.1+0x19/0x19 [ 191.400310] ? get_unused_fd_flags+0x121/0x190 [ 191.404888] ? getname_flags+0xd0/0x5a0 [ 191.408895] ? getname_flags+0x26e/0x5a0 [ 191.412954] do_sys_open+0x56f/0x740 [ 191.416666] ? __do_page_fault+0x2/0xe40 [ 191.420723] ? filp_open+0x80/0x80 [ 191.424267] __x64_sys_open+0x7e/0xc0 [ 191.428066] do_syscall_64+0x1b1/0x800 [ 191.431950] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 191.436790] ? syscall_return_slowpath+0x5c0/0x5c0 [ 191.441712] ? syscall_return_slowpath+0x30f/0x5c0 [ 191.446638] ? retint_user+0x18/0x18 [ 191.450347] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 191.455184] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 191.460365] RIP: 0033:0x40fbd1 [ 191.463543] RSP: 002b:00007f96757a47a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 191.471247] RAX: ffffffffffffffda RBX: cccccccccccccccd RCX: 000000000040fbd1 [ 191.478507] RDX: 0000000000000000 RSI: 0000000000000081 RDI: 00007f96757a4850 [ 191.485767] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 191.493029] R10: 0000000020000080 R11: 0000000000000293 R12: 0000000000000013 2018/05/06 05:51:49 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00\x00\x00\x00\x00\x00@\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 191.500289] R13: 00000000000006e4 R14: 00000000006fe600 R15: 0000000000000002 [ 191.507571] CPU: 1 PID: 14097 Comm: syz-executor4 Not tainted 4.17.0-rc3+ #35 [ 191.514856] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 191.524216] Call Trace: [ 191.526817] dump_stack+0x1b9/0x294 [ 191.530456] ? dump_stack_print_info.cold.2+0x52/0x52 [ 191.535657] ? __kernel_text_address+0xd/0x40 [ 191.540161] ? unwind_get_return_address+0x61/0xa0 [ 191.545104] should_fail.cold.4+0xa/0x1a [ 191.549173] ? fault_create_debugfs_attr+0x1f0/0x1f0 2018/05/06 05:51:49 executing program 1 (fault-call:1 fault-nth:5): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:51:49 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x0, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) [ 191.554283] ? save_stack+0xa9/0xd0 [ 191.557920] ? kasan_kmalloc+0xc4/0xe0 [ 191.561812] ? kasan_slab_alloc+0x12/0x20 [ 191.565966] ? kmem_cache_alloc+0x12e/0x760 [ 191.570295] ? dup_fd+0x114/0xf40 [ 191.573753] ? unshare_fd+0x1ec/0x2a0 [ 191.577554] ? unshare_files+0xa3/0x280 [ 191.581531] ? do_execveat_common.isra.34+0x362/0x2590 [ 191.586807] ? __x64_sys_execveat+0xeb/0x130 [ 191.591225] ? do_syscall_64+0x1b1/0x800 [ 191.595293] ? find_held_lock+0x36/0x1c0 [ 191.599381] ? check_same_owner+0x320/0x320 [ 191.603709] ? rcu_note_context_switch+0x710/0x710 [ 191.608651] __should_failslab+0x124/0x180 [ 191.612896] should_failslab+0x9/0x14 [ 191.616701] kmem_cache_alloc_trace+0x2cb/0x780 [ 191.621376] ? do_raw_spin_unlock+0x9e/0x2e0 [ 191.625792] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 191.629802] FAULT_INJECTION: forcing a failure. [ 191.629802] name failslab, interval 1, probability 0, space 0, times 0 [ 191.630375] ? __lock_is_held+0xb5/0x140 [ 191.630398] alloc_fdtable+0x89/0x280 [ 191.630417] dup_fd+0xa60/0xf40 [ 191.630436] ? ksys_dup3+0x670/0x670 [ 191.630468] ? lock_downgrade+0x8e0/0x8e0 [ 191.660538] ? kasan_check_read+0x11/0x20 [ 191.664682] ? rcu_is_watching+0x85/0x140 [ 191.668824] unshare_fd+0x1ec/0x2a0 [ 191.672443] ? mmdrop_async_fn+0x20/0x20 [ 191.676499] ? is_bpf_text_address+0xd7/0x170 [ 191.680989] ? __unwind_start+0x166/0x330 [ 191.685128] ? __kernel_text_address+0xd/0x40 [ 191.689617] ? unwind_get_return_address+0x61/0xa0 [ 191.694538] unshare_files+0xa3/0x280 [ 191.698334] ? __ia32_sys_unshare+0x40/0x40 [ 191.702660] do_execveat_common.isra.34+0x362/0x2590 [ 191.707753] ? kmem_cache_alloc+0x12e/0x760 [ 191.712067] ? getname_flags+0xd0/0x5a0 [ 191.716032] ? __x64_sys_execveat+0xd4/0x130 [ 191.720436] ? do_syscall_64+0x1b1/0x800 [ 191.724495] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 191.729859] ? find_held_lock+0x36/0x1c0 [ 191.733921] ? prepare_bprm_creds+0x120/0x120 [ 191.738415] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 191.743599] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 191.748609] ? __check_object_size+0x95/0x5d9 [ 191.753102] ? usercopy_warn+0x120/0x120 [ 191.757157] ? kasan_check_read+0x11/0x20 [ 191.761297] ? do_raw_spin_unlock+0x9e/0x2e0 [ 191.765699] ? kasan_check_read+0x11/0x20 [ 191.769842] ? rcu_is_watching+0x85/0x140 [ 191.773984] ? rcu_pm_notify+0xc0/0xc0 [ 191.777867] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 191.783485] ? strncpy_from_user+0x3b6/0x500 [ 191.787890] ? mpi_free.cold.1+0x19/0x19 [ 191.791944] ? ksys_write+0x1a6/0x250 [ 191.795740] ? getname_flags+0xd0/0x5a0 [ 191.799709] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 191.805237] ? getname_flags+0x26e/0x5a0 [ 191.809292] __x64_sys_execveat+0xeb/0x130 [ 191.813526] do_syscall_64+0x1b1/0x800 [ 191.817406] ? finish_task_switch+0x1ca/0x810 [ 191.821899] ? syscall_return_slowpath+0x5c0/0x5c0 [ 191.826825] ? syscall_return_slowpath+0x30f/0x5c0 [ 191.831750] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 191.837114] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 191.841953] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 191.847132] RIP: 0033:0x455979 [ 191.850311] RSP: 002b:00007f2b106b9c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 191.858010] RAX: ffffffffffffffda RBX: 00007f2b106ba6d4 RCX: 0000000000455979 [ 191.865270] RDX: 0000000020000580 RSI: 0000000020ff7000 RDI: 0000000000000013 [ 191.872528] RBP: 000000000072bea0 R08: 0000000000001000 R09: 0000000000000000 [ 191.879788] R10: 000000002034bff8 R11: 0000000000000246 R12: 0000000000000014 [ 191.887050] R13: 0000000000000079 R14: 00000000006f4bf8 R15: 0000000000000003 [ 191.894328] CPU: 0 PID: 14108 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 2018/05/06 05:51:50 executing program 6 (fault-call:0 fault-nth:3): syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) [ 191.901608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 191.910972] Call Trace: [ 191.913569] dump_stack+0x1b9/0x294 [ 191.917209] ? dump_stack_print_info.cold.2+0x52/0x52 [ 191.922416] should_fail.cold.4+0xa/0x1a [ 191.926488] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 191.931596] ? kasan_kmalloc+0xc4/0xe0 [ 191.935483] ? __kmalloc_track_caller+0x14a/0x760 [ 191.940325] ? memdup_user+0x2c/0xa0 [ 191.944040] ? strndup_user+0x77/0xd0 [ 191.947839] ? graph_lock+0x170/0x170 [ 191.951643] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 191.957279] ? find_held_lock+0x36/0x1c0 [ 191.961367] ? check_same_owner+0x320/0x320 [ 191.965958] ? lock_release+0xa10/0xa10 [ 191.969944] ? check_same_owner+0x320/0x320 [ 191.974273] ? rcu_note_context_switch+0x710/0x710 [ 191.979205] ? __check_object_size+0x95/0x5d9 [ 191.983712] __should_failslab+0x124/0x180 [ 191.987960] should_failslab+0x9/0x14 [ 191.991766] kmem_cache_alloc_trace+0x2cb/0x780 [ 191.996447] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 192.001994] ? _copy_from_user+0xdf/0x150 [ 192.006152] copy_mount_options+0x5f/0x380 [ 192.010395] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 192.015944] ksys_mount+0xd0/0x140 [ 192.019497] __x64_sys_mount+0xbe/0x150 [ 192.023478] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 192.028500] do_syscall_64+0x1b1/0x800 [ 192.032393] ? finish_task_switch+0x1ca/0x810 [ 192.036895] ? syscall_return_slowpath+0x5c0/0x5c0 [ 192.041836] ? syscall_return_slowpath+0x30f/0x5c0 [ 192.046779] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 192.052152] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 192.057002] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 192.062196] RIP: 0033:0x455979 [ 192.065385] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 192.072120] FAULT_INJECTION: forcing a failure. [ 192.072120] name failslab, interval 1, probability 0, space 0, times 0 [ 192.073090] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 192.073100] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 192.073109] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 192.073117] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 192.073125] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 [ 192.121261] CPU: 1 PID: 14115 Comm: syz-executor6 Not tainted 4.17.0-rc3+ #35 [ 192.128536] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 192.137893] Call Trace: [ 192.140491] dump_stack+0x1b9/0x294 [ 192.144129] ? dump_stack_print_info.cold.2+0x52/0x52 [ 192.149329] ? remove_wait_queue+0x350/0x350 [ 192.153746] ? check_same_owner+0x320/0x320 [ 192.158076] ? mutex_trylock+0x2a0/0x2a0 [ 192.162156] should_fail.cold.4+0xa/0x1a [ 192.166228] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 192.171347] ? open_wait+0x820/0xaa0 [ 192.175076] ? sg_poll+0x490/0x490 [ 192.178625] ? graph_lock+0x170/0x170 [ 192.182445] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 192.187990] ? __radix_tree_lookup+0x3d4/0x6b0 [ 192.192570] ? debug_check_no_locks_freed+0x310/0x310 [ 192.197749] ? check_same_owner+0x320/0x320 [ 192.202056] ? rcu_note_context_switch+0x710/0x710 [ 192.206986] ? __might_sleep+0x95/0x190 [ 192.210951] __should_failslab+0x124/0x180 [ 192.215170] should_failslab+0x9/0x14 [ 192.218965] kmem_cache_alloc_trace+0x4b/0x780 [ 192.223532] ? trace_hardirqs_on+0xd/0x10 [ 192.227667] sg_open+0x56d/0x1130 [ 192.231539] ? sg_build_reserve+0xd0/0xd0 [ 192.235670] ? refcount_inc_not_zero+0x1dd/0x2d0 [ 192.240424] ? lock_downgrade+0x8e0/0x8e0 [ 192.244552] ? m_show+0x5d0/0x5d0 [ 192.247987] ? kasan_check_read+0x11/0x20 [ 192.252120] ? do_raw_spin_unlock+0x9e/0x2e0 [ 192.256517] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 192.261087] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 192.266605] ? refcount_inc+0x29/0x70 [ 192.270389] ? sg_build_reserve+0xd0/0xd0 [ 192.274534] chrdev_open+0x256/0x760 [ 192.278232] ? cdev_put.part.0+0x50/0x50 [ 192.282278] ? errseq_sample+0xe3/0x120 [ 192.286239] ? security_file_open+0x14f/0x1d0 [ 192.290722] do_dentry_open+0x7ef/0xf10 [ 192.294680] ? cdev_put.part.0+0x50/0x50 [ 192.298725] vfs_open+0x139/0x230 [ 192.302169] path_openat+0x1676/0x4e20 [ 192.306061] ? path_lookupat.isra.44+0xbd0/0xbd0 [ 192.310809] ? find_held_lock+0x36/0x1c0 [ 192.314872] ? lock_downgrade+0x8e0/0x8e0 [ 192.319009] ? do_sys_open+0x39a/0x740 [ 192.322887] ? kasan_check_read+0x11/0x20 [ 192.327022] ? do_raw_spin_unlock+0x9e/0x2e0 [ 192.331420] ? __lock_is_held+0xb5/0x140 [ 192.335474] ? _raw_spin_unlock+0x22/0x30 [ 192.339606] ? __alloc_fd+0x346/0x700 [ 192.343386] ? usercopy_warn+0x120/0x120 [ 192.347448] do_filp_open+0x249/0x350 [ 192.351232] ? may_open_dev+0x100/0x100 [ 192.355196] ? strncpy_from_user+0x3b6/0x500 [ 192.359587] ? mpi_free.cold.1+0x19/0x19 [ 192.363632] ? get_unused_fd_flags+0x121/0x190 [ 192.368193] ? getname_flags+0xd0/0x5a0 [ 192.372153] ? getname_flags+0x26e/0x5a0 [ 192.376199] do_sys_open+0x56f/0x740 [ 192.379895] ? __do_page_fault+0x2/0xe40 [ 192.383937] ? filp_open+0x80/0x80 [ 192.387468] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 192.393012] __x64_sys_open+0x7e/0xc0 [ 192.396808] do_syscall_64+0x1b1/0x800 [ 192.400690] ? finish_task_switch+0x1ca/0x810 [ 192.405177] ? syscall_return_slowpath+0x5c0/0x5c0 [ 192.410086] ? syscall_return_slowpath+0x30f/0x5c0 [ 192.415013] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 192.420541] ? retint_user+0x18/0x18 [ 192.424240] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 192.429067] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 192.434241] RIP: 0033:0x40fbd1 [ 192.437415] RSP: 002b:00007f96757a47a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 192.445102] RAX: ffffffffffffffda RBX: cccccccccccccccd RCX: 000000000040fbd1 [ 192.452445] RDX: 0000000000000000 RSI: 0000000000000081 RDI: 00007f96757a4850 2018/05/06 05:51:50 executing program 7: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0x0, 0x8, 'queue0\x00'}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:51:50 executing program 4 (fault-call:2 fault-nth:4): r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:50 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"62726964676530000000c3ffffff00", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:50 executing program 2: ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) 2018/05/06 05:51:50 executing program 1 (fault-call:1 fault-nth:6): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:51:50 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0xffffffffffffff00, 0x8, 'queue0\x00', 0x1ff}) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:51:50 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x0, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:51:50 executing program 6 (fault-call:0 fault-nth:4): syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) [ 192.459696] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 192.466948] R10: 0000000020000080 R11: 0000000000000293 R12: 0000000000000013 [ 192.474196] R13: 00000000000006e4 R14: 00000000006fe600 R15: 0000000000000003 [ 192.536984] FAULT_INJECTION: forcing a failure. [ 192.536984] name failslab, interval 1, probability 0, space 0, times 0 [ 192.537250] FAULT_INJECTION: forcing a failure. [ 192.537250] name failslab, interval 1, probability 0, space 0, times 0 [ 192.548324] CPU: 1 PID: 14128 Comm: syz-executor4 Not tainted 4.17.0-rc3+ #35 [ 192.566852] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 192.576204] Call Trace: [ 192.578797] dump_stack+0x1b9/0x294 [ 192.582423] ? dump_stack_print_info.cold.2+0x52/0x52 [ 192.587610] ? is_bpf_text_address+0xd7/0x170 [ 192.592102] ? kernel_text_address+0x79/0xf0 [ 192.596503] ? __unwind_start+0x166/0x330 [ 192.600652] should_fail.cold.4+0xa/0x1a [ 192.604708] ? __save_stack_trace+0x7e/0xd0 [ 192.609027] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 192.614132] ? save_stack+0xa9/0xd0 [ 192.617753] ? save_stack+0x43/0xd0 [ 192.621371] ? kasan_kmalloc+0xc4/0xe0 [ 192.625254] ? kmem_cache_alloc_trace+0x152/0x780 [ 192.630094] ? find_held_lock+0x36/0x1c0 [ 192.634167] ? check_same_owner+0x320/0x320 [ 192.638482] ? lock_downgrade+0x8e0/0x8e0 [ 192.642623] ? rcu_note_context_switch+0x710/0x710 [ 192.647550] __should_failslab+0x124/0x180 [ 192.651781] should_failslab+0x9/0x14 [ 192.655573] kmem_cache_alloc_node_trace+0x26f/0x770 [ 192.660678] ? alloc_fdtable+0x89/0x280 [ 192.664647] __kmalloc_node+0x33/0x70 [ 192.668440] kvmalloc_node+0x6b/0x100 [ 192.672234] alloc_fdtable+0xd9/0x280 [ 192.676034] dup_fd+0xa60/0xf40 [ 192.679312] ? ksys_dup3+0x670/0x670 [ 192.683032] ? lock_downgrade+0x8e0/0x8e0 [ 192.687188] ? kasan_check_read+0x11/0x20 [ 192.691327] ? rcu_is_watching+0x85/0x140 [ 192.695470] unshare_fd+0x1ec/0x2a0 [ 192.699088] ? mmdrop_async_fn+0x20/0x20 [ 192.703145] ? is_bpf_text_address+0xd7/0x170 [ 192.707636] ? __unwind_start+0x166/0x330 [ 192.711777] ? __kernel_text_address+0xd/0x40 [ 192.716265] ? unwind_get_return_address+0x61/0xa0 [ 192.721186] unshare_files+0xa3/0x280 [ 192.724985] ? __ia32_sys_unshare+0x40/0x40 [ 192.729310] do_execveat_common.isra.34+0x362/0x2590 [ 192.734403] ? kmem_cache_alloc+0x12e/0x760 [ 192.738715] ? getname_flags+0xd0/0x5a0 [ 192.742679] ? __x64_sys_execveat+0xd4/0x130 [ 192.747082] ? do_syscall_64+0x1b1/0x800 [ 192.751140] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 192.756498] ? find_held_lock+0x36/0x1c0 [ 192.760551] ? prepare_bprm_creds+0x120/0x120 [ 192.765043] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 192.770227] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 192.775235] ? __check_object_size+0x95/0x5d9 [ 192.779735] ? usercopy_warn+0x120/0x120 [ 192.783790] ? kasan_check_read+0x11/0x20 [ 192.787947] ? do_raw_spin_unlock+0x9e/0x2e0 [ 192.792352] ? kasan_check_read+0x11/0x20 [ 192.796494] ? rcu_is_watching+0x85/0x140 [ 192.800638] ? rcu_pm_notify+0xc0/0xc0 [ 192.804523] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 192.810053] ? strncpy_from_user+0x3b6/0x500 [ 192.814459] ? mpi_free.cold.1+0x19/0x19 [ 192.818510] ? ksys_write+0x1a6/0x250 [ 192.822305] ? getname_flags+0xd0/0x5a0 [ 192.826275] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 192.831808] ? getname_flags+0x26e/0x5a0 [ 192.835864] __x64_sys_execveat+0xeb/0x130 [ 192.840097] do_syscall_64+0x1b1/0x800 [ 192.843979] ? finish_task_switch+0x1ca/0x810 [ 192.848469] ? syscall_return_slowpath+0x5c0/0x5c0 [ 192.853392] ? syscall_return_slowpath+0x30f/0x5c0 [ 192.858315] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 192.863673] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 192.868512] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 192.873691] RIP: 0033:0x455979 [ 192.876870] RSP: 002b:00007f2b106b9c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 192.884569] RAX: ffffffffffffffda RBX: 00007f2b106ba6d4 RCX: 0000000000455979 [ 192.891831] RDX: 0000000020000580 RSI: 0000000020ff7000 RDI: 0000000000000013 [ 192.899090] RBP: 000000000072bea0 R08: 0000000000001000 R09: 0000000000000000 [ 192.906350] R10: 000000002034bff8 R11: 0000000000000246 R12: 0000000000000014 [ 192.913616] R13: 0000000000000079 R14: 00000000006f4bf8 R15: 0000000000000004 [ 192.920898] CPU: 0 PID: 14129 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 192.928176] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 192.937540] Call Trace: [ 192.940141] dump_stack+0x1b9/0x294 [ 192.943787] ? dump_stack_print_info.cold.2+0x52/0x52 [ 192.949163] ? find_held_lock+0x36/0x1c0 [ 192.953246] should_fail.cold.4+0xa/0x1a [ 192.957323] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 192.962442] ? kasan_check_read+0x11/0x20 [ 192.966604] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 192.971811] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 192.977011] ? find_held_lock+0x36/0x1c0 [ 192.981099] ? check_same_owner+0x320/0x320 [ 192.985432] ? rcu_note_context_switch+0x710/0x710 [ 192.990371] ? save_stack+0xa9/0xd0 [ 192.994006] __should_failslab+0x124/0x180 [ 192.998256] should_failslab+0x9/0x14 [ 193.002065] kmem_cache_alloc+0x2af/0x760 [ 193.006221] getname_flags+0xd0/0x5a0 [ 193.010031] user_path_at_empty+0x2d/0x50 [ 193.014184] do_mount+0x172/0x3070 [ 193.017741] ? copy_mount_string+0x40/0x40 [ 193.021977] ? rcu_pm_notify+0xc0/0xc0 [ 193.025876] ? copy_mount_options+0x5f/0x380 [ 193.030289] ? rcu_read_lock_sched_held+0x108/0x120 [ 193.035318] ? kmem_cache_alloc_trace+0x616/0x780 [ 193.040167] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 193.045719] ? _copy_from_user+0xdf/0x150 [ 193.049881] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 193.055598] ? copy_mount_options+0x285/0x380 [ 193.060098] ksys_mount+0x12d/0x140 [ 193.063730] __x64_sys_mount+0xbe/0x150 [ 193.067713] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 193.072736] do_syscall_64+0x1b1/0x800 [ 193.076640] ? finish_task_switch+0x1ca/0x810 [ 193.081106] FAULT_INJECTION: forcing a failure. [ 193.081106] name failslab, interval 1, probability 0, space 0, times 0 [ 193.092317] ? syscall_return_slowpath+0x5c0/0x5c0 [ 193.092334] ? syscall_return_slowpath+0x30f/0x5c0 [ 193.092353] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 193.092371] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 193.092390] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 193.092401] RIP: 0033:0x455979 [ 193.092408] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 193.092421] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 2018/05/06 05:51:51 executing program 2: ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) 2018/05/06 05:51:51 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:51 executing program 4 (fault-call:2 fault-nth:5): r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:51 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"627269646765300000000000000400", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 193.092434] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 193.143039] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 193.150298] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 193.157556] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 [ 193.164838] CPU: 1 PID: 14144 Comm: syz-executor4 Not tainted 4.17.0-rc3+ #35 [ 193.172115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 193.181469] Call Trace: [ 193.184068] dump_stack+0x1b9/0x294 [ 193.187742] ? dump_stack_print_info.cold.2+0x52/0x52 [ 193.192938] ? is_bpf_text_address+0xd7/0x170 [ 193.197441] ? kernel_text_address+0x79/0xf0 [ 193.201856] ? __unwind_start+0x166/0x330 [ 193.206006] should_fail.cold.4+0xa/0x1a [ 193.210072] ? __save_stack_trace+0x7e/0xd0 [ 193.214402] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 193.219518] ? save_stack+0xa9/0xd0 [ 193.223151] ? save_stack+0x43/0xd0 [ 193.226782] ? kasan_kmalloc+0xc4/0xe0 [ 193.230668] ? kmem_cache_alloc_trace+0x152/0x780 [ 193.235515] ? find_held_lock+0x36/0x1c0 2018/05/06 05:51:51 executing program 1 (fault-call:1 fault-nth:7): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) [ 193.239598] ? check_same_owner+0x320/0x320 [ 193.243925] ? rcu_note_context_switch+0x710/0x710 [ 193.248862] __should_failslab+0x124/0x180 [ 193.253104] should_failslab+0x9/0x14 [ 193.256913] kmem_cache_alloc_node_trace+0x26f/0x770 [ 193.262021] ? alloc_fdtable+0x89/0x280 [ 193.266009] __kmalloc_node+0x33/0x70 [ 193.269816] kvmalloc_node+0x6b/0x100 [ 193.273624] alloc_fdtable+0xd9/0x280 [ 193.277435] dup_fd+0xa60/0xf40 [ 193.280730] ? ksys_dup3+0x670/0x670 [ 193.284461] ? lock_downgrade+0x8e0/0x8e0 [ 193.285934] FAULT_INJECTION: forcing a failure. [ 193.285934] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 193.288616] ? kasan_check_read+0x11/0x20 [ 193.305115] ? rcu_is_watching+0x85/0x140 [ 193.309259] unshare_fd+0x1ec/0x2a0 [ 193.312881] ? mmdrop_async_fn+0x20/0x20 [ 193.316934] ? is_bpf_text_address+0xd7/0x170 [ 193.321421] ? __unwind_start+0x166/0x330 [ 193.325558] ? __kernel_text_address+0xd/0x40 [ 193.330043] ? unwind_get_return_address+0x61/0xa0 [ 193.334963] unshare_files+0xa3/0x280 [ 193.338756] ? __ia32_sys_unshare+0x40/0x40 [ 193.343077] do_execveat_common.isra.34+0x362/0x2590 [ 193.348175] ? kmem_cache_alloc+0x12e/0x760 [ 193.352488] ? getname_flags+0xd0/0x5a0 [ 193.356450] ? __x64_sys_execveat+0xd4/0x130 [ 193.360848] ? do_syscall_64+0x1b1/0x800 [ 193.364900] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 193.370259] ? find_held_lock+0x36/0x1c0 [ 193.374311] ? prepare_bprm_creds+0x120/0x120 [ 193.378805] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 193.383986] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 193.388992] ? __check_object_size+0x95/0x5d9 [ 193.393479] ? usercopy_warn+0x120/0x120 [ 193.397533] ? kasan_check_read+0x11/0x20 [ 193.401682] ? do_raw_spin_unlock+0x9e/0x2e0 [ 193.406082] ? kasan_check_read+0x11/0x20 [ 193.410218] ? rcu_is_watching+0x85/0x140 [ 193.414358] ? rcu_pm_notify+0xc0/0xc0 [ 193.418238] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 193.423768] ? strncpy_from_user+0x3b6/0x500 [ 193.428172] ? mpi_free.cold.1+0x19/0x19 [ 193.432224] ? ksys_write+0x1a6/0x250 [ 193.436014] ? getname_flags+0xd0/0x5a0 [ 193.439983] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 193.445511] ? getname_flags+0x26e/0x5a0 [ 193.449565] __x64_sys_execveat+0xeb/0x130 [ 193.453802] do_syscall_64+0x1b1/0x800 [ 193.457680] ? finish_task_switch+0x1ca/0x810 [ 193.462168] ? syscall_return_slowpath+0x5c0/0x5c0 [ 193.467087] ? syscall_return_slowpath+0x30f/0x5c0 [ 193.472007] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 193.477367] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 193.482202] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 193.487378] RIP: 0033:0x455979 [ 193.490553] RSP: 002b:00007f2b106b9c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 193.498261] RAX: ffffffffffffffda RBX: 00007f2b106ba6d4 RCX: 0000000000455979 [ 193.505519] RDX: 0000000020000580 RSI: 0000000020ff7000 RDI: 0000000000000013 [ 193.512779] RBP: 000000000072bea0 R08: 0000000000001000 R09: 0000000000000000 [ 193.520036] R10: 000000002034bff8 R11: 0000000000000246 R12: 0000000000000014 [ 193.527294] R13: 0000000000000079 R14: 00000000006f4bf8 R15: 0000000000000005 2018/05/06 05:51:51 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"62726964676530000000fffffdfd00", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:51 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"62726964676530000000fdfdffff00", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 193.534576] CPU: 0 PID: 14153 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 193.541851] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 193.551205] Call Trace: [ 193.553799] dump_stack+0x1b9/0x294 [ 193.557437] ? dump_stack_print_info.cold.2+0x52/0x52 [ 193.562632] ? pick_next_task_fair+0x973/0x1660 [ 193.567312] should_fail.cold.4+0xa/0x1a [ 193.571380] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 193.576494] ? lock_downgrade+0x8e0/0x8e0 [ 193.580648] ? finish_task_switch+0x182/0x810 [ 193.585151] ? kasan_check_read+0x11/0x20 2018/05/06 05:51:52 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"627269646765300000000f00", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 193.589298] ? do_raw_spin_unlock+0x9e/0x2e0 [ 193.593707] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 193.598291] ? compat_start_thread+0x80/0x80 [ 193.602702] ? _raw_spin_unlock_irq+0x27/0x70 [ 193.607209] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 193.612230] ? trace_hardirqs_on+0xd/0x10 [ 193.616384] ? _raw_spin_unlock_irq+0x27/0x70 [ 193.620881] ? finish_task_switch+0x1ca/0x810 [ 193.625383] ? preempt_notifier_register+0x1e0/0x1e0 [ 193.630493] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 193.636032] ? should_fail+0x21b/0xbcd [ 193.639929] __alloc_pages_nodemask+0x34e/0xd70 [ 193.644584] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 193.649585] ? __sched_text_start+0x8/0x8 [ 193.653712] ? find_held_lock+0x36/0x1c0 [ 193.657764] ? check_same_owner+0x320/0x320 [ 193.662071] cache_grow_begin+0x72/0x6c0 [ 193.666115] kmem_cache_alloc+0x689/0x760 [ 193.670244] ? retint_kernel+0x10/0x10 [ 193.674115] getname_flags+0xd0/0x5a0 [ 193.677897] user_path_at_empty+0x2d/0x50 [ 193.682034] do_mount+0x172/0x3070 [ 193.685559] ? copy_mount_string+0x40/0x40 [ 193.689773] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 193.694772] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 193.699508] ? retint_kernel+0x10/0x10 [ 193.703377] ? copy_mount_options+0x1f0/0x380 [ 193.707850] ? copy_mount_options+0x1fa/0x380 [ 193.712324] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 193.717839] ? copy_mount_options+0x285/0x380 [ 193.722315] ksys_mount+0x12d/0x140 [ 193.725924] __x64_sys_mount+0xbe/0x150 [ 193.729876] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 193.734872] do_syscall_64+0x1b1/0x800 [ 193.738738] ? finish_task_switch+0x1ca/0x810 [ 193.743211] ? syscall_return_slowpath+0x5c0/0x5c0 [ 193.748121] ? syscall_return_slowpath+0x30f/0x5c0 [ 193.753039] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 193.758384] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 193.763213] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 193.768382] RIP: 0033:0x455979 [ 193.771552] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 193.779240] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 193.786487] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 193.793732] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 193.800979] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 193.808228] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 2018/05/06 05:51:52 executing program 7: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0x0, 0x8, 'queue0\x00'}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:51:52 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"62726964676530000000000000000f00", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:52 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0xffffffffffffff00, 0x8, 'queue0\x00', 0x1ff}) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) [ 193.889100] FAULT_INJECTION: forcing a failure. [ 193.889100] name failslab, interval 1, probability 0, space 0, times 0 [ 193.900435] CPU: 1 PID: 14135 Comm: syz-executor6 Not tainted 4.17.0-rc3+ #35 [ 193.907719] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 193.917083] Call Trace: [ 193.919694] dump_stack+0x1b9/0x294 [ 193.923342] ? dump_stack_print_info.cold.2+0x52/0x52 [ 193.928554] should_fail.cold.4+0xa/0x1a [ 193.932635] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 193.937764] ? print_usage_bug+0xc0/0xc0 [ 193.941839] ? save_stack+0xa9/0xd0 [ 193.943472] FAULT_INJECTION: forcing a failure. [ 193.943472] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 193.945479] ? save_stack+0x43/0xd0 [ 193.960890] ? kasan_kmalloc+0xc4/0xe0 [ 193.964780] ? kmem_cache_alloc_trace+0x152/0x780 [ 193.969622] ? sg_open+0x56d/0x1130 [ 193.973238] ? chrdev_open+0x256/0x760 [ 193.977114] ? do_dentry_open+0x7ef/0xf10 [ 193.981249] ? vfs_open+0x139/0x230 [ 193.984867] ? path_openat+0x1676/0x4e20 [ 193.988918] ? do_filp_open+0x249/0x350 [ 193.992886] ? print_usage_bug+0xc0/0xc0 [ 193.996938] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 194.002291] ? graph_lock+0x170/0x170 [ 194.006086] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 194.011618] ? mark_held_locks+0xc9/0x160 [ 194.015755] ? print_usage_bug+0xc0/0xc0 [ 194.019807] ? debug_mutex_init+0x1c/0x60 [ 194.023950] __should_failslab+0x124/0x180 [ 194.028180] should_failslab+0x9/0x14 [ 194.031968] __kmalloc+0x63/0x760 [ 194.035413] ? lock_downgrade+0x8e0/0x8e0 [ 194.039549] ? sg_build_indirect.isra.15+0x9d/0x750 [ 194.044559] sg_build_indirect.isra.15+0x9d/0x750 [ 194.049390] ? mark_held_locks+0xc9/0x160 [ 194.053530] sg_build_reserve+0x9c/0xd0 [ 194.057496] sg_open+0xaca/0x1130 [ 194.060941] ? sg_build_reserve+0xd0/0xd0 [ 194.065083] ? refcount_inc_not_zero+0x1dd/0x2d0 [ 194.069841] ? lock_downgrade+0x8e0/0x8e0 [ 194.073977] ? m_show+0x5d0/0x5d0 [ 194.077424] ? kasan_check_read+0x11/0x20 [ 194.081564] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 194.086139] ? refcount_inc+0x29/0x70 [ 194.089933] ? sg_build_reserve+0xd0/0xd0 [ 194.094070] chrdev_open+0x256/0x760 [ 194.097785] ? cdev_put.part.0+0x50/0x50 [ 194.101838] ? errseq_sample+0xe3/0x120 [ 194.105811] ? security_file_open+0x14f/0x1d0 [ 194.110305] do_dentry_open+0x7ef/0xf10 [ 194.114279] ? cdev_put.part.0+0x50/0x50 [ 194.118333] vfs_open+0x139/0x230 [ 194.121780] path_openat+0x1676/0x4e20 [ 194.125670] ? path_lookupat.isra.44+0xbd0/0xbd0 [ 194.130420] ? find_held_lock+0x36/0x1c0 [ 194.134482] ? lock_downgrade+0x8e0/0x8e0 [ 194.138617] ? do_sys_open+0x39a/0x740 [ 194.142500] ? kasan_check_read+0x11/0x20 [ 194.146639] ? do_raw_spin_unlock+0x9e/0x2e0 [ 194.151038] ? __lock_is_held+0xb5/0x140 [ 194.155097] ? _raw_spin_unlock+0x22/0x30 [ 194.159238] ? __alloc_fd+0x346/0x700 [ 194.163028] ? usercopy_warn+0x120/0x120 [ 194.167087] do_filp_open+0x249/0x350 [ 194.170879] ? may_open_dev+0x100/0x100 [ 194.174846] ? strncpy_from_user+0x3b6/0x500 [ 194.179283] ? mpi_free.cold.1+0x19/0x19 [ 194.183341] ? get_unused_fd_flags+0x121/0x190 [ 194.187911] ? getname_flags+0xd0/0x5a0 [ 194.191876] ? getname_flags+0x26e/0x5a0 [ 194.195931] do_sys_open+0x56f/0x740 [ 194.199638] ? __do_page_fault+0x2/0xe40 [ 194.203689] ? filp_open+0x80/0x80 [ 194.207219] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 194.212756] __x64_sys_open+0x7e/0xc0 [ 194.216555] do_syscall_64+0x1b1/0x800 [ 194.220433] ? finish_task_switch+0x1ca/0x810 [ 194.224923] ? syscall_return_slowpath+0x5c0/0x5c0 [ 194.229852] ? syscall_return_slowpath+0x30f/0x5c0 [ 194.234776] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 194.240305] ? retint_user+0x18/0x18 [ 194.244014] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 194.248853] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 194.254029] RIP: 0033:0x40fbd1 [ 194.257205] RSP: 002b:00007f96757a47a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 194.264907] RAX: ffffffffffffffda RBX: cccccccccccccccd RCX: 000000000040fbd1 [ 194.272166] RDX: 0000000000000000 RSI: 0000000000000081 RDI: 00007f96757a4850 [ 194.279422] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 2018/05/06 05:51:52 executing program 1 (fault-call:1 fault-nth:8): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) [ 194.286684] R10: 0000000020000080 R11: 0000000000000293 R12: 0000000000000013 [ 194.293941] R13: 00000000000006e4 R14: 00000000006fe600 R15: 0000000000000004 [ 194.301218] CPU: 0 PID: 14172 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 194.308496] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 194.317857] Call Trace: [ 194.320454] dump_stack+0x1b9/0x294 [ 194.324090] ? dump_stack_print_info.cold.2+0x52/0x52 [ 194.329293] should_fail.cold.4+0xa/0x1a [ 194.333358] ? fault_create_debugfs_attr+0x1f0/0x1f0 2018/05/06 05:51:52 executing program 6: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) 2018/05/06 05:51:52 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"6272696467653000000000ffffffc300", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 194.338472] ? debug_check_no_locks_freed+0x310/0x310 [ 194.343672] ? print_usage_bug+0xc0/0xc0 [ 194.347750] ? graph_lock+0x170/0x170 [ 194.351568] ? print_usage_bug+0xc0/0xc0 [ 194.355639] ? find_held_lock+0x36/0x1c0 [ 194.359712] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 194.365257] ? should_fail+0x21b/0xbcd [ 194.369157] __alloc_pages_nodemask+0x34e/0xd70 [ 194.373834] ? kasan_check_read+0x11/0x20 [ 194.377987] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 194.383012] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 194.388210] ? find_held_lock+0x36/0x1c0 [ 194.392285] ? nlmsvc_testlock+0x3b0/0x3e0 [ 194.396536] ? check_same_owner+0x320/0x320 [ 194.400867] cache_grow_begin+0x72/0x6c0 [ 194.404940] kmem_cache_alloc+0x689/0x760 [ 194.409093] ? find_held_lock+0x36/0x1c0 [ 194.413165] getname_flags+0xd0/0x5a0 [ 194.416982] user_path_at_empty+0x2d/0x50 [ 194.421135] do_mount+0x172/0x3070 [ 194.424685] ? do_raw_spin_unlock+0x9e/0x2e0 [ 194.429102] ? copy_mount_string+0x40/0x40 [ 194.433339] ? rcu_pm_notify+0xc0/0xc0 [ 194.437243] ? copy_mount_options+0x5f/0x380 [ 194.441657] ? rcu_read_lock_sched_held+0x108/0x120 [ 194.446688] ? kmem_cache_alloc_trace+0x616/0x780 [ 194.451541] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 194.457086] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 194.462611] ? copy_mount_options+0x285/0x380 [ 194.467089] ksys_mount+0x12d/0x140 [ 194.470700] __x64_sys_mount+0xbe/0x150 [ 194.474655] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 194.479668] do_syscall_64+0x1b1/0x800 [ 194.483538] ? finish_task_switch+0x1ca/0x810 [ 194.488032] ? syscall_return_slowpath+0x5c0/0x5c0 [ 194.492947] ? syscall_return_slowpath+0x30f/0x5c0 [ 194.497872] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 194.503318] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 194.508156] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 194.513324] RIP: 0033:0x455979 [ 194.516495] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 194.524185] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 194.531433] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 194.538685] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 194.545938] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 194.553195] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 2018/05/06 05:51:53 executing program 2: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) 2018/05/06 05:51:53 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x0, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:51:53 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"6272696467653000000000000f00", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:53 executing program 4 (fault-call:2 fault-nth:6): r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:53 executing program 1 (fault-call:1 fault-nth:9): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:51:53 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0x0, 0x8, 'queue0\x00', 0x1ff}) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:51:53 executing program 6: syz_open_dev$sg(&(0x7f0000000080)='/.ev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) 2018/05/06 05:51:53 executing program 7: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0x0, 0x8, 'queue0\x00'}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) [ 194.790761] FAULT_INJECTION: forcing a failure. [ 194.790761] name failslab, interval 1, probability 0, space 0, times 0 [ 194.796215] FAULT_INJECTION: forcing a failure. [ 194.796215] name failslab, interval 1, probability 0, space 0, times 0 [ 194.802159] CPU: 1 PID: 14201 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 194.820585] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 194.829937] Call Trace: [ 194.832529] dump_stack+0x1b9/0x294 [ 194.836157] ? dump_stack_print_info.cold.2+0x52/0x52 [ 194.841344] ? kernel_text_address+0x79/0xf0 [ 194.845746] ? __unwind_start+0x166/0x330 [ 194.849885] ? __kernel_text_address+0xd/0x40 [ 194.854376] should_fail.cold.4+0xa/0x1a [ 194.858432] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 194.863538] ? save_stack+0x43/0xd0 [ 194.867160] ? kasan_kmalloc+0xc4/0xe0 [ 194.871040] ? kasan_slab_alloc+0x12/0x20 [ 194.875183] ? kmem_cache_alloc+0x12e/0x760 [ 194.879499] ? alloc_vfsmnt+0xe0/0x9d0 [ 194.883376] ? vfs_kern_mount.part.34+0x88/0x4d0 [ 194.888125] ? find_held_lock+0x36/0x1c0 [ 194.892196] ? check_same_owner+0x320/0x320 [ 194.896518] ? rcu_note_context_switch+0x710/0x710 [ 194.901444] __should_failslab+0x124/0x180 [ 194.905677] should_failslab+0x9/0x14 [ 194.909470] __kmalloc_track_caller+0x2c4/0x760 [ 194.914135] ? kasan_check_read+0x11/0x20 [ 194.918275] ? do_raw_spin_unlock+0x9e/0x2e0 [ 194.922677] ? kstrdup_const+0x66/0x80 [ 194.926573] kstrdup+0x39/0x70 [ 194.929760] kstrdup_const+0x66/0x80 [ 194.933467] alloc_vfsmnt+0x1b3/0x9d0 [ 194.937260] ? mnt_free_id.isra.27+0x60/0x60 [ 194.941662] ? kasan_check_read+0x11/0x20 [ 194.945801] ? graph_lock+0x170/0x170 [ 194.949597] ? rcu_pm_notify+0xc0/0xc0 [ 194.953474] ? trace_hardirqs_off+0xd/0x10 [ 194.957702] ? putname+0xf2/0x130 [ 194.961150] ? putname+0xf2/0x130 [ 194.964598] ? find_held_lock+0x36/0x1c0 [ 194.968657] ? lock_downgrade+0x8e0/0x8e0 [ 194.972795] ? module_unload_free+0x5b0/0x5b0 [ 194.977279] ? lock_release+0xa10/0xa10 [ 194.981249] ? mpi_free.cold.1+0x19/0x19 [ 194.985307] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 194.990837] vfs_kern_mount.part.34+0x88/0x4d0 [ 194.995414] ? may_umount+0xb0/0xb0 [ 194.999032] ? _raw_read_unlock+0x22/0x30 [ 195.003170] ? __get_fs_type+0x97/0xc0 [ 195.007058] do_mount+0x564/0x3070 [ 195.010597] ? copy_mount_string+0x40/0x40 [ 195.014822] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 195.019832] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 195.024583] ? retint_kernel+0x10/0x10 [ 195.028470] ? copy_mount_options+0x1f0/0x380 [ 195.032959] ? copy_mount_options+0x206/0x380 [ 195.037970] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 195.043501] ? copy_mount_options+0x285/0x380 [ 195.047995] ksys_mount+0x12d/0x140 [ 195.051621] __x64_sys_mount+0xbe/0x150 [ 195.055589] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 195.060599] do_syscall_64+0x1b1/0x800 [ 195.064477] ? finish_task_switch+0x1ca/0x810 [ 195.068967] ? syscall_return_slowpath+0x5c0/0x5c0 [ 195.073889] ? syscall_return_slowpath+0x30f/0x5c0 [ 195.078815] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 195.084176] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 195.089021] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 195.094205] RIP: 0033:0x455979 [ 195.097384] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 195.105082] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 195.112362] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 195.119623] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 195.126881] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 195.134952] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 [ 195.142231] CPU: 0 PID: 14189 Comm: syz-executor4 Not tainted 4.17.0-rc3+ #35 [ 195.149517] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 195.158870] Call Trace: [ 195.161465] dump_stack+0x1b9/0x294 [ 195.165100] ? dump_stack_print_info.cold.2+0x52/0x52 [ 195.170298] ? dup_fd+0x802/0xf40 [ 195.173760] should_fail.cold.4+0xa/0x1a [ 195.177833] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 195.182951] ? find_held_lock+0x36/0x1c0 [ 195.187023] ? check_same_owner+0x320/0x320 [ 195.191331] ? rcu_note_context_switch+0x710/0x710 [ 195.196246] ? do_raw_spin_lock+0xc1/0x200 [ 195.200467] __should_failslab+0x124/0x180 [ 195.204687] should_failslab+0x9/0x14 [ 195.208471] kmem_cache_alloc_trace+0x2cb/0x780 [ 195.213126] ? __ia32_sys_unshare+0x40/0x40 [ 195.217441] do_execveat_common.isra.34+0x41e/0x2590 [ 195.222787] ? kmem_cache_alloc+0x12e/0x760 [ 195.227099] ? getname_flags+0xd0/0x5a0 [ 195.231059] ? __x64_sys_execveat+0xd4/0x130 [ 195.235448] ? do_syscall_64+0x1b1/0x800 [ 195.239493] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 195.244850] ? find_held_lock+0x36/0x1c0 [ 195.248903] ? prepare_bprm_creds+0x120/0x120 [ 195.253383] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 195.258568] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 195.263585] ? __check_object_size+0x95/0x5d9 [ 195.268072] ? usercopy_warn+0x120/0x120 [ 195.272119] ? kasan_check_read+0x11/0x20 [ 195.276259] ? do_raw_spin_unlock+0x9e/0x2e0 [ 195.280664] ? kasan_check_read+0x11/0x20 [ 195.284803] ? rcu_is_watching+0x85/0x140 [ 195.288942] ? rcu_pm_notify+0xc0/0xc0 [ 195.292822] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 195.298698] ? strncpy_from_user+0x3b6/0x500 [ 195.303667] ? mpi_free.cold.1+0x19/0x19 [ 195.307717] ? ksys_write+0x1a6/0x250 [ 195.311531] ? getname_flags+0xd0/0x5a0 [ 195.315509] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 195.321042] ? getname_flags+0x26e/0x5a0 [ 195.325087] __x64_sys_execveat+0xeb/0x130 [ 195.329320] do_syscall_64+0x1b1/0x800 [ 195.333198] ? syscall_return_slowpath+0x5c0/0x5c0 [ 195.338111] ? syscall_return_slowpath+0x30f/0x5c0 [ 195.343035] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 195.348394] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 195.353225] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 195.358411] RIP: 0033:0x455979 [ 195.361595] RSP: 002b:00007f2b106b9c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 195.369294] RAX: ffffffffffffffda RBX: 00007f2b106ba6d4 RCX: 0000000000455979 [ 195.376546] RDX: 0000000020000580 RSI: 0000000020ff7000 RDI: 0000000000000013 [ 195.383803] RBP: 000000000072bea0 R08: 0000000000001000 R09: 0000000000000000 2018/05/06 05:51:53 executing program 1 (fault-call:1 fault-nth:10): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) [ 195.391064] R10: 000000002034bff8 R11: 0000000000000246 R12: 0000000000000014 [ 195.398316] R13: 0000000000000079 R14: 00000000006f4bf8 R15: 0000000000000006 [ 195.432996] FAULT_INJECTION: forcing a failure. 2018/05/06 05:51:53 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:51:53 executing program 6: syz_open_dev$sg(&(0x7f0000000080)='//ev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) [ 195.432996] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 195.444927] CPU: 0 PID: 14207 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 195.452213] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 195.461577] Call Trace: [ 195.464188] dump_stack+0x1b9/0x294 [ 195.467840] ? dump_stack_print_info.cold.2+0x52/0x52 [ 195.473060] should_fail.cold.4+0xa/0x1a [ 195.477141] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 195.482268] ? pcpu_balance_workfn+0x16d0/0x16d0 [ 195.487041] ? find_held_lock+0x36/0x1c0 2018/05/06 05:51:53 executing program 6: syz_open_dev$sg(&(0x7f0000000080)='/dev/.g#\x00', 0x0, 0x81) close(0xffffffffffffffff) [ 195.491139] ? check_same_owner+0x320/0x320 [ 195.495480] ? __lockdep_init_map+0x105/0x590 [ 195.499993] ? rcu_note_context_switch+0x710/0x710 [ 195.504942] ? lockdep_init_map+0x9/0x10 [ 195.509027] ? __might_sleep+0x95/0x190 [ 195.513020] __alloc_pages_nodemask+0x34e/0xd70 [ 195.517708] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 195.522740] ? kasan_check_read+0x11/0x20 [ 195.526906] ? rcu_pm_notify+0xc0/0xc0 [ 195.530803] ? trace_hardirqs_off+0xd/0x10 [ 195.535060] ? putname+0xf2/0x130 [ 195.538529] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 195.544075] alloc_pages_current+0x10c/0x210 [ 195.548499] __get_free_pages+0xf/0x40 [ 195.552399] get_zeroed_page+0x11/0x20 [ 195.556299] mount_fs+0x210/0x328 [ 195.559764] ? mpi_free.cold.1+0x19/0x19 [ 195.563851] vfs_kern_mount.part.34+0xd4/0x4d0 [ 195.568460] ? may_umount+0xb0/0xb0 [ 195.572094] ? _raw_read_unlock+0x22/0x30 [ 195.576253] ? __get_fs_type+0x97/0xc0 [ 195.580159] do_mount+0x564/0x3070 [ 195.583724] ? copy_mount_string+0x40/0x40 [ 195.587968] ? rcu_pm_notify+0xc0/0xc0 2018/05/06 05:51:54 executing program 6: syz_open_dev$sg(&(0x7f0000000080)='/dev//g#\x00', 0x0, 0x81) close(0xffffffffffffffff) 2018/05/06 05:51:54 executing program 7: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0x0, 0x8, 'queue0\x00'}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) close(r0) [ 195.591872] ? copy_mount_options+0x5f/0x380 [ 195.596287] ? rcu_read_lock_sched_held+0x108/0x120 [ 195.601320] ? kmem_cache_alloc_trace+0x616/0x780 [ 195.606171] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 195.611713] ? _copy_from_user+0xdf/0x150 [ 195.615872] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 195.621415] ? copy_mount_options+0x285/0x380 [ 195.625923] ksys_mount+0x12d/0x140 [ 195.629557] __x64_sys_mount+0xbe/0x150 [ 195.633540] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 195.638568] do_syscall_64+0x1b1/0x800 2018/05/06 05:51:54 executing program 2: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) close(0xffffffffffffffff) [ 195.642465] ? finish_task_switch+0x1ca/0x810 [ 195.647087] ? syscall_return_slowpath+0x5c0/0x5c0 [ 195.652022] ? syscall_return_slowpath+0x30f/0x5c0 [ 195.656959] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 195.662327] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 195.667181] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 195.672374] RIP: 0033:0x455979 [ 195.675563] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 195.683276] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 2018/05/06 05:51:54 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0x0, 0x8, 'queue0\x00', 0x1ff}) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) [ 195.690561] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 195.697832] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 195.705104] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 195.712380] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 2018/05/06 05:51:54 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:54 executing program 6: syz_open_dev$sg(&(0x7f0000000080)="2f6465762f73672304", 0x0, 0x81) close(0xffffffffffffffff) 2018/05/06 05:51:54 executing program 7: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0x0, 0x8, 'queue0\x00'}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) close(r0) 2018/05/06 05:51:54 executing program 1 (fault-call:1 fault-nth:11): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:51:54 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:51:54 executing program 2: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) close(0xffffffffffffffff) 2018/05/06 05:51:54 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0x0, 0x0, 'queue0\x00', 0x1ff}) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:51:54 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:55 executing program 2: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) close(0xffffffffffffffff) [ 196.609199] FAULT_INJECTION: forcing a failure. [ 196.609199] name failslab, interval 1, probability 0, space 0, times 0 [ 196.620532] CPU: 0 PID: 14253 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 196.627815] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 196.637171] Call Trace: [ 196.639777] dump_stack+0x1b9/0x294 [ 196.643421] ? dump_stack_print_info.cold.2+0x52/0x52 [ 196.648630] ? kasan_check_write+0x14/0x20 [ 196.652883] should_fail.cold.4+0xa/0x1a 2018/05/06 05:51:55 executing program 6: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) 2018/05/06 05:51:55 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"62726964676530000000000300", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 196.656961] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 196.662079] ? find_next_zero_bit+0x111/0x140 [ 196.666600] ? rcu_is_watching+0x85/0x140 [ 196.670754] ? rcu_pm_notify+0xc0/0xc0 [ 196.674654] ? find_held_lock+0x36/0x1c0 [ 196.678744] ? check_same_owner+0x320/0x320 [ 196.683084] ? rcu_note_context_switch+0x710/0x710 [ 196.688027] __should_failslab+0x124/0x180 [ 196.692273] should_failslab+0x9/0x14 [ 196.696087] kmem_cache_alloc_trace+0x2cb/0x780 [ 196.700770] ? kasan_check_write+0x14/0x20 [ 196.705018] ? do_raw_spin_lock+0xc1/0x200 [ 196.709266] sget_userns+0x1c7/0xf00 [ 196.712991] ? get_anon_bdev+0x2f0/0x2f0 [ 196.717067] ? destroy_unused_super.part.11+0x110/0x110 [ 196.722443] ? __alloc_pages_nodemask+0xacf/0xd70 [ 196.727298] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 196.732334] ? kasan_check_read+0x11/0x20 [ 196.736496] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 196.742568] ? cap_capable+0x1f9/0x260 [ 196.746489] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 196.752042] ? security_capable+0x99/0xc0 [ 196.756207] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 196.761844] ? ns_capable_common+0x13f/0x170 [ 196.766266] ? get_anon_bdev+0x2f0/0x2f0 [ 196.770335] sget+0x10b/0x150 [ 196.773454] ? fuse_get_root_inode+0x190/0x190 [ 196.778050] mount_nodev+0x33/0x110 [ 196.781691] fuse_mount+0x2c/0x40 [ 196.785148] mount_fs+0xae/0x328 [ 196.788522] vfs_kern_mount.part.34+0xd4/0x4d0 [ 196.793111] ? may_umount+0xb0/0xb0 [ 196.796741] ? _raw_read_unlock+0x22/0x30 [ 196.800892] ? __get_fs_type+0x97/0xc0 [ 196.804790] do_mount+0x564/0x3070 [ 196.808339] ? copy_mount_string+0x40/0x40 [ 196.812586] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 196.817349] ? retint_kernel+0x10/0x10 [ 196.821246] ? copy_mount_options+0x213/0x380 [ 196.825752] ? __sanitizer_cov_trace_pc+0x14/0x50 [ 196.830605] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 196.836149] ? copy_mount_options+0x285/0x380 [ 196.840655] ksys_mount+0x12d/0x140 [ 196.844296] __x64_sys_mount+0xbe/0x150 [ 196.848277] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 196.853298] do_syscall_64+0x1b1/0x800 [ 196.857197] ? syscall_return_slowpath+0x5c0/0x5c0 [ 196.862135] ? syscall_return_slowpath+0x30f/0x5c0 [ 196.867077] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 196.872443] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 196.877275] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 196.882447] RIP: 0033:0x455979 [ 196.885623] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 196.893325] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 196.900857] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 196.908115] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 196.915377] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 196.922651] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 2018/05/06 05:51:55 executing program 7: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0x0, 0x8, 'queue0\x00'}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) close(r0) 2018/05/06 05:51:55 executing program 2: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0x0, 0x8, 'queue0\x00'}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:51:55 executing program 1 (fault-call:1 fault-nth:12): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:51:55 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='.%file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:55 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:51:55 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0x0, 0x0, 'queue0\x00'}) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:51:55 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"6272696467653000000000c3ffffff00", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:55 executing program 6: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) 2018/05/06 05:51:55 executing program 7: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0x0, 0x8, 'queue0\x00'}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) 2018/05/06 05:51:55 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 197.513095] FAULT_INJECTION: forcing a failure. [ 197.513095] name failslab, interval 1, probability 0, space 0, times 0 [ 197.524835] CPU: 0 PID: 14276 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 197.532120] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.541475] Call Trace: [ 197.544079] dump_stack+0x1b9/0x294 [ 197.547723] ? dump_stack_print_info.cold.2+0x52/0x52 [ 197.552922] ? kernel_text_address+0x79/0xf0 [ 197.557340] ? __unwind_start+0x166/0x330 [ 197.561507] should_fail.cold.4+0xa/0x1a [ 197.565583] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 197.570706] ? graph_lock+0x170/0x170 [ 197.574524] ? save_stack+0x43/0xd0 [ 197.578159] ? kasan_kmalloc+0xc4/0xe0 [ 197.582050] ? __kmalloc+0x14e/0x760 [ 197.585772] ? __list_lru_init+0xdd/0x790 [ 197.589934] ? find_held_lock+0x36/0x1c0 [ 197.594010] ? __lock_is_held+0xb5/0x140 [ 197.598084] ? l2cap_rx+0xca0/0x1e10 [ 197.601821] ? check_same_owner+0x320/0x320 [ 197.606156] ? rcu_note_context_switch+0x710/0x710 [ 197.611097] __should_failslab+0x124/0x180 [ 197.615336] should_failslab+0x9/0x14 [ 197.619136] kmem_cache_alloc_node_trace+0x26f/0x770 [ 197.624232] ? mark_held_locks+0xc9/0x160 [ 197.628366] ? __raw_spin_lock_init+0x1c/0x100 [ 197.632934] __kmalloc_node+0x33/0x70 [ 197.636736] kvmalloc_node+0x6b/0x100 [ 197.640535] __list_lru_init+0x559/0x790 [ 197.644590] ? list_lru_destroy+0x4c0/0x4c0 [ 197.648908] ? mark_held_locks+0xc9/0x160 [ 197.653064] ? __raw_spin_lock_init+0x1c/0x100 [ 197.657642] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 197.662641] ? __lockdep_init_map+0x105/0x590 [ 197.667128] ? lockdep_init_map+0x9/0x10 [ 197.671201] sget_userns+0x73a/0xf00 [ 197.674909] ? get_anon_bdev+0x2f0/0x2f0 [ 197.678970] ? destroy_unused_super.part.11+0x110/0x110 [ 197.684334] ? __alloc_pages_nodemask+0xacf/0xd70 [ 197.689171] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 197.694181] ? kasan_check_read+0x11/0x20 [ 197.698322] ? cap_capable+0x1f9/0x260 [ 197.702205] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 197.707727] ? security_capable+0x99/0xc0 [ 197.711863] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 197.717386] ? ns_capable_common+0x13f/0x170 [ 197.721783] ? get_anon_bdev+0x2f0/0x2f0 [ 197.725839] sget+0x10b/0x150 [ 197.728948] ? fuse_get_root_inode+0x190/0x190 [ 197.733534] mount_nodev+0x33/0x110 [ 197.737153] fuse_mount+0x2c/0x40 [ 197.740602] mount_fs+0xae/0x328 [ 197.743954] vfs_kern_mount.part.34+0xd4/0x4d0 [ 197.748519] ? may_umount+0xb0/0xb0 [ 197.752144] ? _raw_read_unlock+0x22/0x30 [ 197.756280] ? __get_fs_type+0x97/0xc0 [ 197.760162] do_mount+0x564/0x3070 [ 197.763699] ? copy_mount_string+0x40/0x40 [ 197.767926] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 197.772928] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 197.777689] ? retint_kernel+0x10/0x10 [ 197.781579] ? copy_mount_options+0x1f0/0x380 [ 197.786072] ? copy_mount_options+0x1fa/0x380 [ 197.790561] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 197.796083] ? copy_mount_options+0x285/0x380 [ 197.800565] ksys_mount+0x12d/0x140 [ 197.804192] __x64_sys_mount+0xbe/0x150 [ 197.808150] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 197.813161] do_syscall_64+0x1b1/0x800 [ 197.817044] ? finish_task_switch+0x1ca/0x810 [ 197.821539] ? syscall_return_slowpath+0x5c0/0x5c0 [ 197.826480] ? syscall_return_slowpath+0x30f/0x5c0 [ 197.831409] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 197.836783] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 197.841626] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 197.846809] RIP: 0033:0x455979 [ 197.849988] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 197.857685] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 2018/05/06 05:51:56 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00\x00\x00\x00\x00\x00\x00@\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 197.864947] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 197.872216] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 197.879489] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 197.886745] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 2018/05/06 05:51:56 executing program 1 (fault-call:1 fault-nth:13): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) [ 198.007878] FAULT_INJECTION: forcing a failure. [ 198.007878] name failslab, interval 1, probability 0, space 0, times 0 [ 198.019238] CPU: 0 PID: 14306 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 198.026520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.035865] Call Trace: [ 198.038445] dump_stack+0x1b9/0x294 [ 198.042061] ? dump_stack_print_info.cold.2+0x52/0x52 [ 198.047238] ? pcpu_next_unpop+0x83/0xf0 [ 198.051285] should_fail.cold.4+0xa/0x1a [ 198.055347] ? kasan_check_write+0x14/0x20 [ 198.059584] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 198.064674] ? graph_lock+0x170/0x170 [ 198.068463] ? wait_for_completion+0x870/0x870 [ 198.073038] ? graph_lock+0x170/0x170 [ 198.076827] ? find_next_zero_bit+0x111/0x140 [ 198.081313] ? find_held_lock+0x36/0x1c0 [ 198.085365] ? __lock_is_held+0xb5/0x140 [ 198.089441] ? check_same_owner+0x320/0x320 [ 198.093767] ? __might_sleep+0x95/0x190 [ 198.097729] ? rcu_note_context_switch+0x710/0x710 [ 198.102659] __should_failslab+0x124/0x180 [ 198.106895] should_failslab+0x9/0x14 [ 198.110689] __kmalloc+0x2c8/0x760 [ 198.114215] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 198.119227] ? __lockdep_init_map+0x105/0x590 [ 198.123730] ? __list_lru_init+0xdd/0x790 [ 198.127874] __list_lru_init+0xdd/0x790 [ 198.131846] ? list_lru_destroy+0x4c0/0x4c0 [ 198.136154] ? mark_held_locks+0xc9/0x160 [ 198.140305] ? __raw_spin_lock_init+0x1c/0x100 [ 198.144883] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 198.149882] ? __lockdep_init_map+0x105/0x590 [ 198.154360] ? lockdep_init_map+0x9/0x10 [ 198.158405] sget_userns+0x73a/0xf00 [ 198.162100] ? get_anon_bdev+0x2f0/0x2f0 [ 198.166157] ? destroy_unused_super.part.11+0x110/0x110 [ 198.171510] ? __alloc_pages_nodemask+0xacf/0xd70 [ 198.176336] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 198.181348] ? kasan_check_read+0x11/0x20 [ 198.185487] ? cap_capable+0x1f9/0x260 [ 198.189375] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 198.194896] ? security_capable+0x99/0xc0 [ 198.199039] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 198.204576] ? ns_capable_common+0x13f/0x170 [ 198.208975] ? get_anon_bdev+0x2f0/0x2f0 [ 198.213028] sget+0x10b/0x150 [ 198.216131] ? fuse_get_root_inode+0x190/0x190 [ 198.220703] mount_nodev+0x33/0x110 [ 198.224322] fuse_mount+0x2c/0x40 [ 198.227771] mount_fs+0xae/0x328 [ 198.231137] vfs_kern_mount.part.34+0xd4/0x4d0 [ 198.235703] ? may_umount+0xb0/0xb0 [ 198.239311] ? _raw_read_unlock+0x22/0x30 [ 198.243441] ? __get_fs_type+0x97/0xc0 [ 198.247316] do_mount+0x564/0x3070 [ 198.250853] ? copy_mount_string+0x40/0x40 [ 198.255078] ? rcu_pm_notify+0xc0/0xc0 [ 198.258960] ? copy_mount_options+0x5f/0x380 [ 198.263352] ? rcu_read_lock_sched_held+0x108/0x120 [ 198.268361] ? kmem_cache_alloc_trace+0x616/0x780 [ 198.273203] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 198.278724] ? copy_mount_options+0x285/0x380 [ 198.283205] ksys_mount+0x12d/0x140 [ 198.286815] __x64_sys_mount+0xbe/0x150 [ 198.290770] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 198.295769] do_syscall_64+0x1b1/0x800 [ 198.299640] ? finish_task_switch+0x1ca/0x810 [ 198.304136] ? syscall_return_slowpath+0x5c0/0x5c0 [ 198.309064] ? syscall_return_slowpath+0x30f/0x5c0 [ 198.313980] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 198.319342] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 198.324184] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 198.329355] RIP: 0033:0x455979 [ 198.332527] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 198.340220] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 198.347469] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 198.354719] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 198.361967] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 198.369219] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 2018/05/06 05:51:56 executing program 7: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0x0, 0x8, 'queue0\x00'}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:51:56 executing program 1 (fault-call:1 fault-nth:14): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:51:56 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./%ile0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:56 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"6272696467653000000000000300", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:56 executing program 2: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0xffffffffffffff00, 0x8, 'queue0\x00', 0x1ff}) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:51:56 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0x0, 0x0, 'queue0\x00'}) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:51:56 executing program 6: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) 2018/05/06 05:51:56 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) [ 198.553543] FAULT_INJECTION: forcing a failure. [ 198.553543] name failslab, interval 1, probability 0, space 0, times 0 [ 198.564846] CPU: 1 PID: 14323 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 198.572125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.581487] Call Trace: [ 198.584091] dump_stack+0x1b9/0x294 [ 198.587733] ? dump_stack_print_info.cold.2+0x52/0x52 [ 198.592941] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 198.598147] should_fail.cold.4+0xa/0x1a 2018/05/06 05:51:57 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"62726964676530000000000200", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 198.602219] ? is_bpf_text_address+0xd7/0x170 [ 198.606726] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 198.611845] ? unwind_get_return_address+0x61/0xa0 [ 198.616767] ? __save_stack_trace+0x7e/0xd0 [ 198.621084] ? graph_lock+0x170/0x170 [ 198.624897] ? find_held_lock+0x36/0x1c0 [ 198.628973] ? __lock_is_held+0xb5/0x140 [ 198.633051] ? check_same_owner+0x320/0x320 [ 198.637390] ? rcu_note_context_switch+0x710/0x710 [ 198.642331] __should_failslab+0x124/0x180 [ 198.646576] should_failslab+0x9/0x14 2018/05/06 05:51:57 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"627269646765300000000000000000ff", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 198.650384] kmem_cache_alloc_trace+0x2cb/0x780 [ 198.655060] ? __kmalloc_node+0x33/0x70 [ 198.659042] ? __kmalloc_node+0x33/0x70 [ 198.663020] ? rcu_read_lock_sched_held+0x108/0x120 [ 198.668055] __memcg_init_list_lru_node+0x17d/0x2c0 [ 198.673077] ? kvfree_rcu+0x20/0x20 [ 198.676711] ? __kmalloc_node+0x47/0x70 [ 198.680701] __list_lru_init+0x456/0x790 [ 198.684770] ? list_lru_destroy+0x4c0/0x4c0 [ 198.689104] ? mark_held_locks+0xc9/0x160 [ 198.693265] ? __raw_spin_lock_init+0x1c/0x100 [ 198.697859] ? trace_hardirqs_on_caller+0x421/0x5c0 2018/05/06 05:51:57 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"62726964676530000000000000000100", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 198.702886] ? __lockdep_init_map+0x105/0x590 [ 198.707401] ? lockdep_init_map+0x9/0x10 [ 198.711473] sget_userns+0x73a/0xf00 [ 198.715202] ? get_anon_bdev+0x2f0/0x2f0 [ 198.719277] ? destroy_unused_super.part.11+0x110/0x110 [ 198.724649] ? __alloc_pages_nodemask+0xacf/0xd70 [ 198.729499] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 198.734525] ? kasan_check_read+0x11/0x20 [ 198.738676] ? cap_capable+0x1f9/0x260 [ 198.742571] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 198.748111] ? security_capable+0x99/0xc0 2018/05/06 05:51:57 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 198.752268] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 198.757811] ? ns_capable_common+0x13f/0x170 [ 198.762226] ? get_anon_bdev+0x2f0/0x2f0 [ 198.766289] sget+0x10b/0x150 [ 198.769401] ? fuse_get_root_inode+0x190/0x190 [ 198.773986] mount_nodev+0x33/0x110 [ 198.777618] fuse_mount+0x2c/0x40 [ 198.781079] mount_fs+0xae/0x328 [ 198.784452] vfs_kern_mount.part.34+0xd4/0x4d0 [ 198.789045] ? may_umount+0xb0/0xb0 [ 198.792671] ? _raw_read_unlock+0x22/0x30 [ 198.796821] ? __get_fs_type+0x97/0xc0 [ 198.800718] do_mount+0x564/0x3070 2018/05/06 05:51:57 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./f%le0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) [ 198.804265] ? copy_mount_string+0x40/0x40 [ 198.808504] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 198.813267] ? retint_kernel+0x10/0x10 [ 198.817170] ? copy_mount_options+0x1a1/0x380 [ 198.821673] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 198.826519] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 198.832053] ? copy_mount_options+0x285/0x380 [ 198.836560] ksys_mount+0x12d/0x140 [ 198.840196] __x64_sys_mount+0xbe/0x150 [ 198.844175] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 198.849195] do_syscall_64+0x1b1/0x800 [ 198.853084] ? finish_task_switch+0x1ca/0x810 [ 198.857586] ? syscall_return_slowpath+0x5c0/0x5c0 [ 198.862523] ? syscall_return_slowpath+0x30f/0x5c0 [ 198.867462] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 198.872839] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 198.877694] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 198.882886] RIP: 0033:0x455979 [ 198.886079] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 198.893792] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 198.901064] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 198.908341] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 198.915614] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 198.922888] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 2018/05/06 05:51:57 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"627269646765300000000000000000ff", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:57 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./fil%0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:57 executing program 1 (fault-call:1 fault-nth:15): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:51:57 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:51:57 executing program 6: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) 2018/05/06 05:51:57 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0x0, 0x0, 'queue0\x00'}) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:51:57 executing program 7 (fault-call:0 fault-nth:0): syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) 2018/05/06 05:51:57 executing program 2 (fault-call:4 fault-nth:0): ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0x0, 0x8, 'queue0\x00'}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) [ 199.489391] FAULT_INJECTION: forcing a failure. [ 199.489391] name failslab, interval 1, probability 0, space 0, times 0 [ 199.500707] CPU: 1 PID: 14365 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 199.507990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.517345] Call Trace: [ 199.519442] FAULT_INJECTION: forcing a failure. [ 199.519442] name failslab, interval 1, probability 0, space 0, times 0 [ 199.519942] dump_stack+0x1b9/0x294 [ 199.534797] ? dump_stack_print_info.cold.2+0x52/0x52 [ 199.539997] ? __save_stack_trace+0x7e/0xd0 [ 199.544322] should_fail.cold.4+0xa/0x1a [ 199.548379] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 199.553477] ? save_stack+0x43/0xd0 [ 199.557094] ? kasan_kmalloc+0xc4/0xe0 [ 199.560972] ? kmem_cache_alloc_trace+0x152/0x780 [ 199.565808] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 199.570990] ? __list_lru_init+0x456/0x790 [ 199.575218] ? sget_userns+0x73a/0xf00 [ 199.579096] ? graph_lock+0x170/0x170 [ 199.582890] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 199.587637] ? do_mount+0x564/0x3070 [ 199.591340] ? ksys_mount+0x12d/0x140 [ 199.595133] ? __x64_sys_mount+0xbe/0x150 [ 199.599271] ? do_syscall_64+0x1b1/0x800 [ 199.603324] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 199.608684] ? find_held_lock+0x36/0x1c0 [ 199.612739] ? __lock_is_held+0xb5/0x140 [ 199.616801] ? check_same_owner+0x320/0x320 [ 199.621120] ? rcu_note_context_switch+0x710/0x710 [ 199.626042] __should_failslab+0x124/0x180 [ 199.630274] should_failslab+0x9/0x14 [ 199.634064] kmem_cache_alloc_trace+0x2cb/0x780 [ 199.638724] ? __kmalloc_node+0x33/0x70 [ 199.642690] ? __kmalloc_node+0x33/0x70 [ 199.646656] ? rcu_read_lock_sched_held+0x108/0x120 [ 199.651666] __memcg_init_list_lru_node+0x17d/0x2c0 [ 199.656675] ? kvfree_rcu+0x20/0x20 [ 199.660295] ? __kmalloc_node+0x47/0x70 [ 199.664265] __list_lru_init+0x456/0x790 [ 199.668322] ? list_lru_destroy+0x4c0/0x4c0 [ 199.672638] ? mark_held_locks+0xc9/0x160 [ 199.676781] ? __raw_spin_lock_init+0x1c/0x100 [ 199.681355] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 199.686366] ? __lockdep_init_map+0x105/0x590 [ 199.690857] ? lockdep_init_map+0x9/0x10 [ 199.694918] sget_userns+0x73a/0xf00 [ 199.698620] ? get_anon_bdev+0x2f0/0x2f0 [ 199.702680] ? destroy_unused_super.part.11+0x110/0x110 [ 199.708035] ? __alloc_pages_nodemask+0xacf/0xd70 [ 199.712873] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 199.717883] ? kasan_check_read+0x11/0x20 [ 199.722025] ? cap_capable+0x1f9/0x260 [ 199.725914] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 199.731442] ? security_capable+0x99/0xc0 [ 199.735587] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 199.741113] ? ns_capable_common+0x13f/0x170 [ 199.745515] ? get_anon_bdev+0x2f0/0x2f0 [ 199.749566] sget+0x10b/0x150 [ 199.752666] ? fuse_get_root_inode+0x190/0x190 [ 199.757238] mount_nodev+0x33/0x110 [ 199.760857] fuse_mount+0x2c/0x40 [ 199.764303] mount_fs+0xae/0x328 [ 199.767668] vfs_kern_mount.part.34+0xd4/0x4d0 [ 199.772243] ? may_umount+0xb0/0xb0 [ 199.775859] ? _raw_read_unlock+0x22/0x30 [ 199.779995] ? __get_fs_type+0x97/0xc0 [ 199.783879] do_mount+0x564/0x3070 [ 199.787415] ? copy_mount_string+0x40/0x40 [ 199.791661] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 199.796673] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 199.801427] ? retint_kernel+0x10/0x10 [ 199.805314] ? copy_mount_options+0x1f0/0x380 [ 199.809801] ? copy_mount_options+0x1fa/0x380 [ 199.814292] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 199.819824] ? copy_mount_options+0x285/0x380 [ 199.824317] ksys_mount+0x12d/0x140 [ 199.827942] __x64_sys_mount+0xbe/0x150 [ 199.831912] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 199.836923] do_syscall_64+0x1b1/0x800 [ 199.840806] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 199.845646] ? syscall_return_slowpath+0x5c0/0x5c0 [ 199.850567] ? syscall_return_slowpath+0x30f/0x5c0 [ 199.855491] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 199.860853] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 199.865691] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 199.870867] RIP: 0033:0x455979 [ 199.874043] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 199.881743] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 199.889696] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 199.896954] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 199.904221] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 199.911478] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 [ 199.918754] CPU: 0 PID: 14376 Comm: syz-executor7 Not tainted 4.17.0-rc3+ #35 [ 199.926031] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.935380] Call Trace: 2018/05/06 05:51:58 executing program 6: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) [ 199.937975] dump_stack+0x1b9/0x294 [ 199.941614] ? dump_stack_print_info.cold.2+0x52/0x52 [ 199.946817] ? kasan_check_read+0x11/0x20 [ 199.950972] ? do_raw_spin_unlock+0x9e/0x2e0 [ 199.955393] should_fail.cold.4+0xa/0x1a [ 199.959467] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 199.964573] ? _raw_spin_unlock+0x22/0x30 [ 199.968726] ? __handle_mm_fault+0x93a/0x4310 [ 199.973232] ? vm_insert_mixed_mkwrite+0x40/0x40 [ 199.977990] ? graph_lock+0x170/0x170 [ 199.981795] ? find_held_lock+0x36/0x1c0 [ 199.985882] ? check_same_owner+0x320/0x320 2018/05/06 05:51:58 executing program 1 (fault-call:1 fault-nth:16): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) [ 199.990216] ? rcu_note_context_switch+0x710/0x710 [ 199.995150] ? lock_downgrade+0x8e0/0x8e0 [ 199.999328] __should_failslab+0x124/0x180 [ 200.003570] should_failslab+0x9/0x14 [ 200.007374] kmem_cache_alloc+0x2af/0x760 [ 200.011523] ? __handle_mm_fault+0x4310/0x4310 [ 200.016129] getname_flags+0xd0/0x5a0 [ 200.019939] getname+0x19/0x20 [ 200.023139] do_sys_open+0x39a/0x740 [ 200.026855] ? __do_page_fault+0x2/0xe40 [ 200.030922] ? filp_open+0x80/0x80 [ 200.034465] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 200.038169] FAULT_INJECTION: forcing a failure. [ 200.038169] name failslab, interval 1, probability 0, space 0, times 0 [ 200.040008] __x64_sys_open+0x7e/0xc0 [ 200.040027] do_syscall_64+0x1b1/0x800 [ 200.040043] ? finish_task_switch+0x1ca/0x810 [ 200.040060] ? syscall_return_slowpath+0x5c0/0x5c0 [ 200.040077] ? syscall_return_slowpath+0x30f/0x5c0 [ 200.040104] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 200.078735] ? retint_user+0x18/0x18 [ 200.082447] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 200.087286] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 200.092470] RIP: 0033:0x40fbd1 [ 200.095653] RSP: 002b:00007f80c2bf77a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 200.103356] RAX: ffffffffffffffda RBX: cccccccccccccccd RCX: 000000000040fbd1 [ 200.110617] RDX: 0000000000000000 RSI: 0000000000000081 RDI: 00007f80c2bf7850 [ 200.117876] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 200.125157] R10: 0000000020000080 R11: 0000000000000293 R12: 0000000000000013 [ 200.132416] R13: 00000000000006e4 R14: 00000000006fe600 R15: 0000000000000000 2018/05/06 05:51:58 executing program 7 (fault-call:0 fault-nth:1): syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) [ 200.139703] CPU: 1 PID: 14389 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 200.147001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.156358] Call Trace: [ 200.158954] dump_stack+0x1b9/0x294 [ 200.162588] ? dump_stack_print_info.cold.2+0x52/0x52 [ 200.167783] ? kernel_text_address+0x79/0xf0 [ 200.172200] ? __unwind_start+0x166/0x330 [ 200.176379] should_fail.cold.4+0xa/0x1a [ 200.180442] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 200.185559] ? graph_lock+0x170/0x170 [ 200.188637] FAULT_INJECTION: forcing a failure. [ 200.188637] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 200.189373] ? save_stack+0x43/0xd0 [ 200.204750] ? kasan_kmalloc+0xc4/0xe0 [ 200.208630] ? __kmalloc+0x14e/0x760 [ 200.212335] ? __list_lru_init+0xdd/0x790 [ 200.216479] ? find_held_lock+0x36/0x1c0 [ 200.220535] ? __lock_is_held+0xb5/0x140 [ 200.224598] ? check_same_owner+0x320/0x320 [ 200.228912] ? rcu_note_context_switch+0x710/0x710 [ 200.233837] __should_failslab+0x124/0x180 [ 200.238064] should_failslab+0x9/0x14 [ 200.241861] kmem_cache_alloc_node_trace+0x26f/0x770 [ 200.247001] ? mark_held_locks+0xc9/0x160 [ 200.251144] ? __raw_spin_lock_init+0x1c/0x100 [ 200.255718] __kmalloc_node+0x33/0x70 [ 200.259511] kvmalloc_node+0x6b/0x100 [ 200.263300] __list_lru_init+0x559/0x790 [ 200.267354] ? list_lru_destroy+0x4c0/0x4c0 [ 200.271667] ? mark_held_locks+0xc9/0x160 [ 200.275812] ? __raw_spin_lock_init+0x1c/0x100 [ 200.280388] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 200.285392] ? __lockdep_init_map+0x105/0x590 [ 200.289877] ? lockdep_init_map+0x9/0x10 [ 200.293930] sget_userns+0x73a/0xf00 [ 200.297635] ? get_anon_bdev+0x2f0/0x2f0 [ 200.301690] ? destroy_unused_super.part.11+0x110/0x110 [ 200.307135] ? __alloc_pages_nodemask+0xacf/0xd70 [ 200.311970] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 200.316979] ? kasan_check_read+0x11/0x20 [ 200.321121] ? cap_capable+0x1f9/0x260 [ 200.325005] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 200.330533] ? security_capable+0x99/0xc0 [ 200.334674] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 200.340204] ? ns_capable_common+0x13f/0x170 [ 200.344603] ? get_anon_bdev+0x2f0/0x2f0 [ 200.348654] sget+0x10b/0x150 [ 200.351752] ? fuse_get_root_inode+0x190/0x190 [ 200.356327] mount_nodev+0x33/0x110 [ 200.359943] fuse_mount+0x2c/0x40 [ 200.363389] mount_fs+0xae/0x328 [ 200.366748] vfs_kern_mount.part.34+0xd4/0x4d0 [ 200.371324] ? may_umount+0xb0/0xb0 [ 200.374940] ? _raw_read_unlock+0x22/0x30 [ 200.379074] ? __get_fs_type+0x97/0xc0 [ 200.382954] do_mount+0x564/0x3070 [ 200.386486] ? do_raw_spin_unlock+0x9e/0x2e0 [ 200.390888] ? copy_mount_string+0x40/0x40 [ 200.395199] ? rcu_pm_notify+0xc0/0xc0 [ 200.399083] ? copy_mount_options+0x5f/0x380 [ 200.403484] ? rcu_read_lock_sched_held+0x108/0x120 [ 200.408490] ? kmem_cache_alloc_trace+0x616/0x780 [ 200.413327] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 200.418871] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 200.424399] ? copy_mount_options+0x285/0x380 [ 200.428893] ksys_mount+0x12d/0x140 [ 200.432510] __x64_sys_mount+0xbe/0x150 [ 200.436475] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 200.441482] do_syscall_64+0x1b1/0x800 [ 200.445360] ? finish_task_switch+0x1ca/0x810 [ 200.449845] ? syscall_return_slowpath+0x5c0/0x5c0 [ 200.454772] ? syscall_return_slowpath+0x30f/0x5c0 [ 200.459697] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 200.465056] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 200.469893] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 200.475072] RIP: 0033:0x455979 [ 200.478252] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 200.485975] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 200.493258] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 200.500519] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 200.507779] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 200.515036] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 [ 200.522320] CPU: 0 PID: 14391 Comm: syz-executor7 Not tainted 4.17.0-rc3+ #35 [ 200.529605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.538962] Call Trace: 2018/05/06 05:51:58 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file+\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:58 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"62726964676530000000000000000300", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 200.541559] dump_stack+0x1b9/0x294 [ 200.545204] ? dump_stack_print_info.cold.2+0x52/0x52 [ 200.550413] should_fail.cold.4+0xa/0x1a [ 200.554485] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 200.559600] ? debug_check_no_locks_freed+0x310/0x310 [ 200.565668] ? find_held_lock+0x36/0x1c0 [ 200.569743] ? lock_downgrade+0x8e0/0x8e0 [ 200.573901] ? find_held_lock+0x36/0x1c0 [ 200.577972] ? do_raw_spin_unlock+0x9e/0x2e0 [ 200.582383] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 200.586972] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 2018/05/06 05:51:59 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file-\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) [ 200.592514] ? should_fail+0x21b/0xbcd [ 200.596410] __alloc_pages_nodemask+0x34e/0xd70 [ 200.601084] ? __handle_mm_fault+0x93a/0x4310 [ 200.605592] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 200.610607] ? vm_insert_mixed_mkwrite+0x40/0x40 [ 200.615357] ? graph_lock+0x170/0x170 [ 200.619168] ? find_held_lock+0x36/0x1c0 [ 200.623241] ? smp_recv_cb+0x2fe0/0x85a0 [ 200.627318] ? check_same_owner+0x320/0x320 [ 200.631651] cache_grow_begin+0x72/0x6c0 [ 200.635724] kmem_cache_alloc+0x689/0x760 [ 200.639900] getname_flags+0xd0/0x5a0 2018/05/06 05:51:59 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file#\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) [ 200.643714] getname+0x19/0x20 [ 200.646914] do_sys_open+0x39a/0x740 [ 200.650630] ? __do_page_fault+0x2/0xe40 [ 200.654694] ? filp_open+0x80/0x80 [ 200.658238] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 200.663792] __x64_sys_open+0x7e/0xc0 [ 200.667596] do_syscall_64+0x1b1/0x800 [ 200.671479] ? finish_task_switch+0x1ca/0x810 [ 200.675979] ? syscall_return_slowpath+0x5c0/0x5c0 [ 200.680915] ? syscall_return_slowpath+0x30f/0x5c0 [ 200.685943] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 200.691483] ? retint_user+0x18/0x18 [ 200.695210] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 200.700062] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 200.705256] RIP: 0033:0x40fbd1 [ 200.708453] RSP: 002b:00007f80c2bf77a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 200.716167] RAX: ffffffffffffffda RBX: cccccccccccccccd RCX: 000000000040fbd1 [ 200.723440] RDX: 0000000000000000 RSI: 0000000000000081 RDI: 00007f80c2bf7850 [ 200.730709] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 200.737989] R10: 0000000020000080 R11: 0000000000000293 R12: 0000000000000013 [ 200.745262] R13: 00000000000006e4 R14: 00000000006fe600 R15: 0000000000000001 2018/05/06 05:51:59 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:51:59 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"6272696467653000000000fffffffe00", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:59 executing program 1 (fault-call:1 fault-nth:17): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:51:59 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:51:59 executing program 2: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0x0, 0x8, 'queue0\x00'}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:51:59 executing program 6: syz_open_dev$sg(&(0x7f0000000080)="2f6465762f736723f6", 0x0, 0x81) close(0xffffffffffffffff) 2018/05/06 05:51:59 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0x0, 0x0, 'queue0\x00', 0x1ff}) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) close(r0) 2018/05/06 05:51:59 executing program 7 (fault-call:0 fault-nth:2): syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) [ 200.889819] FAULT_INJECTION: forcing a failure. [ 200.889819] name failslab, interval 1, probability 0, space 0, times 0 [ 200.894299] FAULT_INJECTION: forcing a failure. [ 200.894299] name failslab, interval 1, probability 0, space 0, times 0 [ 200.901141] CPU: 1 PID: 14432 Comm: syz-executor7 Not tainted 4.17.0-rc3+ #35 [ 200.919929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.929277] Call Trace: [ 200.931866] dump_stack+0x1b9/0x294 [ 200.935495] ? dump_stack_print_info.cold.2+0x52/0x52 [ 200.940691] should_fail.cold.4+0xa/0x1a [ 200.944758] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 200.949861] ? debug_check_no_locks_freed+0x310/0x310 [ 200.955054] ? find_held_lock+0x36/0x1c0 [ 200.959120] ? ip6_datagram_send_ctl+0xfc0/0x1480 [ 200.963966] ? check_same_owner+0x320/0x320 [ 200.968287] ? rcu_note_context_switch+0x710/0x710 [ 200.973217] __should_failslab+0x124/0x180 [ 200.977450] should_failslab+0x9/0x14 [ 200.981247] kmem_cache_alloc+0x2af/0x760 [ 200.985392] ? debug_check_no_locks_freed+0x310/0x310 [ 200.990582] get_empty_filp+0x125/0x520 [ 200.994551] ? proc_nr_files+0x60/0x60 [ 200.998437] ? lock_downgrade+0x8e0/0x8e0 [ 201.002581] ? graph_lock+0x170/0x170 [ 201.006375] ? kasan_check_read+0x11/0x20 [ 201.010518] ? rcu_is_watching+0x85/0x140 [ 201.014660] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 201.019849] path_openat+0x116/0x4e20 [ 201.023659] ? unwind_get_return_address+0x61/0xa0 [ 201.028586] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 201.033596] ? path_lookupat.isra.44+0xbd0/0xbd0 [ 201.038347] ? find_held_lock+0x36/0x1c0 [ 201.042412] ? lock_downgrade+0x8e0/0x8e0 [ 201.046553] ? do_sys_open+0x39a/0x740 [ 201.050440] ? kasan_check_read+0x11/0x20 [ 201.054583] ? do_raw_spin_unlock+0x9e/0x2e0 [ 201.058988] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 201.063565] ? __lock_is_held+0xb5/0x140 [ 201.067629] ? _raw_spin_unlock+0x22/0x30 [ 201.071771] ? __alloc_fd+0x346/0x700 [ 201.075565] ? usercopy_warn+0x120/0x120 [ 201.079630] do_filp_open+0x249/0x350 [ 201.083426] ? may_open_dev+0x100/0x100 [ 201.087395] ? strncpy_from_user+0x3b6/0x500 [ 201.091801] ? mpi_free.cold.1+0x19/0x19 [ 201.095863] ? get_unused_fd_flags+0x121/0x190 [ 201.100438] ? getname_flags+0xd0/0x5a0 [ 201.104408] ? getname_flags+0x26e/0x5a0 [ 201.108468] do_sys_open+0x56f/0x740 [ 201.112180] ? __do_page_fault+0x2/0xe40 [ 201.116236] ? filp_open+0x80/0x80 [ 201.119768] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 201.125305] __x64_sys_open+0x7e/0xc0 [ 201.129105] do_syscall_64+0x1b1/0x800 [ 201.133636] ? finish_task_switch+0x1ca/0x810 [ 201.138134] ? syscall_return_slowpath+0x5c0/0x5c0 [ 201.143056] ? syscall_return_slowpath+0x30f/0x5c0 [ 201.147986] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 201.153516] ? retint_user+0x18/0x18 [ 201.157229] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 201.162068] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 201.167250] RIP: 0033:0x40fbd1 [ 201.170430] RSP: 002b:00007f80c2bf77a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 201.178134] RAX: ffffffffffffffda RBX: cccccccccccccccd RCX: 000000000040fbd1 [ 201.185396] RDX: 0000000000000000 RSI: 0000000000000081 RDI: 00007f80c2bf7850 [ 201.192656] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 201.199918] R10: 0000000020000080 R11: 0000000000000293 R12: 0000000000000013 [ 201.207180] R13: 00000000000006e4 R14: 00000000006fe600 R15: 0000000000000002 [ 201.214460] CPU: 0 PID: 14426 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 201.221740] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.231098] Call Trace: [ 201.233695] dump_stack+0x1b9/0x294 2018/05/06 05:51:59 executing program 7 (fault-call:0 fault-nth:3): syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) [ 201.237334] ? dump_stack_print_info.cold.2+0x52/0x52 [ 201.242544] ? __save_stack_trace+0x7e/0xd0 [ 201.246877] should_fail.cold.4+0xa/0x1a [ 201.250943] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 201.256053] ? save_stack+0x43/0xd0 [ 201.259682] ? kasan_kmalloc+0xc4/0xe0 [ 201.263569] ? kmem_cache_alloc_trace+0x152/0x780 [ 201.268417] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 201.273608] ? __list_lru_init+0x456/0x790 [ 201.277843] ? sget_userns+0x73a/0xf00 [ 201.281734] ? graph_lock+0x170/0x170 [ 201.285538] ? vfs_kern_mount.part.34+0xd4/0x4d0 2018/05/06 05:51:59 executing program 6: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) [ 201.290296] ? do_mount+0x564/0x3070 [ 201.294010] ? ksys_mount+0x12d/0x140 [ 201.297812] ? __x64_sys_mount+0xbe/0x150 [ 201.302479] ? do_syscall_64+0x1b1/0x800 [ 201.306816] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 201.312179] ? find_held_lock+0x36/0x1c0 [ 201.316238] ? __lock_is_held+0xb5/0x140 [ 201.320295] ? sfq_init+0x1520/0x1fe0 [ 201.324109] ? check_same_owner+0x320/0x320 [ 201.328438] ? rcu_note_context_switch+0x710/0x710 [ 201.333376] __should_failslab+0x124/0x180 [ 201.337620] should_failslab+0x9/0x14 2018/05/06 05:51:59 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00\x00\x00\x00\x00@\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 201.341430] kmem_cache_alloc_trace+0x2cb/0x780 [ 201.346105] ? __kmalloc_node+0x33/0x70 [ 201.350081] ? __kmalloc_node+0x33/0x70 [ 201.354075] ? rcu_read_lock_sched_held+0x108/0x120 [ 201.359104] __memcg_init_list_lru_node+0x17d/0x2c0 [ 201.364131] ? kvfree_rcu+0x20/0x20 [ 201.367767] ? __kmalloc_node+0x47/0x70 [ 201.371753] __list_lru_init+0x456/0x790 [ 201.375825] ? list_lru_destroy+0x4c0/0x4c0 [ 201.380153] ? mark_held_locks+0xc9/0x160 [ 201.384315] ? __raw_spin_lock_init+0x1c/0x100 2018/05/06 05:51:59 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"6272696467653000000000feffffff00", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 201.388905] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 201.393924] ? __lockdep_init_map+0x105/0x590 [ 201.398423] ? lockdep_init_map+0x9/0x10 [ 201.402490] sget_userns+0x73a/0xf00 [ 201.406209] ? get_anon_bdev+0x2f0/0x2f0 [ 201.410283] ? destroy_unused_super.part.11+0x110/0x110 [ 201.415653] ? __alloc_pages_nodemask+0xacf/0xd70 [ 201.420510] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 201.425532] ? kasan_check_read+0x11/0x20 [ 201.429689] ? cap_capable+0x1f9/0x260 [ 201.433592] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 2018/05/06 05:51:59 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"6272696467653000000000fffffdfd00", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:51:59 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)="2e2f66696c6530ef", &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) [ 201.439143] ? security_capable+0x99/0xc0 [ 201.443302] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 201.448846] ? ns_capable_common+0x13f/0x170 [ 201.453263] ? get_anon_bdev+0x2f0/0x2f0 [ 201.457328] sget+0x10b/0x150 [ 201.460443] ? fuse_get_root_inode+0x190/0x190 [ 201.465027] mount_nodev+0x33/0x110 [ 201.468659] fuse_mount+0x2c/0x40 [ 201.472118] mount_fs+0xae/0x328 [ 201.475491] vfs_kern_mount.part.34+0xd4/0x4d0 [ 201.480081] ? may_umount+0xb0/0xb0 [ 201.483715] ? _raw_read_unlock+0x22/0x30 [ 201.487869] ? __get_fs_type+0x97/0xc0 [ 201.491765] do_mount+0x564/0x3070 [ 201.495314] ? copy_mount_string+0x40/0x40 [ 201.499550] ? rcu_pm_notify+0xc0/0xc0 [ 201.503453] ? copy_mount_options+0x5f/0x380 [ 201.507865] ? rcu_read_lock_sched_held+0x108/0x120 [ 201.512885] ? kmem_cache_alloc_trace+0x616/0x780 [ 201.517736] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 201.523282] ? _copy_from_user+0xdf/0x150 [ 201.527443] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 201.532984] ? copy_mount_options+0x285/0x380 [ 201.537487] ksys_mount+0x12d/0x140 2018/05/06 05:51:59 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 201.541120] __x64_sys_mount+0xbe/0x150 [ 201.545101] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 201.550137] do_syscall_64+0x1b1/0x800 [ 201.554041] ? finish_task_switch+0x1ca/0x810 [ 201.558542] ? syscall_return_slowpath+0x5c0/0x5c0 [ 201.563480] ? syscall_return_slowpath+0x30f/0x5c0 [ 201.568424] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 201.573797] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 201.578650] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 201.583843] RIP: 0033:0x455979 2018/05/06 05:52:00 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)="2e2f66696c6530ef", &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:00 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"62726964676530000000000000000400", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 201.587045] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 201.594757] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 201.602031] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 201.609300] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 201.616572] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 201.623845] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 2018/05/06 05:52:00 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0x0, 0x0, 'queue0\x00', 0x1ff}) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) close(r0) 2018/05/06 05:52:00 executing program 1 (fault-call:1 fault-nth:18): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:52:00 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) [ 201.798282] FAULT_INJECTION: forcing a failure. [ 201.798282] name failslab, interval 1, probability 0, space 0, times 0 [ 201.804666] FAULT_INJECTION: forcing a failure. [ 201.804666] name failslab, interval 1, probability 0, space 0, times 0 [ 201.809608] CPU: 0 PID: 14479 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 201.828051] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.837403] Call Trace: [ 201.839994] dump_stack+0x1b9/0x294 [ 201.843620] ? dump_stack_print_info.cold.2+0x52/0x52 [ 201.848805] ? __save_stack_trace+0x7e/0xd0 [ 201.853128] should_fail.cold.4+0xa/0x1a [ 201.857186] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 201.862285] ? save_stack+0x43/0xd0 [ 201.865908] ? kasan_kmalloc+0xc4/0xe0 [ 201.869789] ? kmem_cache_alloc_trace+0x152/0x780 [ 201.874623] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 201.879816] ? __list_lru_init+0x456/0x790 [ 201.884043] ? sget_userns+0x73a/0xf00 [ 201.887927] ? graph_lock+0x170/0x170 [ 201.891717] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 201.896464] ? do_mount+0x564/0x3070 [ 201.900170] ? ksys_mount+0x12d/0x140 [ 201.903961] ? __x64_sys_mount+0xbe/0x150 [ 201.908101] ? do_syscall_64+0x1b1/0x800 [ 201.912161] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 201.917519] ? find_held_lock+0x36/0x1c0 [ 201.921576] ? __lock_is_held+0xb5/0x140 [ 201.925641] ? check_same_owner+0x320/0x320 [ 201.929960] ? rcu_note_context_switch+0x710/0x710 [ 201.934889] __should_failslab+0x124/0x180 [ 201.939125] should_failslab+0x9/0x14 [ 201.942927] kmem_cache_alloc_trace+0x2cb/0x780 [ 201.947592] ? __kmalloc_node+0x33/0x70 [ 201.951563] ? __kmalloc_node+0x33/0x70 [ 201.955534] ? rcu_read_lock_sched_held+0x108/0x120 [ 201.960549] __memcg_init_list_lru_node+0x17d/0x2c0 [ 201.965562] ? kvfree_rcu+0x20/0x20 [ 201.969186] ? __kmalloc_node+0x47/0x70 [ 201.973162] __list_lru_init+0x456/0x790 [ 201.977217] ? list_lru_destroy+0x4c0/0x4c0 [ 201.981543] ? mark_held_locks+0xc9/0x160 [ 201.985690] ? __raw_spin_lock_init+0x1c/0x100 [ 201.990268] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 201.995306] ? __lockdep_init_map+0x105/0x590 [ 201.999796] ? lockdep_init_map+0x9/0x10 [ 202.003856] sget_userns+0x73a/0xf00 [ 202.007563] ? get_anon_bdev+0x2f0/0x2f0 [ 202.011624] ? destroy_unused_super.part.11+0x110/0x110 [ 202.016985] ? __alloc_pages_nodemask+0xacf/0xd70 [ 202.021830] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 202.026842] ? kasan_check_read+0x11/0x20 [ 202.030986] ? cap_capable+0x1f9/0x260 [ 202.034876] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 202.040412] ? security_capable+0x99/0xc0 [ 202.044559] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 202.050099] ? ns_capable_common+0x13f/0x170 [ 202.054506] ? get_anon_bdev+0x2f0/0x2f0 [ 202.058560] sget+0x10b/0x150 [ 202.061664] ? fuse_get_root_inode+0x190/0x190 [ 202.066238] mount_nodev+0x33/0x110 [ 202.069862] fuse_mount+0x2c/0x40 [ 202.073308] mount_fs+0xae/0x328 [ 202.076676] vfs_kern_mount.part.34+0xd4/0x4d0 [ 202.081251] ? may_umount+0xb0/0xb0 [ 202.084870] ? _raw_read_unlock+0x22/0x30 [ 202.089011] ? __get_fs_type+0x97/0xc0 [ 202.092900] do_mount+0x564/0x3070 [ 202.096437] ? copy_mount_string+0x40/0x40 [ 202.100665] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 202.105678] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 202.110432] ? retint_kernel+0x10/0x10 [ 202.114318] ? copy_mount_options+0x1f0/0x380 [ 202.118806] ? copy_mount_options+0x1f6/0x380 [ 202.123300] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 202.128832] ? copy_mount_options+0x285/0x380 [ 202.133323] ksys_mount+0x12d/0x140 [ 202.136945] __x64_sys_mount+0xbe/0x150 [ 202.140914] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 202.145926] do_syscall_64+0x1b1/0x800 [ 202.149808] ? finish_task_switch+0x1ca/0x810 [ 202.154302] ? syscall_return_slowpath+0x5c0/0x5c0 [ 202.159229] ? syscall_return_slowpath+0x30f/0x5c0 [ 202.164157] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 202.169518] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 202.174358] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 202.179539] RIP: 0033:0x455979 [ 202.182721] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 202.190425] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 202.197684] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 202.204942] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 202.212200] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 202.219460] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 [ 202.226742] CPU: 1 PID: 14436 Comm: syz-executor7 Not tainted 4.17.0-rc3+ #35 [ 202.234025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 202.243387] Call Trace: [ 202.245989] dump_stack+0x1b9/0x294 [ 202.249630] ? dump_stack_print_info.cold.2+0x52/0x52 [ 202.254834] ? remove_wait_queue+0x350/0x350 [ 202.259251] ? check_same_owner+0x320/0x320 [ 202.263576] ? mutex_trylock+0x2a0/0x2a0 [ 202.267647] should_fail.cold.4+0xa/0x1a [ 202.271721] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 202.276833] ? open_wait+0x820/0xaa0 [ 202.280556] ? sg_poll+0x490/0x490 [ 202.284099] ? graph_lock+0x170/0x170 [ 202.287910] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 202.293455] ? __radix_tree_lookup+0x3d4/0x6b0 [ 202.298046] ? debug_check_no_locks_freed+0x310/0x310 [ 202.303255] ? check_same_owner+0x320/0x320 [ 202.307579] ? rcu_note_context_switch+0x710/0x710 [ 202.312514] ? __might_sleep+0x95/0x190 [ 202.316497] __should_failslab+0x124/0x180 [ 202.320742] should_failslab+0x9/0x14 [ 202.324545] kmem_cache_alloc_trace+0x4b/0x780 [ 202.329130] ? trace_hardirqs_on+0xd/0x10 [ 202.333288] sg_open+0x56d/0x1130 [ 202.336749] ? sg_build_reserve+0xd0/0xd0 [ 202.340901] ? refcount_inc_not_zero+0x1dd/0x2d0 [ 202.345664] ? lock_downgrade+0x8e0/0x8e0 [ 202.349812] ? m_show+0x5d0/0x5d0 [ 202.353274] ? kasan_check_read+0x11/0x20 [ 202.357425] ? do_raw_spin_unlock+0x9e/0x2e0 [ 202.361840] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 202.366438] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 202.371981] ? refcount_inc+0x29/0x70 [ 202.375785] ? sg_build_reserve+0xd0/0xd0 [ 202.379939] chrdev_open+0x256/0x760 [ 202.383660] ? cdev_put.part.0+0x50/0x50 [ 202.387726] ? errseq_sample+0xe3/0x120 [ 202.391711] ? security_file_open+0x14f/0x1d0 [ 202.396213] do_dentry_open+0x7ef/0xf10 [ 202.400181] ? cdev_put.part.0+0x50/0x50 [ 202.404228] vfs_open+0x139/0x230 [ 202.407664] path_openat+0x1676/0x4e20 [ 202.411538] ? path_lookupat.isra.44+0xbd0/0xbd0 [ 202.416275] ? find_held_lock+0x36/0x1c0 [ 202.420319] ? lock_downgrade+0x8e0/0x8e0 [ 202.424452] ? do_sys_open+0x39a/0x740 [ 202.428337] ? kasan_check_read+0x11/0x20 [ 202.432466] ? do_raw_spin_unlock+0x9e/0x2e0 [ 202.436853] ? __lock_is_held+0xb5/0x140 [ 202.440899] ? _raw_spin_unlock+0x22/0x30 [ 202.445058] ? __alloc_fd+0x346/0x700 [ 202.448839] ? usercopy_warn+0x120/0x120 [ 202.452886] do_filp_open+0x249/0x350 [ 202.456667] ? may_open_dev+0x100/0x100 [ 202.460623] ? strncpy_from_user+0x3b6/0x500 [ 202.465022] ? mpi_free.cold.1+0x19/0x19 [ 202.469076] ? get_unused_fd_flags+0x121/0x190 [ 202.473637] ? getname_flags+0xd0/0x5a0 [ 202.477598] ? getname_flags+0x26e/0x5a0 [ 202.481646] do_sys_open+0x56f/0x740 [ 202.485342] ? __do_page_fault+0x2/0xe40 [ 202.489383] ? filp_open+0x80/0x80 [ 202.492906] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 202.498428] __x64_sys_open+0x7e/0xc0 [ 202.502211] do_syscall_64+0x1b1/0x800 [ 202.506165] ? finish_task_switch+0x1ca/0x810 [ 202.510650] ? syscall_return_slowpath+0x5c0/0x5c0 [ 202.515561] ? syscall_return_slowpath+0x30f/0x5c0 [ 202.520471] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 202.525988] ? retint_user+0x18/0x18 [ 202.529688] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 202.534512] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 202.539682] RIP: 0033:0x40fbd1 [ 202.542852] RSP: 002b:00007f80c2bf77a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 2018/05/06 05:52:00 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:00 executing program 6: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) 2018/05/06 05:52:00 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:52:01 executing program 1 (fault-call:1 fault-nth:19): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:52:01 executing program 2: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0x0, 0x8, 'queue0\x00'}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000200)) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x410101, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000040)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000180)=@assoc_id=r2, &(0x7f00000001c0)=0x4) close(r0) 2018/05/06 05:52:01 executing program 7: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) 2018/05/06 05:52:01 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0x0, 0x0, 'queue0\x00', 0x1ff}) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) close(r0) 2018/05/06 05:52:01 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"62726964676530000000000f00", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 202.550539] RAX: ffffffffffffffda RBX: cccccccccccccccd RCX: 000000000040fbd1 [ 202.557790] RDX: 0000000000000000 RSI: 0000000000000081 RDI: 00007f80c2bf7850 [ 202.565045] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 202.572294] R10: 0000000020000080 R11: 0000000000000293 R12: 0000000000000013 [ 202.579542] R13: 00000000000006e4 R14: 00000000006fe600 R15: 0000000000000003 2018/05/06 05:52:01 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"6272696467653000000000fdfdffff00", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 202.626825] FAULT_INJECTION: forcing a failure. [ 202.626825] name failslab, interval 1, probability 0, space 0, times 0 [ 202.638150] CPU: 1 PID: 14499 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 202.645434] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 202.654794] Call Trace: [ 202.657400] dump_stack+0x1b9/0x294 [ 202.661046] ? dump_stack_print_info.cold.2+0x52/0x52 [ 202.666248] ? __save_stack_trace+0x7e/0xd0 [ 202.670593] should_fail.cold.4+0xa/0x1a 2018/05/06 05:52:01 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:01 executing program 6: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) [ 202.674671] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 202.679790] ? save_stack+0x43/0xd0 [ 202.683427] ? kasan_kmalloc+0xc4/0xe0 [ 202.687326] ? kmem_cache_alloc_trace+0x152/0x780 [ 202.692178] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 202.697382] ? __list_lru_init+0x456/0x790 [ 202.701624] ? sget_userns+0x73a/0xf00 [ 202.705521] ? graph_lock+0x170/0x170 [ 202.709328] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 202.714091] ? do_mount+0x564/0x3070 [ 202.717813] ? ksys_mount+0x12d/0x140 [ 202.721630] ? __x64_sys_mount+0xbe/0x150 2018/05/06 05:52:01 executing program 7: syz_open_dev$sg(&(0x7f0000000080)='/.ev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) [ 202.725787] ? do_syscall_64+0x1b1/0x800 [ 202.729853] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 202.735233] ? find_held_lock+0x36/0x1c0 [ 202.739319] ? __lock_is_held+0xb5/0x140 [ 202.743409] ? check_same_owner+0x320/0x320 [ 202.747751] ? rcu_note_context_switch+0x710/0x710 [ 202.752698] __should_failslab+0x124/0x180 [ 202.756953] should_failslab+0x9/0x14 [ 202.760766] kmem_cache_alloc_trace+0x2cb/0x780 [ 202.765448] ? __kmalloc_node+0x33/0x70 [ 202.769441] ? __kmalloc_node+0x33/0x70 2018/05/06 05:52:01 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0x0, 0x0, 'queue0\x00', 0x1ff}) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) [ 202.773433] ? rcu_read_lock_sched_held+0x108/0x120 [ 202.778475] __memcg_init_list_lru_node+0x17d/0x2c0 [ 202.783508] ? kvfree_rcu+0x20/0x20 [ 202.787154] ? __kmalloc_node+0x47/0x70 [ 202.791148] __list_lru_init+0x456/0x790 [ 202.795225] ? list_lru_destroy+0x4c0/0x4c0 [ 202.799562] ? mark_held_locks+0xc9/0x160 [ 202.803728] ? __raw_spin_lock_init+0x1c/0x100 [ 202.808318] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 202.813341] ? __lockdep_init_map+0x105/0x590 [ 202.817841] ? lockdep_init_map+0x9/0x10 [ 202.821918] sget_userns+0x73a/0xf00 [ 202.825656] ? get_anon_bdev+0x2f0/0x2f0 [ 202.829736] ? destroy_unused_super.part.11+0x110/0x110 [ 202.835113] ? __alloc_pages_nodemask+0xacf/0xd70 [ 202.839988] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 202.845020] ? kasan_check_read+0x11/0x20 [ 202.849181] ? cap_capable+0x1f9/0x260 [ 202.853091] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 202.858635] ? security_capable+0x99/0xc0 [ 202.862798] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 202.868345] ? ns_capable_common+0x13f/0x170 [ 202.872761] ? get_anon_bdev+0x2f0/0x2f0 [ 202.876829] sget+0x10b/0x150 [ 202.879950] ? fuse_get_root_inode+0x190/0x190 [ 202.884543] mount_nodev+0x33/0x110 [ 202.888187] fuse_mount+0x2c/0x40 [ 202.891648] mount_fs+0xae/0x328 [ 202.895027] vfs_kern_mount.part.34+0xd4/0x4d0 [ 202.899628] ? may_umount+0xb0/0xb0 [ 202.903263] ? _raw_read_unlock+0x22/0x30 [ 202.907422] ? __get_fs_type+0x97/0xc0 [ 202.911321] do_mount+0x564/0x3070 [ 202.914875] ? copy_mount_string+0x40/0x40 [ 202.919116] ? rcu_pm_notify+0xc0/0xc0 [ 202.923020] ? copy_mount_options+0x5f/0x380 [ 202.927439] ? rcu_read_lock_sched_held+0x108/0x120 [ 202.932462] ? kmem_cache_alloc_trace+0x616/0x780 [ 202.937318] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 202.942870] ? _copy_from_user+0xdf/0x150 [ 202.947036] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 202.952588] ? copy_mount_options+0x285/0x380 [ 202.957098] ksys_mount+0x12d/0x140 [ 202.960736] __x64_sys_mount+0xbe/0x150 [ 202.964710] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 202.969726] do_syscall_64+0x1b1/0x800 [ 202.973612] ? finish_task_switch+0x1ca/0x810 [ 202.978095] ? syscall_return_slowpath+0x5c0/0x5c0 [ 202.983024] ? syscall_return_slowpath+0x30f/0x5c0 [ 202.987952] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 202.993306] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 202.998139] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 203.003312] RIP: 0033:0x455979 [ 203.006493] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 203.014207] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 203.021472] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 203.028734] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 203.036003] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 203.043276] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 2018/05/06 05:52:02 executing program 7: syz_open_dev$sg(&(0x7f0000000080)='//ev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) 2018/05/06 05:52:02 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:02 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:02 executing program 1 (fault-call:1 fault-nth:20): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:52:02 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:52:02 executing program 2: socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e22, @multicast2=0xe0000002}, 0x10) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x3ff, 0x0, 0x8, 'queue0\x00'}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x81) close(r1) 2018/05/06 05:52:02 executing program 6: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) 2018/05/06 05:52:02 executing program 3: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)="2e2f66696c6530ef", &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) [ 203.800669] FAULT_INJECTION: forcing a failure. [ 203.800669] name failslab, interval 1, probability 0, space 0, times 0 [ 203.811987] CPU: 1 PID: 14544 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 203.819270] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 203.828628] Call Trace: [ 203.831231] dump_stack+0x1b9/0x294 [ 203.834874] ? dump_stack_print_info.cold.2+0x52/0x52 [ 203.840078] ? __save_stack_trace+0x7e/0xd0 [ 203.844414] should_fail.cold.4+0xa/0x1a [ 203.848489] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 203.853609] ? save_stack+0x43/0xd0 [ 203.857247] ? kasan_kmalloc+0xc4/0xe0 [ 203.861172] ? kmem_cache_alloc_trace+0x152/0x780 [ 203.866023] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 203.871225] ? __list_lru_init+0x456/0x790 [ 203.875472] ? sget_userns+0x73a/0xf00 [ 203.879383] ? graph_lock+0x170/0x170 [ 203.883195] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 203.887959] ? do_mount+0x564/0x3070 [ 203.891679] ? ksys_mount+0x12d/0x140 [ 203.895490] ? __x64_sys_mount+0xbe/0x150 2018/05/06 05:52:02 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"62726964676530000000000400", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:02 executing program 7: syz_open_dev$sg(&(0x7f0000000080)='/dev/.g#\x00', 0x0, 0x81) close(0xffffffffffffffff) 2018/05/06 05:52:02 executing program 7: syz_open_dev$sg(&(0x7f0000000080)='/dev//g#\x00', 0x0, 0x81) close(0xffffffffffffffff) 2018/05/06 05:52:02 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"627269646765300000000000000000ff", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 203.899654] ? do_syscall_64+0x1b1/0x800 [ 203.903721] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 203.909094] ? find_held_lock+0x36/0x1c0 [ 203.913161] ? __lock_is_held+0xb5/0x140 [ 203.917243] ? check_same_owner+0x320/0x320 [ 203.921574] ? rcu_note_context_switch+0x710/0x710 [ 203.926523] __should_failslab+0x124/0x180 [ 203.930771] should_failslab+0x9/0x14 [ 203.934581] kmem_cache_alloc_trace+0x2cb/0x780 [ 203.939257] ? __kmalloc_node+0x33/0x70 [ 203.943240] ? __kmalloc_node+0x33/0x70 [ 203.947224] ? rcu_read_lock_sched_held+0x108/0x120 [ 203.952258] __memcg_init_list_lru_node+0x17d/0x2c0 [ 203.957289] ? kvfree_rcu+0x20/0x20 [ 203.960931] ? __kmalloc_node+0x47/0x70 [ 203.964925] __list_lru_init+0x456/0x790 [ 203.969001] ? list_lru_destroy+0x4c0/0x4c0 [ 203.973335] ? mark_held_locks+0xc9/0x160 [ 203.977497] ? __raw_spin_lock_init+0x1c/0x100 [ 203.982087] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 203.987108] ? __lockdep_init_map+0x105/0x590 [ 203.991607] ? lockdep_init_map+0x9/0x10 [ 203.995680] sget_userns+0x73a/0xf00 2018/05/06 05:52:02 executing program 7: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) 2018/05/06 05:52:02 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"62726964676530000000000000000200", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 203.999397] ? get_anon_bdev+0x2f0/0x2f0 [ 204.003466] ? destroy_unused_super.part.11+0x110/0x110 [ 204.008841] ? __alloc_pages_nodemask+0xacf/0xd70 [ 204.013699] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 204.018730] ? kasan_check_read+0x11/0x20 [ 204.022895] ? cap_capable+0x1f9/0x260 [ 204.026801] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 204.032345] ? security_capable+0x99/0xc0 [ 204.036511] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 204.042051] ? ns_capable_common+0x13f/0x170 [ 204.046468] ? get_anon_bdev+0x2f0/0x2f0 2018/05/06 05:52:02 executing program 3: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:02 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"627269646765300000000000000000ff", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 204.050537] sget+0x10b/0x150 [ 204.053647] ? fuse_get_root_inode+0x190/0x190 [ 204.058228] mount_nodev+0x33/0x110 [ 204.061863] fuse_mount+0x2c/0x40 [ 204.065316] mount_fs+0xae/0x328 [ 204.068682] vfs_kern_mount.part.34+0xd4/0x4d0 [ 204.073266] ? may_umount+0xb0/0xb0 [ 204.076894] ? _raw_read_unlock+0x22/0x30 [ 204.081043] ? __get_fs_type+0x97/0xc0 [ 204.084937] do_mount+0x564/0x3070 [ 204.088489] ? copy_mount_string+0x40/0x40 [ 204.092723] ? rcu_pm_notify+0xc0/0xc0 [ 204.096623] ? copy_mount_options+0x5f/0x380 [ 204.101035] ? rcu_read_lock_sched_held+0x108/0x120 [ 204.106078] ? kmem_cache_alloc_trace+0x616/0x780 [ 204.110929] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 204.116468] ? _copy_from_user+0xdf/0x150 [ 204.120633] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 204.126175] ? copy_mount_options+0x285/0x380 [ 204.130675] ksys_mount+0x12d/0x140 [ 204.134309] __x64_sys_mount+0xbe/0x150 [ 204.138283] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 204.143306] do_syscall_64+0x1b1/0x800 [ 204.147203] ? finish_task_switch+0x1ca/0x810 [ 204.151702] ? syscall_return_slowpath+0x5c0/0x5c0 [ 204.156635] ? syscall_return_slowpath+0x30f/0x5c0 [ 204.161569] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 204.166938] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 204.171788] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 204.176979] RIP: 0033:0x455979 [ 204.180171] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 204.187886] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 204.195158] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 204.202429] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 204.209705] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 204.216977] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 2018/05/06 05:52:03 executing program 3 (fault-call:3 fault-nth:0): ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0x0, 0x0, 'queue0\x00', 0x1ff}) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:52:03 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"62726964676530000000000000000004", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:03 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)="2e2f66696c6530ff", &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:03 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:52:03 executing program 7: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) 2018/05/06 05:52:03 executing program 1 (fault-call:1 fault-nth:21): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:52:03 executing program 2: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0x0, 0x8, 'queue0\x00'}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xfa, 0x84000) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0xac, &(0x7f0000000180)=[@in6={0xa, 0x4e22, 0x3, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10001}, @in6={0xa, 0x4e23, 0x1000, @dev={0xfe, 0x80, [], 0x1d}, 0x8}, @in6={0xa, 0x4e24, 0x6, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, 0xfffffffffffffffa}, @in={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, @in6={0xa, 0x4e24, 0xd0, @dev={0xfe, 0x80, [], 0x1a}, 0xf000000000000000}, @in={0x2, 0x4e23, @multicast1=0xe0000001}, @in6={0xa, 0x4e24, 0x6, @loopback={0x0, 0x1}}]}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0x6}, 0x8) close(r0) 2018/05/06 05:52:03 executing program 6: syz_open_dev$sg(&(0x7f0000000080)="2f6465762f73672302", 0x0, 0x81) close(0xffffffffffffffff) [ 204.795814] FAULT_INJECTION: forcing a failure. [ 204.795814] name failslab, interval 1, probability 0, space 0, times 0 [ 204.807102] CPU: 1 PID: 14592 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 204.814382] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 204.823737] Call Trace: [ 204.826331] dump_stack+0x1b9/0x294 [ 204.829971] ? dump_stack_print_info.cold.2+0x52/0x52 [ 204.835171] ? __save_stack_trace+0x7e/0xd0 [ 204.839509] should_fail.cold.4+0xa/0x1a [ 204.843591] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 204.848708] ? save_stack+0x43/0xd0 [ 204.852345] ? kasan_kmalloc+0xc4/0xe0 [ 204.856242] ? kmem_cache_alloc_trace+0x152/0x780 [ 204.861092] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 204.866289] ? __list_lru_init+0x456/0x790 [ 204.870529] ? sget_userns+0x73a/0xf00 [ 204.874437] ? graph_lock+0x170/0x170 [ 204.878250] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 204.883011] ? do_mount+0x564/0x3070 [ 204.886735] ? ksys_mount+0x12d/0x140 [ 204.890545] ? __x64_sys_mount+0xbe/0x150 [ 204.894708] ? do_syscall_64+0x1b1/0x800 [ 204.898787] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 204.904163] ? find_held_lock+0x36/0x1c0 [ 204.908234] ? __lock_is_held+0xb5/0x140 [ 204.912313] ? check_same_owner+0x320/0x320 [ 204.916646] ? rcu_note_context_switch+0x710/0x710 [ 204.921584] __should_failslab+0x124/0x180 [ 204.925832] should_failslab+0x9/0x14 [ 204.929642] kmem_cache_alloc_trace+0x2cb/0x780 [ 204.934320] ? __kmalloc_node+0x33/0x70 [ 204.938302] ? __kmalloc_node+0x33/0x70 2018/05/06 05:52:03 executing program 6: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) 2018/05/06 05:52:03 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"627269646765300000000000feffffff", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:03 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"6272696467653000000000000200", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:03 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"62726964676530000000000000000002", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 204.942288] ? rcu_read_lock_sched_held+0x108/0x120 [ 204.947316] __memcg_init_list_lru_node+0x17d/0x2c0 [ 204.952341] ? kvfree_rcu+0x20/0x20 [ 204.955977] ? __kmalloc_node+0x47/0x70 [ 204.959962] __list_lru_init+0x456/0x790 [ 204.964032] ? list_lru_destroy+0x4c0/0x4c0 [ 204.968361] ? mark_held_locks+0xc9/0x160 [ 204.972518] ? __raw_spin_lock_init+0x1c/0x100 [ 204.977108] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 204.982127] ? __lockdep_init_map+0x105/0x590 [ 204.986625] ? lockdep_init_map+0x9/0x10 [ 204.990692] sget_userns+0x73a/0xf00 2018/05/06 05:52:03 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"627269646765300000000000ffffffc3", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:03 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00@', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 204.994419] ? get_anon_bdev+0x2f0/0x2f0 [ 204.998487] ? destroy_unused_super.part.11+0x110/0x110 [ 205.003852] ? __alloc_pages_nodemask+0xacf/0xd70 [ 205.008703] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 205.013729] ? kasan_check_read+0x11/0x20 [ 205.017886] ? cap_capable+0x1f9/0x260 [ 205.021787] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 205.027328] ? security_capable+0x99/0xc0 [ 205.031482] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 205.037022] ? ns_capable_common+0x13f/0x170 [ 205.041438] ? get_anon_bdev+0x2f0/0x2f0 2018/05/06 05:52:03 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"6272696467653000000000000300", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 205.045501] sget+0x10b/0x150 [ 205.048617] ? fuse_get_root_inode+0x190/0x190 [ 205.053200] mount_nodev+0x33/0x110 [ 205.056835] fuse_mount+0x2c/0x40 [ 205.060293] mount_fs+0xae/0x328 [ 205.063667] vfs_kern_mount.part.34+0xd4/0x4d0 [ 205.068254] ? may_umount+0xb0/0xb0 [ 205.071881] ? _raw_read_unlock+0x22/0x30 [ 205.076030] ? __get_fs_type+0x97/0xc0 [ 205.079923] do_mount+0x564/0x3070 [ 205.083471] ? copy_mount_string+0x40/0x40 [ 205.087710] ? rcu_pm_notify+0xc0/0xc0 [ 205.091606] ? copy_mount_options+0x5f/0x380 [ 205.096020] ? rcu_read_lock_sched_held+0x108/0x120 [ 205.101041] ? kmem_cache_alloc_trace+0x616/0x780 [ 205.105889] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 205.111432] ? _copy_from_user+0xdf/0x150 [ 205.115587] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 205.121127] ? copy_mount_options+0x285/0x380 [ 205.125629] ksys_mount+0x12d/0x140 [ 205.129263] __x64_sys_mount+0xbe/0x150 [ 205.133763] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 205.138786] do_syscall_64+0x1b1/0x800 [ 205.142675] ? finish_task_switch+0x1ca/0x810 [ 205.147176] ? syscall_return_slowpath+0x5c0/0x5c0 [ 205.152090] ? syscall_return_slowpath+0x30f/0x5c0 [ 205.157018] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 205.162385] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 205.167224] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 205.172397] RIP: 0033:0x455979 [ 205.175584] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 205.183292] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 205.190560] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 205.197827] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 205.205089] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 205.212342] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 2018/05/06 05:52:04 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"62726964676530000000000000000003", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:04 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:04 executing program 1 (fault-call:1 fault-nth:22): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:52:04 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:52:04 executing program 6: syz_open_dev$sg(&(0x7f0000000080)="2f6465762f736723ff", 0x0, 0x81) close(0xffffffffffffffff) 2018/05/06 05:52:04 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0x0, 0x0, 'queue0\x00', 0x1ff}) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:52:04 executing program 2: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0x0, 0x8, 'queue0\x00'}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000100)=0x14) 2018/05/06 05:52:04 executing program 7: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) 2018/05/06 05:52:04 executing program 6: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x4, 0x81) close(0xffffffffffffffff) [ 205.805651] FAULT_INJECTION: forcing a failure. [ 205.805651] name failslab, interval 1, probability 0, space 0, times 0 [ 205.817075] CPU: 1 PID: 14645 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 205.824967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 205.834330] Call Trace: [ 205.836941] dump_stack+0x1b9/0x294 [ 205.840591] ? dump_stack_print_info.cold.2+0x52/0x52 [ 205.845809] ? __save_stack_trace+0x7e/0xd0 [ 205.850152] should_fail.cold.4+0xa/0x1a 2018/05/06 05:52:04 executing program 6: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0xffffffff00000000, 0x81) close(0xffffffffffffffff) [ 205.854235] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 205.859364] ? save_stack+0x43/0xd0 [ 205.863007] ? kasan_kmalloc+0xc4/0xe0 [ 205.866907] ? kmem_cache_alloc_trace+0x152/0x780 [ 205.871762] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 205.876958] ? __list_lru_init+0x456/0x790 [ 205.881197] ? sget_userns+0x73a/0xf00 [ 205.885091] ? graph_lock+0x170/0x170 [ 205.888895] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 205.893660] ? do_mount+0x564/0x3070 [ 205.897378] ? ksys_mount+0x12d/0x140 [ 205.901184] ? __x64_sys_mount+0xbe/0x150 [ 205.905344] ? do_syscall_64+0x1b1/0x800 [ 205.909411] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 205.914788] ? find_held_lock+0x36/0x1c0 [ 205.918866] ? __lock_is_held+0xb5/0x140 [ 205.922950] ? check_same_owner+0x320/0x320 [ 205.927281] ? rcu_note_context_switch+0x710/0x710 [ 205.932309] __should_failslab+0x124/0x180 [ 205.936561] should_failslab+0x9/0x14 [ 205.940370] kmem_cache_alloc_trace+0x2cb/0x780 [ 205.945046] ? __kmalloc_node+0x33/0x70 [ 205.949029] ? __kmalloc_node+0x33/0x70 2018/05/06 05:52:04 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 205.953012] ? rcu_read_lock_sched_held+0x108/0x120 [ 205.958042] __memcg_init_list_lru_node+0x17d/0x2c0 [ 205.963070] ? kvfree_rcu+0x20/0x20 [ 205.966709] ? __kmalloc_node+0x47/0x70 [ 205.970706] __list_lru_init+0x456/0x790 [ 205.974778] ? list_lru_destroy+0x4c0/0x4c0 [ 205.979112] ? mark_held_locks+0xc9/0x160 [ 205.983268] ? __raw_spin_lock_init+0x1c/0x100 [ 205.987857] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 205.992887] ? __lockdep_init_map+0x105/0x590 [ 205.997389] ? lockdep_init_map+0x9/0x10 [ 206.001462] sget_userns+0x73a/0xf00 2018/05/06 05:52:04 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"627269646765300000000000fdfdffff", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 206.005179] ? get_anon_bdev+0x2f0/0x2f0 [ 206.009251] ? destroy_unused_super.part.11+0x110/0x110 [ 206.014620] ? __alloc_pages_nodemask+0xacf/0xd70 [ 206.019474] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 206.024499] ? kasan_check_read+0x11/0x20 [ 206.028648] ? cap_capable+0x1f9/0x260 [ 206.032550] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 206.038098] ? security_capable+0x99/0xc0 [ 206.042259] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 206.047806] ? ns_capable_common+0x13f/0x170 [ 206.052225] ? get_anon_bdev+0x2f0/0x2f0 2018/05/06 05:52:04 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"627269646765300000000000c3ffffff", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:04 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) [ 206.056290] sget+0x10b/0x150 [ 206.059407] ? fuse_get_root_inode+0x190/0x190 [ 206.063988] mount_nodev+0x33/0x110 [ 206.067614] fuse_mount+0x2c/0x40 [ 206.071071] mount_fs+0xae/0x328 [ 206.074443] vfs_kern_mount.part.34+0xd4/0x4d0 [ 206.079028] ? may_umount+0xb0/0xb0 [ 206.082658] ? _raw_read_unlock+0x22/0x30 [ 206.086805] ? __get_fs_type+0x97/0xc0 [ 206.090703] do_mount+0x564/0x3070 [ 206.094251] ? copy_mount_string+0x40/0x40 [ 206.098493] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 206.103258] ? retint_kernel+0x10/0x10 [ 206.107155] ? copy_mount_options+0x1e3/0x380 [ 206.111658] ? __sanitizer_cov_trace_pc+0x1a/0x50 [ 206.116510] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 206.122053] ? copy_mount_options+0x285/0x380 [ 206.126557] ksys_mount+0x12d/0x140 [ 206.130196] __x64_sys_mount+0xbe/0x150 [ 206.134178] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 206.139210] do_syscall_64+0x1b1/0x800 [ 206.143103] ? finish_task_switch+0x1ca/0x810 [ 206.147606] ? syscall_return_slowpath+0x5c0/0x5c0 [ 206.152544] ? syscall_return_slowpath+0x30f/0x5c0 2018/05/06 05:52:04 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)="2e2f66696c6530e0", &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) [ 206.157485] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 206.162862] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 206.167727] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 206.172927] RIP: 0033:0x455979 [ 206.176120] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 206.183839] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 206.191118] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 206.198394] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 2018/05/06 05:52:04 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 206.205674] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 206.212958] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 2018/05/06 05:52:04 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:52:04 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:04 executing program 1 (fault-call:1 fault-nth:23): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) [ 206.355203] FAULT_INJECTION: forcing a failure. [ 206.355203] name failslab, interval 1, probability 0, space 0, times 0 [ 206.366626] CPU: 0 PID: 14694 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 206.373913] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 206.383272] Call Trace: [ 206.385872] dump_stack+0x1b9/0x294 [ 206.389521] ? dump_stack_print_info.cold.2+0x52/0x52 [ 206.394728] ? __save_stack_trace+0x7e/0xd0 [ 206.399100] should_fail.cold.4+0xa/0x1a [ 206.403178] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 206.408296] ? save_stack+0x43/0xd0 [ 206.411940] ? kasan_kmalloc+0xc4/0xe0 [ 206.415841] ? kmem_cache_alloc_trace+0x152/0x780 [ 206.420690] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 206.425875] ? __list_lru_init+0x456/0x790 [ 206.430109] ? sget_userns+0x73a/0xf00 [ 206.433984] ? graph_lock+0x170/0x170 [ 206.437770] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 206.442520] ? do_mount+0x564/0x3070 [ 206.446226] ? ksys_mount+0x12d/0x140 [ 206.450025] ? __x64_sys_mount+0xbe/0x150 [ 206.454170] ? do_syscall_64+0x1b1/0x800 [ 206.458216] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 206.463575] ? find_held_lock+0x36/0x1c0 [ 206.467675] ? __lock_is_held+0xb5/0x140 [ 206.471739] ? check_same_owner+0x320/0x320 [ 206.476065] ? rcu_note_context_switch+0x710/0x710 [ 206.481008] __should_failslab+0x124/0x180 [ 206.485237] should_failslab+0x9/0x14 [ 206.489032] kmem_cache_alloc_trace+0x2cb/0x780 [ 206.493692] ? __kmalloc_node+0x33/0x70 [ 206.497664] ? __kmalloc_node+0x33/0x70 [ 206.501689] ? rcu_read_lock_sched_held+0x108/0x120 [ 206.506691] __memcg_init_list_lru_node+0x17d/0x2c0 [ 206.511691] ? kvfree_rcu+0x20/0x20 [ 206.515319] ? __kmalloc_node+0x47/0x70 [ 206.519302] __list_lru_init+0x456/0x790 [ 206.523367] ? list_lru_destroy+0x4c0/0x4c0 [ 206.527694] ? mark_held_locks+0xc9/0x160 [ 206.531853] ? __raw_spin_lock_init+0x1c/0x100 [ 206.536442] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 206.541465] ? __lockdep_init_map+0x105/0x590 [ 206.545966] ? lockdep_init_map+0x9/0x10 [ 206.550032] sget_userns+0x73a/0xf00 [ 206.553740] ? get_anon_bdev+0x2f0/0x2f0 [ 206.557802] ? destroy_unused_super.part.11+0x110/0x110 [ 206.563152] ? __alloc_pages_nodemask+0xacf/0xd70 [ 206.567976] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 206.572986] ? kasan_check_read+0x11/0x20 [ 206.577126] ? cap_capable+0x1f9/0x260 [ 206.581003] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 206.586530] ? security_capable+0x99/0xc0 [ 206.590677] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 206.596198] ? ns_capable_common+0x13f/0x170 [ 206.600592] ? get_anon_bdev+0x2f0/0x2f0 [ 206.604637] sget+0x10b/0x150 [ 206.607739] ? fuse_get_root_inode+0x190/0x190 [ 206.612308] mount_nodev+0x33/0x110 [ 206.615927] fuse_mount+0x2c/0x40 [ 206.619373] mount_fs+0xae/0x328 [ 206.622726] vfs_kern_mount.part.34+0xd4/0x4d0 [ 206.627292] ? may_umount+0xb0/0xb0 [ 206.630916] ? _raw_read_unlock+0x22/0x30 [ 206.635064] ? __get_fs_type+0x97/0xc0 [ 206.638985] do_mount+0x564/0x3070 [ 206.642542] ? copy_mount_string+0x40/0x40 [ 206.646787] ? rcu_pm_notify+0xc0/0xc0 [ 206.650694] ? copy_mount_options+0x5f/0x380 [ 206.655106] ? rcu_read_lock_sched_held+0x108/0x120 [ 206.660126] ? kmem_cache_alloc_trace+0x616/0x780 [ 206.664978] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 206.670520] ? _copy_from_user+0xdf/0x150 [ 206.674666] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 206.680184] ? copy_mount_options+0x285/0x380 [ 206.684662] ksys_mount+0x12d/0x140 [ 206.688271] __x64_sys_mount+0xbe/0x150 [ 206.692225] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 206.697232] do_syscall_64+0x1b1/0x800 [ 206.701105] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 206.705942] ? syscall_return_slowpath+0x5c0/0x5c0 [ 206.710860] ? syscall_return_slowpath+0x30f/0x5c0 [ 206.715794] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 206.721150] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 206.725989] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 206.731178] RIP: 0033:0x455979 [ 206.734364] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 206.742078] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 206.749351] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 206.756629] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 206.763904] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 206.771154] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 2018/05/06 05:52:05 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:05 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2), 0x0) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:52:05 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:05 executing program 2: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0x0, 0x8, 'queue0\x00'}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x3, 0x10000) ioctl$KVM_SET_CPUID2(r1, 0x4008ae90, &(0x7f0000000180)={0x5, 0x0, [{0x1, 0x8, 0x2, 0x80000001, 0x10001, 0x0, 0x9}, {0xa, 0x7, 0x2, 0x80, 0x4, 0x7ff, 0x1}, {0x80000000, 0x2, 0x4, 0x100, 0x945, 0x1000, 0x9}, {0x80000007, 0x1, 0x0, 0x7, 0x800, 0x4, 0x1bde82f0}, {0x40000001, 0x9, 0x2, 0x0, 0x6, 0x4, 0xae7e}]}) close(r0) 2018/05/06 05:52:05 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0x0, 0x0, 'queue0\x00', 0x1ff}) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x4, 0x400080) close(r0) 2018/05/06 05:52:05 executing program 7: syz_open_dev$sg(&(0x7f0000000080)="2f6465762f736723ff", 0x0, 0x81) close(0xffffffffffffffff) 2018/05/06 05:52:05 executing program 6: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x2, 0x81) close(0xffffffffffffffff) 2018/05/06 05:52:05 executing program 1 (fault-call:1 fault-nth:24): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) [ 206.922052] FAULT_INJECTION: forcing a failure. [ 206.922052] name failslab, interval 1, probability 0, space 0, times 0 [ 206.933376] CPU: 0 PID: 14714 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 206.940656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 206.950012] Call Trace: [ 206.952612] dump_stack+0x1b9/0x294 [ 206.956247] ? dump_stack_print_info.cold.2+0x52/0x52 [ 206.961453] should_fail.cold.4+0xa/0x1a [ 206.965530] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 206.970647] ? __schedule+0x809/0x1e30 [ 206.974560] ? __sched_text_start+0x8/0x8 [ 206.978724] ? find_held_lock+0x36/0x1c0 [ 206.982810] ? __lock_is_held+0xb5/0x140 [ 206.986894] ? check_same_owner+0x320/0x320 [ 206.991226] ? __might_sleep+0x95/0x190 [ 206.995214] __should_failslab+0x124/0x180 [ 206.999463] should_failslab+0x9/0x14 [ 207.003272] __kmalloc+0x2c8/0x760 [ 207.006820] ? __kmalloc_node+0x47/0x70 [ 207.010806] ? __list_lru_init+0xdd/0x790 [ 207.014966] __list_lru_init+0xdd/0x790 [ 207.018955] ? list_lru_destroy+0x4c0/0x4c0 [ 207.023288] ? mark_held_locks+0xc9/0x160 [ 207.027453] ? __raw_spin_lock_init+0x1c/0x100 [ 207.032049] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 207.037080] ? lockdep_init_map+0x9/0x10 [ 207.041154] sget_userns+0x767/0xf00 [ 207.044871] ? get_anon_bdev+0x2f0/0x2f0 [ 207.048947] ? destroy_unused_super.part.11+0x110/0x110 [ 207.054317] ? __alloc_pages_nodemask+0xacf/0xd70 [ 207.059174] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 207.064204] ? kasan_check_read+0x11/0x20 [ 207.068364] ? cap_capable+0x1f9/0x260 [ 207.072265] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 207.077812] ? security_capable+0x99/0xc0 [ 207.081976] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 207.087521] ? ns_capable_common+0x13f/0x170 [ 207.091937] ? get_anon_bdev+0x2f0/0x2f0 [ 207.096003] sget+0x10b/0x150 [ 207.099115] ? fuse_get_root_inode+0x190/0x190 [ 207.103703] mount_nodev+0x33/0x110 [ 207.107335] fuse_mount+0x2c/0x40 [ 207.110791] mount_fs+0xae/0x328 [ 207.114167] vfs_kern_mount.part.34+0xd4/0x4d0 [ 207.118756] ? may_umount+0xb0/0xb0 [ 207.122382] ? _raw_read_unlock+0x22/0x30 [ 207.126531] ? __get_fs_type+0x97/0xc0 [ 207.130427] do_mount+0x564/0x3070 [ 207.133982] ? copy_mount_string+0x40/0x40 [ 207.138221] ? rcu_pm_notify+0xc0/0xc0 [ 207.142116] ? copy_mount_options+0x5f/0x380 [ 207.146531] ? rcu_read_lock_sched_held+0x108/0x120 [ 207.151551] ? kmem_cache_alloc_trace+0x616/0x780 [ 207.156403] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 207.161945] ? _copy_from_user+0xdf/0x150 [ 207.166104] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 2018/05/06 05:52:05 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"62726964676530000000000000000001", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:05 executing program 7: syz_open_dev$sg(&(0x7f0000000080)="2f6465762f73672304", 0x0, 0x81) close(0xffffffffffffffff) 2018/05/06 05:52:05 executing program 6: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x400000000000000, 0x81) close(0xffffffffffffffff) 2018/05/06 05:52:05 executing program 7: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) 2018/05/06 05:52:05 executing program 6: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x200000000000000, 0x81) close(0xffffffffffffffff) 2018/05/06 05:52:05 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"627269646765300000000000fffffdfd", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 207.171641] ? copy_mount_options+0x285/0x380 [ 207.176139] ksys_mount+0x12d/0x140 [ 207.179776] __x64_sys_mount+0xbe/0x150 [ 207.183752] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 207.188779] do_syscall_64+0x1b1/0x800 [ 207.192672] ? finish_task_switch+0x1ca/0x810 [ 207.197176] ? syscall_return_slowpath+0x5c0/0x5c0 [ 207.202109] ? syscall_return_slowpath+0x30f/0x5c0 [ 207.207043] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 207.212416] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 207.217267] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 207.222455] RIP: 0033:0x455979 [ 207.225644] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 207.233357] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 207.240627] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 207.247896] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 207.255164] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 207.262430] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 2018/05/06 05:52:06 executing program 6: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x4000000, 0x81) close(0xffffffffffffffff) 2018/05/06 05:52:06 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"627269646765300000000000000300", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:06 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:06 executing program 1 (fault-call:1 fault-nth:25): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:52:06 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2), 0x0) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:52:06 executing program 7: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) 2018/05/06 05:52:06 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0x0, 0x0, 'queue0\x00', 0x1ff}) r0 = accept$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000280)) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000300)) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x100000000, 0x400) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) fstat(r2, &(0x7f0000000200)) sched_setattr(r3, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x7, 0x6, 0x80000001, 0x0, 0x3f}, 0x0) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x8, 0x101141) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) close(r1) 2018/05/06 05:52:06 executing program 2: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0x0, 0x8, 'queue0\x00'}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x400000, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000200)={'dummy0\x00', {0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}}) r3 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x5, 0x8400) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) recvfrom$packet(r3, &(0x7f0000000040)=""/61, 0x3d, 0x20, &(0x7f0000000180)={0x11, 0xfe, r4, 0x1, 0x0, 0x6}, 0x14) 2018/05/06 05:52:06 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 208.011835] FAULT_INJECTION: forcing a failure. [ 208.011835] name failslab, interval 1, probability 0, space 0, times 0 [ 208.023162] CPU: 0 PID: 14766 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 208.030449] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 208.040240] Call Trace: [ 208.042855] dump_stack+0x1b9/0x294 [ 208.046513] ? dump_stack_print_info.cold.2+0x52/0x52 [ 208.051721] ? __save_stack_trace+0x7e/0xd0 [ 208.056063] should_fail.cold.4+0xa/0x1a 2018/05/06 05:52:06 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 208.060143] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 208.065262] ? save_stack+0x43/0xd0 [ 208.068906] ? kasan_kmalloc+0xc4/0xe0 [ 208.072815] ? kmem_cache_alloc_trace+0x152/0x780 [ 208.077676] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 208.082875] ? __list_lru_init+0x456/0x790 [ 208.087120] ? sget_userns+0x73a/0xf00 [ 208.091014] ? graph_lock+0x170/0x170 [ 208.094822] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 208.099582] ? do_mount+0x564/0x3070 [ 208.103308] ? ksys_mount+0x12d/0x140 [ 208.107114] ? __x64_sys_mount+0xbe/0x150 2018/05/06 05:52:06 executing program 7: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) [ 208.111271] ? do_syscall_64+0x1b1/0x800 [ 208.115340] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 208.120712] ? find_held_lock+0x36/0x1c0 [ 208.124785] ? __lock_is_held+0xb5/0x140 [ 208.128959] ? check_same_owner+0x320/0x320 [ 208.133291] ? rcu_note_context_switch+0x710/0x710 [ 208.138236] __should_failslab+0x124/0x180 [ 208.142481] should_failslab+0x9/0x14 [ 208.146294] kmem_cache_alloc_trace+0x2cb/0x780 [ 208.150971] ? __kmalloc_node+0x33/0x70 [ 208.154955] ? __kmalloc_node+0x33/0x70 [ 208.158943] ? rcu_read_lock_sched_held+0x108/0x120 [ 208.163975] __memcg_init_list_lru_node+0x17d/0x2c0 [ 208.168999] ? kvfree_rcu+0x20/0x20 [ 208.172640] ? __kmalloc_node+0x47/0x70 [ 208.176634] __list_lru_init+0x456/0x790 [ 208.180708] ? list_lru_destroy+0x4c0/0x4c0 [ 208.185042] ? mark_held_locks+0xc9/0x160 [ 208.189202] ? __raw_spin_lock_init+0x1c/0x100 [ 208.193794] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 208.198812] ? __lockdep_init_map+0x105/0x590 [ 208.203310] ? lockdep_init_map+0x9/0x10 [ 208.207376] sget_userns+0x73a/0xf00 2018/05/06 05:52:06 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:06 executing program 6: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x1000000000000, 0x81) close(0xffffffffffffffff) [ 208.211093] ? get_anon_bdev+0x2f0/0x2f0 [ 208.215161] ? destroy_unused_super.part.11+0x110/0x110 [ 208.220528] ? __alloc_pages_nodemask+0xacf/0xd70 [ 208.225378] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 208.230401] ? kasan_check_read+0x11/0x20 [ 208.234552] ? cap_capable+0x1f9/0x260 [ 208.238458] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 208.243995] ? security_capable+0x99/0xc0 [ 208.248152] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 208.254045] ? ns_capable_common+0x13f/0x170 [ 208.258462] ? get_anon_bdev+0x2f0/0x2f0 [ 208.262526] sget+0x10b/0x150 [ 208.265637] ? fuse_get_root_inode+0x190/0x190 [ 208.270229] mount_nodev+0x33/0x110 [ 208.273858] fuse_mount+0x2c/0x40 [ 208.277315] mount_fs+0xae/0x328 [ 208.280695] vfs_kern_mount.part.34+0xd4/0x4d0 [ 208.285280] ? may_umount+0xb0/0xb0 [ 208.288905] ? _raw_read_unlock+0x22/0x30 [ 208.293051] ? __get_fs_type+0x97/0xc0 [ 208.296953] do_mount+0x564/0x3070 [ 208.300497] ? do_raw_spin_unlock+0x9e/0x2e0 [ 208.304914] ? copy_mount_string+0x40/0x40 [ 208.309152] ? rcu_pm_notify+0xc0/0xc0 2018/05/06 05:52:06 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:06 executing program 6: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0xf6ffffff00000000, 0x81) close(0xffffffffffffffff) [ 208.313049] ? copy_mount_options+0x5f/0x380 [ 208.317465] ? rcu_read_lock_sched_held+0x108/0x120 [ 208.322485] ? kmem_cache_alloc_trace+0x616/0x780 [ 208.327336] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 208.332884] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 208.338422] ? copy_mount_options+0x285/0x380 [ 208.342921] ksys_mount+0x12d/0x140 [ 208.346548] __x64_sys_mount+0xbe/0x150 [ 208.350522] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 208.355544] do_syscall_64+0x1b1/0x800 [ 208.359436] ? finish_task_switch+0x1ca/0x810 [ 208.363937] ? syscall_return_slowpath+0x5c0/0x5c0 [ 208.368872] ? syscall_return_slowpath+0x30f/0x5c0 [ 208.373805] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 208.379176] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 208.384026] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 208.389212] RIP: 0033:0x455979 [ 208.392400] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 208.400110] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 2018/05/06 05:52:06 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0x0, 0x0, 'queue0\x00', 0x1ff}) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x4000) setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f0000000240)=0x5, 0x4) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000040)={0x9, 0x7, 0x7, 0x4}) close(r0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000100)={0x0, 0xdbb5}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000001c0)={r2, 0x38, &(0x7f0000000180)=[@in6={0xa, 0x4e22, 0x7ff, @mcast1={0xff, 0x1, [], 0x1}, 0x1}, @in6={0xa, 0x4e21, 0x7, @remote={0xfe, 0x80, [], 0xbb}, 0x1f}]}, &(0x7f0000000200)=0x10) [ 208.407382] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 208.414654] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 208.421921] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 208.429186] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 2018/05/06 05:52:07 executing program 6: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0xf6ffffff, 0x81) close(0xffffffffffffffff) 2018/05/06 05:52:07 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"6272696467653000000000000000000f", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:07 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0h', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:07 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2), 0x0) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:52:07 executing program 1 (fault-call:1 fault-nth:26): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:52:07 executing program 2: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0x0, 0x8, 'queue0\x00'}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000000)=0x8, 0x4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setuid(r1) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f00000000c0)='+#vboxnet0ppp0\x00', 0x0) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r2 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r2) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2be}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000280)={r3, 0x100, 0x9, 0x7, 0x7fff, 0x40}, 0x14) 2018/05/06 05:52:07 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0x0, 0x0, 'queue0\x00', 0x1ff}) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) pwrite64(r1, &(0x7f0000000000)="f63bbda535efa484e83601a5d0a46fe1947feb705173c70776cba0174351319aa6fbd527636fa748b33cbcef0ccc3c41eb8d2e273b0ef04bff27faf9cf26d496ee4ebe50b4158b61a97317dbc932bc6cdc8b2ef7313524ca47f7cee266a8589c0f35c552", 0x64, 0x0) 2018/05/06 05:52:07 executing program 7: syz_open_dev$sg(&(0x7f0000000080)="2f6465762f73672302", 0x0, 0x81) close(0xffffffffffffffff) 2018/05/06 05:52:07 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00\x00\x00\x00\x00\x00@\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:07 executing program 7: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) 2018/05/06 05:52:07 executing program 6: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0xfffffff6, 0x81) close(0xffffffffffffffff) [ 209.490719] FAULT_INJECTION: forcing a failure. [ 209.490719] name failslab, interval 1, probability 0, space 0, times 0 [ 209.502060] CPU: 0 PID: 14836 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 209.509342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 209.518712] Call Trace: [ 209.521324] dump_stack+0x1b9/0x294 [ 209.524970] ? dump_stack_print_info.cold.2+0x52/0x52 [ 209.530168] ? perf_trace_lock_acquire+0xe3/0x980 [ 209.535025] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 209.540234] should_fail.cold.4+0xa/0x1a [ 209.544320] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 209.549446] ? unwind_get_return_address+0x61/0xa0 [ 209.554391] ? __save_stack_trace+0x7e/0xd0 [ 209.558726] ? graph_lock+0x170/0x170 [ 209.562559] ? find_held_lock+0x36/0x1c0 [ 209.566640] ? __lock_is_held+0xb5/0x140 [ 209.570726] ? check_same_owner+0x320/0x320 [ 209.575064] ? rcu_note_context_switch+0x710/0x710 [ 209.580021] __should_failslab+0x124/0x180 [ 209.584275] should_failslab+0x9/0x14 [ 209.588093] kmem_cache_alloc_trace+0x2cb/0x780 [ 209.592780] ? __kmalloc_node+0x33/0x70 [ 209.596768] ? __kmalloc_node+0x33/0x70 [ 209.600756] ? rcu_read_lock_sched_held+0x108/0x120 [ 209.605795] __memcg_init_list_lru_node+0x17d/0x2c0 [ 209.610825] ? kvfree_rcu+0x20/0x20 [ 209.614466] ? __kmalloc_node+0x47/0x70 [ 209.618458] __list_lru_init+0x456/0x790 [ 209.622539] ? list_lru_destroy+0x4c0/0x4c0 [ 209.626917] ? mark_held_locks+0xc9/0x160 [ 209.631085] ? __raw_spin_lock_init+0x1c/0x100 [ 209.635679] ? trace_hardirqs_on_caller+0x421/0x5c0 2018/05/06 05:52:08 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"6272696467653000000000000400", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 209.640714] ? lockdep_init_map+0x9/0x10 [ 209.644803] sget_userns+0x767/0xf00 [ 209.648531] ? get_anon_bdev+0x2f0/0x2f0 [ 209.652625] ? destroy_unused_super.part.11+0x110/0x110 [ 209.658000] ? __alloc_pages_nodemask+0xacf/0xd70 [ 209.662857] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 209.667886] ? kasan_check_read+0x11/0x20 [ 209.672042] ? cap_capable+0x1f9/0x260 [ 209.675947] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 209.681493] ? security_capable+0x99/0xc0 [ 209.685654] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 2018/05/06 05:52:08 executing program 6: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x8000000000000000, 0x81) close(0xffffffffffffffff) [ 209.691204] ? ns_capable_common+0x13f/0x170 [ 209.695626] ? get_anon_bdev+0x2f0/0x2f0 [ 209.699701] sget+0x10b/0x150 [ 209.702818] ? fuse_get_root_inode+0x190/0x190 [ 209.707412] mount_nodev+0x33/0x110 [ 209.711048] fuse_mount+0x2c/0x40 [ 209.714512] mount_fs+0xae/0x328 [ 209.717895] vfs_kern_mount.part.34+0xd4/0x4d0 [ 209.722484] ? may_umount+0xb0/0xb0 [ 209.726113] ? _raw_read_unlock+0x22/0x30 [ 209.730267] ? __get_fs_type+0x97/0xc0 [ 209.734166] do_mount+0x564/0x3070 [ 209.737719] ? copy_mount_string+0x40/0x40 2018/05/06 05:52:08 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)="2e2f66696c65300f", &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:08 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"6272696467653000000000000f00", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 209.741961] ? rcu_pm_notify+0xc0/0xc0 [ 209.745865] ? copy_mount_options+0x5f/0x380 [ 209.750282] ? rcu_read_lock_sched_held+0x108/0x120 [ 209.755305] ? kmem_cache_alloc_trace+0x616/0x780 [ 209.760163] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 209.765727] ? _copy_from_user+0xdf/0x150 [ 209.769898] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 209.775443] ? copy_mount_options+0x285/0x380 [ 209.779949] ksys_mount+0x12d/0x140 [ 209.783588] __x64_sys_mount+0xbe/0x150 2018/05/06 05:52:08 executing program 6: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x100000000000000, 0x81) close(0xffffffffffffffff) [ 209.787565] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 209.792594] do_syscall_64+0x1b1/0x800 [ 209.796493] ? syscall_return_slowpath+0x5c0/0x5c0 [ 209.801431] ? syscall_return_slowpath+0x30f/0x5c0 [ 209.806377] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 209.811754] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 209.816613] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 209.821805] RIP: 0033:0x455979 [ 209.824996] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 209.832713] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 209.839985] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 209.847259] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 209.854547] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 209.861822] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 2018/05/06 05:52:08 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:08 executing program 2: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0x0, 0x8, 'queue0\x00'}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = openat$cgroup_int(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.memory_migrate\x00', 0x2, 0x0) write$binfmt_misc(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="73797a30178875ddba9302a2045f9b6a5826def397bebf10a3f3fd023ae9c068b27c83a28d384ca5beaf7a3a7a51ef85a0154e4d3c1d4027c9093a5e4ff44e7587669dc875d70f8928c2d6a51dfd0f2e1fb7972ae05a02f8b751900ce1cd0ab68e0ef9c481b1cc4c6906919779d346f2fb0bda03c38a7408f318deac19ac5c436196193eabd2c3bc2f18884f3ea68165c94666ed48154c4a96f1e163b57b33bd79df48978f0693e6ba293dc22873907d49f6f23ce9e8a0f662a4a2ac0b2ba70eb0b7c7228b0a2bee97ebf525666a12c5ff24000000000000000100000000001f27ce05c180c83a1f34e65cc8bac26925601fb34d91"], 0xdf) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000040)) close(r1) 2018/05/06 05:52:08 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x0, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:52:08 executing program 1 (fault-call:1 fault-nth:27): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:52:08 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:08 executing program 6: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x1000000, 0x81) close(0xffffffffffffffff) 2018/05/06 05:52:08 executing program 3: io_setup(0x353a, &(0x7f0000000000)=0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x4) r3 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.type\x00', 0x2, 0x0) r4 = syz_open_dev$audion(&(0x7f00000002c0)='/dev/audio#\x00', 0x5, 0x2000) io_submit(r0, 0x2, &(0x7f0000000340)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x2, 0x100000000, r1, &(0x7f0000000100)="3df48530e4bf9380060d24f3227f5c49daf396f0205256030ef0", 0x1a, 0x40, 0x0, 0x0, r2}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x7, r3, &(0x7f0000000200)="0e8e60bdf801f41546af3ed2e72ee47b13655ac498d227656c42817a27cbc2379a5edc768d0b10e458ca049aae08fc14a4d4a28946f40b59921fe18b45c99ecdc76a7425722783c01d9882d82b53e18cbd700f838a2ff05364f65db461fcb80bc4e29b46252bd5b2a52da30eca36b05cdfff9aea977875ba909dcda2514848ae36fd1325e224bedca4a2bcc485a44177f61d330ee0262db3", 0x98, 0x7ff, 0x0, 0x0, r4}]) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0x0, 0x0, 'queue0\x00', 0x1ff}) r5 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r5) 2018/05/06 05:52:08 executing program 7: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) 2018/05/06 05:52:09 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"627269646765300000000000000f00", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 210.597391] FAULT_INJECTION: forcing a failure. [ 210.597391] name failslab, interval 1, probability 0, space 0, times 0 [ 210.608731] CPU: 1 PID: 14894 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 210.616018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 210.625379] Call Trace: [ 210.627990] dump_stack+0x1b9/0x294 [ 210.631634] ? dump_stack_print_info.cold.2+0x52/0x52 [ 210.636837] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 210.642043] should_fail.cold.4+0xa/0x1a 2018/05/06 05:52:09 executing program 6: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x2000000, 0x81) close(0xffffffffffffffff) [ 210.646111] ? is_bpf_text_address+0xd7/0x170 [ 210.650620] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 210.655741] ? unwind_get_return_address+0x61/0xa0 [ 210.660687] ? __save_stack_trace+0x7e/0xd0 [ 210.665022] ? graph_lock+0x170/0x170 [ 210.668841] ? find_held_lock+0x36/0x1c0 [ 210.672914] ? __lock_is_held+0xb5/0x140 [ 210.676999] ? check_same_owner+0x320/0x320 [ 210.681336] ? rcu_note_context_switch+0x710/0x710 [ 210.686277] __should_failslab+0x124/0x180 [ 210.690520] should_failslab+0x9/0x14 2018/05/06 05:52:09 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 210.694334] kmem_cache_alloc_trace+0x2cb/0x780 [ 210.699012] ? __kmalloc_node+0x33/0x70 [ 210.702998] ? __kmalloc_node+0x33/0x70 [ 210.706986] ? rcu_read_lock_sched_held+0x108/0x120 [ 210.712022] __memcg_init_list_lru_node+0x17d/0x2c0 [ 210.717054] ? kvfree_rcu+0x20/0x20 [ 210.720696] ? __kmalloc_node+0x47/0x70 [ 210.724685] __list_lru_init+0x456/0x790 [ 210.728759] ? list_lru_destroy+0x4c0/0x4c0 [ 210.733089] ? mark_held_locks+0xc9/0x160 [ 210.737249] ? __raw_spin_lock_init+0x1c/0x100 [ 210.741848] ? trace_hardirqs_on_caller+0x421/0x5c0 2018/05/06 05:52:09 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 210.747053] ? lockdep_init_map+0x9/0x10 [ 210.751129] sget_userns+0x767/0xf00 [ 210.754856] ? get_anon_bdev+0x2f0/0x2f0 [ 210.758937] ? destroy_unused_super.part.11+0x110/0x110 [ 210.764329] ? __alloc_pages_nodemask+0xacf/0xd70 [ 210.769189] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 210.774217] ? kasan_check_read+0x11/0x20 [ 210.778371] ? cap_capable+0x1f9/0x260 [ 210.782273] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 210.787820] ? security_capable+0x99/0xc0 [ 210.791986] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 2018/05/06 05:52:09 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"627269646765300000000000fffffffe", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 210.797534] ? ns_capable_common+0x13f/0x170 [ 210.804047] ? get_anon_bdev+0x2f0/0x2f0 [ 210.808123] sget+0x10b/0x150 [ 210.811241] ? fuse_get_root_inode+0x190/0x190 [ 210.815828] mount_nodev+0x33/0x110 [ 210.819460] fuse_mount+0x2c/0x40 [ 210.822923] mount_fs+0xae/0x328 [ 210.826302] vfs_kern_mount.part.34+0xd4/0x4d0 [ 210.830893] ? may_umount+0xb0/0xb0 [ 210.834522] ? _raw_read_unlock+0x22/0x30 [ 210.838674] ? __get_fs_type+0x97/0xc0 [ 210.842573] do_mount+0x564/0x3070 2018/05/06 05:52:09 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 210.846127] ? copy_mount_string+0x40/0x40 [ 210.850371] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 210.855392] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 210.860164] ? retint_kernel+0x10/0x10 [ 210.864065] ? copy_mount_options+0x1f0/0x380 [ 210.868560] ? copy_mount_options+0x1fa/0x380 [ 210.873063] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 210.878611] ? copy_mount_options+0x285/0x380 [ 210.883112] ksys_mount+0x12d/0x140 [ 210.886742] __x64_sys_mount+0xbe/0x150 [ 210.890723] ? trace_hardirqs_on_caller+0x421/0x5c0 2018/05/06 05:52:09 executing program 6: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) exit(0x1) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000001240)='/dev/cuse\x00', 0x0, 0x0) getrlimit(0x2, &(0x7f0000001580)) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000001280)={0x2, 0x9, 0x1ff}) close(0xffffffffffffffff) read(r0, &(0x7f0000000240)=""/4096, 0x1000) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0xa0103) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) syz_open_dev$binder(&(0x7f0000001500)='/dev/binder#\x00', 0x0, 0x800) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000100)={{0xa1b, 0x5, 0x80000000, 0x729, "e9557654e2f74e629732fe6f952fddd28690aba261c5d846bcc9f53234850df4144c3fb4d30d518e9a56d37a", 0x2}, 0x0, 0x0, 0xf5, r3, 0x421, 0x5, "baa6246b53fd12daa49fde6dd2632fc9377053e0ee51d75640db351dc9d250785fcca6d3e30c5b9815678bae4a312ad8d42f8b2fc5999d93b821fcdc57cb328e", &(0x7f00000000c0)='\x00', 0x1, [], [0x2, 0x9, 0x0, 0x9]}) writev(r0, &(0x7f0000001540)=[{&(0x7f00000012c0)="168afea29b21d4223f1eb40afd442e0e12abb9e9503b7921b2d54fdde51e2b24931bf5b53423c24cdd5baf65820cb3dbdd0a5b2ca6d97f3a", 0x38}, {&(0x7f0000001300)="113e54a3c769ff534d240d98c7d101e75197e373dcf8cd2097f36b01fc5df889e4d0a94dbcb3ee972a155808c3ec746e3cf4689197e3316939501541ec042459295097f1a5d889a9dc580a88b9b681dce49ceee7c37ba333ac27f11d82ca9888fdaad17171efeaa8db7c26bd120feec510a643a483bb6c6aeef9231d2f8789dfa3ce753e03b98866671934cd301b2f0df2b6f4ea68720c75a4bd34fefa2798acbe43a3fb6ad46080a7da77e0aa12cf2944539618ab92d8ff1f8082762abfe21ec87ab57f1e", 0xc5}, {&(0x7f0000001400)="a4d6d3473f67ede6c8b056bb75cdb3f40cc0239d993e0491cfd630c9eedecbaf51494c5f7a3c824e2fa050febac0f9bf075a3628dcf90086e9d709885340dbe858f2ca6681f069951c5de2ac0191548988aca94f5b69ebae50643b0298b5c9f7b1821a1ed3b9ab0b559d87e7f7495a1de9e4d6ca82c5de30d3a65d1851e70e38146188b2ad73ea74b98906231e81507bea6eb49ec752aee9b561f2900334032f7740feb58c735644578aea6d5374e03c7065c67606941706d59a50fbab9abdf9c6bc05bb42", 0xc5}, {&(0x7f0000001500)}], 0x4) 2018/05/06 05:52:09 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) [ 210.895746] do_syscall_64+0x1b1/0x800 [ 210.899638] ? finish_task_switch+0x1ca/0x810 [ 210.904151] ? syscall_return_slowpath+0x5c0/0x5c0 [ 210.909086] ? syscall_return_slowpath+0x30f/0x5c0 [ 210.914023] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 210.919404] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 210.924258] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 210.929449] RIP: 0033:0x455979 [ 210.932641] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 210.940362] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 2018/05/06 05:52:09 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 210.947636] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 210.954913] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 210.962198] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 210.969476] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 2018/05/06 05:52:09 executing program 2: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0x0, 0x8, 'queue0\x00'}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x1, 0x191000) creat(&(0x7f0000000000)='./file0\x00', 0x2) 2018/05/06 05:52:09 executing program 7: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) 2018/05/06 05:52:09 executing program 1 (fault-call:1 fault-nth:28): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:52:09 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:09 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 211.582751] FAULT_INJECTION: forcing a failure. [ 211.582751] name failslab, interval 1, probability 0, space 0, times 0 [ 211.594074] CPU: 0 PID: 14946 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 211.601357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 211.610721] Call Trace: [ 211.613330] dump_stack+0x1b9/0x294 [ 211.616983] ? dump_stack_print_info.cold.2+0x52/0x52 [ 211.622195] ? __save_stack_trace+0x7e/0xd0 [ 211.626538] should_fail.cold.4+0xa/0x1a [ 211.630614] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 211.635736] ? save_stack+0x43/0xd0 [ 211.639377] ? kasan_kmalloc+0xc4/0xe0 [ 211.643285] ? kmem_cache_alloc_trace+0x152/0x780 [ 211.648142] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 211.653341] ? __list_lru_init+0x456/0x790 [ 211.657590] ? sget_userns+0x767/0xf00 [ 211.661482] ? graph_lock+0x170/0x170 [ 211.665272] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 211.670018] ? do_mount+0x564/0x3070 [ 211.673725] ? ksys_mount+0x12d/0x140 [ 211.677524] ? __x64_sys_mount+0xbe/0x150 [ 211.681684] ? do_syscall_64+0x1b1/0x800 [ 211.685741] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 211.691106] ? find_held_lock+0x36/0x1c0 [ 211.695185] ? __lock_is_held+0xb5/0x140 [ 211.699274] ? check_same_owner+0x320/0x320 [ 211.703615] ? rcu_note_context_switch+0x710/0x710 [ 211.708556] __should_failslab+0x124/0x180 [ 211.712798] should_failslab+0x9/0x14 [ 211.716609] kmem_cache_alloc_trace+0x2cb/0x780 [ 211.721288] ? __kmalloc_node+0x33/0x70 [ 211.725271] ? __kmalloc_node+0x33/0x70 [ 211.729254] ? rcu_read_lock_sched_held+0x108/0x120 [ 211.734284] __memcg_init_list_lru_node+0x17d/0x2c0 [ 211.739311] ? kvfree_rcu+0x20/0x20 [ 211.742944] ? __kmalloc_node+0x47/0x70 [ 211.746911] __list_lru_init+0x456/0x790 [ 211.750966] ? list_lru_destroy+0x4c0/0x4c0 [ 211.755278] ? mark_held_locks+0xc9/0x160 [ 211.759413] ? __raw_spin_lock_init+0x1c/0x100 [ 211.764077] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 211.769102] ? lockdep_init_map+0x9/0x10 [ 211.773159] sget_userns+0x767/0xf00 [ 211.776866] ? get_anon_bdev+0x2f0/0x2f0 [ 211.780916] ? destroy_unused_super.part.11+0x110/0x110 [ 211.786273] ? __alloc_pages_nodemask+0xacf/0xd70 [ 211.787543] sg_write: data in/out 584327543/10 bytes for SCSI command 0x34-- guessing data in; [ 211.787543] program syz-executor6 not setting count and/or reply_len properly [ 211.791115] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 211.791137] ? kasan_check_read+0x11/0x20 [ 211.791155] ? cap_capable+0x1f9/0x260 [ 211.791174] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 211.791199] ? security_capable+0x99/0xc0 [ 211.829955] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 211.835485] ? ns_capable_common+0x13f/0x170 [ 211.839883] ? get_anon_bdev+0x2f0/0x2f0 [ 211.843930] sget+0x10b/0x150 [ 211.847040] ? fuse_get_root_inode+0x190/0x190 [ 211.851615] mount_nodev+0x33/0x110 [ 211.855240] fuse_mount+0x2c/0x40 [ 211.858686] mount_fs+0xae/0x328 [ 211.862048] vfs_kern_mount.part.34+0xd4/0x4d0 [ 211.866627] ? may_umount+0xb0/0xb0 [ 211.870244] ? _raw_read_unlock+0x22/0x30 [ 211.874420] ? __get_fs_type+0x97/0xc0 [ 211.878309] do_mount+0x564/0x3070 [ 211.881834] ? copy_mount_string+0x40/0x40 [ 211.886051] ? rcu_pm_notify+0xc0/0xc0 [ 211.889923] ? copy_mount_options+0x5f/0x380 [ 211.894315] ? rcu_read_lock_sched_held+0x108/0x120 [ 211.899323] ? kmem_cache_alloc_trace+0x616/0x780 [ 211.904153] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 211.909685] ? copy_mount_options+0x285/0x380 [ 211.914168] ksys_mount+0x12d/0x140 [ 211.917780] __x64_sys_mount+0xbe/0x150 [ 211.921740] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 211.926753] do_syscall_64+0x1b1/0x800 [ 211.930625] ? finish_task_switch+0x1ca/0x810 [ 211.935103] ? syscall_return_slowpath+0x5c0/0x5c0 [ 211.940039] ? syscall_return_slowpath+0x30f/0x5c0 [ 211.944962] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 211.950325] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 211.955171] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 211.960346] RIP: 0033:0x455979 [ 211.963531] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 211.971250] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 211.978611] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 211.985868] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 211.993130] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 212.000396] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 2018/05/06 05:52:10 executing program 7: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) 2018/05/06 05:52:10 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0x0, 0x0, 'queue0\x00', 0x1ff}) r0 = memfd_create(&(0x7f0000000000)='-GPL:md5sumem0]!#mime_type\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r0, 0xc08c5335, &(0x7f0000000100)={0xb5, 0x100000001, 0x0, 'queue1\x00', 0x4}) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r1) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000040)) 2018/05/06 05:52:10 executing program 2: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x1ff, 0x200) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f0000000180)={0x7, 0x0, 0x8, 'queue0\x00', 0x2}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r1) 2018/05/06 05:52:10 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:10 executing program 1 (fault-call:1 fault-nth:29): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:52:10 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:10 executing program 6: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) 2018/05/06 05:52:10 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x0, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) [ 212.602849] FAULT_INJECTION: forcing a failure. [ 212.602849] name failslab, interval 1, probability 0, space 0, times 0 [ 212.614174] CPU: 0 PID: 14981 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 212.621459] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 212.630823] Call Trace: [ 212.633422] dump_stack+0x1b9/0x294 [ 212.637061] ? dump_stack_print_info.cold.2+0x52/0x52 [ 212.642261] ? __save_stack_trace+0x7e/0xd0 [ 212.646595] should_fail.cold.4+0xa/0x1a 2018/05/06 05:52:11 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) [ 212.650668] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 212.655783] ? save_stack+0x43/0xd0 [ 212.659420] ? kasan_kmalloc+0xc4/0xe0 [ 212.663321] ? kmem_cache_alloc_trace+0x152/0x780 [ 212.668171] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 212.673372] ? __list_lru_init+0x456/0x790 [ 212.677619] ? sget_userns+0x767/0xf00 [ 212.681517] ? graph_lock+0x170/0x170 [ 212.685333] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 212.690096] ? do_mount+0x564/0x3070 [ 212.693814] ? ksys_mount+0x12d/0x140 [ 212.697621] ? __x64_sys_mount+0xbe/0x150 2018/05/06 05:52:11 executing program 6: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:52:11 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 212.701778] ? do_syscall_64+0x1b1/0x800 [ 212.705845] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 212.711217] ? find_held_lock+0x36/0x1c0 [ 212.715287] ? __lock_is_held+0xb5/0x140 [ 212.719372] ? check_same_owner+0x320/0x320 [ 212.723702] ? rcu_note_context_switch+0x710/0x710 [ 212.728644] __should_failslab+0x124/0x180 [ 212.732890] should_failslab+0x9/0x14 [ 212.736701] kmem_cache_alloc_trace+0x2cb/0x780 [ 212.741382] ? __kmalloc_node+0x33/0x70 [ 212.745375] ? __kmalloc_node+0x33/0x70 2018/05/06 05:52:11 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 212.749360] ? rcu_read_lock_sched_held+0x108/0x120 [ 212.754386] __memcg_init_list_lru_node+0x17d/0x2c0 [ 212.759411] ? kvfree_rcu+0x20/0x20 [ 212.763046] ? __kmalloc_node+0x47/0x70 [ 212.767033] __list_lru_init+0x456/0x790 [ 212.771107] ? list_lru_destroy+0x4c0/0x4c0 [ 212.775448] ? mark_held_locks+0xc9/0x160 [ 212.779614] ? __raw_spin_lock_init+0x1c/0x100 [ 212.784199] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 212.789219] ? lockdep_init_map+0x9/0x10 [ 212.793287] sget_userns+0x767/0xf00 [ 212.797008] ? get_anon_bdev+0x2f0/0x2f0 2018/05/06 05:52:11 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 212.801080] ? destroy_unused_super.part.11+0x110/0x110 [ 212.806448] ? __alloc_pages_nodemask+0xacf/0xd70 [ 212.811308] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 212.816332] ? kasan_check_read+0x11/0x20 [ 212.820484] ? cap_capable+0x1f9/0x260 [ 212.824384] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 212.829929] ? security_capable+0x99/0xc0 [ 212.834087] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 212.839629] ? ns_capable_common+0x13f/0x170 [ 212.844041] ? get_anon_bdev+0x2f0/0x2f0 [ 212.848108] sget+0x10b/0x150 2018/05/06 05:52:11 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 212.851223] ? fuse_get_root_inode+0x190/0x190 [ 212.855806] mount_nodev+0x33/0x110 [ 212.859432] fuse_mount+0x2c/0x40 [ 212.862909] mount_fs+0xae/0x328 [ 212.866293] vfs_kern_mount.part.34+0xd4/0x4d0 [ 212.870879] ? may_umount+0xb0/0xb0 [ 212.874502] ? _raw_read_unlock+0x22/0x30 [ 212.878648] ? __get_fs_type+0x97/0xc0 [ 212.882546] do_mount+0x564/0x3070 [ 212.886096] ? copy_mount_string+0x40/0x40 [ 212.890335] ? rcu_pm_notify+0xc0/0xc0 [ 212.894236] ? copy_mount_options+0x5f/0x380 [ 212.898649] ? rcu_read_lock_sched_held+0x108/0x120 [ 212.903666] ? kmem_cache_alloc_trace+0x616/0x780 [ 212.908517] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 212.914055] ? _copy_from_user+0xdf/0x150 [ 212.918215] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 212.923756] ? copy_mount_options+0x285/0x380 [ 212.928257] ksys_mount+0x12d/0x140 [ 212.931895] __x64_sys_mount+0xbe/0x150 [ 212.935872] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 212.940892] do_syscall_64+0x1b1/0x800 [ 212.944782] ? finish_task_switch+0x1ca/0x810 [ 212.949295] ? syscall_return_slowpath+0x5c0/0x5c0 [ 212.954273] ? syscall_return_slowpath+0x30f/0x5c0 [ 212.959198] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 212.964553] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 212.969397] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 212.974568] RIP: 0033:0x455979 [ 212.977739] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 212.985429] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 212.992689] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 212.999962] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 213.007219] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 213.014479] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 2018/05/06 05:52:12 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0L', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:12 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"62726964676530000000000000feffff", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:12 executing program 1 (fault-call:1 fault-nth:30): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:52:12 executing program 7: syz_open_dev$sg(&(0x7f0000000080)="2f6465762f736723f6", 0x0, 0x81) close(0xffffffffffffffff) 2018/05/06 05:52:12 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x0, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:52:12 executing program 2: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0x0, 0x8, 'queue0\x00'}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2000) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x9, 0x101000) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000000c0)={0x0, 0xb37f, 0x100000000, 0x3ff}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000180)={r2, @in={{0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0xfffffffffffffffe, 0x200, 0x12711bed, 0x6, 0x66b7}, &(0x7f0000000240)=0x98) close(r0) 2018/05/06 05:52:12 executing program 3: r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x12) ioctl$KVM_SET_TSS_ADDR(r0, 0xae47, 0xd000) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0x0, 0x0, 'queue0\x00', 0x1ff}) syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:52:12 executing program 6: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) close(r0) [ 213.670726] FAULT_INJECTION: forcing a failure. [ 213.670726] name failslab, interval 1, probability 0, space 0, times 0 [ 213.682022] CPU: 0 PID: 15033 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 213.689302] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 213.698660] Call Trace: [ 213.701334] dump_stack+0x1b9/0x294 [ 213.704979] ? dump_stack_print_info.cold.2+0x52/0x52 [ 213.710182] ? __save_stack_trace+0x7e/0xd0 [ 213.714523] should_fail.cold.4+0xa/0x1a 2018/05/06 05:52:12 executing program 7: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0xf6ffffff00000000, 0x81) close(0xffffffffffffffff) 2018/05/06 05:52:12 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 213.718601] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 213.723716] ? save_stack+0x43/0xd0 [ 213.727353] ? kasan_kmalloc+0xc4/0xe0 [ 213.731253] ? kmem_cache_alloc_trace+0x152/0x780 [ 213.736108] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 213.741305] ? __list_lru_init+0x456/0x790 [ 213.745552] ? sget_userns+0x767/0xf00 [ 213.749450] ? graph_lock+0x170/0x170 [ 213.753258] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 213.758023] ? do_mount+0x564/0x3070 [ 213.761746] ? ksys_mount+0x12d/0x140 [ 213.765553] ? __x64_sys_mount+0xbe/0x150 2018/05/06 05:52:12 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 213.769709] ? do_syscall_64+0x1b1/0x800 [ 213.773779] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 213.779156] ? find_held_lock+0x36/0x1c0 [ 213.783237] ? __lock_is_held+0xb5/0x140 [ 213.787322] ? check_same_owner+0x320/0x320 [ 213.791656] ? rcu_note_context_switch+0x710/0x710 [ 213.796597] __should_failslab+0x124/0x180 [ 213.800842] should_failslab+0x9/0x14 [ 213.804648] kmem_cache_alloc_trace+0x2cb/0x780 [ 213.809330] ? __kmalloc_node+0x33/0x70 [ 213.813319] ? __kmalloc_node+0x33/0x70 [ 213.817310] ? rcu_read_lock_sched_held+0x108/0x120 [ 213.822345] __memcg_init_list_lru_node+0x17d/0x2c0 [ 213.827375] ? kvfree_rcu+0x20/0x20 [ 213.831017] ? __kmalloc_node+0x47/0x70 [ 213.835010] __list_lru_init+0x456/0x790 [ 213.839081] ? list_lru_destroy+0x4c0/0x4c0 [ 213.843412] ? mark_held_locks+0xc9/0x160 [ 213.847575] ? __raw_spin_lock_init+0x1c/0x100 [ 213.852169] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 213.857197] ? lockdep_init_map+0x9/0x10 [ 213.861286] sget_userns+0x767/0xf00 [ 213.865005] ? get_anon_bdev+0x2f0/0x2f0 [ 213.869084] ? destroy_unused_super.part.11+0x110/0x110 [ 213.874457] ? __alloc_pages_nodemask+0xacf/0xd70 [ 213.879309] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 213.884339] ? kasan_check_read+0x11/0x20 [ 213.888493] ? cap_capable+0x1f9/0x260 [ 213.892391] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 213.897930] ? security_capable+0x99/0xc0 [ 213.902086] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 213.907627] ? ns_capable_common+0x13f/0x170 [ 213.912044] ? get_anon_bdev+0x2f0/0x2f0 [ 213.916106] sget+0x10b/0x150 [ 213.919230] ? fuse_get_root_inode+0x190/0x190 [ 213.923815] mount_nodev+0x33/0x110 [ 213.927443] fuse_mount+0x2c/0x40 [ 213.930900] mount_fs+0xae/0x328 [ 213.934273] vfs_kern_mount.part.34+0xd4/0x4d0 [ 213.938858] ? may_umount+0xb0/0xb0 [ 213.942484] ? _raw_read_unlock+0x22/0x30 [ 213.946635] ? __get_fs_type+0x97/0xc0 [ 213.950532] do_mount+0x564/0x3070 [ 213.954096] ? copy_mount_string+0x40/0x40 [ 213.958334] ? rcu_pm_notify+0xc0/0xc0 [ 213.962238] ? copy_mount_options+0x5f/0x380 [ 213.966650] ? rcu_read_lock_sched_held+0x108/0x120 [ 213.971672] ? kmem_cache_alloc_trace+0x616/0x780 [ 213.976513] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 213.982042] ? _copy_from_user+0xdf/0x150 [ 213.986202] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 213.991743] ? copy_mount_options+0x285/0x380 [ 213.996242] ksys_mount+0x12d/0x140 [ 213.999858] __x64_sys_mount+0xbe/0x150 [ 214.003816] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 214.008825] do_syscall_64+0x1b1/0x800 [ 214.012702] ? finish_task_switch+0x1ca/0x810 [ 214.017203] ? syscall_return_slowpath+0x5c0/0x5c0 [ 214.022124] ? syscall_return_slowpath+0x30f/0x5c0 [ 214.027051] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 214.032420] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 214.037253] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 214.042425] RIP: 0033:0x455979 [ 214.045608] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 214.053299] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 214.060550] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 214.067801] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 214.075061] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 214.082318] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 2018/05/06 05:52:13 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:13 executing program 7: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x4000000, 0x81) close(0xffffffffffffffff) 2018/05/06 05:52:13 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:13 executing program 1 (fault-call:1 fault-nth:31): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:52:13 executing program 2: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0x0, 0x8, 'queue0\x00'}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:52:13 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0x0, 0x0, 'queue0\x00', 0x1ff}) r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0xb, 0x10002) r1 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x3, 0x20000) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000100)) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) r3 = fcntl$dupfd(r2, 0x0, r2) connect$inet(r1, &(0x7f0000ff1ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0xfffffffffffffd83) setsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f0000000000)=@fragment, 0x8) listen$netrom(r3, 0x101) accept4$inet(r3, 0x0, &(0x7f00008c5ffc), 0x0) syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0xbfffffffffffdffd, 0x81) socket$inet_tcp(0x2, 0x1, 0x0) close(r0) 2018/05/06 05:52:13 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(0xffffffffffffffff) 2018/05/06 05:52:13 executing program 6: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x8, 0x10100) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x80) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f00000001c0)=0x9, 0x2) bind$netrom(r0, &(0x7f00000000c0)=@full={{0x3, {"96f4b3e5be369f"}, 0x7ff}, [{"d04c884c898b08"}, {"16f98d18c79dea"}, {"a6183f8fd5c4b4"}, {"de872b48cb237d"}, {"5a628030a6c875"}, {"5598f56b815a32"}, {"1bdd76139e19fa"}, {"39df392969cb2d"}]}, 0x123) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000180)=0x4) [ 214.733779] FAULT_INJECTION: forcing a failure. [ 214.733779] name failslab, interval 1, probability 0, space 0, times 0 [ 214.745091] CPU: 1 PID: 15086 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 214.752384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 214.761738] Call Trace: [ 214.764340] dump_stack+0x1b9/0x294 [ 214.767978] ? dump_stack_print_info.cold.2+0x52/0x52 [ 214.773184] ? __save_stack_trace+0x7e/0xd0 [ 214.777524] should_fail.cold.4+0xa/0x1a 2018/05/06 05:52:13 executing program 7: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x200000000000000, 0x81) close(0xffffffffffffffff) 2018/05/06 05:52:13 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"62726964676530000000000000000f00", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 214.781596] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 214.786713] ? save_stack+0x43/0xd0 [ 214.790347] ? kasan_kmalloc+0xc4/0xe0 [ 214.794245] ? kmem_cache_alloc_trace+0x152/0x780 [ 214.799094] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 214.804298] ? __list_lru_init+0x456/0x790 [ 214.808548] ? sget_userns+0x767/0xf00 [ 214.812451] ? graph_lock+0x170/0x170 [ 214.816264] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 214.821033] ? do_mount+0x564/0x3070 [ 214.824760] ? ksys_mount+0x12d/0x140 [ 214.828573] ? __x64_sys_mount+0xbe/0x150 2018/05/06 05:52:13 executing program 7: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x400000000000000, 0x81) close(0xffffffffffffffff) [ 214.832734] ? do_syscall_64+0x1b1/0x800 [ 214.836807] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 214.842184] ? find_held_lock+0x36/0x1c0 [ 214.846262] ? __lock_is_held+0xb5/0x140 [ 214.850346] ? check_same_owner+0x320/0x320 [ 214.854676] ? rcu_note_context_switch+0x710/0x710 [ 214.859623] __should_failslab+0x124/0x180 [ 214.863895] should_failslab+0x9/0x14 [ 214.867710] kmem_cache_alloc_trace+0x2cb/0x780 [ 214.872391] ? __kmalloc_node+0x33/0x70 [ 214.876378] ? __kmalloc_node+0x33/0x70 2018/05/06 05:52:13 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00\x00\x00\x00\x00\x00\x00@\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:13 executing program 7: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0xf6ffffff, 0x81) close(0xffffffffffffffff) [ 214.880362] ? rcu_read_lock_sched_held+0x108/0x120 [ 214.885394] __memcg_init_list_lru_node+0x17d/0x2c0 [ 214.890422] ? kvfree_rcu+0x20/0x20 [ 214.894065] ? __kmalloc_node+0x47/0x70 [ 214.898059] __list_lru_init+0x456/0x790 [ 214.902135] ? list_lru_destroy+0x4c0/0x4c0 [ 214.906468] ? mark_held_locks+0xc9/0x160 [ 214.910633] ? __raw_spin_lock_init+0x1c/0x100 [ 214.915227] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 214.920255] ? lockdep_init_map+0x9/0x10 [ 214.924326] sget_userns+0x767/0xf00 [ 214.928048] ? get_anon_bdev+0x2f0/0x2f0 [ 214.932124] ? destroy_unused_super.part.11+0x110/0x110 [ 214.937491] ? __alloc_pages_nodemask+0xacf/0xd70 [ 214.942341] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 214.947397] ? kasan_check_read+0x11/0x20 [ 214.951565] ? cap_capable+0x1f9/0x260 [ 214.955472] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 214.961017] ? security_capable+0x99/0xc0 [ 214.965174] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 214.970720] ? ns_capable_common+0x13f/0x170 [ 214.975142] ? get_anon_bdev+0x2f0/0x2f0 [ 214.979209] sget+0x10b/0x150 2018/05/06 05:52:13 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"627269646765300000000000000200", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:13 executing program 7: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0xfffffff6, 0x81) close(0xffffffffffffffff) [ 214.982325] ? fuse_get_root_inode+0x190/0x190 [ 214.986914] mount_nodev+0x33/0x110 [ 214.990548] fuse_mount+0x2c/0x40 [ 214.994012] mount_fs+0xae/0x328 [ 214.997387] vfs_kern_mount.part.34+0xd4/0x4d0 [ 215.001974] ? may_umount+0xb0/0xb0 [ 215.005604] ? _raw_read_unlock+0x22/0x30 [ 215.009761] ? __get_fs_type+0x97/0xc0 [ 215.013661] do_mount+0x564/0x3070 [ 215.017209] ? copy_mount_string+0x40/0x40 [ 215.021450] ? rcu_pm_notify+0xc0/0xc0 [ 215.025354] ? copy_mount_options+0x5f/0x380 [ 215.029777] ? rcu_read_lock_sched_held+0x108/0x120 [ 215.034807] ? kmem_cache_alloc_trace+0x616/0x780 [ 215.039666] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 215.045218] ? _copy_from_user+0xdf/0x150 [ 215.049378] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 215.054923] ? copy_mount_options+0x285/0x380 [ 215.059428] ksys_mount+0x12d/0x140 [ 215.063062] __x64_sys_mount+0xbe/0x150 [ 215.067047] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 215.072080] do_syscall_64+0x1b1/0x800 [ 215.075980] ? finish_task_switch+0x1ca/0x810 [ 215.080491] ? syscall_return_slowpath+0x5c0/0x5c0 [ 215.085433] ? syscall_return_slowpath+0x30f/0x5c0 [ 215.090377] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 215.095755] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 215.100622] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 215.105815] RIP: 0033:0x455979 [ 215.109009] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 215.116725] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 215.124004] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 2018/05/06 05:52:13 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:13 executing program 7: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x4, 0x81) close(0xffffffffffffffff) 2018/05/06 05:52:13 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"62726964676530000000000000fdfdff", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 215.132015] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 215.139295] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 215.146579] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 2018/05/06 05:52:13 executing program 1 (fault-call:1 fault-nth:32): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) [ 215.246966] FAULT_INJECTION: forcing a failure. [ 215.246966] name failslab, interval 1, probability 0, space 0, times 0 [ 215.258369] CPU: 0 PID: 15125 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 215.265642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 215.274983] Call Trace: [ 215.277568] dump_stack+0x1b9/0x294 [ 215.281189] ? dump_stack_print_info.cold.2+0x52/0x52 [ 215.286386] ? __save_stack_trace+0x7e/0xd0 [ 215.290723] should_fail.cold.4+0xa/0x1a [ 215.294782] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 215.300344] ? save_stack+0x43/0xd0 [ 215.303961] ? kasan_kmalloc+0xc4/0xe0 [ 215.307831] ? kmem_cache_alloc_trace+0x152/0x780 [ 215.312660] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 215.317839] ? __list_lru_init+0x456/0x790 [ 215.322058] ? sget_userns+0x767/0xf00 [ 215.325981] ? graph_lock+0x170/0x170 [ 215.329774] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 215.334513] ? do_mount+0x564/0x3070 [ 215.338209] ? ksys_mount+0x12d/0x140 [ 215.341997] ? __x64_sys_mount+0xbe/0x150 [ 215.346140] ? do_syscall_64+0x1b1/0x800 [ 215.350196] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 215.355555] ? find_held_lock+0x36/0x1c0 [ 215.359613] ? __lock_is_held+0xb5/0x140 [ 215.363692] ? check_same_owner+0x320/0x320 [ 215.368025] ? rcu_note_context_switch+0x710/0x710 [ 215.372965] __should_failslab+0x124/0x180 [ 215.377199] should_failslab+0x9/0x14 [ 215.380993] kmem_cache_alloc_trace+0x2cb/0x780 [ 215.385651] ? __kmalloc_node+0x33/0x70 [ 215.389608] ? __kmalloc_node+0x33/0x70 [ 215.393577] ? rcu_read_lock_sched_held+0x108/0x120 [ 215.398604] __memcg_init_list_lru_node+0x17d/0x2c0 [ 215.403614] ? kvfree_rcu+0x20/0x20 [ 215.407240] ? __kmalloc_node+0x47/0x70 [ 215.411223] __list_lru_init+0x456/0x790 [ 215.415287] ? list_lru_destroy+0x4c0/0x4c0 [ 215.419606] ? mark_held_locks+0xc9/0x160 [ 215.423758] ? __raw_spin_lock_init+0x1c/0x100 [ 215.428328] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 215.433341] ? lockdep_init_map+0x9/0x10 [ 215.437402] sget_userns+0x767/0xf00 [ 215.441102] ? get_anon_bdev+0x2f0/0x2f0 [ 215.445149] ? destroy_unused_super.part.11+0x110/0x110 [ 215.450496] ? __alloc_pages_nodemask+0xacf/0xd70 [ 215.455335] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 215.460347] ? kasan_check_read+0x11/0x20 [ 215.464477] ? cap_capable+0x1f9/0x260 [ 215.468357] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 215.473882] ? security_capable+0x99/0xc0 [ 215.478029] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 215.484087] ? ns_capable_common+0x13f/0x170 [ 215.488496] ? get_anon_bdev+0x2f0/0x2f0 [ 215.492541] sget+0x10b/0x150 [ 215.495641] ? fuse_get_root_inode+0x190/0x190 [ 215.500214] mount_nodev+0x33/0x110 [ 215.503845] fuse_mount+0x2c/0x40 [ 215.507300] mount_fs+0xae/0x328 [ 215.510650] vfs_kern_mount.part.34+0xd4/0x4d0 [ 215.515221] ? may_umount+0xb0/0xb0 [ 215.518838] ? _raw_read_unlock+0x22/0x30 [ 215.522979] ? __get_fs_type+0x97/0xc0 [ 215.526864] do_mount+0x564/0x3070 [ 215.530399] ? copy_mount_string+0x40/0x40 [ 215.534627] ? rcu_pm_notify+0xc0/0xc0 [ 215.538520] ? copy_mount_options+0x5f/0x380 [ 215.542917] ? rcu_read_lock_sched_held+0x108/0x120 [ 215.547935] ? kmem_cache_alloc_trace+0x616/0x780 [ 215.552770] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 215.558299] ? _copy_from_user+0xdf/0x150 [ 215.562435] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 215.567957] ? copy_mount_options+0x285/0x380 [ 215.572439] ksys_mount+0x12d/0x140 [ 215.576054] __x64_sys_mount+0xbe/0x150 [ 215.580023] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 215.585043] do_syscall_64+0x1b1/0x800 [ 215.588917] ? finish_task_switch+0x1ca/0x810 [ 215.593399] ? syscall_return_slowpath+0x5c0/0x5c0 [ 215.598322] ? syscall_return_slowpath+0x30f/0x5c0 [ 215.603241] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 215.608601] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 215.613439] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 215.618619] RIP: 0033:0x455979 [ 215.621805] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 215.629515] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 215.636776] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 215.644035] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 215.651320] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 215.658589] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 2018/05/06 05:52:14 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:14 executing program 7: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x8000000000000000, 0x81) close(0xffffffffffffffff) 2018/05/06 05:52:14 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:14 executing program 1 (fault-call:1 fault-nth:33): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:52:14 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(0xffffffffffffffff) 2018/05/06 05:52:14 executing program 2: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0x0, 0x8, 'queue0\x00'}) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x4, 0x600200) open(&(0x7f0000000040)='./file0\x00', 0x400000, 0x80) r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x5, 0x40000) ioctl$TIOCMGET(r1, 0x5415, &(0x7f0000000140)) r2 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r2) fallocate(r0, 0x2, 0x6, 0x4) 2018/05/06 05:52:14 executing program 6: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) r1 = dup2(r0, r0) ioctl$KVM_GET_PIT(r1, 0xc048ae65, &(0x7f0000000000)) close(0xffffffffffffffff) 2018/05/06 05:52:14 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x2, 0x0, 0x0, 'queue1\x00', 0x7ffffffc}) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) [ 215.845180] FAULT_INJECTION: forcing a failure. [ 215.845180] name failslab, interval 1, probability 0, space 0, times 0 [ 215.856496] CPU: 0 PID: 15155 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 215.863778] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 215.873137] Call Trace: [ 215.875743] dump_stack+0x1b9/0x294 [ 215.879391] ? dump_stack_print_info.cold.2+0x52/0x52 [ 215.884593] ? __save_stack_trace+0x7e/0xd0 [ 215.888930] should_fail.cold.4+0xa/0x1a [ 215.893005] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 215.898118] ? save_stack+0x43/0xd0 [ 215.901750] ? kasan_kmalloc+0xc4/0xe0 [ 215.905645] ? kmem_cache_alloc_trace+0x152/0x780 [ 215.910492] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 215.915690] ? __list_lru_init+0x456/0x790 [ 215.919937] ? sget_userns+0x767/0xf00 [ 215.923832] ? graph_lock+0x170/0x170 [ 215.927643] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 215.932407] ? do_mount+0x564/0x3070 [ 215.936130] ? ksys_mount+0x12d/0x140 [ 215.939935] ? __x64_sys_mount+0xbe/0x150 2018/05/06 05:52:14 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:14 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:14 executing program 7: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x1000000, 0x81) close(0xffffffffffffffff) 2018/05/06 05:52:14 executing program 7: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x2000000, 0x81) close(0xffffffffffffffff) [ 215.944090] ? do_syscall_64+0x1b1/0x800 [ 215.948161] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 215.953536] ? find_held_lock+0x36/0x1c0 [ 215.957611] ? __lock_is_held+0xb5/0x140 [ 215.961697] ? check_same_owner+0x320/0x320 [ 215.966029] ? rcu_note_context_switch+0x710/0x710 [ 215.970974] __should_failslab+0x124/0x180 [ 215.975223] should_failslab+0x9/0x14 [ 215.979033] kmem_cache_alloc_trace+0x2cb/0x780 [ 215.983711] ? __kmalloc_node+0x33/0x70 [ 215.987693] ? __kmalloc_node+0x33/0x70 2018/05/06 05:52:14 executing program 7: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x2, 0x81) close(0xffffffffffffffff) [ 215.991675] ? rcu_read_lock_sched_held+0x108/0x120 [ 215.996703] __memcg_init_list_lru_node+0x17d/0x2c0 [ 216.001730] ? kvfree_rcu+0x20/0x20 [ 216.005366] ? __kmalloc_node+0x47/0x70 [ 216.009356] __list_lru_init+0x456/0x790 [ 216.013436] ? list_lru_destroy+0x4c0/0x4c0 [ 216.017764] ? mark_held_locks+0xc9/0x160 [ 216.021921] ? __raw_spin_lock_init+0x1c/0x100 [ 216.026506] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 216.031528] ? lockdep_init_map+0x9/0x10 [ 216.035600] sget_userns+0x767/0xf00 [ 216.039315] ? get_anon_bdev+0x2f0/0x2f0 [ 216.043383] ? destroy_unused_super.part.11+0x110/0x110 [ 216.048750] ? __alloc_pages_nodemask+0xacf/0xd70 [ 216.053697] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 216.058721] ? kasan_check_read+0x11/0x20 [ 216.062875] ? cap_capable+0x1f9/0x260 [ 216.066774] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 216.072315] ? security_capable+0x99/0xc0 [ 216.076472] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 216.082015] ? ns_capable_common+0x13f/0x170 [ 216.086433] ? get_anon_bdev+0x2f0/0x2f0 [ 216.090579] sget+0x10b/0x150 [ 216.093692] ? fuse_get_root_inode+0x190/0x190 [ 216.098281] mount_nodev+0x33/0x110 [ 216.101917] fuse_mount+0x2c/0x40 [ 216.105375] mount_fs+0xae/0x328 [ 216.108751] vfs_kern_mount.part.34+0xd4/0x4d0 [ 216.113341] ? may_umount+0xb0/0xb0 [ 216.116974] ? _raw_read_unlock+0x22/0x30 [ 216.121124] ? __get_fs_type+0x97/0xc0 [ 216.125010] do_mount+0x564/0x3070 [ 216.128556] ? copy_mount_string+0x40/0x40 [ 216.132775] ? rcu_pm_notify+0xc0/0xc0 [ 216.136659] ? copy_mount_options+0x5f/0x380 [ 216.141067] ? rcu_read_lock_sched_held+0x108/0x120 [ 216.146076] ? kmem_cache_alloc_trace+0x616/0x780 [ 216.150904] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 216.156437] ? _copy_from_user+0xdf/0x150 [ 216.160593] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 216.166121] ? copy_mount_options+0x285/0x380 [ 216.170612] ksys_mount+0x12d/0x140 [ 216.174263] __x64_sys_mount+0xbe/0x150 [ 216.178228] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 216.183249] do_syscall_64+0x1b1/0x800 [ 216.187131] ? finish_task_switch+0x1ca/0x810 [ 216.191624] ? syscall_return_slowpath+0x5c0/0x5c0 [ 216.196554] ? syscall_return_slowpath+0x30f/0x5c0 [ 216.201498] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 216.206857] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 216.211686] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 216.216856] RIP: 0033:0x455979 [ 216.220034] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 216.227771] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 216.235031] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 216.242294] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 216.249546] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 216.256802] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 2018/05/06 05:52:15 executing program 7: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x100000000000000, 0x81) close(0xffffffffffffffff) 2018/05/06 05:52:15 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"627269646765300000000000000f00", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:15 executing program 1 (fault-call:1 fault-nth:34): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:52:15 executing program 6: syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x4cce, 0x80000000000007d) close(0xffffffffffffffff) 2018/05/06 05:52:15 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:15 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0x0, 0x0, 'queue0\x00', 0x1ff}) epoll_create(0x2) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x18, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0xa, 0x7d) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xfffffffffffffffc, 0xdc080) getsockname$unix(r1, &(0x7f0000000180), &(0x7f0000000080)=0x6e) ioctl$IOC_PR_PREEMPT_ABORT(r2, 0x401870cc, &(0x7f0000000040)={0x0, 0x8, 0x3ff, 0x41}) close(r0) eventfd2(0x3c28, 0x80000) 2018/05/06 05:52:15 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x101600, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000040)={0xf4, &(0x7f0000000180)=""/244}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000340)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001640)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000001740)=0xe8) r3 = getgid() ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000001780)=0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000017c0)={{{@in=@broadcast, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f00000018c0)=0xe8) lstat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(r0, &(0x7f0000001a00)={&(0x7f0000000280)=@file={0x1, './file0\x00'}, 0x1e, &(0x7f00000015c0)=[{&(0x7f0000000140)="a7a36314df92ddd379381498bd0f200cfc1883bb213a698efbb4ae5f43be38e2", 0x20}, {&(0x7f0000001bc0)="f133f0bdc0bb2d88e85a6b568775fe9b261f6ede8264c55e8cfefdec5d7e8767f124ffb407ef100bf5d5ea247ce7950c96e9ce6dccae3ebafe5119c9d46c571fab6b9d4687523af37b598c6143979edfe120bbea516d48ab81e62b5411c5d582a103c3ce5f0776e63700a43bde1defbc39fdc5c3db8abe5ad116f45bdda8d0b96dab393a21237ab1e3120c55190738018c15a5a9ff7dee6784be482929d137359ac7333530d74377f08d3c2285976c106abe99b29d84a3b14877afb4c01e0b919f4fb7590dfe208c05acd3d9e8e0c6aad39a85c2b3e50f84dff200eb151ebc921bfc3a", 0xe3}, {&(0x7f0000000300)="b86ee1ac0c036f71e57d50df684c189e6efdb61a", 0x14}, {&(0x7f0000000540)="100a81b24cb642c115694e6f4a0daef2b91f616772ad174ad86a9ad2ad2b64f9dde18a8da1af97e9f7bd887c629cb2e20df10de4990c9a406a7bc480073bcca85261e5ef16b37e63d7c86b0e50c19f49d3e6af232dbf74dde3eca99dcce9fad177371ce71831c293f18ff8631cc71441b0", 0x71}, {&(0x7f00000005c0)="26ed9f8801fc515c038650a9af3e66e5214110d48281058aae0cb0107657c0e4748f3c06d648137e8594927292e7c4e060097ed0e5ad286498e74bea37f8b161dc49170571bf78599563d393dc537e5a1740976b71b0df7a0cc3b3676b6fe4832813292d64ae2bb0327cd13939d0e7925512b89bad017fa11e1ede7030ddfde44e71ff510708369d8cd233e16fc9e705d75affd059f4a96104fc69348771f5cd1b40834716a0020ff75364252cad1fa981b4661c45626b17b44f09e5690f2c2621a8e7c7674feaf4b573f47296862d99b148aeeb2c1e3ef5fd959ff8dcc85f5efd73d1d4b9cd65c420bcaf055d82b6cd931461af329e9f19328526555059ed36b80d37a0a015565556f01ac5019e2eaa8f18119e3d09eb6167f85c3acd2b25fbf1b72bdf424e2f4344ac5dc9d94bc317031ffada4c5e9b4e7101ed1fd3d67f62bf42293abb361b710f1acd763e49bd87e37e4ddbd3d0c7ee40cc6477cfbb716d16513d5c2e4d3a9ed5dedaa7c34917b43c96bf626886d2a561158fdd8e52d81f94e1275d44ac7f6e09a3dd279a59af351ae838328738e079147d5f7003f560541542189882f7794d134c7419e8478f015fbb8f3ba0239f239cfc0037ff148ee654544eecdff8477a9b93410ad07f2ee8b83ca4214a7c0858d6627ff8e1076caaea90b0fa03cb8c3bac18c31109e64a11abb4b692ea231bd50e2d6ba1bf7de31e40402bab879c3971c75dea203231e47ad867a421975e9ed3b7f3a2fcd2f2ac13439bb25208b9cd6c68a3c4058d2f111511a5368fb60aba3d94064ba79dc0fae645c394d8be3808381a5bfcbf970bf3667af104bd2b4b2f7e8dd72e0e276270e47482074ed7242dca75907614b635a093af2725bfde34d8e8aa85ee51ff832d8b44799c95aa7b04583af48722c55233382912b20c0a6d101855548e14204cba8c7f31eeaaf2ff9275dde7113bc481507794acae8a4862728511c7b3df88cccab81488e9f4eacbd4d19f6e353908e6a7e3f80ceffbed5f9a66997a0471e7ce637c59b88eac2a8019942b0943eec1c90c4305e9600aefad2d9038154c4a82feb466522ffbcc32ec3212297253974fdf2664d2a65d700df3b4eec0d14253305f580523c02e0c7081525346ac653883008c5d5bf286df7046aecb01089ca0ceed8e0f89e27af05c1ccfdafa430ca929538e8dfba672c6775d523abe41b04c198442ab73b291a5d282a0856fa79c2fad560cfffc85214457c38695c3d2cb4340db30924bda07670e0d771d94074fc89cc39b31ab3f53e9f446c9765a28135bf944b5f27b534d6d4326de1f3223cbcd5eded39e0acc0dc27bb9eed342415fe0f735ef67c8d109dcd883004764ec6e7729a081074ed3eb517abc7135e62f4bc48ce0053bc5206934a76ccea30a76a19ecb97037d6592eb15e50af92d128b7a46e4211e21861e82e30168fb40dcac2e359112ff1322e26a9bf0d10fcf0f29aa52acddc57bb920933d69556e508102db13d25e471142c8e1798879da29b5c6a44740efab76ee0ced8aaafc825ae3c51aa58718ff3ac33f74641378f1dd0865e5cb260c71cece2651fa62b1ce1a98a861e37efdff1a1218d329037055587811a46f225969509aafd729fe252fef3887d7597351f14137816abd72c84b0b23e0aeec8897a9e0f43f181122fc7fe4d156e8aa66ecaa30e4801078b872a46bf66131f32fcec24721111ae4e7a9846463b855151697c89e8fee91e810b06baacd523d6efa572bc680eb6995cc7f14ab296e511117bf192f4e782d74a1b78523f8988bc2ea862382af543ddd157780d71524c63ec73499b2ce34a9cb4573ee0c08908bb7025cca149c0bd65467c4a3af3d4563b33854c1be87a81c809c03bc07ca8673c3e136dba1c9d0750cf9a10e0532f9b565114c33b0604f16dc38d78cba70300f9da43b7f5169bf0ca751468a1b505bfd34aa4d7143752b975fed179f8febdbfc9242d60322da412444aa56c49c04de4a286faeb7c542218f4770acf031f8d528a54602607a24b172c7da41a2464f308ad8401624a4866705906f75373d2582a2012ea8971ee27625e2fb58f813139391de493bcebfcd425672a76d3e47372ffc95f04629137996559ff688cd00b21d1bda319688d705d4d55ddc96f56ed43cc94a55ccb295829be5709a7fd7b746c465e9a0bd242d4fbc16b997034ac2187405be73b69b6284d811814e45bb52f97607b557846319e7875c5111d9fa89de8909f0943e8f87def1ddc3ed6aa7c67d6c253f5ae5b34134b4e55a16f3cf2090ac3f99872f6eb9cfe2321844331869669f65a1afa34ea133d35bfc7960159a44fbaeaa1270c92a64086801b45b672191c7eecff08ae845eabcbbacbd857f7a62a8258a171a24a6d22fab3944f207d4f6127aafbe463c24b99915853fcc1fabab34fbb1e5b2e5f3cbd86168413d8fd0e6866521ff2dc3aa36b59f295350b07025b802b338b38c696fa46c5498d75d77cf0f896fe7e2886195e454c7674194f1e16109a371db767c161de5f75a5b7ac7c4bce7303700fd971593149ee33febcd1878b794b76205453f6aa0fd621c68ae7a6e891b553b552a5016c02232b9f089a536e5020c834ae405511d29d1258523f8309a21b0ae6ddeff0b657e7b728e9f5e082e0fc57d6863957192fad196cae44557ea07cd21e23cee78ae788b324020faf25668fd7ab7ebac0a28c3c11c1052dfa8afe6fed42e50d380890504716332a7058ad005cc2bb11560c8b44ecb8bb273170e36d64acb85f5e90be311d1ad780406b01fea3d97a5e4c64066cbcae77006a969a6ff56f65a1e63384f80e1cc7babe218a8f802509eec5bf94a8017edb54f6fe07161f079ce8afeecdd018909554cf7b5cf72475dad1207ab2e090a87e3216c394aba967ffde31cad556c91989f4a67bd15d9cf1edf0d3b750ff6db53ff60aa5701d08622d28895dc486ba063a0dd76037a627f4fcfc0a5b5b6aaffbaa2a6c0111699945a4fb8daaff9bfc6945960c27aefee6343f079e57c00fe522ad563c4f1cecde9abb71fab2a2afe1c59e3594a155ebe6883671500f9fcbd4684399702a8adec61949f72085c399cbba6eedce99944248e5b0d41b044776fab37e09fcd44e4b5b90d5f66fbbadfa71dec1c5fb2b0956645049a67280150162a3a14176aa760c239decb7940c2b9c7e1642c6cb4537b16c8805a628764edabe7025e429ab10932e0483b5ba708b7cf0092505d74faf88c86964cfe353830d0085d0068c7a67315ae6c1646288ceafa28b533181d1d1efc9f894bd64585ef92fc617e26b089bd439d7a5595ac65c960a74c78b8635d8fb55cef9177f5ea7420c81732af66e6eb5ceae0e4b3146d1df83ef19b03af6383f10f11716d9ed109543a8e591547f2b1efebfa59838e835f3fea20434d1b59a931d32feb21c0a98c4667cad351e3666b9a1393d37dd6222bb6add029707c05b431364699f190322d5f21df9e1f760a49f3926c5b18a72fbfeafe4b96e9cddc09621e1ca2d0f8f58c76720231744ab97eb74881f31216a08d82564b34076ed2a5db7a258bd6a20384d6d73443d41b9b5150451954dbec8d695e0e1aaa63cc6bb6d65d915d9b245c56825ab305676cabd043570b8b350a184a017d80620619e691b1ad5450dd868f58b4e198bcdd81c41d74f2f9a8af0e9405d05f770d613f5881bf933b66b18ff6e5e04d5d9be899d4bf7f2f2b798f64d2ebfd291e642964365832b997f3ec5e427727802212073cf91e19710df58d1bf33e9bedd9d8c1d35dcc810eca0794f99d7a3b93e981eda41c293053a5b780fe09142da907a84a555dc8ebe9e35479328dcc2b705076ea81939e488b86fe73a08af1f4f47a3f609966f8ac3783e64095a72d1215d3ae5ada9caaf30ed53c4efb22f4a8cf555b7b8aa878e73aaf97f30c125ed40790e336af1cbf076f1a989432db9f3f7cc6102d6d60c0e0ac525b041f63fc1595eeb977a8b1216fe3bdf758560304736e7713b81802111548f273b4375a2f743c9198ccad79a9cb9079cd909f405639180d047130fddbe6f54d5c3013fc3fedd3bdbaa812498a6107ce970eb946c5e6729dba10e2916046167b29aec895a2f45b2a872bd0d74c079fd0de1b78493c9fddb33a30255bf6bda3bde33b130b863afd6c00884a90a069fb6460b3f9c2fe22880ba2e44b34d1861fe51dad6a732add45dcb60f3040bab3cbce9668e750850b1c0c53254e0484ad5afdf49c45aade2c834e9087534b55e4a6900774c4f5e717335821cab484ce7d23f9f7fcf788695b73a3a63ee2f5428b7a0d2c6d1538c80ca43100603b634df54d090b28c6603bc11e1ae58637b753534c076b0233df4efb602cd78754b1133f8c868ef04ee27976759feb5d7297b959973b058a54c4dc86c07199069f535424f01c4f709423162e6d5ce2200c824d2000492848bd7c5a4e077d218613c91fe8f3656abb6b0fc82099780527bbb3d4b852a1b134c712961f75be30a0116289fa5befad65aad1fd1e389991bbf543cfe9b74c6cf2cf18dbe5b20bcd3fe1cc5034a56215efaadfa34b7f24f43bb90ab401b29874817f567054fba9061a458973744bbfbaf5ab5e77052d2f13901f6c1ef6ba508b0f908345cc055b0f64e41fcc64afad2500123e307b01b446c6e6deb42223db7af5060cb512621bedfc9caae12c6ece875ffae264395c1a1b81f3daacd97c4b7dacb2b8552f3c5e7b7fec30638ad6324801aa60f163cf0f87b224fea52115c8d48913428b49ccd11b7506ea7ef3082f2f119cb298e316a3a848225f5ac43e88b0824c336393f57d895080cc62f9735b4d47acba91f03cc0f5c938343902a5ebbec0be6f823798ac311e29ccc91daac655e88ef786d3b10d8bde19ba2d1a7329804da5010a162c3d0ac2b9d02ac536137c7fee0f06afa36cb3df886b2d58023c71ce3570c516e93a34d6cc1a50ca7cdc473d16214acc7e83d4d6f29290124529da333ee8fe54b9686039eb1629c1b39e8b9e1a16be433805e45af48589c8c90f611fc21060b987a39991fbb864d4074088e56830e9fbef182a1e3c575dacfa05376eaf80ed8045b0406986778707d670e8c25691e4d87ecce5cecb42140a1bdda60cf6927824bbf0d93b37f27cc81b0cc5cc127c9dfeec7310fe6b4976f801359c444a65be3c141703e4ac6f55a7cd4ab076e387f482aedb04c107d420af01de5e8126fab5f21c1448497b4b73c58933dc0da338e6f8d7830aa3b5e3266058af50aaad6b7e47444b132a316ede1d36c2991471bc3077730f5e174406f12a0e5f5c39fc485e0d2cc5f3c6a9a75421be6cf8dcddfe915f8eee61f08aa1d2a36c2e100f4fad41bf8aae23e6387b8deb02f28e85043c0737ee4a23557dbbffe00d1f905bb7f6fb704e0544c52644b92e2adefe0bfe665bdfdd7bdf529bafb9166c7cc2073bd984e5a4f53370a7afcba86bb4fae2cc27861ab0594160d5a46d4257618078469c5dea348d30caee98a7c3b840ddb94a270d7ad901b7c019ec149fa39502cbd8c88f001ad96fada84c75e5c788949726ae9f1b573098f6be5849d1f24af6632f38b731e0295bf0f16b5ff6e149df08e2185e8401a4c76c48216d888d5dbdef4f2e81b2c9f3f9108e33d62f9087c1ec5c464f95eaec9336898b321da5e645e548d45025f5fc5fdfe4a70064855ca709f48e399bce228e2bfae2aaf90c7c2cb74b6036290bbf0d8bbc53be7d69c2179e07d680f3cc158c3da066960014824034870e533374f80cdc25a78136f48a9e", 0x1000}], 0x5, &(0x7f00000019c0)=[@cred={0x20, 0x1, 0x2, r1, r2, r3}, @cred={0x20, 0x1, 0x2, r4, r5, r6}], 0x40, 0x20000000}, 0x40000) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0x0, 0x8, 'queue0\x00'}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000100)) r7 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r7) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, &(0x7f0000001a40)) 2018/05/06 05:52:15 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(0xffffffffffffffff) [ 216.886130] FAULT_INJECTION: forcing a failure. [ 216.886130] name failslab, interval 1, probability 0, space 0, times 0 [ 216.897451] CPU: 0 PID: 15200 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 216.904731] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 216.914091] Call Trace: [ 216.916696] dump_stack+0x1b9/0x294 [ 216.920336] ? dump_stack_print_info.cold.2+0x52/0x52 [ 216.925535] ? __save_stack_trace+0x7e/0xd0 [ 216.929868] should_fail.cold.4+0xa/0x1a [ 216.933942] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 216.939061] ? save_stack+0x43/0xd0 [ 216.942700] ? kasan_kmalloc+0xc4/0xe0 [ 216.946753] ? kmem_cache_alloc_trace+0x152/0x780 [ 216.951606] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 216.956800] ? __list_lru_init+0x456/0x790 [ 216.961042] ? sget_userns+0x767/0xf00 [ 216.964949] ? graph_lock+0x170/0x170 [ 216.968759] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 216.973518] ? do_mount+0x564/0x3070 [ 216.977243] ? ksys_mount+0x12d/0x140 [ 216.981049] ? __x64_sys_mount+0xbe/0x150 [ 216.985201] ? do_syscall_64+0x1b1/0x800 [ 216.989273] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 216.994645] ? find_held_lock+0x36/0x1c0 [ 216.998717] ? __lock_is_held+0xb5/0x140 [ 217.002800] ? check_same_owner+0x320/0x320 [ 217.007135] ? rcu_note_context_switch+0x710/0x710 [ 217.012077] __should_failslab+0x124/0x180 [ 217.016325] should_failslab+0x9/0x14 [ 217.020135] kmem_cache_alloc_trace+0x2cb/0x780 [ 217.024814] ? __kmalloc_node+0x33/0x70 [ 217.028792] ? __kmalloc_node+0x33/0x70 2018/05/06 05:52:15 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:15 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"62726964676530000000000000c3ffff", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:15 executing program 7: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x1000000000000, 0x81) close(0xffffffffffffffff) 2018/05/06 05:52:15 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0x0, 0x0, 'queue0\x00', 0x1ff}) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f00000001c0)={0x2}, 0x4) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000100), &(0x7f0000000140)=0xc) syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x2000080000002027, 0x10602) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x410000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r3, 0x84, 0x65, &(0x7f0000000040)=[@in={0x2, 0x4e23, @broadcast=0xffffffff}, @in6={0xa, 0x4e22, 0x2, @loopback={0x0, 0x1}, 0x3}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x4e20, @loopback=0x7f000001}, @in={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e22, @multicast1=0xe0000001}], 0x6c) close(r1) 2018/05/06 05:52:15 executing program 6: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x20000, 0x0) [ 217.032773] ? rcu_read_lock_sched_held+0x108/0x120 [ 217.037797] __memcg_init_list_lru_node+0x17d/0x2c0 [ 217.042830] ? kvfree_rcu+0x20/0x20 [ 217.046470] ? __kmalloc_node+0x47/0x70 [ 217.050461] __list_lru_init+0x456/0x790 [ 217.054534] ? list_lru_destroy+0x4c0/0x4c0 [ 217.058863] ? mark_held_locks+0xc9/0x160 [ 217.063019] ? __raw_spin_lock_init+0x1c/0x100 [ 217.067605] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 217.072630] ? lockdep_init_map+0x9/0x10 [ 217.076701] sget_userns+0x767/0xf00 [ 217.080418] ? get_anon_bdev+0x2f0/0x2f0 [ 217.084490] ? destroy_unused_super.part.11+0x110/0x110 [ 217.089862] ? __alloc_pages_nodemask+0xacf/0xd70 [ 217.094713] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 217.099738] ? kasan_check_read+0x11/0x20 [ 217.103897] ? cap_capable+0x1f9/0x260 [ 217.107801] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 217.113346] ? security_capable+0x99/0xc0 [ 217.117510] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 217.123056] ? ns_capable_common+0x13f/0x170 [ 217.127472] ? get_anon_bdev+0x2f0/0x2f0 [ 217.131542] sget+0x10b/0x150 2018/05/06 05:52:15 executing program 3: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x1ff, 0x280) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8800, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r1, 0xc08c5336, &(0x7f0000000380)={0x4, 0x8000000000000034, 0xfffffffffffffffb, "7175657565300000000000000000000000000000000000000000e4ffffffffffffff00", 0x204}) r2 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) bind$ipx(r0, &(0x7f0000000100)={0x4, 0x2, 0x80000001, "98f381c0e664", 0x10100000000}, 0x10) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r2) 2018/05/06 05:52:15 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) [ 217.134659] ? fuse_get_root_inode+0x190/0x190 [ 217.139250] mount_nodev+0x33/0x110 [ 217.142881] fuse_mount+0x2c/0x40 [ 217.146351] mount_fs+0xae/0x328 [ 217.149725] vfs_kern_mount.part.34+0xd4/0x4d0 [ 217.154314] ? may_umount+0xb0/0xb0 [ 217.157942] ? _raw_read_unlock+0x22/0x30 [ 217.162097] ? __get_fs_type+0x97/0xc0 [ 217.165996] do_mount+0x564/0x3070 [ 217.169544] ? copy_mount_string+0x40/0x40 [ 217.173785] ? rcu_pm_notify+0xc0/0xc0 [ 217.177685] ? copy_mount_options+0x5f/0x380 [ 217.182098] ? rcu_read_lock_sched_held+0x108/0x120 [ 217.187119] ? kmem_cache_alloc_trace+0x616/0x780 [ 217.191972] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 217.197517] ? _copy_from_user+0xdf/0x150 [ 217.200287] QAT: Invalid ioctl [ 217.201672] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 217.201689] ? copy_mount_options+0x285/0x380 [ 217.201708] ksys_mount+0x12d/0x140 [ 217.201726] __x64_sys_mount+0xbe/0x150 [ 217.201741] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 217.201759] do_syscall_64+0x1b1/0x800 [ 217.201778] ? finish_task_switch+0x1ca/0x810 2018/05/06 05:52:15 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:15 executing program 7: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0xffffffff00000000, 0x81) close(0xffffffffffffffff) [ 217.235911] ? syscall_return_slowpath+0x5c0/0x5c0 [ 217.240967] ? syscall_return_slowpath+0x30f/0x5c0 [ 217.245911] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 217.251297] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 217.256152] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 217.261342] RIP: 0033:0x455979 [ 217.264527] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 217.272244] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 217.279518] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 217.286843] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 217.294122] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 217.302117] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 2018/05/06 05:52:15 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:15 executing program 1 (fault-call:1 fault-nth:35): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:52:15 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"62726964676530000000000000fffffd", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 217.407062] FAULT_INJECTION: forcing a failure. [ 217.407062] name failslab, interval 1, probability 0, space 0, times 0 [ 217.418437] CPU: 1 PID: 15256 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 217.425717] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 217.435074] Call Trace: [ 217.437675] dump_stack+0x1b9/0x294 [ 217.441319] ? dump_stack_print_info.cold.2+0x52/0x52 [ 217.446513] ? finish_task_switch+0x1ca/0x810 [ 217.451017] ? finish_task_switch+0x182/0x810 [ 217.455526] should_fail.cold.4+0xa/0x1a [ 217.459605] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 217.464727] ? __schedule+0x809/0x1e30 [ 217.468625] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 217.473386] ? do_mount+0x564/0x3070 [ 217.477115] ? __sched_text_start+0x8/0x8 [ 217.481271] ? find_held_lock+0x36/0x1c0 [ 217.485349] ? __lock_is_held+0xb5/0x140 [ 217.489439] ? check_same_owner+0x320/0x320 [ 217.493786] __should_failslab+0x124/0x180 [ 217.498037] should_failslab+0x9/0x14 [ 217.501854] kmem_cache_alloc_trace+0x2cb/0x780 [ 217.506534] ? __kmalloc_node+0x33/0x70 [ 217.510519] ? __kmalloc_node+0x33/0x70 [ 217.514491] ? rcu_read_lock_sched_held+0x108/0x120 [ 217.519497] __memcg_init_list_lru_node+0x17d/0x2c0 [ 217.524502] ? kvfree_rcu+0x20/0x20 [ 217.528124] ? __kmalloc_node+0x47/0x70 [ 217.532105] __list_lru_init+0x456/0x790 [ 217.536164] ? list_lru_destroy+0x4c0/0x4c0 [ 217.540481] ? mark_held_locks+0xc9/0x160 [ 217.544627] ? __raw_spin_lock_init+0x1c/0x100 [ 217.549199] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 217.554211] ? lockdep_init_map+0x9/0x10 [ 217.558262] sget_userns+0x767/0xf00 [ 217.561961] ? get_anon_bdev+0x2f0/0x2f0 [ 217.566024] ? destroy_unused_super.part.11+0x110/0x110 [ 217.571391] ? __alloc_pages_nodemask+0xacf/0xd70 [ 217.576242] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 217.581258] ? kasan_check_read+0x11/0x20 [ 217.585402] ? cap_capable+0x1f9/0x260 [ 217.589290] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 217.594818] ? security_capable+0x99/0xc0 [ 217.598971] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 217.604501] ? ns_capable_common+0x13f/0x170 [ 217.608913] ? get_anon_bdev+0x2f0/0x2f0 [ 217.612970] sget+0x10b/0x150 [ 217.616073] ? fuse_get_root_inode+0x190/0x190 [ 217.620644] mount_nodev+0x33/0x110 [ 217.624265] fuse_mount+0x2c/0x40 [ 217.627715] mount_fs+0xae/0x328 [ 217.631084] vfs_kern_mount.part.34+0xd4/0x4d0 [ 217.635659] ? may_umount+0xb0/0xb0 [ 217.639275] ? _raw_read_unlock+0x22/0x30 [ 217.643404] ? __get_fs_type+0x97/0xc0 [ 217.647290] do_mount+0x564/0x3070 [ 217.650833] ? do_raw_spin_unlock+0x9e/0x2e0 [ 217.655248] ? copy_mount_string+0x40/0x40 [ 217.659486] ? rcu_pm_notify+0xc0/0xc0 [ 217.663383] ? copy_mount_options+0x5f/0x380 [ 217.667796] ? rcu_read_lock_sched_held+0x108/0x120 [ 217.672817] ? kmem_cache_alloc_trace+0x616/0x780 [ 217.677669] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 217.683215] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 217.688760] ? copy_mount_options+0x285/0x380 [ 217.693266] ksys_mount+0x12d/0x140 [ 217.696891] __x64_sys_mount+0xbe/0x150 [ 217.700860] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 217.705882] do_syscall_64+0x1b1/0x800 [ 217.709764] ? finish_task_switch+0x1ca/0x810 [ 217.714258] ? syscall_return_slowpath+0x5c0/0x5c0 [ 217.719186] ? syscall_return_slowpath+0x30f/0x5c0 [ 217.724561] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 217.729927] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 217.734781] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 217.739966] RIP: 0033:0x455979 [ 217.743137] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 217.750832] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 217.758095] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 217.765353] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 217.772606] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 217.779867] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 [ 218.047444] QAT: Invalid ioctl 2018/05/06 05:52:16 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:16 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:16 executing program 1 (fault-call:1 fault-nth:36): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:52:16 executing program 5: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0x0, 0x0, 'queue0\x00', 0x1ff}) r0 = memfd_create(&(0x7f0000000000)='-GPL:md5sumem0]!#mime_type\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r0, 0xc08c5335, &(0x7f0000000100)={0xb5, 0x100000001, 0x0, 'queue1\x00', 0x4}) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r1) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000040)) 2018/05/06 05:52:16 executing program 7: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f00000000c0)={{0xba, 0x7}, {0x4, 0x1}, 0xffffffffffff5ce5, 0x0, 0x80000000}) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) ioctl$KVM_GET_NR_MMU_PAGES(r0, 0xae45, 0xfffffffffffffffa) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000140)=0x4) close(r0) preadv(r0, &(0x7f0000000400)=[{&(0x7f0000000180)=""/220, 0xdc}, {&(0x7f0000000280)=""/149, 0x95}, {&(0x7f0000000340)=""/144, 0x90}], 0x3, 0x0) 2018/05/06 05:52:16 executing program 2: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0x0, 0x8, 'queue0\x00'}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffff9c, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000180)=r0, 0x4) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r1) 2018/05/06 05:52:16 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0x0, 0x0, 'queue0\x00', 0x1ff}) eventfd2(0x5, 0x80801) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:52:16 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x8083) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x523001, 0x0) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000080)=0x9, &(0x7f0000000100)=0x2) close(0xffffffffffffffff) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x1, 0x602001) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @local}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) bind$packet(r2, &(0x7f0000000280)={0x11, 0x1d, r3, 0x1, 0x81, 0x6}, 0x14) [ 218.192794] FAULT_INJECTION: forcing a failure. [ 218.192794] name failslab, interval 1, probability 0, space 0, times 0 [ 218.204384] CPU: 1 PID: 15289 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 218.211665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 218.221026] Call Trace: [ 218.223629] dump_stack+0x1b9/0x294 [ 218.227273] ? dump_stack_print_info.cold.2+0x52/0x52 [ 218.232474] ? lock_downgrade+0x8e0/0x8e0 [ 218.236636] ? graph_lock+0x170/0x170 2018/05/06 05:52:16 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"62726964676530000000000000ffffff", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:16 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"627269646765300000000000000300", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 218.240454] should_fail.cold.4+0xa/0x1a [ 218.244529] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 218.249644] ? print_usage_bug+0xc0/0xc0 [ 218.253733] ? print_usage_bug+0xc0/0xc0 [ 218.257802] ? graph_lock+0x170/0x170 [ 218.261625] ? find_held_lock+0x36/0x1c0 [ 218.265693] ? __lock_is_held+0xb5/0x140 [ 218.269778] ? check_same_owner+0x320/0x320 [ 218.274107] ? lockdep_init_map+0x9/0x10 [ 218.278182] ? rcu_note_context_switch+0x710/0x710 [ 218.283127] ? kasan_check_write+0x14/0x20 [ 218.287378] ? __init_rwsem+0x1c4/0x290 2018/05/06 05:52:16 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"627269646765300000000000000400", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:16 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"62726964676530000000000000ffffff", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 218.291372] __should_failslab+0x124/0x180 [ 218.295622] should_failslab+0x9/0x14 [ 218.299437] __kmalloc+0x2c8/0x760 [ 218.302986] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 218.308006] ? prealloc_shrinker+0xcf/0x130 [ 218.312354] prealloc_shrinker+0xcf/0x130 [ 218.316520] sget_userns+0x9b2/0xf00 [ 218.320244] ? get_anon_bdev+0x2f0/0x2f0 [ 218.324319] ? destroy_unused_super.part.11+0x110/0x110 [ 218.329695] ? __alloc_pages_nodemask+0xacf/0xd70 [ 218.334554] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 218.339581] ? kasan_check_read+0x11/0x20 [ 218.343739] ? cap_capable+0x1f9/0x260 [ 218.347645] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 218.353194] ? security_capable+0x99/0xc0 [ 218.357367] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 218.362916] ? ns_capable_common+0x13f/0x170 [ 218.367335] ? get_anon_bdev+0x2f0/0x2f0 [ 218.371405] sget+0x10b/0x150 [ 218.374518] ? fuse_get_root_inode+0x190/0x190 [ 218.379102] mount_nodev+0x33/0x110 [ 218.382729] fuse_mount+0x2c/0x40 [ 218.386191] mount_fs+0xae/0x328 [ 218.389570] vfs_kern_mount.part.34+0xd4/0x4d0 [ 218.394157] ? may_umount+0xb0/0xb0 [ 218.397790] ? _raw_read_unlock+0x22/0x30 [ 218.401939] ? __get_fs_type+0x97/0xc0 [ 218.405839] do_mount+0x564/0x3070 [ 218.409390] ? copy_mount_string+0x40/0x40 [ 218.413617] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 218.418633] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 218.423395] ? retint_kernel+0x10/0x10 [ 218.427291] ? copy_mount_options+0x1f0/0x380 [ 218.431792] ? copy_mount_options+0x1f6/0x380 [ 218.436293] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 218.441835] ? copy_mount_options+0x285/0x380 [ 218.446341] ksys_mount+0x12d/0x140 [ 218.449982] __x64_sys_mount+0xbe/0x150 [ 218.453960] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 218.458976] do_syscall_64+0x1b1/0x800 [ 218.462850] ? finish_task_switch+0x1ca/0x810 [ 218.467455] ? syscall_return_slowpath+0x5c0/0x5c0 [ 218.472370] ? syscall_return_slowpath+0x30f/0x5c0 [ 218.477287] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 218.482653] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 218.487500] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 218.492669] RIP: 0033:0x455979 [ 218.495843] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 218.503552] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 218.510815] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 218.518072] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 218.525331] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 218.532596] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 2018/05/06 05:52:17 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"62726964676530000000000000000300", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:17 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:17 executing program 1 (fault-call:1 fault-nth:37): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:52:17 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:52:17 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x4115, 0x7, 0x0, "7175657545300000000000000000000000000000003f000000000000000000000000000000000003000000002d95598800", 0x1ff}) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x7, 0x8800) close(r0) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r1) 2018/05/06 05:52:17 executing program 2: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0x0, 0x8, 'queue0\x00'}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000000)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:52:17 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:52:17 executing program 6: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x40800, 0x0) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000240)) ioctl$int_out(r1, 0x2, &(0x7f0000004b40)) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000000c0)={0x0, 0xb03}, &(0x7f0000000100)=0x8) sendmsg$nl_generic(r1, &(0x7f0000004ac0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000004a80)={&(0x7f0000000280)={0x47d4, 0x29, 0x10, 0x70bd2d, 0x25dfdbfb, {0xb}, [@nested={0x11b0, 0x84, [@generic="bb5b21911dfa66934140dec11c8e4102bc8fd4733c83af03ea73817d8f394ff18fb947df5d7613bf3f3f68baa6a780dbf14138ce5cf52cb1d50299e52a35347e8217ff388556a94e6181e438e6318d7c4c1edbbdf2150d5fb7098e17554a8df150737983efaa683b770ac6916c612b46858914d691cece975baeab78c3c0a6a2e7ecc553370e769e05142ed031de", @typed={0x8, 0x3, @str='\x00'}, @typed={0xc, 0x2a, @u64=0x3}, @generic="108d40d6ff030ba15d7906728a89fc46041b9efb6e", @generic="b908e0861fec296702743c33de5d7e0c233998e04cbc4cc9f15d0b9e354799bb42fc7947aa64d63a3d22ae557bd9fc", @generic="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", @typed={0x8, 0x14, @ipv4=@rand_addr=0x6}, @generic="c1151af8de668597a436d5d8d5035b4d17d92e0249ba4f49b5a9a629dcb592b388a821ab217f48f467c1151ad4fa4f810dce237877ac31f072e4460416f8f41e95355abdb9ae62", @generic="857b478b56beb46c314f9ad178d8065d34e55ae2686bea688693341b4c07a5463278283adb769454230485b6942c885c2cb484401b628ca802496d59210cbf66e6364a251796ad71c6027403af4c77a502415ad073b09822fd66106730acf15e8109e642da24d222beead7b4", @typed={0x8, 0x56, @ipv4=@remote={0xac, 0x14, 0x14, 0xbb}}]}, @nested={0x194, 0x77, [@generic="397be3cb297edf7ac9d8af764dff47bfa1493390fab3738974e09047688bb990821044117b9185c71b5b4fdaf0", @typed={0x10, 0x18, @str='/dev/ppp\x00'}, @generic="d7dd4c23ed2e41bacc5c53af8b713b00ebaa28774d040bbed2709709af78eb1663f6a0fda12175abcaff6f4d95efd63a95cf38f6adc8f2ce3a20f8a4a3b855859c75e1f5bf0fec2073a6316fc69cbcbbf1a5b17c338d629760bb6888836ccdf109c316b08cafae2245ed0f62028034230a21746ecc03af5cd2ca486902f67ad4b198fad7ef5425bd709d79047798af065c0c21700b99b0718354ee9bcf82e8a2b56560963dea729fb1ab792c993a902b89", @generic="d95f729962ea1b78ba3af067de135a67939dcb0183cac2fbeb9a3215a4598f1aab47a50a176d5b164aa7b1beb37689b0128e43ffef1d2981bbdb103e911896c49d27f707869f78c61cbf2beb631637ba50a67b7ea556d8d4156ff5196f28ffa9fc7fae0b8e09cacd9cb9943968254215e49b20e915178231969a86fd7b5eb5596b5866183e1f0256b6192411c0b94bd283acd23b2b3383fb7b3e8e19da9bbfe71b"]}, @generic="2a74edf385e0959a22763c56b20865379bbc088061b16e17ac590ccc5933d88bd8d7a1970a242c55a35315db2fe21e8456214b5638266ff181e3886dbb35583bb664bc0e39d25668b4bfe251dc9115f8fdd912a20801d182732e3d66f372cfcc81191663951fcec547d50a68e70bd89ad33d60afccdd3f751e723fe3c3bf5250419e2d4fa4eee49f6fc5654e80917ef0302e04088710a925c262c3015515cf9ecf63cec2a3b84120a5c1c488221e30dd4a60c44ae8daaa03a0f4f55f0ae441ff0d5f", @nested={0x1074, 0x87, [@typed={0x10, 0x4a, @str='/dev/sg#\x00'}, @generic="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", @typed={0x8, 0x68, @u32=0x8}, @generic="7887bb7d24368899fc0cce0081332e4f52038d43bc4ee939ce2187c2a842543f88c3cc4fe772cf526c3d7ea083281c8c0e2e766cdcad72d0db84043e73a0d78aff46b79be3e59d32cb37bf0053b337", @typed={0x8, 0x60, @u32=0x80000001}]}, @nested={0x3c, 0x68, [@generic="6c8cb31e023c5baed1456d9945a479cfa2f6a961834e832e2071cd4040249692a5", @typed={0xc, 0x8, @u64=0x6f}, @typed={0x8, 0x18, @u32=0xffffffff}]}, @nested={0x2128, 0x2b, [@typed={0x8, 0x53, @ipv4=@broadcast=0xffffffff}, @generic="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", @generic="4bdd07d833e89b7f3cca013f16969d1526e9489401062d16eebf03edd358d3a127f754e8476e27578feea6baebc6f3dbe8314f059010021c6094d42120a4ee9be33f10fc22a57f563e1e4ae0346325be6f37e921987ce713ca6462dd133342a7adee6956595fe8145f8d8762252c7624a94db48385684e01ee5bc53d3c0a0f749f1e69a53693aba20d699e", @generic="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", @generic="a071017e66509a72f5ae72dcc59200f218766610a4bc6333a76364042bd3878fea96e9e651f4635a5f4df0b8cc897217bd0e5bcabf2ea11ac7dfc1647ad5e750cc674a7cb98dedab67caa73d21d8c573d61e5b1584e0f699bd68849cb56a7de73deb28cd30e5eb5f0d3f6663c5352d571fccea080a17e4fe24b7a7039c5b0f78eeaad56de036ac", @typed={0x8, 0x67, @fd=r0}]}, @generic="b533932e1ead9bb80c261e1fd8d4d3fda2371c3caf8dc4b10476b035ba93c736c2efb95176adfb20eeff423f5463135bd5f5c144f9ed0b09f908f957e299a66bcddc71b8afe2c4a8182c5237d0d2883d34585a9692cac969f0d1b9b0e206667d269eabca86155a3a744e4db384f617a005287236ce46b4048bcc73b87e13d45e6faae9ac3a43b0bdaee1e218b904fcdb2cf7e7e86a919002cbe2b93fd56030b7260489346022ab4aa7426067763506a95998537baed405f3d7ab4aaccc7cf6", @typed={0xc, 0x43, @u64=0x9}, @generic="0a6828fee92f825f2152f5d7937c889b007f8ae45a72570e6730b3bf8509691bab1ac68b29b273ec119b7a852266b18cf2ee61f2f2f36774f0a63b393c016fd3bf1288d0921eebb74b57a3a7d14b37ffa42fcb714098e5b21561d731fe1b04ff606feffb7ff33f5394a0fcd7d1e4f90fe5d210fd059b0fb813b338d3ef4937b4bea722092050f80099c02d028141f0437bce8a4d39504646dde27e15ee77f116d337a45b8fc49d8877ddd3f3075fe2ea4da2d4f4f2961248ceafdaa6e7562acf3278b6a10f3243c19f8d3318dbebf862533fe2bb5aa8bd8a41072ccbcf2f93d81ce29a4951a55035f912ccb08e6deac53274ceca815320008d9449acc8", @generic="696045b17f1a9f3cb266006710e2506630b2cc8d031502"]}, 0x47d4}, 0x1, 0x0, 0x0, 0x40}, 0x10) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000140)=ANY=[@ANYRES32=r2, @ANYBLOB="780000007878dbb2108dba39a84fbfcee2475ae4e9663faf62210717639ce56941a1c5e35b6d9570bee0e1d252c79ae2cb8b5d136ae610a097537c86b76d67c98c05d9c2d0a37d96159e13b7057fab23ba803db2d2331d06a16b6c3ee602e1f79b80f67cbeadb3279669ce1d1372cd1b7eaf47cb8b10a4b9a0"], &(0x7f00000001c0)=0x80) [ 219.297397] FAULT_INJECTION: forcing a failure. [ 219.297397] name failslab, interval 1, probability 0, space 0, times 0 [ 219.309247] CPU: 0 PID: 15334 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 219.316527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 219.325883] Call Trace: [ 219.328489] dump_stack+0x1b9/0x294 [ 219.332141] ? dump_stack_print_info.cold.2+0x52/0x52 [ 219.337347] ? debug_check_no_locks_freed+0x310/0x310 [ 219.342550] should_fail.cold.4+0xa/0x1a 2018/05/06 05:52:17 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"62726964676530000000000000000300", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 219.346629] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 219.351745] ? graph_lock+0x170/0x170 [ 219.355568] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 219.361111] ? graph_lock+0x170/0x170 [ 219.364922] ? graph_lock+0x170/0x170 [ 219.368735] ? ida_get_new_above+0x490/0xa10 [ 219.373155] ? save_stack+0x43/0xd0 [ 219.376799] ? find_held_lock+0x36/0x1c0 [ 219.380882] ? __lock_is_held+0xb5/0x140 [ 219.384968] ? check_same_owner+0x320/0x320 [ 219.389304] ? rcu_note_context_switch+0x710/0x710 2018/05/06 05:52:17 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)="2e2f66696c6530ff", &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:17 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 219.394249] __should_failslab+0x124/0x180 [ 219.398493] should_failslab+0x9/0x14 [ 219.402300] __kmalloc+0x2c8/0x760 [ 219.405848] ? up_read+0x110/0x110 [ 219.409401] ? down_read+0x1b0/0x1b0 [ 219.413131] ? match_number.isra.0+0xb6/0x260 [ 219.417632] match_number.isra.0+0xb6/0x260 [ 219.421962] ? match_strdup+0xa0/0xa0 [ 219.425794] ? match_wildcard+0x3c0/0x3c0 [ 219.429958] match_int+0x23/0x30 [ 219.433331] fuse_fill_super+0x812/0x1e20 [ 219.437498] ? fuse_get_root_inode+0x190/0x190 [ 219.442091] ? __alloc_pages_slowpath+0x2db0/0x2db0 2018/05/06 05:52:17 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 219.447121] ? kasan_check_read+0x11/0x20 [ 219.451278] ? cap_capable+0x1f9/0x260 [ 219.455185] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 219.460731] ? security_capable+0x99/0xc0 [ 219.464894] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 219.470441] ? ns_capable_common+0x13f/0x170 [ 219.474856] ? get_anon_bdev+0x2f0/0x2f0 [ 219.478919] ? sget+0x113/0x150 [ 219.482202] ? fuse_get_root_inode+0x190/0x190 [ 219.486786] mount_nodev+0x6b/0x110 [ 219.490416] fuse_mount+0x2c/0x40 [ 219.493870] mount_fs+0xae/0x328 [ 219.497241] vfs_kern_mount.part.34+0xd4/0x4d0 [ 219.501823] ? may_umount+0xb0/0xb0 [ 219.505452] ? _raw_read_unlock+0x22/0x30 [ 219.509602] ? __get_fs_type+0x97/0xc0 [ 219.513498] do_mount+0x564/0x3070 [ 219.517050] ? copy_mount_string+0x40/0x40 [ 219.521291] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 219.526312] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 219.531077] ? retint_kernel+0x10/0x10 [ 219.534975] ? copy_mount_options+0x1a1/0x380 [ 219.539476] ? copy_mount_options+0x1a4/0x380 2018/05/06 05:52:17 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"6272696467653000000000000000c3ff", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:17 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) [ 219.543979] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 219.549518] ? copy_mount_options+0x285/0x380 [ 219.554020] ksys_mount+0x12d/0x140 [ 219.557655] __x64_sys_mount+0xbe/0x150 [ 219.561634] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 219.566660] do_syscall_64+0x1b1/0x800 [ 219.570552] ? finish_task_switch+0x1ca/0x810 [ 219.575054] ? syscall_return_slowpath+0x5c0/0x5c0 [ 219.579989] ? syscall_return_slowpath+0x30f/0x5c0 [ 219.584929] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 219.590305] ? trace_hardirqs_off_thunk+0x1a/0x1c 2018/05/06 05:52:18 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 219.595162] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 219.600353] RIP: 0033:0x455979 [ 219.603540] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 219.611255] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 219.618525] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 219.625796] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 219.633066] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 219.640335] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 2018/05/06 05:52:18 executing program 1 (fault-call:1 fault-nth:38): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:52:18 executing program 5: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)="2e2f66696c6530ff", &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:18 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:18 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"6272696467653000000000000000ffff", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 219.739980] FAULT_INJECTION: forcing a failure. [ 219.739980] name failslab, interval 1, probability 0, space 0, times 0 [ 219.751408] CPU: 0 PID: 15371 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 219.758696] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 219.768055] Call Trace: [ 219.770656] dump_stack+0x1b9/0x294 [ 219.774296] ? dump_stack_print_info.cold.2+0x52/0x52 [ 219.779496] ? rcu_is_watching+0x85/0x140 [ 219.783654] ? rcu_bh_force_quiescent_state+0x20/0x20 2018/05/06 05:52:18 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"6272696467653000000000000000fdfd", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 219.788854] should_fail.cold.4+0xa/0x1a [ 219.792928] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 219.798045] ? kernel_text_address+0x79/0xf0 [ 219.802471] ? __unwind_start+0x166/0x330 [ 219.806633] ? __kernel_text_address+0xd/0x40 [ 219.811141] ? graph_lock+0x170/0x170 [ 219.814961] ? __save_stack_trace+0x7e/0xd0 [ 219.819296] ? find_held_lock+0x36/0x1c0 [ 219.823371] ? __lock_is_held+0xb5/0x140 [ 219.827451] ? check_same_owner+0x320/0x320 [ 219.831783] ? rcu_note_context_switch+0x710/0x710 [ 219.836726] __should_failslab+0x124/0x180 [ 219.840980] should_failslab+0x9/0x14 [ 219.844794] __kmalloc+0x2c8/0x760 [ 219.848353] ? match_number.isra.0+0xb6/0x260 [ 219.852865] match_number.isra.0+0xb6/0x260 [ 219.857201] ? match_strdup+0xa0/0xa0 [ 219.861018] ? match_wildcard+0x3c0/0x3c0 [ 219.865178] ? trace_hardirqs_on+0xd/0x10 [ 219.869341] match_octal+0x26/0x30 [ 219.872890] fuse_fill_super+0x615/0x1e20 [ 219.877052] ? fuse_get_root_inode+0x190/0x190 [ 219.881645] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 219.886676] ? kasan_check_read+0x11/0x20 [ 219.890836] ? cap_capable+0x1f9/0x260 [ 219.894750] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 219.900297] ? security_capable+0x99/0xc0 [ 219.904462] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 219.910013] ? ns_capable_common+0x13f/0x170 [ 219.914433] ? get_anon_bdev+0x2f0/0x2f0 [ 219.918498] ? sget+0x113/0x150 [ 219.921789] ? fuse_get_root_inode+0x190/0x190 [ 219.926374] mount_nodev+0x6b/0x110 [ 219.930003] fuse_mount+0x2c/0x40 [ 219.933461] mount_fs+0xae/0x328 [ 219.936837] vfs_kern_mount.part.34+0xd4/0x4d0 [ 219.941426] ? may_umount+0xb0/0xb0 [ 219.945055] ? _raw_read_unlock+0x22/0x30 [ 219.949204] ? __get_fs_type+0x97/0xc0 [ 219.953093] do_mount+0x564/0x3070 [ 219.956643] ? copy_mount_string+0x40/0x40 [ 219.960880] ? rcu_pm_notify+0xc0/0xc0 [ 219.964780] ? copy_mount_options+0x5f/0x380 [ 219.969193] ? rcu_read_lock_sched_held+0x108/0x120 [ 219.974220] ? kmem_cache_alloc_trace+0x616/0x780 [ 219.979071] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 219.984613] ? _copy_from_user+0xdf/0x150 [ 219.988772] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 219.994313] ? copy_mount_options+0x285/0x380 [ 219.998819] ksys_mount+0x12d/0x140 [ 220.002457] __x64_sys_mount+0xbe/0x150 [ 220.006436] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 220.011467] do_syscall_64+0x1b1/0x800 [ 220.015358] ? finish_task_switch+0x1ca/0x810 [ 220.019858] ? syscall_return_slowpath+0x5c0/0x5c0 [ 220.024823] ? syscall_return_slowpath+0x30f/0x5c0 [ 220.029764] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 220.035142] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 220.039996] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 220.045188] RIP: 0033:0x455979 [ 220.048377] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 220.056086] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 220.063347] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 220.070613] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 220.077870] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 220.085141] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 2018/05/06 05:52:18 executing program 1 (fault-call:1 fault-nth:39): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:52:18 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) fallocate(r0, 0x3, 0x7, 0x84) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_udp_int(r1, 0x11, 0x66, &(0x7f0000000040), &(0x7f00000001c0)=0x4) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f00000000c0)=""/215) 2018/05/06 05:52:18 executing program 6: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x34000, 0x0) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000040)=0xfff) r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r1) ioctl$TCSETSF(r0, 0x5404, &(0x7f00000000c0)={0xec9b, 0x1, 0x3ff, 0x600, 0x2000000000000, 0x4, 0x0, 0x1ff, 0x4, 0x7, 0x5, 0x9}) 2018/05/06 05:52:18 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0x0, 0x0, 'queue0\x00', 0x1ff}) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x420040, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r0, 0x50, &(0x7f0000000140)}, 0x10) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f0000000040)=0x2, 0x4) openat$cuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cuse\x00', 0x523e8b98ca8da487, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f0000000200)={0x77359400}, 0x10) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000)={0x7}, 0xfffffffffffffe48) 2018/05/06 05:52:18 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:18 executing program 2: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0x0, 0x8, 'queue0\x00'}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) r2 = syz_open_dev$admmidi(&(0x7f0000000240)='/dev/admmidi#\x00', 0x1, 0x80000) rt_sigpending(&(0x7f0000000200), 0x8) getsockopt$IPT_SO_GET_ENTRIES(r2, 0x0, 0x41, &(0x7f0000000280)={'security\x00', 0xbd, "67b304570143e3dece04aa8056af166c0a776ea7332de88acfef32580dad1663c26ee2b4172db96cc409851dc53ee040beab7f83ccc3ae97b1f1b786c642d31051e316d1909550c39bc8c9cbd264d0c88e7585755b2863778a330c230b337a01dc4d3f90e66403c408866a4430b18b5e04a19023c30360cceb76d2026a8aa66610e876e07340713db7928a752e9b34df0e6a08a68a4ed1255e07258abd0ffdc52f6132942d97a233b5447fa767734cb59f5bcfae6524e5e1c46b9e2ee0"}, &(0x7f0000000440)=0xe1) ioctl$SG_SET_DEBUG(r0, 0x227e, &(0x7f0000000100)=0x1) close(r1) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x1, 0x0) write$vnet(r2, &(0x7f0000000500)={0x1, {&(0x7f0000000180)=""/83, 0x53, &(0x7f0000000480)=""/83, 0x0, 0x3}}, 0x68) ioctl$TIOCGSOFTCAR(r3, 0x5419, &(0x7f0000000040)) 2018/05/06 05:52:18 executing program 5: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)="2e2f66696c6530ff", &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:18 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)="2e2f66696c6530e0", &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) [ 220.331603] FAULT_INJECTION: forcing a failure. [ 220.331603] name failslab, interval 1, probability 0, space 0, times 0 [ 220.342950] CPU: 0 PID: 15404 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 220.350239] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 220.359630] Call Trace: [ 220.362236] dump_stack+0x1b9/0x294 [ 220.365881] ? dump_stack_print_info.cold.2+0x52/0x52 [ 220.371088] ? debug_check_no_locks_freed+0x310/0x310 [ 220.376298] should_fail.cold.4+0xa/0x1a 2018/05/06 05:52:18 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 220.380377] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 220.385493] ? graph_lock+0x170/0x170 [ 220.389313] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 220.394884] ? graph_lock+0x170/0x170 [ 220.398709] ? graph_lock+0x170/0x170 [ 220.402537] ? ida_get_new_above+0x490/0xa10 [ 220.406963] ? save_stack+0x43/0xd0 [ 220.410607] ? find_held_lock+0x36/0x1c0 [ 220.414686] ? __lock_is_held+0xb5/0x140 [ 220.418767] ? ip6_mc_add_src+0x5f0/0xca0 [ 220.422942] ? check_same_owner+0x320/0x320 [ 220.427284] ? rcu_note_context_switch+0x710/0x710 2018/05/06 05:52:18 executing program 5: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) [ 220.432223] __should_failslab+0x124/0x180 [ 220.436484] should_failslab+0x9/0x14 [ 220.440295] __kmalloc+0x2c8/0x760 [ 220.443840] ? up_read+0x110/0x110 [ 220.447390] ? down_read+0x1b0/0x1b0 [ 220.451112] ? match_number.isra.0+0xb6/0x260 [ 220.455628] match_number.isra.0+0xb6/0x260 [ 220.459965] ? match_strdup+0xa0/0xa0 [ 220.463777] ? match_wildcard+0x3c0/0x3c0 [ 220.467940] match_int+0x23/0x30 [ 220.471323] fuse_fill_super+0x812/0x1e20 [ 220.475489] ? fuse_get_root_inode+0x190/0x190 [ 220.480089] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 220.485120] ? kasan_check_read+0x11/0x20 [ 220.489286] ? cap_capable+0x1f9/0x260 [ 220.493190] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 220.498742] ? security_capable+0x99/0xc0 [ 220.502910] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 220.508473] ? ns_capable_common+0x13f/0x170 [ 220.512890] ? get_anon_bdev+0x2f0/0x2f0 [ 220.516953] ? sget+0x113/0x150 [ 220.520236] ? fuse_get_root_inode+0x190/0x190 [ 220.524818] mount_nodev+0x6b/0x110 [ 220.528445] fuse_mount+0x2c/0x40 2018/05/06 05:52:18 executing program 6: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x2, 0x0) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, &(0x7f00000000c0)) 2018/05/06 05:52:18 executing program 5 (fault-call:8 fault-nth:0): mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) [ 220.531997] mount_fs+0xae/0x328 [ 220.535370] vfs_kern_mount.part.34+0xd4/0x4d0 [ 220.539958] ? may_umount+0xb0/0xb0 [ 220.543595] ? _raw_read_unlock+0x22/0x30 [ 220.547752] ? __get_fs_type+0x97/0xc0 [ 220.551652] do_mount+0x564/0x3070 [ 220.555204] ? do_raw_spin_unlock+0x9e/0x2e0 [ 220.559624] ? copy_mount_string+0x40/0x40 [ 220.563861] ? rcu_pm_notify+0xc0/0xc0 [ 220.568021] ? copy_mount_options+0x5f/0x380 [ 220.572438] ? rcu_read_lock_sched_held+0x108/0x120 [ 220.577464] ? kmem_cache_alloc_trace+0x616/0x780 2018/05/06 05:52:19 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)="2e2f66696c6530ff", &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:19 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 220.582318] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 220.587868] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 220.593408] ? copy_mount_options+0x285/0x380 [ 220.597920] ksys_mount+0x12d/0x140 [ 220.601566] __x64_sys_mount+0xbe/0x150 [ 220.605547] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 220.610572] do_syscall_64+0x1b1/0x800 [ 220.614463] ? finish_task_switch+0x1ca/0x810 [ 220.618963] ? syscall_return_slowpath+0x5c0/0x5c0 [ 220.623898] ? syscall_return_slowpath+0x30f/0x5c0 [ 220.628832] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 220.634207] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 220.639061] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 220.644252] RIP: 0033:0x455979 [ 220.647442] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 220.655157] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 220.662434] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 220.669713] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 2018/05/06 05:52:19 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"62726964676530000000000000000f00", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:19 executing program 1 (fault-call:1 fault-nth:40): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) [ 220.676985] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 220.684255] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 2018/05/06 05:52:19 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0l', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) [ 220.751090] FAULT_INJECTION: forcing a failure. [ 220.751090] name failslab, interval 1, probability 0, space 0, times 0 [ 220.762427] CPU: 0 PID: 15447 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 220.769710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 220.779068] Call Trace: [ 220.781689] dump_stack+0x1b9/0x294 [ 220.785338] ? dump_stack_print_info.cold.2+0x52/0x52 [ 220.790552] ? rcu_is_watching+0x85/0x140 [ 220.794717] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 220.799921] should_fail.cold.4+0xa/0x1a [ 220.803994] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 220.809113] ? kernel_text_address+0x79/0xf0 [ 220.813536] ? __unwind_start+0x166/0x330 [ 220.817700] ? __kernel_text_address+0xd/0x40 [ 220.822213] ? graph_lock+0x170/0x170 [ 220.826033] ? __save_stack_trace+0x7e/0xd0 [ 220.830372] ? find_held_lock+0x36/0x1c0 [ 220.834450] ? __lock_is_held+0xb5/0x140 [ 220.838537] ? check_same_owner+0x320/0x320 [ 220.842877] ? rcu_note_context_switch+0x710/0x710 [ 220.847822] __should_failslab+0x124/0x180 [ 220.852075] should_failslab+0x9/0x14 [ 220.855886] __kmalloc+0x2c8/0x760 [ 220.859438] ? match_number.isra.0+0xb6/0x260 [ 220.863946] match_number.isra.0+0xb6/0x260 [ 220.868279] ? match_strdup+0xa0/0xa0 [ 220.872091] ? match_wildcard+0x3c0/0x3c0 [ 220.876251] ? trace_hardirqs_on+0xd/0x10 [ 220.880412] match_octal+0x26/0x30 [ 220.883971] fuse_fill_super+0x615/0x1e20 [ 220.888134] ? fuse_get_root_inode+0x190/0x190 [ 220.892731] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 220.897767] ? kasan_check_read+0x11/0x20 [ 220.901926] ? cap_capable+0x1f9/0x260 [ 220.905835] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 220.911386] ? security_capable+0x99/0xc0 [ 220.915544] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 220.921081] ? ns_capable_common+0x13f/0x170 [ 220.925492] ? get_anon_bdev+0x2f0/0x2f0 [ 220.929538] ? sget+0x113/0x150 [ 220.932803] ? fuse_get_root_inode+0x190/0x190 [ 220.937370] mount_nodev+0x6b/0x110 [ 220.940985] fuse_mount+0x2c/0x40 [ 220.944425] mount_fs+0xae/0x328 [ 220.947777] vfs_kern_mount.part.34+0xd4/0x4d0 [ 220.952373] ? may_umount+0xb0/0xb0 [ 220.955994] ? _raw_read_unlock+0x22/0x30 [ 220.960139] ? __get_fs_type+0x97/0xc0 [ 220.964032] do_mount+0x564/0x3070 [ 220.967573] ? copy_mount_string+0x40/0x40 [ 220.971800] ? rcu_pm_notify+0xc0/0xc0 [ 220.975700] ? copy_mount_options+0x5f/0x380 [ 220.980106] ? rcu_read_lock_sched_held+0x108/0x120 [ 220.985125] ? kmem_cache_alloc_trace+0x616/0x780 [ 220.989958] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 220.995482] ? _copy_from_user+0xdf/0x150 [ 220.999616] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 221.005145] ? copy_mount_options+0x285/0x380 [ 221.009628] ksys_mount+0x12d/0x140 [ 221.013244] __x64_sys_mount+0xbe/0x150 [ 221.017207] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 221.022211] do_syscall_64+0x1b1/0x800 [ 221.026081] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 221.030910] ? syscall_return_slowpath+0x5c0/0x5c0 [ 221.035823] ? syscall_return_slowpath+0x30f/0x5c0 [ 221.040744] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 221.046101] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 221.050938] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 221.056122] RIP: 0033:0x455979 [ 221.059299] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 221.066992] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 221.074262] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 221.081525] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 221.088787] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 221.096056] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 2018/05/06 05:52:19 executing program 7: r0 = socket$inet_icmp(0x2, 0x2, 0x1) close(r0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) 2018/05/06 05:52:19 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:19 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0x0, 0x0, 'queue0\x00', 0x1ff}) syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:52:19 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:19 executing program 1 (fault-call:1 fault-nth:41): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:52:19 executing program 2: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0x0, 0x8, 'queue0\x00'}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x1, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r1, 0x401870cc, &(0x7f0000000340)={0x4eb56f6d, 0x630f, 0x9, 0x8}) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x20000, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r2, 0xc0305302, &(0x7f0000000040)={0x1, 0x1, 0x8, 0x100000000, 0x6, 0x8}) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r2, 0x80045400, &(0x7f00000002c0)) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)=0x9, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in=@local, @in=@local}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000280)=0xe8) close(r0) 2018/05/06 05:52:19 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 221.387198] FAULT_INJECTION: forcing a failure. [ 221.387198] name failslab, interval 1, probability 0, space 0, times 0 [ 221.398486] CPU: 1 PID: 15478 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 221.405774] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 221.413806] FAULT_INJECTION: forcing a failure. [ 221.413806] name failslab, interval 1, probability 0, space 0, times 0 [ 221.415128] Call Trace: [ 221.415166] dump_stack+0x1b9/0x294 [ 221.415188] ? dump_stack_print_info.cold.2+0x52/0x52 [ 221.415220] should_fail.cold.4+0xa/0x1a [ 221.441807] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 221.446910] ? graph_lock+0x170/0x170 [ 221.450703] ? lock_downgrade+0x8e0/0x8e0 [ 221.454846] ? kasan_check_write+0x14/0x20 [ 221.459088] ? find_held_lock+0x36/0x1c0 [ 221.463150] ? __lock_is_held+0xb5/0x140 [ 221.467213] ? check_same_owner+0x320/0x320 [ 221.471530] ? rcu_note_context_switch+0x710/0x710 [ 221.476467] __should_failslab+0x124/0x180 [ 221.480696] should_failslab+0x9/0x14 [ 221.484490] kmem_cache_alloc_trace+0x2cb/0x780 [ 221.489153] ? match_wildcard+0x3c0/0x3c0 [ 221.493293] ? trace_hardirqs_on+0xd/0x10 [ 221.497437] fuse_fill_super+0xc92/0x1e20 [ 221.501584] ? fuse_get_root_inode+0x190/0x190 [ 221.506158] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 221.511171] ? kasan_check_read+0x11/0x20 [ 221.515313] ? cap_capable+0x1f9/0x260 [ 221.519200] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 221.524726] ? security_capable+0x99/0xc0 [ 221.528867] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 221.534394] ? ns_capable_common+0x13f/0x170 [ 221.538794] ? get_anon_bdev+0x2f0/0x2f0 [ 221.542843] ? sget+0x113/0x150 [ 221.546119] ? fuse_get_root_inode+0x190/0x190 [ 221.550693] mount_nodev+0x6b/0x110 [ 221.554311] fuse_mount+0x2c/0x40 [ 221.557758] mount_fs+0xae/0x328 [ 221.561125] vfs_kern_mount.part.34+0xd4/0x4d0 [ 221.565698] ? may_umount+0xb0/0xb0 [ 221.569316] ? _raw_read_unlock+0x22/0x30 [ 221.573457] ? __get_fs_type+0x97/0xc0 [ 221.577337] do_mount+0x564/0x3070 [ 221.580875] ? copy_mount_string+0x40/0x40 [ 221.585106] ? rcu_pm_notify+0xc0/0xc0 [ 221.588992] ? copy_mount_options+0x5f/0x380 [ 221.593392] ? rcu_read_lock_sched_held+0x108/0x120 [ 221.598403] ? kmem_cache_alloc_trace+0x616/0x780 [ 221.603243] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 221.608774] ? _copy_from_user+0xdf/0x150 [ 221.612919] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 221.618459] ? copy_mount_options+0x285/0x380 [ 221.622948] ksys_mount+0x12d/0x140 [ 221.626571] __x64_sys_mount+0xbe/0x150 [ 221.630538] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 221.635546] do_syscall_64+0x1b1/0x800 [ 221.639424] ? finish_task_switch+0x1ca/0x810 [ 221.643913] ? syscall_return_slowpath+0x5c0/0x5c0 [ 221.648835] ? syscall_return_slowpath+0x30f/0x5c0 [ 221.653761] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 221.659124] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 221.663960] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 221.669138] RIP: 0033:0x455979 [ 221.672315] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 221.680369] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 221.687629] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 221.694891] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 221.702150] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 221.709408] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 [ 221.716685] CPU: 0 PID: 15489 Comm: syz-executor5 Not tainted 4.17.0-rc3+ #35 [ 221.723968] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 221.733321] Call Trace: [ 221.735915] dump_stack+0x1b9/0x294 [ 221.739560] ? dump_stack_print_info.cold.2+0x52/0x52 [ 221.744761] ? graph_lock+0x170/0x170 [ 221.748575] should_fail.cold.4+0xa/0x1a [ 221.752643] ? lock_downgrade+0x8e0/0x8e0 [ 221.756792] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 221.761902] ? find_held_lock+0x36/0x1c0 [ 221.763991] QAT: Invalid ioctl [ 221.765976] ? find_held_lock+0x36/0x1c0 [ 221.766010] ? check_same_owner+0x320/0x320 [ 221.766030] ? rcu_note_context_switch+0x710/0x710 [ 221.766045] ? wait_for_completion+0x870/0x870 2018/05/06 05:52:20 executing program 1 (fault-call:1 fault-nth:42): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:52:20 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)="2e2f66696c65307f", &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:20 executing program 6: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x2, 0xd0800) ioctl$KVM_SET_CLOCK(r0, 0x4030ae7b, &(0x7f0000000040)={0x9, 0x3f}) r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) socketpair(0x1d, 0xa, 0x40, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$KVM_GET_PIT2(r2, 0x8070ae9f, &(0x7f00000001c0)) close(r1) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f0000000100)={0x4, {{0xa, 0xfffffffffffffff7, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x80000001}}}, 0x88) [ 221.766065] __should_failslab+0x124/0x180 [ 221.791300] should_failslab+0x9/0x14 [ 221.795106] kmem_cache_alloc+0x2af/0x760 [ 221.799268] getname_flags+0xd0/0x5a0 [ 221.803082] getname+0x19/0x20 [ 221.806279] do_sys_open+0x39a/0x740 [ 221.810006] ? filp_open+0x80/0x80 [ 221.813553] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 221.819106] __x64_sys_open+0x7e/0xc0 [ 221.822913] do_syscall_64+0x1b1/0x800 [ 221.826806] ? finish_task_switch+0x1ca/0x810 [ 221.831309] ? syscall_return_slowpath+0x5c0/0x5c0 [ 221.836246] ? syscall_return_slowpath+0x30f/0x5c0 [ 221.841183] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 221.846554] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 221.851409] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 221.856608] RIP: 0033:0x40fbd1 [ 221.859806] RSP: 002b:00007f637bf8c800 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 221.867526] RAX: ffffffffffffffda RBX: 00007f637bf8d6d4 RCX: 000000000040fbd1 [ 221.874803] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 00000000004ba29e [ 221.876153] FAULT_INJECTION: forcing a failure. [ 221.876153] name failslab, interval 1, probability 0, space 0, times 0 [ 221.882067] RBP: 0000000000008000 R08: 0000000000000000 R09: 0000000000000000 [ 221.882076] R10: 0000000020000180 R11: 0000000000000293 R12: 0000000000000000 [ 221.882084] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 [ 221.915416] CPU: 1 PID: 15500 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 221.922697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 221.932057] Call Trace: [ 221.934666] dump_stack+0x1b9/0x294 [ 221.938310] ? dump_stack_print_info.cold.2+0x52/0x52 [ 221.943522] ? _raw_spin_unlock_irqrestore+0x74/0xc0 [ 221.948629] should_fail.cold.4+0xa/0x1a [ 221.952693] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 221.957795] ? memset+0x31/0x40 [ 221.961060] ? graph_lock+0x170/0x170 [ 221.964863] ? get_random_bytes+0x34/0x40 [ 221.969012] ? crng_backtrack_protect+0x80/0x80 [ 221.973679] ? find_held_lock+0x36/0x1c0 [ 221.977737] ? __lock_is_held+0xb5/0x140 [ 221.981792] ? check_same_owner+0x320/0x320 [ 221.986097] ? fuse_conn_init+0x744/0x900 [ 221.990242] ? rcu_note_context_switch+0x710/0x710 [ 221.995190] __should_failslab+0x124/0x180 [ 221.999439] should_failslab+0x9/0x14 [ 222.003226] kmem_cache_alloc_trace+0x2cb/0x780 [ 222.007899] fuse_dev_alloc+0xb5/0x4e0 [ 222.011779] ? __lock_is_held+0xb5/0x140 [ 222.015835] ? process_init_reply+0x1460/0x1460 [ 222.020505] ? rcu_read_lock_sched_held+0x108/0x120 [ 222.025519] ? kmem_cache_alloc_trace+0x616/0x780 [ 222.030365] ? match_wildcard+0x3c0/0x3c0 [ 222.034511] ? trace_hardirqs_on+0xd/0x10 [ 222.038667] fuse_fill_super+0xce0/0x1e20 [ 222.042809] ? fuse_get_root_inode+0x190/0x190 [ 222.047378] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 222.052384] ? kasan_check_read+0x11/0x20 [ 222.056524] ? cap_capable+0x1f9/0x260 [ 222.060414] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 222.065932] ? security_capable+0x99/0xc0 [ 222.070070] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 222.075605] ? ns_capable_common+0x13f/0x170 [ 222.079997] ? get_anon_bdev+0x2f0/0x2f0 [ 222.084054] ? sget+0x113/0x150 [ 222.087347] ? fuse_get_root_inode+0x190/0x190 [ 222.091911] mount_nodev+0x6b/0x110 [ 222.095522] fuse_mount+0x2c/0x40 [ 222.098959] mount_fs+0xae/0x328 [ 222.102308] vfs_kern_mount.part.34+0xd4/0x4d0 [ 222.106881] ? may_umount+0xb0/0xb0 [ 222.110493] ? _raw_read_unlock+0x22/0x30 [ 222.114622] ? __get_fs_type+0x97/0xc0 [ 222.118495] do_mount+0x564/0x3070 [ 222.122034] ? copy_mount_string+0x40/0x40 [ 222.126269] ? rcu_pm_notify+0xc0/0xc0 [ 222.130145] ? copy_mount_options+0x5f/0x380 [ 222.134545] ? rcu_read_lock_sched_held+0x108/0x120 [ 222.139549] ? kmem_cache_alloc_trace+0x616/0x780 [ 222.144375] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 222.149897] ? _copy_from_user+0xdf/0x150 [ 222.154039] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 222.159563] ? copy_mount_options+0x285/0x380 [ 222.164048] ksys_mount+0x12d/0x140 [ 222.167671] __x64_sys_mount+0xbe/0x150 [ 222.171628] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 222.176631] do_syscall_64+0x1b1/0x800 [ 222.180504] ? finish_task_switch+0x1ca/0x810 [ 222.184990] ? syscall_return_slowpath+0x5c0/0x5c0 [ 222.189913] ? syscall_return_slowpath+0x30f/0x5c0 [ 222.194827] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 222.200181] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 222.205027] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 222.210214] RIP: 0033:0x455979 [ 222.213400] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 222.221178] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 222.228439] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 222.235701] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 222.243582] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 222.250843] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 [ 222.294798] QAT: Invalid ioctl 2018/05/06 05:52:20 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:52:20 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x101000, 0x0) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f0000003380)={0x9, 0x0, [{0x2, 0xde, &(0x7f00000000c0)=""/222}, {0x8381eb6f6742ee9c, 0x3, &(0x7f0000000040)=""/3}, {0x0, 0x1000, &(0x7f00000001c0)=""/4096}, {0x7004, 0x1000, &(0x7f00000011c0)=""/4096}, {0x0, 0x4f, &(0x7f00000021c0)=""/79}, {0x10d000, 0xad, &(0x7f0000002240)=""/173}, {0x100002, 0x21, &(0x7f0000002300)=""/33}, {0x2, 0x1000, &(0x7f0000002340)=""/4096}, {0xf003, 0xd, &(0x7f0000003340)=""/13}]}) 2018/05/06 05:52:20 executing program 6: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000000)=0x0) r2 = getpid() r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x10000, 0x0) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f00000000c0)={r3, r0, 0x4000000000000000}) 2018/05/06 05:52:20 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)="2e2f66696c6530ff", &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:20 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"6272696467653000000000000000ffff", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:20 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000100)=@req={0xe2ca000000000, 0x2, 0x78a, 0x7fffffff}, 0x10) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0x0, 0x0, 'queue0\x00', 0x1ff}) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000140)=""/69, &(0x7f00000001c0)=0x45) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x9, 0x599340) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000040)) close(r1) 2018/05/06 05:52:20 executing program 2: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0x0, 0x8, 'queue0\x00'}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) prctl$seccomp(0x16, 0x1, &(0x7f0000000100)={0x3, &(0x7f0000000080)=[{0x6, 0x12, 0x3, 0x2}, {0x0, 0x80, 0x9, 0x7}, {0x2, 0x7, 0x1, 0x5}]}) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x10000000000, 0x81) close(r0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000800)='/dev/snd/pcmC#D#p\x00', 0x81, 0xc000) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000840)={0x0, 0x8, 0x3ff}, &(0x7f0000000880)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f00000008c0)={r2, 0x8001, 0x7b, "078c3f408b9fac40d4f2583ddc07ead602712d6453d5f80ef20157acafa1725a6cfd21821db5488dcec1a1f9871b237ca45eda76e179156d8b87bbba45c72ce00afdf20c81f6221d76716bfbf9e48dbdc7f68312bda97cde04801030011ddd3fde75810966f850e6be3aca0a5e62aa5814b061fe72311853ac6b62"}, 0x83) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000)) 2018/05/06 05:52:20 executing program 1 (fault-call:1 fault-nth:43): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) [ 222.494278] audit: type=1326 audit(1525585940.894:5): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15519 comm="syz-executor2" exe="/root/syz-executor2" sig=9 arch=c000003e syscall=202 compat=0 ip=0x455979 code=0x0 [ 222.520292] FAULT_INJECTION: forcing a failure. [ 222.520292] name failslab, interval 1, probability 0, space 0, times 0 [ 222.531626] CPU: 1 PID: 15531 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 222.538904] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 222.548261] Call Trace: [ 222.550863] dump_stack+0x1b9/0x294 [ 222.554510] ? dump_stack_print_info.cold.2+0x52/0x52 [ 222.559718] should_fail.cold.4+0xa/0x1a [ 222.563791] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 222.568901] ? fuse_mount+0x2c/0x40 [ 222.572534] ? mount_fs+0xae/0x328 [ 222.576080] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 222.580842] ? do_mount+0x564/0x3070 [ 222.584563] ? ksys_mount+0x12d/0x140 [ 222.588369] ? __x64_sys_mount+0xbe/0x150 [ 222.592522] ? do_syscall_64+0x1b1/0x800 [ 222.596591] ? graph_lock+0x170/0x170 [ 222.600398] ? find_held_lock+0x36/0x1c0 [ 222.604473] ? find_held_lock+0x36/0x1c0 [ 222.608551] ? __lock_is_held+0xb5/0x140 [ 222.612640] ? check_same_owner+0x320/0x320 [ 222.617007] ? rcu_note_context_switch+0x710/0x710 [ 222.621965] ? kasan_check_read+0x11/0x20 [ 222.626124] __should_failslab+0x124/0x180 [ 222.630370] should_failslab+0x9/0x14 [ 222.634184] kmem_cache_alloc_node_trace+0x26f/0x770 [ 222.639309] ? _raw_spin_unlock+0x22/0x30 2018/05/06 05:52:20 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:20 executing program 7: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x82) close(0xffffffffffffffff) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000000c0)={"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"}) 2018/05/06 05:52:21 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"6272696467653000000000000000ffff", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:21 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:21 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"62726964676530000000000000000400", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 222.643471] bdi_alloc_node+0x67/0xe0 [ 222.647280] super_setup_bdi_name+0x8b/0x220 [ 222.651691] ? kill_block_super+0x100/0x100 [ 222.656026] ? rcu_read_lock_sched_held+0x108/0x120 [ 222.661061] ? kmem_cache_alloc_trace+0x616/0x780 [ 222.665911] ? match_wildcard+0x3c0/0x3c0 [ 222.670069] ? trace_hardirqs_on+0xd/0x10 [ 222.674233] fuse_fill_super+0xe6e/0x1e20 [ 222.678398] ? fuse_get_root_inode+0x190/0x190 [ 222.682991] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 222.688026] ? kasan_check_read+0x11/0x20 2018/05/06 05:52:21 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"62726964676530000000000000000200", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:21 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) [ 222.692184] ? cap_capable+0x1f9/0x260 [ 222.696081] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 222.701623] ? security_capable+0x99/0xc0 [ 222.705777] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 222.711316] ? ns_capable_common+0x13f/0x170 [ 222.715728] ? get_anon_bdev+0x2f0/0x2f0 [ 222.719791] ? sget+0x113/0x150 [ 222.723070] ? fuse_get_root_inode+0x190/0x190 [ 222.727651] mount_nodev+0x6b/0x110 [ 222.731285] fuse_mount+0x2c/0x40 [ 222.734747] mount_fs+0xae/0x328 [ 222.738135] vfs_kern_mount.part.34+0xd4/0x4d0 2018/05/06 05:52:21 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 222.742726] ? may_umount+0xb0/0xb0 [ 222.746351] ? _raw_read_unlock+0x22/0x30 [ 222.750501] ? __get_fs_type+0x97/0xc0 [ 222.754400] do_mount+0x564/0x3070 [ 222.757953] ? interrupt_entry+0xb1/0xf0 [ 222.762033] ? copy_mount_string+0x40/0x40 [ 222.766271] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 222.771048] ? retint_kernel+0x10/0x10 [ 222.774945] ? copy_mount_options+0x213/0x380 [ 222.779449] ? write_comp_data+0x11/0x70 [ 222.783518] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 222.789061] ? copy_mount_options+0x285/0x380 [ 222.793570] ksys_mount+0x12d/0x140 [ 222.797212] __x64_sys_mount+0xbe/0x150 [ 222.801200] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 222.806223] do_syscall_64+0x1b1/0x800 [ 222.810114] ? finish_task_switch+0x1ca/0x810 [ 222.814617] ? syscall_return_slowpath+0x5c0/0x5c0 [ 222.819558] ? syscall_return_slowpath+0x30f/0x5c0 [ 222.824503] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 222.829880] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 222.834736] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 222.839933] RIP: 0033:0x455979 [ 222.843119] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 222.850835] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 222.858108] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 222.865382] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 222.872660] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 222.879930] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 [ 223.402583] audit: type=1326 audit(1525585941.803:6): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15519 comm="syz-executor2" exe="/root/syz-executor2" sig=9 arch=c000003e syscall=202 compat=0 ip=0x455979 code=0x0 2018/05/06 05:52:21 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='//control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:52:21 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x40000) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f00000002c0)={0x0, 0x100000001, 0x0, 'queue0\x00', 0x1ff}) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffff9c, 0xae41, 0x1) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000380)={[0x1, 0x40000000000, 0x4, 0x2, 0x18, 0x1000, 0x80, 0x80000000, 0x77, 0x1, 0x6, 0x6, 0x9, 0x3, 0x9, 0x7], 0x7004, 0x162084}) syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7, 0x80000) ioctl$KVM_SET_FPU(r2, 0x41a0ae8d, &(0x7f0000000100)={[], 0x9929, 0x0, 0x0, 0x0, 0x6, 0x7000, 0xf000, [], 0x9}) close(r2) 2018/05/06 05:52:21 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:21 executing program 6: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xfff, 0x400001) syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x5, 0x668240) close(r0) 2018/05/06 05:52:21 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:21 executing program 1 (fault-call:1 fault-nth:44): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:52:21 executing program 7: syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0xfffffffffffffffc, 0x81) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000040)) ioctl$DRM_IOCTL_SET_MASTER(r0, 0x641e) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000100)=""/151) ioctl$KVM_PPC_GET_PVINFO(r0, 0x4080aea1, &(0x7f0000000080)) 2018/05/06 05:52:21 executing program 2: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0x0, 0x8, 'queue0\x00'}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x20dde97, 0x288440) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000180)={{{@in6, @in6}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r2 = add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000440)="d1f9d36255dea38b23a5bd5241b573289e848cbf51e0167e6f365eb5eb1b67510cdb12abac59a229633a9d91268c14683b6030dc79f38931e1268bf1c0912d528b33162a57284de497443b247cda66788a6d20f9b8b328c2d859de4b046b047e70095045521c17b65d79be7cc7e8fc53eafd68e34b1edfe67e7f79a4bbd6d900821eba8197155b3a43906072a3e37659df24906e032da56b", 0x98, 0x0) r3 = add_key(&(0x7f0000000340)='trusted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)="f25e8509b600dce49a8c90249a1dcc7fad28971f2606244f1ec5ae17cf95730d9ddd9a796baf9c7ffa1cb093bc77634989301c7aa22ec6fab6b93bcfbd71d980ac9159e7bce748d60c502dc748111337025fec8d19c9ef6f6760431cbd64d30d8dd56de5c347b00e4a0ee4235d2425bf80adbcbc0068df102c6b91b508d6ad1265a0c21dd87f702ee7a3bb4ca3810fe93e0480f81289bd7ee62506c24bd3dbaea6153d368b2d02159040c5b4d49f528903505ce4646b97ee161cd62a992ed353c3d8c232fa0182c6f9c230", 0xcb, 0xfffffffffffffffe) keyctl$unlink(0x9, r2, r3) pipe2(&(0x7f0000000100), 0x4000) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) umount2(&(0x7f0000000000)='./file0\x00', 0x4) close(r0) [ 223.520844] FAULT_INJECTION: forcing a failure. [ 223.520844] name failslab, interval 1, probability 0, space 0, times 0 [ 223.532185] CPU: 0 PID: 15593 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 223.539500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 223.548870] Call Trace: [ 223.551491] dump_stack+0x1b9/0x294 [ 223.555143] ? dump_stack_print_info.cold.2+0x52/0x52 [ 223.560351] should_fail.cold.4+0xa/0x1a [ 223.564432] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 223.569556] ? fuse_mount+0x2c/0x40 [ 223.573197] ? mount_fs+0xae/0x328 [ 223.576778] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 223.581525] ? do_mount+0x564/0x3070 [ 223.585240] ? ksys_mount+0x12d/0x140 [ 223.589044] ? __x64_sys_mount+0xbe/0x150 [ 223.593180] ? do_syscall_64+0x1b1/0x800 [ 223.597241] ? graph_lock+0x170/0x170 [ 223.601043] ? find_held_lock+0x36/0x1c0 [ 223.605093] ? __lock_is_held+0xb5/0x140 [ 223.609155] ? check_same_owner+0x320/0x320 [ 223.613468] ? rcu_note_context_switch+0x710/0x710 [ 223.618400] ? kasan_check_read+0x11/0x20 [ 223.622545] __should_failslab+0x124/0x180 [ 223.626769] should_failslab+0x9/0x14 [ 223.630571] kmem_cache_alloc_node_trace+0x26f/0x770 [ 223.635695] ? _raw_spin_unlock+0x22/0x30 [ 223.639835] bdi_alloc_node+0x67/0xe0 [ 223.643728] super_setup_bdi_name+0x8b/0x220 [ 223.648144] ? kill_block_super+0x100/0x100 [ 223.652481] ? rcu_read_lock_sched_held+0x108/0x120 [ 223.657502] ? kmem_cache_alloc_trace+0x616/0x780 [ 223.662347] ? match_wildcard+0x3c0/0x3c0 [ 223.666482] ? trace_hardirqs_on+0xd/0x10 [ 223.670624] fuse_fill_super+0xe6e/0x1e20 [ 223.674774] ? fuse_get_root_inode+0x190/0x190 [ 223.679348] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 223.684367] ? kasan_check_read+0x11/0x20 [ 223.688531] ? cap_capable+0x1f9/0x260 [ 223.692426] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 223.697970] ? security_capable+0x99/0xc0 [ 223.702110] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 223.707644] ? ns_capable_common+0x13f/0x170 [ 223.712047] ? get_anon_bdev+0x2f0/0x2f0 [ 223.716104] ? sget+0x113/0x150 [ 223.719388] ? fuse_get_root_inode+0x190/0x190 [ 223.723965] mount_nodev+0x6b/0x110 [ 223.727593] fuse_mount+0x2c/0x40 [ 223.731138] mount_fs+0xae/0x328 [ 223.734492] vfs_kern_mount.part.34+0xd4/0x4d0 [ 223.739057] ? may_umount+0xb0/0xb0 [ 223.742677] ? _raw_read_unlock+0x22/0x30 [ 223.746816] ? __get_fs_type+0x97/0xc0 [ 223.750704] do_mount+0x564/0x3070 [ 223.754242] ? copy_mount_string+0x40/0x40 [ 223.758471] ? rcu_pm_notify+0xc0/0xc0 [ 223.762368] ? copy_mount_options+0x5f/0x380 [ 223.766778] ? rcu_read_lock_sched_held+0x108/0x120 [ 223.771800] ? kmem_cache_alloc_trace+0x616/0x780 [ 223.776638] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 223.782178] ? _copy_from_user+0xdf/0x150 [ 223.786319] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 223.791850] ? copy_mount_options+0x285/0x380 [ 223.796335] ksys_mount+0x12d/0x140 [ 223.799946] __x64_sys_mount+0xbe/0x150 [ 223.803915] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 223.808921] do_syscall_64+0x1b1/0x800 [ 223.812807] ? finish_task_switch+0x1ca/0x810 [ 223.817296] ? syscall_return_slowpath+0x5c0/0x5c0 [ 223.822214] ? syscall_return_slowpath+0x30f/0x5c0 [ 223.827130] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 223.832479] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 223.837315] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 223.842498] RIP: 0033:0x455979 [ 223.845669] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 223.853359] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 223.860615] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 2018/05/06 05:52:22 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"6272696467653000000000000000feff", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:22 executing program 7: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x40) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000040)={0x3c, @empty, 0x4e21, 0x1, 'wlc\x00', 0x29, 0x7024, 0x75}, 0x2c) [ 223.867869] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 223.875139] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 223.882410] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 2018/05/06 05:52:22 executing program 1 (fault-call:1 fault-nth:45): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:52:22 executing program 6: r0 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x0) close(0xffffffffffffffff) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000080)=0x5c) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x48000, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000040)={0x0, 0x16, "1c286def77677d3b66df176fd12d9f4fd99bab10d6d4"}, &(0x7f00000000c0)=0x1e) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000100)={r2, 0xffff}, 0x8) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000180)=[{0xc, 0x7}, {0xc, 0x4}, {0x0, 0x3}], 0x3) 2018/05/06 05:52:22 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)="2e2f66696c6530e0", &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) [ 223.974620] FAULT_INJECTION: forcing a failure. [ 223.974620] name failslab, interval 1, probability 0, space 0, times 0 [ 223.985945] CPU: 0 PID: 15609 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 223.993228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 224.002583] Call Trace: [ 224.005188] dump_stack+0x1b9/0x294 [ 224.008836] ? dump_stack_print_info.cold.2+0x52/0x52 [ 224.014054] should_fail.cold.4+0xa/0x1a [ 224.018129] ? fault_create_debugfs_attr+0x1f0/0x1f0 2018/05/06 05:52:22 executing program 6: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/ppp\x00', 0x20000, 0x0) ioctl$DRM_IOCTL_GET_MAGIC(r1, 0x80046402, &(0x7f0000001640)=0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000001680)={'vcan0\x00', 0x0}) connect$can_bcm(r1, &(0x7f00000016c0)={0x1d, r2}, 0x10) r3 = openat(0xffffffffffffffff, &(0x7f0000001600)='./file0\x00', 0x200100, 0x40) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r3) sendmsg$kcm(r3, &(0x7f0000001c00)={&(0x7f0000001700)=@l2={0x1f, 0x76, {0x7, 0x81, 0x3, 0x1f, 0xffffffffffffffe1, 0x1ab9}, 0xfff, 0xcaa}, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001780)="ef879184d153562f1491b93dba3dc751ad7e98887055eb4728ddac06491b1b5d35cb8895d2784e0edf04ee3119cfdc99fbcee04a6aed59f5ed971112a3a5b69f13b8bd4d9897fb50d93c37300fd17c5090187dc0cdab281d52086e143ff413941acbd170ebc4", 0x66}, {&(0x7f0000001800)="16384f1b142044cf667cce263cd1e2fc8c7d703ff2c3e868a1df28523f44e31427167383c59d4d012d669e9c891d8dc9ec635a0a296076ed88c4131d378b95d541ede73a1dbaa339b62121", 0x4b}, {&(0x7f0000001880)="50fcd89f00578a2547623b415438af63c0dfbf45340ea931949a4ca3de177e88e1207bec7c0ffeea6831ee15abad087e45a6c0926e467f525de203afb83ceebc0e79e489c61a47dc140ae4d8272e7ccbb5325d8debab82faea3c8bd93d7988c54bab66ff54fa6e3a52f397cb57171448a510280640e76b503bacc865042d346dc368522fdad8b8c5841ee692237e35e95656a29904b43a7f921d1e1d4f1f9d65086929f02915d2db1fa850b68f07d61679c51c5a08619344c45efeb3c6f0d68863f710c1fa2dacd0330851d20311256e3203eca9d0b9166be88e", 0xda}, {&(0x7f0000001980)="b9f33bc2c4c23947bf5d3dda8ad45e7dc35762491f5b4c4514e084c1d2e6f7a6d89af897ef793470646d6179164f5ade293fdd80c5e28f470333482c1c81bcbe0dd430b1131a30bc9234027bffdad83aafe861ac1c5787c8e0389b5a20092fff08917ab185f11944919c5a78cf80a24f2d95efb9f1c3e3716ebf4d74d3986a6abce6c97d8835551beca938bb5b4712341fd01c9bac4e9cfd6d35a969dd0c07380b341cc5ff45", 0xa6}, {&(0x7f0000001a40)}, {&(0x7f0000001a80)="bf164b3afd54baade6f4349a0b4117d37397513ac0823f1bb1c8b01b83dd32ed0d23acf80da5aed3f0f0bb377dbba966cf10a37155ce4e17772b01c1edf9060faaaf5f2194c93b5cc24ed771d715af2b477badcc041fb24e7b13c828f184bbe25dbc2188a1f964078bd2be159c757fef6d0f56da6476fb84250d723dad55b4", 0x7f}, {&(0x7f0000001b00)="78d46700c2774886bd3d3a906dbf7f8181bee6b5d6ac4f7cae62c26f0db74326", 0x20}], 0x7, &(0x7f0000001bc0)=[{0x40, 0x29, 0xbc7, "15faa0c900073fd94b717f39e643eb23eb61fcd00e92f31225c805465b33072bccba151b0937c470f3703fb5ca63e3c9"}], 0x40, 0x20000000}, 0x24040880) preadv(r0, &(0x7f0000001500)=[{&(0x7f0000000000)=""/122, 0x7a}, {&(0x7f00000000c0)=""/238, 0xee}, {&(0x7f00000001c0)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/127, 0x7f}, {&(0x7f0000001240)=""/62, 0x3e}, {&(0x7f0000001280)=""/148, 0x94}, {&(0x7f0000001340)=""/165, 0xa5}, {&(0x7f0000001400)=""/30, 0x1e}, {&(0x7f0000001440)=""/186, 0xba}], 0x9, 0x59) [ 224.023247] ? graph_lock+0x170/0x170 [ 224.027058] ? _raw_spin_unlock_irqrestore+0x74/0xc0 [ 224.032171] ? find_held_lock+0x36/0x1c0 [ 224.036247] ? __lock_is_held+0xb5/0x140 [ 224.040336] ? check_same_owner+0x320/0x320 [ 224.044669] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 224.050226] ? rcu_note_context_switch+0x710/0x710 [ 224.055171] __should_failslab+0x124/0x180 [ 224.059435] should_failslab+0x9/0x14 [ 224.063249] kmem_cache_alloc_trace+0x2cb/0x780 [ 224.067929] ? __raw_spin_lock_init+0x1c/0x100 2018/05/06 05:52:22 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:22 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0X', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) [ 224.072530] device_create_groups_vargs+0xa7/0x270 [ 224.077473] device_create_vargs+0x46/0x60 [ 224.081719] bdi_register_va.part.10+0xbb/0x9b0 [ 224.086432] ? cgwb_kill+0x630/0x630 [ 224.090164] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 224.095714] ? bdi_init+0x416/0x510 [ 224.099361] ? wb_init+0x9e0/0x9e0 [ 224.102922] ? bdi_alloc_node+0x67/0xe0 [ 224.106905] ? bdi_alloc_node+0x67/0xe0 [ 224.110890] ? rcu_read_lock_sched_held+0x108/0x120 [ 224.115918] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 224.121211] ? _raw_spin_unlock+0x22/0x30 [ 224.125377] bdi_register_va+0x68/0x80 [ 224.129291] super_setup_bdi_name+0x123/0x220 [ 224.133794] ? kill_block_super+0x100/0x100 [ 224.138130] ? kmem_cache_alloc_trace+0x616/0x780 [ 224.142982] ? match_wildcard+0x3c0/0x3c0 [ 224.147141] ? trace_hardirqs_on+0xd/0x10 [ 224.151299] fuse_fill_super+0xe6e/0x1e20 [ 224.155457] ? fuse_get_root_inode+0x190/0x190 [ 224.160051] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 224.165084] ? kasan_check_read+0x11/0x20 [ 224.169328] ? cap_capable+0x1f9/0x260 [ 224.173230] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 224.178775] ? security_capable+0x99/0xc0 [ 224.182930] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 224.188475] ? ns_capable_common+0x13f/0x170 [ 224.192893] ? get_anon_bdev+0x2f0/0x2f0 [ 224.196950] ? sget+0x113/0x150 [ 224.200231] ? fuse_get_root_inode+0x190/0x190 [ 224.204819] mount_nodev+0x6b/0x110 [ 224.208453] fuse_mount+0x2c/0x40 [ 224.211907] mount_fs+0xae/0x328 [ 224.215281] vfs_kern_mount.part.34+0xd4/0x4d0 [ 224.219869] ? may_umount+0xb0/0xb0 [ 224.223503] ? _raw_read_unlock+0x22/0x30 [ 224.227656] ? __get_fs_type+0x97/0xc0 [ 224.231551] do_mount+0x564/0x3070 [ 224.235103] ? copy_mount_string+0x40/0x40 [ 224.239333] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 224.244344] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 224.249275] ? retint_kernel+0x10/0x10 [ 224.253155] ? copy_mount_options+0x1f0/0x380 [ 224.257630] ? copy_mount_options+0x202/0x380 [ 224.262109] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 224.267897] ? copy_mount_options+0x285/0x380 [ 224.272400] ksys_mount+0x12d/0x140 [ 224.276024] __x64_sys_mount+0xbe/0x150 [ 224.279996] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 224.285008] do_syscall_64+0x1b1/0x800 [ 224.288886] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 224.293713] ? syscall_return_slowpath+0x5c0/0x5c0 [ 224.298641] ? syscall_return_slowpath+0x30f/0x5c0 [ 224.303578] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 224.308935] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 224.313763] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 224.318939] RIP: 0033:0x455979 [ 224.322114] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 224.329814] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 224.337071] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 224.344343] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 224.351603] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 224.358865] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 2018/05/06 05:52:23 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/udp\x00') getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000140)=0x7, &(0x7f0000000180)=0x4) r1 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x840) close(r1) ioctl$KVM_SET_XCRS(r1, 0x4188aea7, &(0x7f0000000000)=ANY=[@ANYBLOB="0200000005000000010000000000000001010000400000000300000000000000ff07000000000000"]) r2 = socket$bt_rfcomm(0x1f, 0x3, 0x3) getsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f0000000080)=0xeab, &(0x7f00000000c0)=0x1) 2018/05/06 05:52:23 executing program 6: socket$inet6_icmp(0xa, 0x2, 0x3a) r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x100) ioctl$KVM_ASSIGN_SET_MSIX_NR(r0, 0x4008ae73, &(0x7f0000000040)={0x8, 0x8000}) ioctl$IOC_PR_PREEMPT(r0, 0x401870cb, &(0x7f0000000000)={0x1f, 0x5, 0x1c5, 0xfffffffffffffce0}) eventfd(0x127e52ff) r1 = socket$alg(0x26, 0x5, 0x0) close(r1) setsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000080)=0x4, 0x4) 2018/05/06 05:52:23 executing program 2: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0x0, 0x8, 'queue0\x00'}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x6, 0x400) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:52:23 executing program 1 (fault-call:1 fault-nth:46): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:52:23 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)="e52f636f6e74726f6c00", 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:52:23 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.stat\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f0000000100)={0x0, 0x0, 0x0, "717565756530000000000000040000000000000000000000008ff6f21a0000000000801b71070000000000000000cb00000000e40b0000000012000700", 0x10001}) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r1) 2018/05/06 05:52:23 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:23 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:23 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"62726964676530000000000000000003", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 224.635677] FAULT_INJECTION: forcing a failure. [ 224.635677] name failslab, interval 1, probability 0, space 0, times 0 [ 224.647009] CPU: 0 PID: 15665 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 224.654295] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 224.663652] Call Trace: [ 224.666257] dump_stack+0x1b9/0x294 [ 224.669905] ? dump_stack_print_info.cold.2+0x52/0x52 [ 224.675294] should_fail.cold.4+0xa/0x1a [ 224.679374] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 224.684485] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 224.689512] ? __lockdep_init_map+0x105/0x590 [ 224.694027] ? graph_lock+0x170/0x170 [ 224.697842] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 224.703399] ? put_dec_trunc8+0x273/0x300 [ 224.709062] ? find_held_lock+0x36/0x1c0 [ 224.713143] ? __lock_is_held+0xb5/0x140 [ 224.717237] ? check_same_owner+0x320/0x320 [ 224.721571] ? device_pm_sleep_init+0xe8/0x200 [ 224.726167] ? rcu_note_context_switch+0x710/0x710 [ 224.731122] __should_failslab+0x124/0x180 [ 224.735377] should_failslab+0x9/0x14 [ 224.739190] __kmalloc_track_caller+0x2c4/0x760 [ 224.744657] ? pointer+0xa20/0xa20 [ 224.748241] ? kvasprintf_const+0x67/0x190 [ 224.752495] kvasprintf+0xa9/0x130 [ 224.756049] ? bust_spinlocks+0xe0/0xe0 [ 224.760045] ? rcu_read_lock_sched_held+0x108/0x120 [ 224.765054] kvasprintf_const+0x67/0x190 [ 224.769125] kobject_set_name_vargs+0x5b/0x150 [ 224.773715] device_create_groups_vargs+0x1ce/0x270 [ 224.778727] device_create_vargs+0x46/0x60 [ 224.782966] bdi_register_va.part.10+0xbb/0x9b0 [ 224.787634] ? cgwb_kill+0x630/0x630 [ 224.791338] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 224.796863] ? bdi_init+0x416/0x510 [ 224.800475] ? wb_init+0x9e0/0x9e0 [ 224.803999] ? bdi_alloc_node+0x67/0xe0 [ 224.807964] ? bdi_alloc_node+0x67/0xe0 [ 224.811938] ? rcu_read_lock_sched_held+0x108/0x120 [ 224.816964] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 224.822243] ? _raw_spin_unlock+0x22/0x30 [ 224.826385] bdi_register_va+0x68/0x80 [ 224.830259] super_setup_bdi_name+0x123/0x220 [ 224.834740] ? kill_block_super+0x100/0x100 [ 224.839052] ? kmem_cache_alloc_trace+0x616/0x780 [ 224.843896] ? match_wildcard+0x3c0/0x3c0 [ 224.848040] ? trace_hardirqs_on+0xd/0x10 [ 224.852180] fuse_fill_super+0xe6e/0x1e20 [ 224.856330] ? fuse_get_root_inode+0x190/0x190 [ 224.860918] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 224.865937] ? kasan_check_read+0x11/0x20 [ 224.870082] ? cap_capable+0x1f9/0x260 [ 224.873968] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 224.879514] ? security_capable+0x99/0xc0 [ 224.883660] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 224.889236] ? ns_capable_common+0x13f/0x170 [ 224.893630] ? get_anon_bdev+0x2f0/0x2f0 [ 224.897684] ? sget+0x113/0x150 [ 224.900971] ? fuse_get_root_inode+0x190/0x190 [ 224.905545] mount_nodev+0x6b/0x110 [ 224.909167] fuse_mount+0x2c/0x40 [ 224.912624] mount_fs+0xae/0x328 [ 224.915993] vfs_kern_mount.part.34+0xd4/0x4d0 [ 224.920574] ? may_umount+0xb0/0xb0 [ 224.924207] ? _raw_read_unlock+0x22/0x30 [ 224.928358] ? __get_fs_type+0x97/0xc0 [ 224.932244] do_mount+0x564/0x3070 [ 224.935768] ? copy_mount_string+0x40/0x40 [ 224.939985] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 224.944989] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 224.949740] ? retint_kernel+0x10/0x10 [ 224.953637] ? copy_mount_options+0x1f0/0x380 [ 224.958131] ? copy_mount_options+0x206/0x380 [ 224.962614] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 224.968149] ? copy_mount_options+0x285/0x380 [ 224.972639] ksys_mount+0x12d/0x140 [ 224.976267] __x64_sys_mount+0xbe/0x150 [ 224.980240] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 224.985257] do_syscall_64+0x1b1/0x800 [ 224.989134] ? finish_task_switch+0x1ca/0x810 [ 224.993614] ? syscall_return_slowpath+0x5c0/0x5c0 [ 224.998533] ? syscall_return_slowpath+0x30f/0x5c0 [ 225.003453] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 225.008803] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 225.013644] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 225.018828] RIP: 0033:0x455979 [ 225.021999] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 225.029709] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 225.036969] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 225.044226] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 225.051499] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 225.058760] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 2018/05/06 05:52:23 executing program 7: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f00000000c0)) 2018/05/06 05:52:23 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:23 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)="2e2f66696c6530ef", &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:23 executing program 6: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) r1 = dup(r0) ioctl$UFFDIO_WAKE(r1, 0x8010aa02, &(0x7f0000000340)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e21, 0x700, @ipv4={[], [0xff, 0xff]}, 0x8000}}, 0x2979, 0x800, 0x89d, 0x1e3b}, &(0x7f0000000440)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000480)={r2, @in={{0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}}, [0x0, 0x5, 0x1, 0x1, 0x8a0a, 0x4ac0, 0x2, 0x20, 0x3, 0x4, 0x3, 0x2, 0xcf3, 0x9, 0x5f]}, &(0x7f0000000580)=0x100) close(r0) accept$packet(r1, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000600)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000640)={@loopback={0x0, 0x1}, 0x100, r3}) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000040)='./file0\x00', 0x81, 0x4, &(0x7f00000002c0)=[{&(0x7f00000000c0)="dd8f2122d838ce6f01a46def8574277dcb973b9591da862b57cba7ac34e2c8b46a8e0bbdb87f7acc97748c45", 0x2c, 0x3000000000000000}, {&(0x7f0000000100)="3622451167171125011693cde793d41d5ca48d040dbe2c11d9a72ee29bd9ad49755442f01b52a8c5401bcbca294460c43854860468c8420ca29d9b9e174c80625bb851899291a9d382210ca0cfce79396f9c51299518c0704340726cf11b3bd2458a391fa5075f817e2e0b7347e103286062f9", 0x73, 0xfffffffffffffff9}, {&(0x7f0000000180)="5a7c4146dd64fd20c26ab984610043065a169e434fb0e7eced48f4e246190ee8", 0x20, 0x7fff}, {&(0x7f00000001c0)="b9a3ae2c5b626efe0d76df0cf4fd9c60c1889ec561f8cc066c9d5623759ca85b8b63abb6e1e8fd808e2f6a0763e686d7a2d327222489cf963c4f91e41af4e0edd543eef1117c465fd99d784fbc4907ce88dbdf80eb1f819ce28b2cb214c9faf20fe78c16f50e03b71a4d95b080fcd6f89252c8aa3d1d3986392fb347a749b284e7d33423b9ccdadaae6dbce64b2c835b982e1307b4a4964eadbedd4e0d650a94878d3034835728abd45f0f0abdc017251b34528b763daa91fbcb433b170396b717db532bf38dc6eb2c63b8", 0xcb, 0x4}], 0x200400, 0x0) 2018/05/06 05:52:23 executing program 1 (fault-call:1 fault-nth:47): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:52:23 executing program 3: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000140)={0x10200, 0x2, 0x6000, 0x1000, &(0x7f0000fff000/0x1000)=nil}) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0x0, 0x0, 'queue0\x00', 0x1ff}) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000000)='./file0\x00', r2}, 0x10) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r1) 2018/05/06 05:52:23 executing program 2: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0x0, 0x8, 'queue0\x00'}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:52:23 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)="2ee5636f6e74726f6c00", 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) [ 225.598672] FAULT_INJECTION: forcing a failure. [ 225.598672] name failslab, interval 1, probability 0, space 0, times 0 [ 225.610009] CPU: 1 PID: 15698 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 225.617293] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 225.626653] Call Trace: [ 225.629257] dump_stack+0x1b9/0x294 [ 225.632899] ? dump_stack_print_info.cold.2+0x52/0x52 [ 225.638105] should_fail.cold.4+0xa/0x1a [ 225.642175] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 225.647287] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 225.652315] ? __lockdep_init_map+0x105/0x590 [ 225.656817] ? graph_lock+0x170/0x170 [ 225.660631] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 225.666179] ? put_dec_trunc8+0x273/0x300 [ 225.670345] ? find_held_lock+0x36/0x1c0 [ 225.674421] ? __lock_is_held+0xb5/0x140 [ 225.678509] ? check_same_owner+0x320/0x320 [ 225.682839] ? device_pm_sleep_init+0xe8/0x200 [ 225.687452] ? rcu_note_context_switch+0x710/0x710 [ 225.692395] __should_failslab+0x124/0x180 [ 225.696645] should_failslab+0x9/0x14 [ 225.700454] __kmalloc_track_caller+0x2c4/0x760 [ 225.705146] ? pointer+0xa20/0xa20 [ 225.708697] ? kvasprintf_const+0x67/0x190 [ 225.712943] kvasprintf+0xa9/0x130 [ 225.716490] ? bust_spinlocks+0xe0/0xe0 [ 225.720481] ? rcu_read_lock_sched_held+0x108/0x120 [ 225.725508] kvasprintf_const+0x67/0x190 [ 225.729581] kobject_set_name_vargs+0x5b/0x150 [ 225.734180] device_create_groups_vargs+0x1ce/0x270 [ 225.739216] device_create_vargs+0x46/0x60 [ 225.743467] bdi_register_va.part.10+0xbb/0x9b0 [ 225.748151] ? cgwb_kill+0x630/0x630 [ 225.751883] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 225.757429] ? bdi_init+0x416/0x510 [ 225.761062] ? wb_init+0x9e0/0x9e0 [ 225.764615] ? bdi_alloc_node+0x67/0xe0 [ 225.768598] ? bdi_alloc_node+0x67/0xe0 [ 225.772580] ? rcu_read_lock_sched_held+0x108/0x120 [ 225.777606] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 225.782893] ? _raw_spin_unlock+0x22/0x30 [ 225.787052] bdi_register_va+0x68/0x80 [ 225.790945] super_setup_bdi_name+0x123/0x220 [ 225.795442] ? kill_block_super+0x100/0x100 [ 225.799862] ? kmem_cache_alloc_trace+0x616/0x780 [ 225.804710] ? match_wildcard+0x3c0/0x3c0 [ 225.808865] ? trace_hardirqs_on+0xd/0x10 [ 225.813022] fuse_fill_super+0xe6e/0x1e20 [ 225.817184] ? fuse_get_root_inode+0x190/0x190 [ 225.821782] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 225.826807] ? kasan_check_read+0x11/0x20 [ 225.830961] ? cap_capable+0x1f9/0x260 [ 225.834857] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 225.840400] ? security_capable+0x99/0xc0 [ 225.844558] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 225.850101] ? ns_capable_common+0x13f/0x170 [ 225.854515] ? get_anon_bdev+0x2f0/0x2f0 [ 225.858579] ? sget+0x113/0x150 [ 225.861866] ? fuse_get_root_inode+0x190/0x190 [ 225.866454] mount_nodev+0x6b/0x110 [ 225.870085] fuse_mount+0x2c/0x40 [ 225.873541] mount_fs+0xae/0x328 [ 225.876928] vfs_kern_mount.part.34+0xd4/0x4d0 [ 225.881517] ? may_umount+0xb0/0xb0 [ 225.885149] ? _raw_read_unlock+0x22/0x30 [ 225.889299] ? __get_fs_type+0x97/0xc0 [ 225.893199] do_mount+0x564/0x3070 [ 225.896742] ? interrupt_entry+0xb1/0xf0 [ 225.900814] ? copy_mount_string+0x40/0x40 [ 225.905055] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 225.909838] ? retint_kernel+0x10/0x10 [ 225.913734] ? copy_mount_options+0x1e3/0x380 [ 225.918247] ? write_comp_data+0x1b/0x70 [ 225.922319] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 225.927858] ? copy_mount_options+0x285/0x380 [ 225.932364] ksys_mount+0x12d/0x140 [ 225.935999] __x64_sys_mount+0xbe/0x150 [ 225.939977] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 225.944999] do_syscall_64+0x1b1/0x800 [ 225.948889] ? finish_task_switch+0x1ca/0x810 [ 225.953390] ? syscall_return_slowpath+0x5c0/0x5c0 [ 225.958326] ? syscall_return_slowpath+0x30f/0x5c0 [ 225.963267] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 225.968640] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 225.973492] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 225.978680] RIP: 0033:0x455979 [ 225.981866] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 225.989581] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 2018/05/06 05:52:24 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:24 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0H', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:24 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00@', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:24 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:24 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"6272696467653000000000000000000f", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:24 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"62726964676530000000000000000002", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:24 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:24 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 225.996854] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 226.004126] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 226.011398] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 226.018779] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 [ 226.045967] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop6. [ 226.131162] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop6. 2018/05/06 05:52:25 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x2, 0x401) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x40001, 0x0) linkat(r1, &(0x7f0000000100)='./file0\x00', r2, &(0x7f0000000180)='./file0\x00', 0x1400) r3 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0xfffffffffffff4cd, 0x41) ioctl$EVIOCSKEYCODE_V2(r3, 0x40284504, &(0x7f0000000040)={0x9, 0x17, 0x0, 0x9, "6b1217b716fad7e3c97cde5f5988687c04e229b6a99c2639f092306e671dbfca"}) close(r0) 2018/05/06 05:52:25 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)="2e2f66696c653005", &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:25 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:25 executing program 1 (fault-call:1 fault-nth:48): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:52:25 executing program 6: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x72, &(0x7f00000000c0)={0x0, 0x5, 0x10}, &(0x7f0000000100)=0xc) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000140)={r1, 0x9}, 0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={r1, 0x8d}, &(0x7f00000001c0)=0x8) r2 = getpgrp(0xffffffffffffffff) migrate_pages(r2, 0x8, &(0x7f0000000200)=0x80000001, &(0x7f0000000240)=0x80) getsockname$packet(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$can_raw(r0, &(0x7f0000000440)={&(0x7f0000000380)={0x1d, r3}, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=@can={{0x3, 0x7, 0x581f1351, 0x56f61303}, 0x0, 0x1, 0x0, 0x0, "533694fd4af48ff1"}, 0x10}, 0x1}, 0x2004c050) 2018/05/06 05:52:25 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0x0, 0x0, 'queue0\x00', 0x1ff}) syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:52:25 executing program 2: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0x0, 0x8, 'queue0\x00'}) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x101000, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x200, 0x30000) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000140)) r1 = socket$inet_icmp(0x2, 0x2, 0x1) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000280)={'broute\x00', 0x0, 0x3, 0xf2, [], 0x7, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f0000000180)=""/242}, &(0x7f0000000100)=0x78) r2 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)=""/54, 0x36) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) ioctl$KVM_SET_BOOT_CPU_ID(r0, 0xae78, &(0x7f00000004c0)=0x2) close(r2) [ 226.680513] FAULT_INJECTION: forcing a failure. [ 226.680513] name failslab, interval 1, probability 0, space 0, times 0 [ 226.691918] CPU: 1 PID: 15777 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 226.699203] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 226.708561] Call Trace: [ 226.711171] dump_stack+0x1b9/0x294 [ 226.714816] ? dump_stack_print_info.cold.2+0x52/0x52 [ 226.720029] should_fail.cold.4+0xa/0x1a [ 226.724099] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 226.729216] ? graph_lock+0x170/0x170 [ 226.733033] ? find_held_lock+0x36/0x1c0 [ 226.737107] ? __lock_is_held+0xb5/0x140 [ 226.741173] ? l2cap_rx+0xca0/0x1e10 [ 226.744907] ? check_same_owner+0x320/0x320 [ 226.749241] ? rcu_note_context_switch+0x710/0x710 [ 226.754181] ? check_same_owner+0x320/0x320 [ 226.758514] __should_failslab+0x124/0x180 [ 226.762785] should_failslab+0x9/0x14 [ 226.766602] __kmalloc_track_caller+0x2c4/0x760 [ 226.771282] ? debug_check_no_locks_freed+0x310/0x310 [ 226.776487] ? kasan_check_write+0x14/0x20 [ 226.780734] ? __mutex_lock+0x7d9/0x17f0 [ 226.784812] ? kstrdup_const+0x66/0x80 [ 226.788715] kstrdup+0x39/0x70 [ 226.791915] kstrdup_const+0x66/0x80 [ 226.795625] __kernfs_new_node+0xa8/0x580 [ 226.799774] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 226.804531] ? lock_downgrade+0x8e0/0x8e0 [ 226.808676] kernfs_new_node+0x80/0xf0 [ 226.812556] kernfs_create_dir_ns+0x3d/0x140 [ 226.816953] sysfs_create_dir_ns+0xbe/0x1d0 [ 226.821262] kobject_add_internal+0x354/0xac0 [ 226.825757] ? kobj_ns_type_registered+0x60/0x60 [ 226.830502] ? lock_downgrade+0x8e0/0x8e0 [ 226.834640] ? refcount_add_not_zero+0x320/0x320 [ 226.839387] ? kasan_check_read+0x11/0x20 [ 226.843530] kobject_add+0x13a/0x190 [ 226.847240] ? kset_create_and_add+0x190/0x190 [ 226.851826] ? mutex_unlock+0xd/0x10 [ 226.855528] device_add+0x3a5/0x16d0 [ 226.859230] ? device_private_init+0x230/0x230 [ 226.863804] ? kfree+0x1e9/0x260 [ 226.867175] ? kfree_const+0x5e/0x70 [ 226.870881] device_create_groups_vargs+0x1ff/0x270 [ 226.875895] device_create_vargs+0x46/0x60 [ 226.880132] bdi_register_va.part.10+0xbb/0x9b0 [ 226.884787] ? cgwb_kill+0x630/0x630 [ 226.888492] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 226.894022] ? bdi_init+0x416/0x510 [ 226.897639] ? wb_init+0x9e0/0x9e0 [ 226.901178] ? bdi_alloc_node+0x67/0xe0 [ 226.905150] ? bdi_alloc_node+0x67/0xe0 [ 226.909110] ? rcu_read_lock_sched_held+0x108/0x120 [ 226.914135] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 226.919409] ? _raw_spin_unlock+0x22/0x30 [ 226.923544] bdi_register_va+0x68/0x80 [ 226.927426] super_setup_bdi_name+0x123/0x220 [ 226.931917] ? kill_block_super+0x100/0x100 [ 226.936237] ? kmem_cache_alloc_trace+0x616/0x780 [ 226.941075] ? match_wildcard+0x3c0/0x3c0 [ 226.945218] ? trace_hardirqs_on+0xd/0x10 [ 226.949367] fuse_fill_super+0xe6e/0x1e20 [ 226.953507] ? fuse_get_root_inode+0x190/0x190 [ 226.958086] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 226.963112] ? kasan_check_read+0x11/0x20 [ 226.967257] ? cap_capable+0x1f9/0x260 [ 226.971147] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 226.976686] ? security_capable+0x99/0xc0 [ 226.980836] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 226.986380] ? ns_capable_common+0x13f/0x170 [ 226.990800] ? get_anon_bdev+0x2f0/0x2f0 [ 226.994866] ? sget+0x113/0x150 [ 226.998151] ? fuse_get_root_inode+0x190/0x190 [ 227.002730] mount_nodev+0x6b/0x110 [ 227.007221] fuse_mount+0x2c/0x40 [ 227.010677] mount_fs+0xae/0x328 [ 227.014052] vfs_kern_mount.part.34+0xd4/0x4d0 [ 227.018621] ? may_umount+0xb0/0xb0 [ 227.022235] ? _raw_read_unlock+0x22/0x30 [ 227.026378] ? __get_fs_type+0x97/0xc0 [ 227.030264] do_mount+0x564/0x3070 [ 227.033793] ? copy_mount_string+0x40/0x40 [ 227.038044] ? rcu_pm_notify+0xc0/0xc0 [ 227.041920] ? copy_mount_options+0x5f/0x380 [ 227.046314] ? rcu_read_lock_sched_held+0x108/0x120 [ 227.051329] ? kmem_cache_alloc_trace+0x616/0x780 [ 227.056173] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 227.061730] ? _copy_from_user+0xdf/0x150 [ 227.065884] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 227.071420] ? copy_mount_options+0x285/0x380 [ 227.075907] ksys_mount+0x12d/0x140 [ 227.079544] __x64_sys_mount+0xbe/0x150 [ 227.083516] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 227.088519] do_syscall_64+0x1b1/0x800 [ 227.092393] ? finish_task_switch+0x1ca/0x810 [ 227.096885] ? syscall_return_slowpath+0x5c0/0x5c0 [ 227.101819] ? syscall_return_slowpath+0x30f/0x5c0 [ 227.106745] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 227.112107] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 227.116939] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 227.122133] RIP: 0033:0x455979 [ 227.125318] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 227.133559] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 227.140824] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 227.148090] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 227.155349] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 227.162612] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 [ 227.170162] kobject_add_internal failed for 0:44 (error: -12 parent: bdi) 2018/05/06 05:52:26 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./.ontrol\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:52:26 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:26 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:26 executing program 1 (fault-call:1 fault-nth:49): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:52:26 executing program 7: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x100, 0x0) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) 2018/05/06 05:52:26 executing program 3: r0 = syz_open_dev$dmmidi(&(0x7f00000001c0)='/dev/dmmidi#\x00', 0x3, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000200)={0x0, 0xf7, 0x7a, 0x5, 0x0, 0x5, 0x7, 0x683df9cf, {0x0, @in6={{0xa, 0x4e20, 0xd086, @dev={0xfe, 0x80, [], 0x15}, 0x7}}, 0x9, 0x2, 0x3951, 0x100000000000, 0x6}}, &(0x7f00000002c0)=0xb0) fstat(r0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r2) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000300)={r1, 0xffffffff}, 0x8) clock_gettime(0x0, &(0x7f0000001480)={0x0, 0x0}) utimensat(r0, &(0x7f0000000340)='./file0\x00', &(0x7f00000014c0)={{r3, r4/1000+30000}, {0x0, 0x2710}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0x0, 0x0, 'queue0\x00', 0x1ff}) r5 = syz_open_dev$sg(&(0x7f00000015c0)='/dev/sg#\x00', 0x639, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x9, 0x800000000020200) prctl$intptr(0x2f, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) r6 = dup2(r5, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000440)={0x0, 0x1000, "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"}, &(0x7f0000000000)=0x1008) ioctl$KVM_HAS_DEVICE_ATTR(r6, 0x4018aee3, &(0x7f0000000180)={0x0, 0x7f, 0x4, &(0x7f0000000140)=0xddf}) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r6, 0x84, 0x77, &(0x7f0000000040)={r7, 0xffffffffffffff80, 0x4, [0x6, 0x1, 0x1, 0xac08]}, &(0x7f0000000100)=0x10) close(r5) 2018/05/06 05:52:26 executing program 6: close(0xffffffffffffffff) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200000, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f0000000040)={0x8000, 0x6680000, 0xffffffffffff1fe7}) 2018/05/06 05:52:26 executing program 2: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0x0, 0x8, 'queue0\x00'}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0xffffffffffffffff, 0x7, 0x0, 0x80, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000100)={0x0, 0x2}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00000001c0)={r2, 0x3}, 0x8) [ 227.788599] FAULT_INJECTION: forcing a failure. [ 227.788599] name failslab, interval 1, probability 0, space 0, times 0 [ 227.799911] CPU: 0 PID: 15808 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 227.807196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 227.816559] Call Trace: [ 227.819165] dump_stack+0x1b9/0x294 [ 227.822983] ? dump_stack_print_info.cold.2+0x52/0x52 [ 227.828195] should_fail.cold.4+0xa/0x1a [ 227.832269] ? __kmalloc_track_caller+0x14a/0x760 2018/05/06 05:52:26 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:26 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0x0, 0x0, 'queue0\x00', 0x1ff}) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) [ 227.837130] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 227.842250] ? device_add+0x3a5/0x16d0 [ 227.846150] ? device_create_groups_vargs+0x1ff/0x270 [ 227.851348] ? device_create_vargs+0x46/0x60 [ 227.855766] ? bdi_register_va.part.10+0xbb/0x9b0 [ 227.860620] ? bdi_register_va+0x68/0x80 [ 227.864689] ? super_setup_bdi_name+0x123/0x220 [ 227.869366] ? fuse_fill_super+0xe6e/0x1e20 [ 227.873696] ? graph_lock+0x170/0x170 [ 227.877506] ? do_mount+0x564/0x3070 [ 227.881231] ? ksys_mount+0x12d/0x140 [ 227.885042] ? __x64_sys_mount+0xbe/0x150 2018/05/06 05:52:26 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"627269646765300000000000000000fd", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 227.889202] ? do_syscall_64+0x1b1/0x800 [ 227.893270] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 227.898640] ? find_held_lock+0x36/0x1c0 [ 227.902715] ? __lock_is_held+0xb5/0x140 [ 227.906797] ? check_same_owner+0x320/0x320 [ 227.911135] ? rcu_note_context_switch+0x710/0x710 [ 227.916075] ? rcu_read_lock_sched_held+0x108/0x120 [ 227.921115] __should_failslab+0x124/0x180 [ 227.925362] should_failslab+0x9/0x14 [ 227.929176] kmem_cache_alloc+0x2af/0x760 [ 227.933333] ? memcpy+0x45/0x50 2018/05/06 05:52:26 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 227.936626] ? kstrdup+0x59/0x70 [ 227.940004] __kernfs_new_node+0xe7/0x580 [ 227.944163] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 227.948935] ? lock_downgrade+0x8e0/0x8e0 [ 227.953118] kernfs_new_node+0x80/0xf0 [ 227.957023] kernfs_create_dir_ns+0x3d/0x140 [ 227.961444] sysfs_create_dir_ns+0xbe/0x1d0 [ 227.965777] kobject_add_internal+0x354/0xac0 [ 227.970283] ? kobj_ns_type_registered+0x60/0x60 [ 227.975050] ? lock_downgrade+0x8e0/0x8e0 [ 227.979213] ? refcount_add_not_zero+0x320/0x320 [ 227.983976] ? kasan_check_read+0x11/0x20 2018/05/06 05:52:26 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"627269646765300000000000000000c3", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 227.988138] kobject_add+0x13a/0x190 [ 227.991855] ? kset_create_and_add+0x190/0x190 [ 227.996446] ? mutex_unlock+0xd/0x10 [ 228.000165] device_add+0x3a5/0x16d0 [ 228.003885] ? device_private_init+0x230/0x230 [ 228.008467] ? kfree+0x1e9/0x260 [ 228.011842] ? kfree_const+0x5e/0x70 [ 228.015568] device_create_groups_vargs+0x1ff/0x270 [ 228.020596] device_create_vargs+0x46/0x60 [ 228.024845] bdi_register_va.part.10+0xbb/0x9b0 [ 228.029521] ? cgwb_kill+0x630/0x630 [ 228.033244] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 2018/05/06 05:52:26 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"62726964676530000000000000000004", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 228.038784] ? bdi_init+0x416/0x510 [ 228.042417] ? wb_init+0x9e0/0x9e0 [ 228.045963] ? bdi_alloc_node+0x67/0xe0 [ 228.049949] ? bdi_alloc_node+0x67/0xe0 [ 228.053927] ? rcu_read_lock_sched_held+0x108/0x120 [ 228.058980] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 228.064262] ? _raw_spin_unlock+0x22/0x30 [ 228.068418] bdi_register_va+0x68/0x80 [ 228.072318] super_setup_bdi_name+0x123/0x220 [ 228.076817] ? kill_block_super+0x100/0x100 [ 228.081148] ? kmem_cache_alloc_trace+0x616/0x780 [ 228.085998] ? match_wildcard+0x3c0/0x3c0 2018/05/06 05:52:26 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 228.090157] ? trace_hardirqs_on+0xd/0x10 [ 228.094321] fuse_fill_super+0xe6e/0x1e20 [ 228.098483] ? fuse_get_root_inode+0x190/0x190 [ 228.103075] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 228.108108] ? kasan_check_read+0x11/0x20 [ 228.112260] ? cap_capable+0x1f9/0x260 [ 228.116156] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 228.121705] ? security_capable+0x99/0xc0 [ 228.125863] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 228.131406] ? ns_capable_common+0x13f/0x170 [ 228.135826] ? get_anon_bdev+0x2f0/0x2f0 2018/05/06 05:52:26 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) [ 228.139893] ? sget+0x113/0x150 [ 228.143178] ? fuse_get_root_inode+0x190/0x190 [ 228.147765] mount_nodev+0x6b/0x110 [ 228.151405] fuse_mount+0x2c/0x40 [ 228.154870] mount_fs+0xae/0x328 [ 228.158245] vfs_kern_mount.part.34+0xd4/0x4d0 [ 228.162839] ? may_umount+0xb0/0xb0 [ 228.166470] ? _raw_read_unlock+0x22/0x30 [ 228.170621] ? __get_fs_type+0x97/0xc0 [ 228.174518] do_mount+0x564/0x3070 [ 228.178072] ? copy_mount_string+0x40/0x40 [ 228.182318] ? rcu_pm_notify+0xc0/0xc0 [ 228.186216] ? copy_mount_options+0x5f/0x380 [ 228.190629] ? rcu_read_lock_sched_held+0x108/0x120 [ 228.195652] ? kmem_cache_alloc_trace+0x616/0x780 [ 228.200514] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 228.206074] ? _copy_from_user+0xdf/0x150 [ 228.210262] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 228.215807] ? copy_mount_options+0x285/0x380 [ 228.220314] ksys_mount+0x12d/0x140 [ 228.223953] __x64_sys_mount+0xbe/0x150 [ 228.227945] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 228.232973] do_syscall_64+0x1b1/0x800 [ 228.236871] ? finish_task_switch+0x1ca/0x810 [ 228.241378] ? syscall_return_slowpath+0x5c0/0x5c0 [ 228.246323] ? syscall_return_slowpath+0x30f/0x5c0 [ 228.251259] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 228.256623] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 228.261467] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 228.266651] RIP: 0033:0x455979 [ 228.269824] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 228.277520] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 228.284786] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 228.292046] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 228.299322] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 228.306606] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 [ 228.314104] kobject_add_internal failed for 0:44 (error: -12 parent: bdi) 2018/05/06 05:52:27 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0x0, 0x0, 'queue0\x00', 0x1ff}) syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x1, 0x81) close(r0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) timerfd_gettime(r1, &(0x7f0000000040)) 2018/05/06 05:52:27 executing program 7: ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f0000000000)={0x100000001, 0x2, 0x1, 0xffffffffffffffff}) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) dup2(r0, r0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, r1, r2) r3 = syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x9, 0x80100) setsockopt$bt_BT_SNDMTU(r3, 0x112, 0xc, &(0x7f0000000240)=0x1, 0x2) r4 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x10000000000000, 0x81) close(r4) 2018/05/06 05:52:27 executing program 2: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0x0, 0x8, 'queue0\x00'}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r1, &(0x7f0000000180)="434e15d2de974fd5088500656a6ee351d77a5ca5cbb8c48583e8f8563ff7325499cf8d893edf3f133fd5132e7353645984d2641fa1686e7002d305d0dc53bd63be403c7a9e6e7c6576bd77aae913e6"}, 0x10) close(r0) 2018/05/06 05:52:27 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='.//ontrol\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:52:27 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:27 executing program 1 (fault-call:1 fault-nth:50): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:52:27 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"627269646765300000000000000000fe", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:27 executing program 6: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x7e) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x3, 0x0) close(r0) [ 228.866274] FAULT_INJECTION: forcing a failure. [ 228.866274] name failslab, interval 1, probability 0, space 0, times 0 [ 228.877574] CPU: 0 PID: 15872 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 228.884860] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 228.894222] Call Trace: [ 228.896835] dump_stack+0x1b9/0x294 [ 228.900494] ? dump_stack_print_info.cold.2+0x52/0x52 [ 228.905702] should_fail.cold.4+0xa/0x1a [ 228.909774] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 228.914894] ? graph_lock+0x170/0x170 [ 228.918712] ? find_held_lock+0x36/0x1c0 [ 228.922790] ? __lock_is_held+0xb5/0x140 [ 228.926876] ? check_same_owner+0x320/0x320 [ 228.931213] ? rcu_note_context_switch+0x710/0x710 [ 228.936158] ? check_same_owner+0x320/0x320 [ 228.940494] __should_failslab+0x124/0x180 [ 228.944739] should_failslab+0x9/0x14 [ 228.948543] __kmalloc_track_caller+0x2c4/0x760 [ 228.953221] ? debug_check_no_locks_freed+0x310/0x310 [ 228.958421] ? kasan_check_write+0x14/0x20 [ 228.962669] ? __mutex_lock+0x7d9/0x17f0 [ 228.966738] ? kstrdup_const+0x66/0x80 [ 228.970639] kstrdup+0x39/0x70 [ 228.973844] kstrdup_const+0x66/0x80 [ 228.977569] __kernfs_new_node+0xa8/0x580 [ 228.981724] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 228.986496] ? lock_downgrade+0x8e0/0x8e0 [ 228.990659] kernfs_new_node+0x80/0xf0 [ 228.994564] kernfs_create_dir_ns+0x3d/0x140 [ 228.998989] sysfs_create_dir_ns+0xbe/0x1d0 [ 229.003326] kobject_add_internal+0x354/0xac0 [ 229.007840] ? kobj_ns_type_registered+0x60/0x60 [ 229.012610] ? lock_downgrade+0x8e0/0x8e0 [ 229.016771] ? refcount_add_not_zero+0x320/0x320 [ 229.021543] ? kasan_check_read+0x11/0x20 [ 229.025695] kobject_add+0x13a/0x190 [ 229.029415] ? kset_create_and_add+0x190/0x190 [ 229.034016] ? mutex_unlock+0xd/0x10 [ 229.037745] device_add+0x3a5/0x16d0 [ 229.041472] ? device_private_init+0x230/0x230 [ 229.046059] ? kfree+0x1e9/0x260 [ 229.049433] ? kfree_const+0x5e/0x70 [ 229.053157] device_create_groups_vargs+0x1ff/0x270 [ 229.058179] device_create_vargs+0x46/0x60 [ 229.062414] bdi_register_va.part.10+0xbb/0x9b0 [ 229.067067] ? cgwb_kill+0x630/0x630 [ 229.070766] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 229.076283] ? bdi_init+0x416/0x510 [ 229.079941] ? wb_init+0x9e0/0x9e0 [ 229.083463] ? bdi_alloc_node+0x67/0xe0 [ 229.087419] ? bdi_alloc_node+0x67/0xe0 [ 229.091374] ? rcu_read_lock_sched_held+0x108/0x120 [ 229.096373] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 229.101634] ? _raw_spin_unlock+0x22/0x30 [ 229.105776] bdi_register_va+0x68/0x80 [ 229.109658] super_setup_bdi_name+0x123/0x220 [ 229.114134] ? kill_block_super+0x100/0x100 [ 229.118437] ? kmem_cache_alloc_trace+0x616/0x780 [ 229.123262] ? match_wildcard+0x3c0/0x3c0 [ 229.127398] ? trace_hardirqs_on+0xd/0x10 [ 229.131542] fuse_fill_super+0xe6e/0x1e20 [ 229.135683] ? fuse_get_root_inode+0x190/0x190 [ 229.140256] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 229.145258] ? kasan_check_read+0x11/0x20 [ 229.149389] ? cap_capable+0x1f9/0x260 [ 229.153260] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 229.158779] ? security_capable+0x99/0xc0 [ 229.162917] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 229.168453] ? ns_capable_common+0x13f/0x170 [ 229.172869] ? get_anon_bdev+0x2f0/0x2f0 [ 229.176927] ? sget+0x113/0x150 [ 229.180189] ? fuse_get_root_inode+0x190/0x190 [ 229.184754] mount_nodev+0x6b/0x110 [ 229.188364] fuse_mount+0x2c/0x40 [ 229.191800] mount_fs+0xae/0x328 [ 229.195151] vfs_kern_mount.part.34+0xd4/0x4d0 [ 229.199723] ? may_umount+0xb0/0xb0 [ 229.203332] ? _raw_read_unlock+0x22/0x30 [ 229.207462] ? __get_fs_type+0x97/0xc0 [ 229.211345] do_mount+0x564/0x3070 [ 229.214889] ? do_raw_spin_unlock+0x9e/0x2e0 [ 229.219293] ? copy_mount_string+0x40/0x40 [ 229.223515] ? rcu_pm_notify+0xc0/0xc0 [ 229.227388] ? copy_mount_options+0x5f/0x380 [ 229.231777] ? rcu_read_lock_sched_held+0x108/0x120 [ 229.236778] ? kmem_cache_alloc_trace+0x616/0x780 [ 229.241605] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 229.247125] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 229.252644] ? copy_mount_options+0x285/0x380 [ 229.257126] ksys_mount+0x12d/0x140 [ 229.260737] __x64_sys_mount+0xbe/0x150 [ 229.264693] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 229.269709] do_syscall_64+0x1b1/0x800 [ 229.273591] ? finish_task_switch+0x1ca/0x810 [ 229.278086] ? syscall_return_slowpath+0x5c0/0x5c0 [ 229.283013] ? syscall_return_slowpath+0x30f/0x5c0 [ 229.287937] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 229.293287] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 229.298504] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 229.303674] RIP: 0033:0x455979 [ 229.306846] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 229.314538] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 229.321789] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 229.329046] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 229.336304] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 229.343561] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 [ 229.351050] kobject_add_internal failed for 0:44 (error: -12 parent: bdi) 2018/05/06 05:52:28 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0x0, 0x0, 'queue0\x00', 0x1ff}) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f0000000240)={0x2, 0x0, [{0x10000, 0xb8, &(0x7f0000000100)=""/184}, {0x3000, 0x75, &(0x7f00000001c0)=""/117}]}) close(r0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r1, 0x28, 0x6, &(0x7f0000000040), 0x10) 2018/05/06 05:52:28 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:28 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:28 executing program 7: syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0xfffffffffffffffe, 0x400) close(0xffffffffffffffff) 2018/05/06 05:52:28 executing program 6: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x1a000, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000040)=@int=0x3, 0x4) 2018/05/06 05:52:28 executing program 1 (fault-call:1 fault-nth:51): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:52:28 executing program 2: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0x0, 0x8, 'queue0\x00'}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x840, 0x0) ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000000040)) close(r0) 2018/05/06 05:52:28 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./c%ntrol\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) [ 229.841590] FAULT_INJECTION: forcing a failure. [ 229.841590] name failslab, interval 1, probability 0, space 0, times 0 [ 229.853344] CPU: 0 PID: 15903 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 229.860633] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 229.869998] Call Trace: [ 229.872607] dump_stack+0x1b9/0x294 [ 229.876254] ? dump_stack_print_info.cold.2+0x52/0x52 [ 229.881458] ? __save_stack_trace+0x7e/0xd0 [ 229.885796] should_fail.cold.4+0xa/0x1a [ 229.889875] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 229.894994] ? kasan_kmalloc+0xc4/0xe0 [ 229.898895] ? kasan_slab_alloc+0x12/0x20 [ 229.903053] ? kmem_cache_alloc+0x12e/0x760 [ 229.907384] ? radix_tree_node_alloc.constprop.19+0x1e6/0x310 [ 229.913295] ? idr_get_free+0x891/0x10a0 [ 229.917364] ? idr_alloc_u32+0x1f9/0x3d0 [ 229.921441] ? idr_alloc_cyclic+0x167/0x340 [ 229.925779] ? kernfs_new_node+0x80/0xf0 [ 229.929857] ? kernfs_create_dir_ns+0x3d/0x140 [ 229.934454] ? sysfs_create_dir_ns+0xbe/0x1d0 2018/05/06 05:52:28 executing program 7: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x9, 0x2000) 2018/05/06 05:52:28 executing program 6: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x200000, 0x0) 2018/05/06 05:52:28 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 229.938966] ? kobject_add_internal+0x354/0xac0 [ 229.943647] ? kobject_add+0x13a/0x190 [ 229.947546] ? device_add+0x3a5/0x16d0 [ 229.951625] ? device_create_groups_vargs+0x1ff/0x270 [ 229.956829] ? device_create_vargs+0x46/0x60 [ 229.961246] ? bdi_register_va.part.10+0xbb/0x9b0 [ 229.966095] ? bdi_register_va+0x68/0x80 [ 229.970168] ? super_setup_bdi_name+0x123/0x220 [ 229.974847] ? fuse_fill_super+0xe6e/0x1e20 [ 229.979181] ? mount_nodev+0x6b/0x110 [ 229.982995] ? fuse_mount+0x2c/0x40 [ 229.986632] ? mount_fs+0xae/0x328 2018/05/06 05:52:28 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 229.990181] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 229.994946] ? do_mount+0x564/0x3070 [ 229.998665] ? ksys_mount+0x12d/0x140 [ 230.002474] ? __x64_sys_mount+0xbe/0x150 [ 230.006637] ? do_syscall_64+0x1b1/0x800 [ 230.010708] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 230.016082] ? graph_lock+0x170/0x170 [ 230.019889] ? graph_lock+0x170/0x170 [ 230.023699] ? graph_lock+0x170/0x170 [ 230.027503] ? print_usage_bug+0xc0/0xc0 [ 230.031572] ? __lock_is_held+0xb5/0x140 [ 230.035640] __should_failslab+0x124/0x180 2018/05/06 05:52:28 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 230.039901] should_failslab+0x9/0x14 [ 230.043711] kmem_cache_alloc+0x47/0x760 [ 230.047782] ? radix_tree_node_alloc.constprop.19+0x1e6/0x310 [ 230.053673] radix_tree_node_alloc.constprop.19+0x1e6/0x310 [ 230.059397] idr_get_free+0x891/0x10a0 [ 230.063308] ? radix_tree_clear_tags+0xc0/0xc0 [ 230.067910] ? unwind_get_return_address+0x61/0xa0 [ 230.072858] ? __save_stack_trace+0x7e/0xd0 [ 230.077197] ? save_stack+0xa9/0xd0 [ 230.080837] ? save_stack+0x43/0xd0 [ 230.084473] ? kasan_kmalloc+0xc4/0xe0 [ 230.088448] ? kasan_slab_alloc+0x12/0x20 2018/05/06 05:52:28 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:28 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 230.092601] ? kmem_cache_alloc+0x12e/0x760 [ 230.096934] ? __kernfs_new_node+0xe7/0x580 [ 230.101371] ? kernfs_new_node+0x80/0xf0 [ 230.105443] ? kernfs_create_dir_ns+0x3d/0x140 [ 230.110036] ? sysfs_create_dir_ns+0xbe/0x1d0 [ 230.114540] ? kobject_add_internal+0x354/0xac0 [ 230.119211] ? kobject_add+0x13a/0x190 [ 230.123107] ? device_create_groups_vargs+0x1ff/0x270 [ 230.128301] ? device_create_vargs+0x46/0x60 [ 230.132721] ? bdi_register_va.part.10+0xbb/0x9b0 [ 230.137572] ? bdi_register_va+0x68/0x80 2018/05/06 05:52:28 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"627269646765300000000000000000ff", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 230.141640] ? super_setup_bdi_name+0x123/0x220 [ 230.146316] ? fuse_fill_super+0xe6e/0x1e20 [ 230.150647] ? mount_nodev+0x6b/0x110 [ 230.154452] ? mount_fs+0xae/0x328 [ 230.157996] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 230.162756] ? do_mount+0x564/0x3070 [ 230.166477] ? ksys_mount+0x12d/0x140 [ 230.170286] ? __x64_sys_mount+0xbe/0x150 [ 230.174441] ? do_syscall_64+0x1b1/0x800 [ 230.178512] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 230.183885] ? print_usage_bug+0xc0/0xc0 [ 230.187967] idr_alloc_u32+0x1f9/0x3d0 [ 230.191873] ? __fprop_inc_percpu_max+0x2c0/0x2c0 [ 230.196728] ? lock_acquire+0x1dc/0x520 [ 230.200709] ? __kernfs_new_node+0x10e/0x580 [ 230.205128] ? __lock_is_held+0xb5/0x140 [ 230.209227] idr_alloc_cyclic+0x167/0x340 [ 230.214167] ? idr_alloc+0x1a0/0x1a0 [ 230.217893] ? kasan_check_write+0x14/0x20 [ 230.222137] ? do_raw_spin_lock+0xc1/0x200 [ 230.226378] __kernfs_new_node+0x1a3/0x580 [ 230.230629] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 230.235401] ? lock_downgrade+0x8e0/0x8e0 [ 230.239568] kernfs_new_node+0x80/0xf0 [ 230.243467] kernfs_create_dir_ns+0x3d/0x140 [ 230.247890] sysfs_create_dir_ns+0xbe/0x1d0 [ 230.252228] kobject_add_internal+0x354/0xac0 [ 230.256737] ? kobj_ns_type_registered+0x60/0x60 [ 230.261507] ? lock_downgrade+0x8e0/0x8e0 [ 230.265667] ? refcount_add_not_zero+0x320/0x320 [ 230.270430] ? kasan_check_read+0x11/0x20 [ 230.274585] kobject_add+0x13a/0x190 [ 230.278290] ? kset_create_and_add+0x190/0x190 [ 230.282873] ? mutex_unlock+0xd/0x10 [ 230.286574] device_add+0x3a5/0x16d0 [ 230.290277] ? device_private_init+0x230/0x230 [ 230.294855] ? kfree+0x1e9/0x260 [ 230.298223] ? kfree_const+0x5e/0x70 [ 230.301930] device_create_groups_vargs+0x1ff/0x270 [ 230.306936] device_create_vargs+0x46/0x60 [ 230.311174] bdi_register_va.part.10+0xbb/0x9b0 [ 230.315839] ? cgwb_kill+0x630/0x630 [ 230.319544] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 230.325070] ? bdi_init+0x416/0x510 [ 230.328705] ? wb_init+0x9e0/0x9e0 [ 230.332249] ? bdi_alloc_node+0x67/0xe0 [ 230.336205] ? bdi_alloc_node+0x67/0xe0 [ 230.340163] ? rcu_read_lock_sched_held+0x108/0x120 [ 230.345173] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 230.350448] ? _raw_spin_unlock+0x22/0x30 [ 230.354936] bdi_register_va+0x68/0x80 [ 230.358824] super_setup_bdi_name+0x123/0x220 [ 230.363306] ? kill_block_super+0x100/0x100 [ 230.367625] ? kmem_cache_alloc_trace+0x616/0x780 [ 230.372465] ? match_wildcard+0x3c0/0x3c0 [ 230.376610] ? trace_hardirqs_on+0xd/0x10 [ 230.380771] fuse_fill_super+0xe6e/0x1e20 [ 230.384923] ? fuse_get_root_inode+0x190/0x190 [ 230.389494] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 230.394507] ? kasan_check_read+0x11/0x20 [ 230.398643] ? cap_capable+0x1f9/0x260 [ 230.402530] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 230.408070] ? security_capable+0x99/0xc0 [ 230.412239] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 230.417773] ? ns_capable_common+0x13f/0x170 [ 230.422169] ? get_anon_bdev+0x2f0/0x2f0 [ 230.426214] ? sget+0x113/0x150 [ 230.429479] ? fuse_get_root_inode+0x190/0x190 [ 230.434054] mount_nodev+0x6b/0x110 [ 230.437675] fuse_mount+0x2c/0x40 [ 230.441114] mount_fs+0xae/0x328 [ 230.444468] vfs_kern_mount.part.34+0xd4/0x4d0 [ 230.449044] ? may_umount+0xb0/0xb0 [ 230.452668] ? _raw_read_unlock+0x22/0x30 [ 230.456797] ? __get_fs_type+0x97/0xc0 [ 230.460672] do_mount+0x564/0x3070 [ 230.464212] ? copy_mount_string+0x40/0x40 [ 230.468442] ? rcu_pm_notify+0xc0/0xc0 [ 230.472318] ? copy_mount_options+0x5f/0x380 [ 230.476710] ? rcu_read_lock_sched_held+0x108/0x120 [ 230.481717] ? kmem_cache_alloc_trace+0x616/0x780 [ 230.486557] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 230.492079] ? _copy_from_user+0xdf/0x150 [ 230.496222] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 230.501756] ? copy_mount_options+0x285/0x380 [ 230.506259] ksys_mount+0x12d/0x140 [ 230.509881] __x64_sys_mount+0xbe/0x150 [ 230.513845] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 230.518854] do_syscall_64+0x1b1/0x800 [ 230.522733] ? finish_task_switch+0x1ca/0x810 [ 230.527213] ? syscall_return_slowpath+0x5c0/0x5c0 [ 230.532141] ? syscall_return_slowpath+0x30f/0x5c0 [ 230.537075] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 230.542424] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 230.547267] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 230.552446] RIP: 0033:0x455979 [ 230.555618] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 230.563307] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 230.570566] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 230.577826] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 230.585085] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 230.592346] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 2018/05/06 05:52:29 executing program 7: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x80000, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=0x0) ioctl$SG_GET_RESERVED_SIZE(r0, 0x2272, &(0x7f00000000c0)) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x4000000040, 0x6, 0x7f, 0x3, 0x8, r1}) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) 2018/05/06 05:52:29 executing program 3: r0 = memfd_create(&(0x7f0000000040)='/dev/sg#\x00', 0x3) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000100)={0x0, [0x8, 0x1, 0x7, 0x5e6]}, &(0x7f0000000140)=0xc) r1 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8917, &(0x7f0000000000)={'veth1_to_bond\x00', {0x2, 0x4e24}}) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0x0, 0x0, 'queue0\x00', 0x1ff}) r2 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r2) 2018/05/06 05:52:29 executing program 6: socketpair$ax25(0x3, 0x7, 0xff, &(0x7f00000000c0)={0xffffffffffffffff}) bind$ax25(r0, &(0x7f0000000100)={0x3, {"7ab1a52be89287"}}, 0x10) r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)=0x0) fcntl$setownex(r1, 0xf, &(0x7f0000000140)={0x2, r2}) close(r1) 2018/05/06 05:52:29 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x401, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000440)={0x0, @in6={{0xa, 0x4e20, 0x7, @empty, 0x1}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000240)={r1, 0x9}, 0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000040)={0x0, 0xea}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000600), &(0x7f0000000640)=0x4) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000180)={r2}, &(0x7f00000001c0)=0x8) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffef6) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0x0, 0x8, 'queue0\x00'}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r3 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x4, 0x0) sendmsg$key(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000500)={0x2, 0xe, 0x6, 0x5, 0x1f, 0x0, 0x70bd28, 0x25dfdbfd, [@sadb_ident={0x2, 0xa, 0x1, 0x0, 0x1}, @sadb_ident={0x2, 0xb, 0x8001, 0x0, 0x2}, @sadb_sa={0x2, 0x1, 0x4d2, 0x0, 0x4, 0x6c, 0x1, 0x20000000}, @sadb_key={0x14, 0x9, 0x4a0, 0x0, "bca324216081f9c051ecf5e316093799eee38fdba4079279d307eaaec7bb6fac94dcdd741481ffe818bff827101318c30523ae9f623253b55432755cfa4dcd1a0d9ef2cb86e317acb6f302c1831c1edaa6b38b54b3509529f2c4311ebd1aff47b823456a66174dfa5400aebf35a3cb5324993e41f81f942f54ddc0774dfbc66224d7d0bc539dc5ad6080867d1ecae520f591e360"}, @sadb_x_nat_t_type={0x1, 0x14, 0x3f}, @sadb_sa={0x2, 0x1, 0x4d6, 0x3f, 0xfa55, 0x29, 0x4, 0x20000000}]}, 0xf8}, 0x1}, 0x20000801) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r3) 2018/05/06 05:52:29 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"627269646765300000000000000000ff", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:29 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:29 executing program 1 (fault-call:1 fault-nth:52): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:52:29 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./cdntrol\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) [ 231.043954] FAULT_INJECTION: forcing a failure. [ 231.043954] name failslab, interval 1, probability 0, space 0, times 0 [ 231.055253] CPU: 0 PID: 15963 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 231.062536] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 231.071895] Call Trace: [ 231.074502] dump_stack+0x1b9/0x294 [ 231.078149] ? dump_stack_print_info.cold.2+0x52/0x52 [ 231.083352] ? __lock_acquire+0x7f5/0x5140 [ 231.087602] should_fail.cold.4+0xa/0x1a 2018/05/06 05:52:29 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)="2e2f66696c653003", &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) [ 231.091688] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 231.096815] ? graph_lock+0x170/0x170 [ 231.100636] ? kasan_check_write+0x14/0x20 [ 231.104892] ? find_held_lock+0x36/0x1c0 [ 231.108968] ? __lock_is_held+0xb5/0x140 [ 231.113053] ? check_same_owner+0x320/0x320 [ 231.117387] ? rcu_note_context_switch+0x710/0x710 [ 231.122336] __should_failslab+0x124/0x180 [ 231.126584] should_failslab+0x9/0x14 [ 231.130395] kmem_cache_alloc+0x2af/0x760 [ 231.135203] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 231.140748] ? graph_lock+0x170/0x170 2018/05/06 05:52:29 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0xeb0c0fdee7df829e) close(0xffffffffffffffff) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x80000, 0x0) r2 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x5, 0x6, 0x100000000, 0x1, "67edbcd77bbc578822306a9b73978a374cc9f580227d1024a012bab9f00a0b71337c44b53e1290dc4ed67497", 0x39}, 0x0, 0x0, 0x0, r2, 0x10000, 0x1000, "f41ca7943ec44e98cb1b78c4126c34edb731a97e40911ee982207bd0c3050db2ce0f763d3a48fad92ba7979a77c67827903878e4a04f083be3030b3f46b784e9", &(0x7f0000000100)='\x00', 0x1, [], [0x80000001, 0x4, 0x0, 0xfffffffffffffffb]}) splice(r0, &(0x7f0000000040), r0, &(0x7f0000000080), 0x7fffffff, 0x4) 2018/05/06 05:52:29 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 231.144560] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 231.149588] __kernfs_new_node+0xe7/0x580 [ 231.153746] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 231.158511] ? find_held_lock+0x36/0x1c0 [ 231.162590] ? lock_downgrade+0x8e0/0x8e0 [ 231.166755] kernfs_new_node+0x80/0xf0 [ 231.170660] __kernfs_create_file+0x4d/0x330 [ 231.175082] sysfs_add_file_mode_ns+0x21a/0x560 [ 231.179771] sysfs_create_file_ns+0x8b/0xb0 [ 231.184169] device_create_file+0xf4/0x1e0 [ 231.188413] ? acpi_bind_one+0x8f0/0x8f0 [ 231.192484] device_add+0x3ec/0x16d0 [ 231.196216] ? device_private_init+0x230/0x230 [ 231.200832] ? kfree+0x1e9/0x260 [ 231.204232] ? kfree_const+0x5e/0x70 [ 231.207959] device_create_groups_vargs+0x1ff/0x270 [ 231.212991] device_create_vargs+0x46/0x60 [ 231.217236] bdi_register_va.part.10+0xbb/0x9b0 [ 231.221912] ? cgwb_kill+0x630/0x630 [ 231.225634] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 231.231172] ? bdi_init+0x416/0x510 [ 231.234805] ? wb_init+0x9e0/0x9e0 [ 231.238360] ? bdi_alloc_node+0x67/0xe0 2018/05/06 05:52:29 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:52:29 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 231.242339] ? bdi_alloc_node+0x67/0xe0 [ 231.246320] ? rcu_read_lock_sched_held+0x108/0x120 [ 231.251340] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 231.256629] ? _raw_spin_unlock+0x22/0x30 [ 231.260784] bdi_register_va+0x68/0x80 [ 231.264683] super_setup_bdi_name+0x123/0x220 [ 231.269181] ? kill_block_super+0x100/0x100 [ 231.273508] ? kmem_cache_alloc_trace+0x616/0x780 [ 231.278364] ? match_wildcard+0x3c0/0x3c0 [ 231.282517] ? trace_hardirqs_on+0xd/0x10 [ 231.286678] fuse_fill_super+0xe6e/0x1e20 [ 231.290845] ? fuse_get_root_inode+0x190/0x190 [ 231.295436] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 231.300946] ? kasan_check_read+0x11/0x20 [ 231.305106] ? cap_capable+0x1f9/0x260 [ 231.309001] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 231.314545] ? security_capable+0x99/0xc0 [ 231.318703] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 231.324243] ? ns_capable_common+0x13f/0x170 [ 231.328654] ? get_anon_bdev+0x2f0/0x2f0 [ 231.332721] ? sget+0x113/0x150 [ 231.336007] ? fuse_get_root_inode+0x190/0x190 [ 231.340594] mount_nodev+0x6b/0x110 2018/05/06 05:52:29 executing program 2: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x4, 0x0, 0x8, 'queue0\x00', 0x5c}) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vga_arbiter\x00', 0x101003, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000140)) syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x101000) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000100)='#procprocsystem\x00', 0xfffffffffffffffb) keyctl$clear(0x7, r1) close(0xffffffffffffffff) r2 = syz_open_dev$dspn(&(0x7f0000000340)='/dev/dsp#\x00', 0x10000, 0x50080) write$cgroup_int(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="e4faa23c2f"], 0x5) r3 = memfd_create(&(0x7f0000000240)='ppp1\x00', 0x2) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000280)={0x28e6, 0x0, {0x0, 0x0, 0x0, 0x1, 0x29e5b4be}}) connect$pppoe(r0, &(0x7f00000004c0)={0x18, 0x0, {0x0, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 'erspan0\x00'}}, 0x1e) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0286404, &(0x7f0000000300)={&(0x7f0000fff000/0x1000)=nil, 0x7, 0x3, 0x80, &(0x7f0000ffd000/0x3000)=nil, 0x2}) r4 = memfd_create(&(0x7f0000000080)='/dev/sg#\x00', 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000180)={{0x4}, 'port1\x00', 0x80, 0x30000, 0x1f, 0xd1, 0x3, 0x8001, 0x5, 0x0, 0x6, 0x3}) ioctl$TIOCLINUX6(r2, 0x541c, &(0x7f0000000500)={0x6, 0x80000000}) 2018/05/06 05:52:29 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"6272696467653000000000000000000f", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 231.344225] fuse_mount+0x2c/0x40 [ 231.347690] mount_fs+0xae/0x328 [ 231.351067] vfs_kern_mount.part.34+0xd4/0x4d0 [ 231.355654] ? may_umount+0xb0/0xb0 [ 231.359285] ? _raw_read_unlock+0x22/0x30 [ 231.363434] ? __get_fs_type+0x97/0xc0 [ 231.367442] do_mount+0x564/0x3070 [ 231.370991] ? copy_mount_string+0x40/0x40 [ 231.375227] ? rcu_pm_notify+0xc0/0xc0 [ 231.379123] ? copy_mount_options+0x5f/0x380 [ 231.383536] ? rcu_read_lock_sched_held+0x108/0x120 [ 231.388561] ? kmem_cache_alloc_trace+0x616/0x780 2018/05/06 05:52:29 executing program 2: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x80000001, 0xfffffffffffffffe, 0x8, 'queue0\x00'}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) [ 231.393421] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 231.398959] ? copy_mount_options+0x285/0x380 [ 231.403458] ksys_mount+0x12d/0x140 [ 231.407088] __x64_sys_mount+0xbe/0x150 [ 231.411064] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 231.416091] do_syscall_64+0x1b1/0x800 [ 231.420003] ? finish_task_switch+0x1ca/0x810 [ 231.424506] ? syscall_return_slowpath+0x5c0/0x5c0 [ 231.429449] ? syscall_return_slowpath+0x30f/0x5c0 [ 231.434385] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 231.439757] ? trace_hardirqs_off_thunk+0x1a/0x1c 2018/05/06 05:52:29 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 231.444610] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 231.449798] RIP: 0033:0x455979 [ 231.452988] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 231.460711] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 231.467986] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 231.475259] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 231.482527] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 231.489798] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 2018/05/06 05:52:30 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)="2e2f66696c653006", &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:30 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./csntrol\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:52:30 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0x0, 0x0, 'queue0\x00', 0x1ff}) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000000)) 2018/05/06 05:52:30 executing program 6: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) r1 = dup3(r0, r0, 0x80000) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0)=@assoc_id=0x0, &(0x7f0000000100)=0x4) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000200)={r2, 0xa4, &(0x7f0000000140)=[@in={0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x17}}, @in6={0xa, 0x4e24, 0x9, @mcast2={0xff, 0x2, [], 0x1}, 0x6}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x2}, @in={0x2, 0x4e24, @multicast2=0xe0000002}, @in={0x2, 0x4e23, @multicast2=0xe0000002}, @in={0x2, 0x4e20, @rand_addr=0x10000}, @in6={0xa, 0x4e24, 0x3ff, @mcast1={0xff, 0x1, [], 0x1}, 0x40}]}, &(0x7f0000000240)=0x10) r3 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x800, 0x20000) ioctl$BLKDISCARD(r3, 0x1277, &(0x7f0000000040)=0x100000000) 2018/05/06 05:52:30 executing program 2: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0x0, 0x8, 'queue0\x00'}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) socketpair(0x10, 0x7, 0xad6, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000180)="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") syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:52:30 executing program 7: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x4000) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000040)) 2018/05/06 05:52:30 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:30 executing program 1 (fault-call:1 fault-nth:53): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) [ 232.439962] FAULT_INJECTION: forcing a failure. [ 232.439962] name failslab, interval 1, probability 0, space 0, times 0 [ 232.451383] CPU: 1 PID: 16035 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 232.458668] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 232.468032] Call Trace: [ 232.470728] dump_stack+0x1b9/0x294 [ 232.474377] ? dump_stack_print_info.cold.2+0x52/0x52 [ 232.479586] should_fail.cold.4+0xa/0x1a [ 232.483661] ? __kmalloc_track_caller+0x14a/0x760 2018/05/06 05:52:30 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"627269646765300000000000000000ff", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:30 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={"62726964676530000000000000000003", &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 232.488521] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 232.493637] ? device_create_groups_vargs+0x1ff/0x270 [ 232.498837] ? device_create_vargs+0x46/0x60 [ 232.503264] ? bdi_register_va.part.10+0xbb/0x9b0 [ 232.508112] ? bdi_register_va+0x68/0x80 [ 232.512180] ? super_setup_bdi_name+0x123/0x220 [ 232.516857] ? fuse_fill_super+0xe6e/0x1e20 [ 232.521187] ? mount_nodev+0x6b/0x110 [ 232.525000] ? graph_lock+0x170/0x170 [ 232.528899] ? ksys_mount+0x12d/0x140 [ 232.532716] ? __x64_sys_mount+0xbe/0x150 2018/05/06 05:52:30 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) 2018/05/06 05:52:30 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 232.536877] ? do_syscall_64+0x1b1/0x800 [ 232.540950] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 232.546332] ? find_held_lock+0x36/0x1c0 [ 232.550410] ? __lock_is_held+0xb5/0x140 [ 232.554504] ? check_same_owner+0x320/0x320 [ 232.558843] ? rcu_note_context_switch+0x710/0x710 [ 232.563788] ? rcu_read_lock_sched_held+0x108/0x120 [ 232.568823] __should_failslab+0x124/0x180 [ 232.573075] should_failslab+0x9/0x14 [ 232.576885] kmem_cache_alloc+0x2af/0x760 [ 232.581037] ? memcpy+0x45/0x50 [ 232.584331] ? kstrdup+0x59/0x70 2018/05/06 05:52:31 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf}}) [ 232.587714] __kernfs_new_node+0xe7/0x580 [ 232.591876] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 232.596645] ? lock_downgrade+0x8e0/0x8e0 [ 232.600814] ? kasan_check_read+0x11/0x20 [ 232.604993] ? do_raw_spin_unlock+0x9e/0x2e0 [ 232.609415] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 232.614007] kernfs_new_node+0x80/0xf0 [ 232.617902] kernfs_create_link+0x33/0x180 [ 232.622147] sysfs_do_create_link_sd.isra.2+0x90/0x130 [ 232.627434] sysfs_create_link+0x65/0xc0 [ 232.631499] device_add+0x7a0/0x16d0 [ 232.635223] ? device_private_init+0x230/0x230 2018/05/06 05:52:31 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0x4}}) [ 232.639812] ? kfree+0x1e9/0x260 [ 232.643194] ? kfree_const+0x5e/0x70 [ 232.646922] device_create_groups_vargs+0x1ff/0x270 [ 232.651949] device_create_vargs+0x46/0x60 [ 232.656196] bdi_register_va.part.10+0xbb/0x9b0 [ 232.660889] ? cgwb_kill+0x630/0x630 [ 232.664619] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 232.670165] ? bdi_init+0x416/0x510 [ 232.673797] ? wb_init+0x9e0/0x9e0 [ 232.677347] ? bdi_alloc_node+0x67/0xe0 [ 232.681326] ? bdi_alloc_node+0x67/0xe0 [ 232.685304] ? rcu_read_lock_sched_held+0x108/0x120 2018/05/06 05:52:31 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)="2e2f66696c6530e0", &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) [ 232.690323] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 232.695610] ? _raw_spin_unlock+0x22/0x30 [ 232.699767] bdi_register_va+0x68/0x80 [ 232.703660] super_setup_bdi_name+0x123/0x220 [ 232.708164] ? kill_block_super+0x100/0x100 [ 232.712493] ? kmem_cache_alloc_trace+0x616/0x780 [ 232.717345] ? match_wildcard+0x3c0/0x3c0 [ 232.721498] ? trace_hardirqs_on+0xd/0x10 [ 232.725661] fuse_fill_super+0xe6e/0x1e20 [ 232.729819] ? fuse_get_root_inode+0x190/0x190 [ 232.734408] ? __alloc_pages_slowpath+0x2db0/0x2db0 2018/05/06 05:52:31 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) [ 232.739434] ? kasan_check_read+0x11/0x20 [ 232.743679] ? cap_capable+0x1f9/0x260 [ 232.747594] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 232.753137] ? security_capable+0x99/0xc0 [ 232.757292] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 232.762830] ? ns_capable_common+0x13f/0x170 [ 232.767247] ? get_anon_bdev+0x2f0/0x2f0 [ 232.771311] ? sget+0x113/0x150 [ 232.774601] ? fuse_get_root_inode+0x190/0x190 [ 232.779190] mount_nodev+0x6b/0x110 [ 232.782840] fuse_mount+0x2c/0x40 [ 232.786297] mount_fs+0xae/0x328 2018/05/06 05:52:31 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0x6}}) [ 232.789674] vfs_kern_mount.part.34+0xd4/0x4d0 [ 232.794263] ? may_umount+0xb0/0xb0 [ 232.797896] ? _raw_read_unlock+0x22/0x30 [ 232.802044] ? __get_fs_type+0x97/0xc0 [ 232.805938] do_mount+0x564/0x3070 [ 232.809489] ? copy_mount_string+0x40/0x40 [ 232.813723] ? rcu_pm_notify+0xc0/0xc0 [ 232.817620] ? copy_mount_options+0x5f/0x380 [ 232.822060] ? rcu_read_lock_sched_held+0x108/0x120 [ 232.827084] ? kmem_cache_alloc_trace+0x616/0x780 [ 232.831936] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 232.837481] ? _copy_from_user+0xdf/0x150 [ 232.841640] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 232.847183] ? copy_mount_options+0x285/0x380 [ 232.851695] ksys_mount+0x12d/0x140 [ 232.855326] __x64_sys_mount+0xbe/0x150 [ 232.859304] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 232.864321] do_syscall_64+0x1b1/0x800 [ 232.868224] ? finish_task_switch+0x1ca/0x810 [ 232.872727] ? syscall_return_slowpath+0x5c0/0x5c0 [ 232.877665] ? syscall_return_slowpath+0x30f/0x5c0 [ 232.882636] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 232.888010] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 232.892856] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 232.898036] RIP: 0033:0x455979 [ 232.901226] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 232.908938] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 232.916200] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 232.923458] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 232.930714] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 232.937974] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 2018/05/06 05:52:31 executing program 1 (fault-call:1 fault-nth:54): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:52:31 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)="2e2f66696c65300f", &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:31 executing program 7: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) munlockall() 2018/05/06 05:52:31 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./cuntrol\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:52:31 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000200)='/dev/dsp#\x00', 0x4, 0x40000) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000280)) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0x0, 0x0, 'queue0\x00', 0x1ff}) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f0000000100)={{0x1, 0x2}, 'port1\x00', 0x1, 0x1400, 0xf05, 0x8, 0xce1b, 0xf3c8, 0x1f, 0x0, 0x4, 0x400}) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) openat$cgroup_procs(r2, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) setsockopt$inet6_tcp_buf(r2, 0x6, 0x0, &(0x7f0000000040)="158ebd6e67aa4455daea136dc9b518619a65e74a3144d7051437ae04c6208df52ee42bfc10f43e776114f33871784a", 0x2f) close(r1) 2018/05/06 05:52:31 executing program 2: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0x0, 0x8, 'queue0\x00'}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_S390_UCAS_MAP(r0, 0x4018ae50, &(0x7f0000000000)={0x40, 0x7fffffff, 0x6}) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/21, 0x15, 0x3a) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r1) 2018/05/06 05:52:31 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0x9}}) 2018/05/06 05:52:31 executing program 6: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001d80)={'gre0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000001dc0)={'team0\x00', r1}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/if_inet6\x00') ioctl$KVM_GET_MSR_INDEX_LIST(r2, 0xc004ae02, &(0x7f00000001c0)=ANY=[@ANYBLOB="070000000000000000000100000000000000000000000000000000000000003a15d26aaf188b347a4de2ddc07bb739fb41e053c6fecd8ad456060000001b5b73da3c06b6aebc2d5af5a105b1dcf53951d053f9b1b630a7b8cf2827c3ae102a4a3687de07d1ca6bb8ea1e538fda8cf91dae93a167562d0000000441ba12e0d6879500000000000000000000000000357677949b"]) sendmsg(r2, &(0x7f0000001880)={&(0x7f00000000c0)=@sco={0x1f, {0x5, 0x8, 0x3ff, 0x6, 0x1ff, 0xffff}}, 0x80, &(0x7f0000001700)=[{&(0x7f0000000040)="2a63875ec9c513e4a2ecad3d", 0xc}, {&(0x7f0000000280)="2b2a3fdbfe4e784894600a63f902dd60a9772c65a9ea8dea064a25c86176758b8056436c4f66d0999d9069710ceae28abf0ac42afaa424c8ee9c00229d8c2a790d7ff9efd86529f3d866e482a28a7d31bc447882b7583ae6d74ea2ccef8dabef562be6f4eb2104fdbf9072e9dc4522c921f8c1c5e593d95a0980e1946db2bf2933890d932d4341604d8d541c9ed86d7848ee3afddd02137ac4346da2a567b91482f4b5913758cc", 0xa7}, {&(0x7f0000000340)="969dd24b79fdd6c442b50dfe60e7cc9547e77c141455d71f1d6f7d767e97e671b993196a46902e9da01becb08122269c98b85158f5dde61f22f6a3cdac1104112f75c7b33cb61e709dbd3072e5616426c9da9c35c4619b189054685bc783002ca702b2f4b30c1d4863fbb297abf7ddc64c91b8d0b828889d8c87c9b5fbfc28776b155d3e520254b9a85dc11c32bb4a8df82888ee217e966caa745ad9f44648eb214ff8234356abb41988aab2bc2b6a90623c13b1e67c5a53eba8d161c7a7081285615f2bb6908e6d5ae4a4bbaee798a71d543b4c181e5f0437cb", 0xda}, {&(0x7f0000000440)="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", 0x1000}, {&(0x7f0000000140)="99f9", 0x2}, {&(0x7f0000001440)="b36fe24da7d933c0a9ae8a6419c7d88cc61bd3e5b22302f854651e88c3613678b8bf2734b205acfcdd3a32fa3a5fd71ea5163f6c556ffaa0330e33f7809220e18872ee8949090eebebf93412c51041e74a85c8a6f2e1d586c6a7f8f6b1a3755eb4d325147e525c0d375e8307bc450c62d52b4dbc0fe1386e75bfa3e5e8603ece2fa78f1b7651c24e5055c33e97d6fc", 0x8f}, {&(0x7f0000001500)="ce9953998fe0cc5547704419f097bcb210019622304e94f14fd16457b7ba2f20acc1bc59012abeeaf6ec841eba6e237df5ee4ae3f666baf833f5b5791f9492a7dac45ec7b54db52c59a672e8fa524776a04b40c51bb4a21b27befe38f6d1be86cad873cb018276f6a5d7b080c615ff2ab14c0a44c6534783283e00a88331ebf1140756287a7d97f9c450d0f844485503fd2953fc05b5b32a974e6f43218f", 0x9e}, {&(0x7f0000000180)="b461d172a5edd36dcbc438ccc5b5816a06385f71d1aa2088d9f1aaffde3e", 0x1e}, {&(0x7f00000015c0)="5f53d9dfa41794a34a099773ff6ca1137fd3c971f3e52cf8c6d5e5dfb22cb429763a35dafbbd9a10f70a1c0fa3bd2578bf1c7495a04911b9290196f2eb73031af31694554b6747770a63514064db18dd8960b2f88bb51e5024b53a060d24e803c74ba34e1ecc3cc1e2007f22116e5a83580d9cf2a1a18db7ac0bc6e8ac8bbf98135138eb682d2ce889ea48ff3e10be850dd819787a7826b6b7b84058086244e0fc9180df8a38e24dcabcb94eae8984a3a1fd78450488b218f2cb69f462b29cb8e58a46193ef39c3641e728b81c181d01bb9a120fafb5cc3b412d44e78200354cad34", 0xe2}, {&(0x7f00000016c0)="425babe644f58279172dbbf10de607a6bb86a788a2ca8ca42ea03e39be4a22a95c1f24", 0x23}], 0xa, &(0x7f00000017c0)=[{0x48, 0x19f, 0xfffffffeffffffff, "bce66485ec73eb3991174e9946152ae57450aaec3a86f79ad543f2447ce7c2633bb72c71e490407c20ed21822912cdfb75087c"}, {0x40, 0x10a, 0x6, "61824c269da62f5393cd117bc5491b67de7c6cd9bb28dcc9f5ab2c049b44e9bcc52e744385d0151d7e"}], 0x88, 0x40}, 0x8000) close(0xffffffffffffffff) [ 233.548611] FAULT_INJECTION: forcing a failure. [ 233.548611] name failslab, interval 1, probability 0, space 0, times 0 [ 233.560066] CPU: 0 PID: 16106 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 233.567359] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 233.576725] Call Trace: [ 233.579333] dump_stack+0x1b9/0x294 [ 233.582982] ? dump_stack_print_info.cold.2+0x52/0x52 [ 233.588192] ? lock_release+0xa10/0xa10 [ 233.592186] ? check_same_owner+0x320/0x320 2018/05/06 05:52:32 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) [ 233.596529] should_fail.cold.4+0xa/0x1a [ 233.600621] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 233.605756] ? kasan_check_write+0x14/0x20 [ 233.610008] ? __mutex_lock+0x7d9/0x17f0 [ 233.614081] ? graph_lock+0x170/0x170 [ 233.617896] ? find_held_lock+0x36/0x1c0 [ 233.621973] ? __lock_is_held+0xb5/0x140 [ 233.626074] ? check_same_owner+0x320/0x320 [ 233.630406] ? find_held_lock+0x36/0x1c0 [ 233.634484] ? rcu_note_context_switch+0x710/0x710 [ 233.639437] __should_failslab+0x124/0x180 [ 233.643691] should_failslab+0x9/0x14 2018/05/06 05:52:32 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) [ 233.647509] kmem_cache_alloc+0x2af/0x760 [ 233.651682] ? kasan_check_write+0x14/0x20 [ 233.655929] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 233.660870] ? lock_downgrade+0x8e0/0x8e0 [ 233.665033] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 233.670069] __kernfs_new_node+0xe7/0x580 [ 233.674232] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 233.679000] ? kasan_check_write+0x14/0x20 [ 233.683249] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 233.688194] ? __lock_is_held+0xb5/0x140 [ 233.692269] ? wait_for_completion+0x870/0x870 [ 233.696877] kernfs_new_node+0x80/0xf0 [ 233.700779] __kernfs_create_file+0x4d/0x330 [ 233.705205] sysfs_add_file_mode_ns+0x21a/0x560 [ 233.709895] internal_create_group+0x282/0x970 [ 233.714511] sysfs_create_groups+0x9b/0x150 [ 233.718851] device_add+0x84d/0x16d0 [ 233.722582] ? device_private_init+0x230/0x230 [ 233.727170] ? kfree+0x1e9/0x260 [ 233.730549] ? kfree_const+0x5e/0x70 [ 233.734274] device_create_groups_vargs+0x1ff/0x270 [ 233.739301] device_create_vargs+0x46/0x60 [ 233.743570] bdi_register_va.part.10+0xbb/0x9b0 2018/05/06 05:52:32 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)="2e2f66696c6530e0", &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) [ 233.748244] ? cgwb_kill+0x630/0x630 [ 233.751970] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 233.757516] ? bdi_init+0x416/0x510 [ 233.761150] ? wb_init+0x9e0/0x9e0 [ 233.764703] ? bdi_alloc_node+0x67/0xe0 [ 233.768685] ? bdi_alloc_node+0x67/0xe0 [ 233.772671] ? rcu_read_lock_sched_held+0x108/0x120 [ 233.777701] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 233.783011] ? _raw_spin_unlock+0x22/0x30 [ 233.787177] bdi_register_va+0x68/0x80 [ 233.791077] super_setup_bdi_name+0x123/0x220 [ 233.795584] ? kill_block_super+0x100/0x100 2018/05/06 05:52:32 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) [ 233.799920] ? kmem_cache_alloc_trace+0x616/0x780 [ 233.804773] ? match_wildcard+0x3c0/0x3c0 [ 233.808926] ? trace_hardirqs_on+0xd/0x10 [ 233.813085] fuse_fill_super+0xe6e/0x1e20 [ 233.817241] ? fuse_get_root_inode+0x190/0x190 [ 233.821835] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 233.826862] ? kasan_check_read+0x11/0x20 [ 233.831023] ? cap_capable+0x1f9/0x260 [ 233.834925] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 233.840472] ? security_capable+0x99/0xc0 [ 233.844644] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 2018/05/06 05:52:32 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) [ 233.850194] ? ns_capable_common+0x13f/0x170 [ 233.854616] ? get_anon_bdev+0x2f0/0x2f0 [ 233.858689] ? sget+0x113/0x150 [ 233.861979] ? fuse_get_root_inode+0x190/0x190 [ 233.866575] mount_nodev+0x6b/0x110 [ 233.870209] fuse_mount+0x2c/0x40 [ 233.873668] mount_fs+0xae/0x328 [ 233.877043] vfs_kern_mount.part.34+0xd4/0x4d0 [ 233.881635] ? may_umount+0xb0/0xb0 [ 233.885266] ? _raw_read_unlock+0x22/0x30 [ 233.889509] ? __get_fs_type+0x97/0xc0 [ 233.893405] do_mount+0x564/0x3070 [ 233.896952] ? copy_mount_string+0x40/0x40 [ 233.901189] ? rcu_pm_notify+0xc0/0xc0 [ 233.905088] ? copy_mount_options+0x5f/0x380 [ 233.909505] ? rcu_read_lock_sched_held+0x108/0x120 [ 233.914528] ? kmem_cache_alloc_trace+0x616/0x780 [ 233.919381] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 233.924922] ? _copy_from_user+0xdf/0x150 [ 233.929079] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 233.934660] ? copy_mount_options+0x285/0x380 [ 233.939169] ksys_mount+0x12d/0x140 [ 233.942803] __x64_sys_mount+0xbe/0x150 2018/05/06 05:52:32 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) [ 233.946783] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 233.951808] do_syscall_64+0x1b1/0x800 [ 233.955705] ? finish_task_switch+0x1ca/0x810 [ 233.960207] ? syscall_return_slowpath+0x5c0/0x5c0 [ 233.965148] ? syscall_return_slowpath+0x30f/0x5c0 [ 233.970088] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 233.975461] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 233.980316] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 233.985515] RIP: 0033:0x455979 [ 233.988711] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/05/06 05:52:32 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:32 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xd}}) 2018/05/06 05:52:32 executing program 1 (fault-call:1 fault-nth:55): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) [ 233.996428] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 234.003700] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 234.010970] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 234.018240] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 234.025514] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 2018/05/06 05:52:32 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0x5}}) [ 234.118284] FAULT_INJECTION: forcing a failure. [ 234.118284] name failslab, interval 1, probability 0, space 0, times 0 [ 234.129655] CPU: 0 PID: 16169 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 234.136938] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 234.146301] Call Trace: [ 234.148896] dump_stack+0x1b9/0x294 [ 234.152531] ? dump_stack_print_info.cold.2+0x52/0x52 [ 234.157732] ? __mutex_lock+0x7d9/0x17f0 [ 234.161809] should_fail.cold.4+0xa/0x1a 2018/05/06 05:52:32 executing program 7: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x400, 0x0) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, &(0x7f00000000c0)=""/163) r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r1) [ 234.165883] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 234.170998] ? kasan_kmalloc+0xc4/0xe0 [ 234.174898] ? graph_lock+0x170/0x170 [ 234.178715] ? find_held_lock+0x36/0x1c0 [ 234.182784] ? __lock_is_held+0xb5/0x140 [ 234.186871] ? check_same_owner+0x320/0x320 [ 234.191211] ? kasan_check_write+0x14/0x20 [ 234.195461] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 234.200398] ? rcu_note_context_switch+0x710/0x710 [ 234.205337] __should_failslab+0x124/0x180 [ 234.209585] should_failslab+0x9/0x14 [ 234.213404] kmem_cache_alloc+0x2af/0x760 [ 234.217582] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 234.222547] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 234.227580] __kernfs_new_node+0xe7/0x580 [ 234.231758] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 234.236529] ? mutex_unlock+0xd/0x10 [ 234.240257] ? kernfs_activate+0x20e/0x2a0 [ 234.244501] ? kernfs_walk_and_get_ns+0x320/0x320 [ 234.249347] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 234.254888] ? kernfs_link_sibling+0x1d2/0x3b0 [ 234.259485] kernfs_new_node+0x80/0xf0 [ 234.263363] __kernfs_create_file+0x4d/0x330 [ 234.267763] sysfs_add_file_mode_ns+0x21a/0x560 [ 234.272426] internal_create_group+0x282/0x970 [ 234.277000] sysfs_create_groups+0x9b/0x150 [ 234.281322] device_add+0x84d/0x16d0 [ 234.285033] ? device_private_init+0x230/0x230 [ 234.289613] ? kfree+0x1e9/0x260 [ 234.292983] ? kfree_const+0x5e/0x70 [ 234.296684] device_create_groups_vargs+0x1ff/0x270 [ 234.301704] device_create_vargs+0x46/0x60 [ 234.305938] bdi_register_va.part.10+0xbb/0x9b0 [ 234.310603] ? cgwb_kill+0x630/0x630 [ 234.314313] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 234.319839] ? bdi_init+0x416/0x510 [ 234.323456] ? wb_init+0x9e0/0x9e0 [ 234.326979] ? bdi_alloc_node+0x67/0xe0 [ 234.330939] ? bdi_alloc_node+0x67/0xe0 [ 234.334905] ? rcu_read_lock_sched_held+0x108/0x120 [ 234.339919] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 234.345195] ? _raw_spin_unlock+0x22/0x30 [ 234.349343] bdi_register_va+0x68/0x80 [ 234.353235] super_setup_bdi_name+0x123/0x220 [ 234.357725] ? kill_block_super+0x100/0x100 [ 234.362051] ? kmem_cache_alloc_trace+0x616/0x780 [ 234.366892] ? match_wildcard+0x3c0/0x3c0 [ 234.371038] ? trace_hardirqs_on+0xd/0x10 [ 234.375181] fuse_fill_super+0xe6e/0x1e20 [ 234.379334] ? fuse_get_root_inode+0x190/0x190 [ 234.383914] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 234.388927] ? kasan_check_read+0x11/0x20 [ 234.393082] ? cap_capable+0x1f9/0x260 [ 234.396981] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 234.402524] ? security_capable+0x99/0xc0 [ 234.406679] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 234.412211] ? ns_capable_common+0x13f/0x170 [ 234.416631] ? get_anon_bdev+0x2f0/0x2f0 [ 234.420683] ? sget+0x113/0x150 [ 234.423946] ? fuse_get_root_inode+0x190/0x190 [ 234.428511] mount_nodev+0x6b/0x110 [ 234.432122] fuse_mount+0x2c/0x40 [ 234.435561] mount_fs+0xae/0x328 [ 234.438915] vfs_kern_mount.part.34+0xd4/0x4d0 [ 234.443505] ? may_umount+0xb0/0xb0 [ 234.447116] ? _raw_read_unlock+0x22/0x30 [ 234.451245] ? __get_fs_type+0x97/0xc0 [ 234.455120] do_mount+0x564/0x3070 [ 234.458648] ? copy_mount_string+0x40/0x40 [ 234.462870] ? rcu_pm_notify+0xc0/0xc0 [ 234.466746] ? copy_mount_options+0x5f/0x380 [ 234.471137] ? rcu_read_lock_sched_held+0x108/0x120 [ 234.476136] ? kmem_cache_alloc_trace+0x616/0x780 [ 234.480967] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 234.486499] ? _copy_from_user+0xdf/0x150 [ 234.490658] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 234.496197] ? copy_mount_options+0x285/0x380 [ 234.500703] ksys_mount+0x12d/0x140 [ 234.504337] __x64_sys_mount+0xbe/0x150 [ 234.508309] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 234.513329] do_syscall_64+0x1b1/0x800 [ 234.517222] ? finish_task_switch+0x1ca/0x810 [ 234.521721] ? syscall_return_slowpath+0x5c0/0x5c0 [ 234.526652] ? syscall_return_slowpath+0x30f/0x5c0 [ 234.531593] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 234.536958] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 234.541807] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 234.546985] RIP: 0033:0x455979 [ 234.550162] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 234.557861] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 234.565135] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 234.572407] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 234.579685] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 234.586957] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 2018/05/06 05:52:33 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)="2e2f66696c653002", &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:33 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./cxntrol\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:52:33 executing program 1 (fault-call:1 fault-nth:56): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:52:33 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) ioctl$void(r0, 0xc0045878) close(0xffffffffffffffff) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x101, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000380)) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000300)={&(0x7f0000000100)=ANY=[@ANYBLOB="dc010001", @ANYRES16=r2, @ANYBLOB="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"], 0x1dc}, 0x1, 0x0, 0x0, 0x8000}, 0x44000) 2018/05/06 05:52:33 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0x24}}) 2018/05/06 05:52:33 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0x0, 0x0, 'queue0\x00', 0x1ff}) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x1) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffff9c, 0xc008640a, &(0x7f0000000040)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000100)={0x0}) syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\x00', &(0x7f00000001c0)='./file0\x00', 0x101, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="67405e8b235fd75f45e7a161", 0xc, 0x16}], 0x2, &(0x7f0000000280)={[{@data_ordered='data=ordered', 0x2c}, {@hash_rupasov='hash=rupasov', 0x2c}, {@tails_small='tails=small', 0x2c}]}) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000140)={r2, r3, 0x1}) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:52:33 executing program 2: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0x0, 0x8, 'queue0\x00'}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x243f, 0x10000) ioctl$TIOCNXCL(r0, 0x540d) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r1) 2018/05/06 05:52:33 executing program 6: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000240)={0x0, 0x17, "840dd5bb5e057c1bd57630a95d8594ffa767a6a18e31e6"}, &(0x7f0000000280)=0x1f) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r1, 0x3, 0x6}, &(0x7f0000000300)=0x8) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x40, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000580)=0xe8) setsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f00000005c0)={@loopback={0x0, 0x1}, r3}, 0x14) syncfs(r0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000040)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000340)={0x3, 0x4, 0x0, [{0x4, 0xab, 0x2, 0x7, 0xfffffffffffff26b, 0x2, 0x8}, {0x8af, 0x10001, 0x8e, 0x0, 0x401, 0xffffffffffffffff}, {0x2b8b, 0x4, 0x81, 0xfffffffffffffffa, 0x1, 0x8, 0xe000000000000}, {0x4, 0xf, 0x7, 0x5ba, 0x6, 0x9, 0x8}]}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f00000001c0)={&(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x2, 0x4, 0x8}) [ 234.680321] QAT: Invalid ioctl [ 234.686383] FAULT_INJECTION: forcing a failure. [ 234.686383] name failslab, interval 1, probability 0, space 0, times 0 [ 234.697709] CPU: 0 PID: 16213 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 234.704991] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 234.714349] Call Trace: [ 234.716955] dump_stack+0x1b9/0x294 [ 234.720604] ? dump_stack_print_info.cold.2+0x52/0x52 [ 234.725805] ? lock_release+0xa10/0xa10 2018/05/06 05:52:33 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0x8}}) 2018/05/06 05:52:33 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0x10}}) [ 234.729519] QAT: Invalid ioctl [ 234.729784] ? check_same_owner+0x320/0x320 [ 234.729808] should_fail.cold.4+0xa/0x1a [ 234.729832] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 234.746489] ? kasan_check_write+0x14/0x20 [ 234.750740] ? __mutex_lock+0x7d9/0x17f0 [ 234.754826] ? graph_lock+0x170/0x170 [ 234.758645] ? find_held_lock+0x36/0x1c0 [ 234.762720] ? __lock_is_held+0xb5/0x140 [ 234.766802] ? check_same_owner+0x320/0x320 [ 234.771133] ? find_held_lock+0x36/0x1c0 [ 234.775210] ? rcu_note_context_switch+0x710/0x710 2018/05/06 05:52:33 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xe}}) [ 234.780153] __should_failslab+0x124/0x180 [ 234.784401] should_failslab+0x9/0x14 [ 234.788208] kmem_cache_alloc+0x2af/0x760 [ 234.792370] ? kasan_check_write+0x14/0x20 [ 234.796621] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 234.801583] ? lock_downgrade+0x8e0/0x8e0 [ 234.805752] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 234.810783] __kernfs_new_node+0xe7/0x580 [ 234.814949] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 234.819723] ? kasan_check_write+0x14/0x20 [ 234.823971] ? __mutex_unlock_slowpath+0x180/0x8a0 2018/05/06 05:52:33 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0x7}}) [ 234.828915] ? __lock_is_held+0xb5/0x140 [ 234.832986] ? wait_for_completion+0x870/0x870 [ 234.837595] kernfs_new_node+0x80/0xf0 [ 234.841498] __kernfs_create_file+0x4d/0x330 [ 234.845916] sysfs_add_file_mode_ns+0x21a/0x560 [ 234.850617] internal_create_group+0x282/0x970 [ 234.855220] sysfs_create_groups+0x9b/0x150 [ 234.859561] device_add+0x84d/0x16d0 [ 234.863289] ? device_private_init+0x230/0x230 [ 234.867876] ? kfree+0x1e9/0x260 [ 234.871245] ? kfree_const+0x5e/0x70 [ 234.874970] device_create_groups_vargs+0x1ff/0x270 [ 234.879995] device_create_vargs+0x46/0x60 [ 234.884239] bdi_register_va.part.10+0xbb/0x9b0 [ 234.888915] ? cgwb_kill+0x630/0x630 [ 234.892638] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 234.898183] ? bdi_init+0x416/0x510 [ 234.901818] ? wb_init+0x9e0/0x9e0 [ 234.905375] ? bdi_alloc_node+0x67/0xe0 [ 234.909361] ? bdi_alloc_node+0x67/0xe0 [ 234.913341] ? rcu_read_lock_sched_held+0x108/0x120 [ 234.918365] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 234.923657] bdi_register_va+0x68/0x80 [ 234.927551] super_setup_bdi_name+0x123/0x220 [ 234.932039] ? kill_block_super+0x100/0x100 [ 234.936347] ? kmem_cache_alloc_trace+0x616/0x780 [ 234.941184] ? match_wildcard+0x3c0/0x3c0 [ 234.945332] ? trace_hardirqs_on+0xd/0x10 [ 234.949479] fuse_fill_super+0xe6e/0x1e20 [ 234.953623] ? fuse_get_root_inode+0x190/0x190 [ 234.958191] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 234.963192] ? kasan_check_read+0x11/0x20 [ 234.967330] ? cap_capable+0x1f9/0x260 [ 234.971223] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 234.976744] ? security_capable+0x99/0xc0 [ 234.980886] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 234.986427] ? ns_capable_common+0x13f/0x170 [ 234.990831] ? get_anon_bdev+0x2f0/0x2f0 [ 234.994879] ? sget+0x113/0x150 [ 234.998143] ? fuse_get_root_inode+0x190/0x190 [ 235.002713] mount_nodev+0x6b/0x110 [ 235.006338] fuse_mount+0x2c/0x40 [ 235.009774] mount_fs+0xae/0x328 [ 235.013126] vfs_kern_mount.part.34+0xd4/0x4d0 [ 235.017691] ? may_umount+0xb0/0xb0 [ 235.021301] ? _raw_read_unlock+0x22/0x30 [ 235.025431] ? __get_fs_type+0x97/0xc0 [ 235.029314] do_mount+0x564/0x3070 [ 235.032850] ? copy_mount_string+0x40/0x40 [ 235.037066] ? rcu_pm_notify+0xc0/0xc0 [ 235.040954] ? copy_mount_options+0x5f/0x380 [ 235.045370] ? rcu_read_lock_sched_held+0x108/0x120 [ 235.050389] ? kmem_cache_alloc_trace+0x616/0x780 [ 235.055250] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 235.060793] ? copy_mount_options+0x285/0x380 [ 235.065302] ksys_mount+0x12d/0x140 [ 235.068940] __x64_sys_mount+0xbe/0x150 [ 235.072923] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 235.077938] do_syscall_64+0x1b1/0x800 [ 235.081812] ? finish_task_switch+0x1ca/0x810 [ 235.086301] ? syscall_return_slowpath+0x5c0/0x5c0 [ 235.091224] ? syscall_return_slowpath+0x30f/0x5c0 [ 235.096148] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 235.101503] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 235.106344] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 235.111527] RIP: 0033:0x455979 [ 235.114702] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 235.122394] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 235.129657] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 235.136926] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 235.144195] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 235.151466] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 [ 235.164812] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "hash=rupasov" [ 235.482083] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "hash=rupasov" 2018/05/06 05:52:34 executing program 7: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x3, 0x81) close(0xffffffffffffffff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x4000, 0x2) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000000)={0x0, 0xffffffffffffffff, 0x1}) ioctl$KVM_GET_DEVICE_ATTR(r1, 0x4018aee2, &(0x7f00000000c0)={0x0, 0x0, 0x3, &(0x7f0000000040)=0x80000001}) 2018/05/06 05:52:34 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xa}}) 2018/05/06 05:52:34 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:34 executing program 6: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x10002) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x1) 2018/05/06 05:52:34 executing program 1 (fault-call:1 fault-nth:57): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:52:34 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0x0, 0x0, "717565756530000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001500", 0x1ff}) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:52:34 executing program 2: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x800000000000fe, 0x0, 0x8, 'queue0\x00'}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) socket$inet6_icmp(0xa, 0x2, 0x3a) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:52:34 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./con/rol\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) [ 235.751522] FAULT_INJECTION: forcing a failure. [ 235.751522] name failslab, interval 1, probability 0, space 0, times 0 [ 235.762846] CPU: 1 PID: 16276 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 235.770133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 235.779496] Call Trace: [ 235.782101] dump_stack+0x1b9/0x294 [ 235.785744] ? dump_stack_print_info.cold.2+0x52/0x52 [ 235.790948] ? __mutex_lock+0x7d9/0x17f0 [ 235.795036] should_fail.cold.4+0xa/0x1a 2018/05/06 05:52:34 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xb}}) 2018/05/06 05:52:34 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) [ 235.799131] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 235.804253] ? kasan_kmalloc+0xc4/0xe0 [ 235.808158] ? graph_lock+0x170/0x170 [ 235.811984] ? find_held_lock+0x36/0x1c0 [ 235.816065] ? __lock_is_held+0xb5/0x140 [ 235.820150] ? check_same_owner+0x320/0x320 [ 235.824488] ? kasan_check_write+0x14/0x20 [ 235.828738] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 235.833685] ? rcu_note_context_switch+0x710/0x710 [ 235.838637] __should_failslab+0x124/0x180 [ 235.842889] should_failslab+0x9/0x14 [ 235.846704] kmem_cache_alloc+0x2af/0x760 2018/05/06 05:52:34 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0x11}}) [ 235.850867] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 235.855816] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 235.860852] __kernfs_new_node+0xe7/0x580 [ 235.865021] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 235.869788] ? mutex_unlock+0xd/0x10 [ 235.873518] ? kernfs_activate+0x20e/0x2a0 [ 235.877762] ? kernfs_walk_and_get_ns+0x320/0x320 [ 235.882624] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 235.888171] ? kernfs_link_sibling+0x1d2/0x3b0 [ 235.892772] kernfs_new_node+0x80/0xf0 [ 235.896672] __kernfs_create_file+0x4d/0x330 2018/05/06 05:52:34 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0x12}}) 2018/05/06 05:52:34 executing program 7: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x47}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0xffffff85, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x1}, 0x48) mq_unlink(&(0x7f00000000c0)="3c9061524315170236a7f13f1b41a407e9d27893bfcb1fba4425d0026dd9") close(0xffffffffffffffff) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$TIOCEXCL(r0, 0x540c) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x2) [ 235.901092] sysfs_add_file_mode_ns+0x21a/0x560 [ 235.905780] internal_create_group+0x282/0x970 [ 235.910384] sysfs_create_groups+0x9b/0x150 [ 235.914715] device_add+0x84d/0x16d0 [ 235.918441] ? device_private_init+0x230/0x230 [ 235.923039] ? kfree+0x1e9/0x260 [ 235.926411] ? kfree_const+0x5e/0x70 [ 235.930136] device_create_groups_vargs+0x1ff/0x270 [ 235.935162] device_create_vargs+0x46/0x60 [ 235.939409] bdi_register_va.part.10+0xbb/0x9b0 [ 235.944087] ? cgwb_kill+0x630/0x630 [ 235.947808] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 235.953354] ? bdi_init+0x416/0x510 [ 235.956998] ? wb_init+0x9e0/0x9e0 [ 235.960545] ? bdi_alloc_node+0x67/0xe0 [ 235.964520] ? bdi_alloc_node+0x67/0xe0 [ 235.968502] ? rcu_read_lock_sched_held+0x108/0x120 [ 235.973530] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 235.978823] ? _raw_spin_unlock+0x22/0x30 [ 235.982986] bdi_register_va+0x68/0x80 [ 235.986883] super_setup_bdi_name+0x123/0x220 [ 235.991387] ? kill_block_super+0x100/0x100 [ 235.996063] ? kmem_cache_alloc_trace+0x616/0x780 2018/05/06 05:52:34 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x4}}) [ 236.000911] ? match_wildcard+0x3c0/0x3c0 [ 236.005064] ? trace_hardirqs_on+0xd/0x10 [ 236.009222] fuse_fill_super+0xe6e/0x1e20 [ 236.013382] ? fuse_get_root_inode+0x190/0x190 [ 236.017980] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 236.023006] ? kasan_check_read+0x11/0x20 [ 236.027192] ? cap_capable+0x1f9/0x260 [ 236.031273] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 236.036818] ? security_capable+0x99/0xc0 [ 236.040987] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 236.046649] ? ns_capable_common+0x13f/0x170 2018/05/06 05:52:34 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x3}}) [ 236.051065] ? get_anon_bdev+0x2f0/0x2f0 [ 236.055129] ? sget+0x113/0x150 [ 236.058415] ? fuse_get_root_inode+0x190/0x190 [ 236.063004] mount_nodev+0x6b/0x110 [ 236.066644] fuse_mount+0x2c/0x40 [ 236.070108] mount_fs+0xae/0x328 [ 236.073488] vfs_kern_mount.part.34+0xd4/0x4d0 [ 236.078078] ? may_umount+0xb0/0xb0 [ 236.081707] ? _raw_read_unlock+0x22/0x30 [ 236.085863] ? __get_fs_type+0x97/0xc0 [ 236.089763] do_mount+0x564/0x3070 [ 236.093314] ? copy_mount_string+0x40/0x40 [ 236.097557] ? rcu_pm_notify+0xc0/0xc0 2018/05/06 05:52:34 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x300000000000000}}) [ 236.101458] ? copy_mount_options+0x5f/0x380 [ 236.105872] ? rcu_read_lock_sched_held+0x108/0x120 [ 236.110895] ? kmem_cache_alloc_trace+0x616/0x780 [ 236.115756] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 236.121300] ? _copy_from_user+0xdf/0x150 [ 236.125463] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 236.131010] ? copy_mount_options+0x285/0x380 [ 236.135520] ksys_mount+0x12d/0x140 [ 236.139160] __x64_sys_mount+0xbe/0x150 [ 236.143139] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 236.148161] do_syscall_64+0x1b1/0x800 2018/05/06 05:52:34 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x400000000000000}}) [ 236.152056] ? finish_task_switch+0x1ca/0x810 [ 236.156557] ? syscall_return_slowpath+0x5c0/0x5c0 [ 236.161497] ? syscall_return_slowpath+0x30f/0x5c0 [ 236.166441] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 236.171818] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 236.176678] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 236.181870] RIP: 0033:0x455979 [ 236.185062] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 236.192813] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 2018/05/06 05:52:34 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:34 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x40000000}}) [ 236.200093] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 236.207632] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 236.214913] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 236.222195] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 2018/05/06 05:52:35 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./contrdl\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:52:35 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0x0, 0x0, 'queue0\x00', 0x1ff}) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xffffffffffffff80, 0x701000) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000040)={0x3a370, 0x100000001, 0xff, 0x1000, 0x1b602334, 0x1ffb, 0x3, 0x1ff, 0x80, 0x1}) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r1) 2018/05/06 05:52:35 executing program 1 (fault-call:1 fault-nth:58): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:52:35 executing program 6: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) r1 = dup(r0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffff9c, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0xadce}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000200)={0xfff, 0x1, 0x1f, 0x4, r2}, 0x10) close(0xffffffffffffffff) r3 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x4, 0x20200) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x8001}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000100)={r4, 0x3, "e0329c"}, &(0x7f0000000140)=0xb) 2018/05/06 05:52:35 executing program 2: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0x0, 0x800, 'queue0\x00'}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x6, 0x101002) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000040), 0x2) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000080)={0xcd, &(0x7f0000000180)}) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f0000000600)={0x5, 0x5, 0x5, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000500)={{0x7, 0x4}, 'port1\x00', 0x8, 0x10000, 0x6, 0x0, 0x4, 0x3, 0x1, 0x0, 0x3, 0x8001}) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) syz_open_dev$sg(&(0x7f00000002c0)='/dev/sg#\x00', 0x0, 0x81) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000100)=0x0) ptrace$pokeuser(0x6, r2, 0x67, 0x5) getpeername$packet(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000240)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={@loopback={0x0, 0x1}, 0x5a, r3}) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f00000006c0)={'syz_tun\x00', {0x2, 0x4e23, @rand_addr=0x38}}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000001c0)={0x0, 0x7}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000340)={r4, 0x80, &(0x7f0000000440)=[@in={0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}, @in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0xd}, 0x100000000}, @in6={0xa, 0x4e22, 0x291, @mcast1={0xff, 0x1, [], 0x1}, 0x4f7}, @in6={0xa, 0x4e21, 0xffffffffffff7fff, @remote={0xfe, 0x80, [], 0xbb}, 0x10000}, @in6={0xa, 0x4e21, 0x2, @empty, 0x1f}]}, &(0x7f00000004c0)=0x10) close(r1) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f00000005c0)={0x9, 0x1, 0x100000000000, 0x1, 0x6bd}, 0xc) 2018/05/06 05:52:35 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:35 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0xf00000000000000}}) 2018/05/06 05:52:35 executing program 7: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9, 0x400) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000040)) [ 236.737776] FAULT_INJECTION: forcing a failure. [ 236.737776] name failslab, interval 1, probability 0, space 0, times 0 [ 236.749161] CPU: 0 PID: 16346 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 236.756450] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 236.765810] Call Trace: [ 236.768421] dump_stack+0x1b9/0x294 [ 236.772084] ? dump_stack_print_info.cold.2+0x52/0x52 [ 236.777295] should_fail.cold.4+0xa/0x1a [ 236.781371] ? fault_create_debugfs_attr+0x1f0/0x1f0 2018/05/06 05:52:35 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0xfeffffff00000000}}) 2018/05/06 05:52:35 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x4000000000000000}}) [ 236.786496] ? graph_lock+0x170/0x170 [ 236.790310] ? lock_downgrade+0x8e0/0x8e0 [ 236.794474] ? find_held_lock+0x36/0x1c0 [ 236.798553] ? __lock_is_held+0xb5/0x140 [ 236.802642] ? check_same_owner+0x320/0x320 [ 236.806979] ? wait_for_completion+0x870/0x870 [ 236.811578] ? rcu_note_context_switch+0x710/0x710 [ 236.816616] ? graph_lock+0x170/0x170 [ 236.820440] __should_failslab+0x124/0x180 [ 236.824690] should_failslab+0x9/0x14 [ 236.828499] kmem_cache_alloc+0x2af/0x760 [ 236.832668] ? __sanitizer_cov_trace_cmp8+0x18/0x20 2018/05/06 05:52:35 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) [ 236.837698] __kernfs_new_node+0xe7/0x580 [ 236.841982] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 236.846752] ? kernfs_walk_and_get_ns+0x320/0x320 [ 236.851618] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 236.857175] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 236.862719] ? kernfs_put+0x493/0x750 [ 236.866530] ? kernfs_add_one+0x129/0x4d0 [ 236.870695] ? kernfs_get+0x30/0x30 [ 236.874341] kernfs_new_node+0x80/0xf0 [ 236.878245] kernfs_create_dir_ns+0x3d/0x140 [ 236.882667] internal_create_group+0x110/0x970 2018/05/06 05:52:35 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x3000000}}) [ 236.887262] ? internal_create_group+0x347/0x970 [ 236.892042] sysfs_create_group+0x1f/0x30 [ 236.896203] dpm_sysfs_add+0x26/0x210 [ 236.900015] device_add+0xa11/0x16d0 [ 236.903743] ? device_private_init+0x230/0x230 [ 236.908331] ? kfree+0x1e9/0x260 [ 236.911708] ? kfree_const+0x5e/0x70 [ 236.915436] device_create_groups_vargs+0x1ff/0x270 [ 236.920461] device_create_vargs+0x46/0x60 [ 236.924707] bdi_register_va.part.10+0xbb/0x9b0 [ 236.929385] ? cgwb_kill+0x630/0x630 [ 236.933119] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 2018/05/06 05:52:35 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0xfeffffff}}) [ 236.938668] ? bdi_init+0x416/0x510 [ 236.942299] ? wb_init+0x9e0/0x9e0 [ 236.945847] ? bdi_alloc_node+0x67/0xe0 [ 236.949828] ? bdi_alloc_node+0x67/0xe0 [ 236.953814] ? rcu_read_lock_sched_held+0x108/0x120 [ 236.958840] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 236.964134] ? _raw_spin_unlock+0x22/0x30 [ 236.968299] bdi_register_va+0x68/0x80 [ 236.972205] super_setup_bdi_name+0x123/0x220 [ 236.976708] ? kill_block_super+0x100/0x100 [ 236.981041] ? kmem_cache_alloc_trace+0x616/0x780 2018/05/06 05:52:35 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) [ 236.985891] ? match_wildcard+0x3c0/0x3c0 [ 236.990047] ? trace_hardirqs_on+0xd/0x10 [ 236.994212] fuse_fill_super+0xe6e/0x1e20 [ 236.998374] ? fuse_get_root_inode+0x190/0x190 [ 237.002976] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 237.008003] ? kasan_check_read+0x11/0x20 [ 237.012162] ? cap_capable+0x1f9/0x260 [ 237.016065] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 237.021734] ? security_capable+0x99/0xc0 [ 237.025895] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 237.031440] ? ns_capable_common+0x13f/0x170 2018/05/06 05:52:35 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x300}}) [ 237.035861] ? get_anon_bdev+0x2f0/0x2f0 [ 237.039933] ? sget+0x113/0x150 [ 237.043230] ? fuse_get_root_inode+0x190/0x190 [ 237.047823] mount_nodev+0x6b/0x110 [ 237.051458] fuse_mount+0x2c/0x40 [ 237.054928] mount_fs+0xae/0x328 [ 237.058425] vfs_kern_mount.part.34+0xd4/0x4d0 [ 237.063017] ? may_umount+0xb0/0xb0 [ 237.066661] ? _raw_read_unlock+0x22/0x30 [ 237.070815] ? __get_fs_type+0x97/0xc0 [ 237.074717] do_mount+0x564/0x3070 [ 237.078273] ? copy_mount_string+0x40/0x40 [ 237.082519] ? rcu_pm_notify+0xc0/0xc0 2018/05/06 05:52:35 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) [ 237.086431] ? copy_mount_options+0x5f/0x380 [ 237.090850] ? rcu_read_lock_sched_held+0x108/0x120 [ 237.095881] ? kmem_cache_alloc_trace+0x616/0x780 [ 237.100738] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 237.106318] ? _copy_from_user+0xdf/0x150 [ 237.110489] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 237.116038] ? copy_mount_options+0x285/0x380 [ 237.120549] ksys_mount+0x12d/0x140 [ 237.124190] __x64_sys_mount+0xbe/0x150 [ 237.128176] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 237.133208] do_syscall_64+0x1b1/0x800 [ 237.137110] ? finish_task_switch+0x1ca/0x810 [ 237.141616] ? syscall_return_slowpath+0x5c0/0x5c0 [ 237.146555] ? syscall_return_slowpath+0x30f/0x5c0 [ 237.151498] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 237.156876] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 237.161740] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 237.166936] RIP: 0033:0x455979 [ 237.170131] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 237.177849] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 237.185124] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 237.192404] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 237.199682] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 237.206963] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 2018/05/06 05:52:36 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./contrsl\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:52:36 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0x0, 0x0, 'queue0\x00', 0x1ff}) r0 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x100000, 0x200000) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x100, 0x0) accept$ipx(r1, &(0x7f0000000040), &(0x7f0000000100)=0x10) 2018/05/06 05:52:36 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x2}}) 2018/05/06 05:52:36 executing program 1 (fault-call:1 fault-nth:59): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) [ 237.681857] FAULT_INJECTION: forcing a failure. [ 237.681857] name failslab, interval 1, probability 0, space 0, times 0 [ 237.693187] CPU: 1 PID: 16409 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 237.700475] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 237.709851] Call Trace: [ 237.712460] dump_stack+0x1b9/0x294 [ 237.716127] ? dump_stack_print_info.cold.2+0x52/0x52 [ 237.721333] ? __mutex_lock+0x7d9/0x17f0 [ 237.725413] should_fail.cold.4+0xa/0x1a [ 237.729490] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 237.734606] ? kasan_kmalloc+0xc4/0xe0 [ 237.738513] ? graph_lock+0x170/0x170 [ 237.742325] ? find_held_lock+0x36/0x1c0 [ 237.746394] ? __lock_is_held+0xb5/0x140 [ 237.750478] ? check_same_owner+0x320/0x320 [ 237.754814] ? kasan_check_write+0x14/0x20 [ 237.759072] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 237.764189] ? rcu_note_context_switch+0x710/0x710 [ 237.769127] __should_failslab+0x124/0x180 [ 237.773367] should_failslab+0x9/0x14 [ 237.777181] kmem_cache_alloc+0x2af/0x760 [ 237.781345] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 237.786289] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 237.791319] __kernfs_new_node+0xe7/0x580 [ 237.795484] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 237.800254] ? mutex_unlock+0xd/0x10 [ 237.803971] ? kernfs_activate+0x20e/0x2a0 [ 237.808217] ? kernfs_walk_and_get_ns+0x320/0x320 [ 237.813075] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 237.818611] ? kernfs_link_sibling+0x1d2/0x3b0 [ 237.823209] kernfs_new_node+0x80/0xf0 [ 237.827096] __kernfs_create_file+0x4d/0x330 [ 237.831495] sysfs_add_file_mode_ns+0x21a/0x560 [ 237.836156] internal_create_group+0x282/0x970 [ 237.840732] sysfs_create_groups+0x9b/0x150 [ 237.845048] device_add+0x84d/0x16d0 [ 237.848756] ? device_private_init+0x230/0x230 [ 237.853321] ? kfree+0x1e9/0x260 [ 237.856673] ? kfree_const+0x5e/0x70 [ 237.860374] device_create_groups_vargs+0x1ff/0x270 [ 237.865385] device_create_vargs+0x46/0x60 [ 237.869605] bdi_register_va.part.10+0xbb/0x9b0 [ 237.874257] ? cgwb_kill+0x630/0x630 [ 237.877960] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 237.883480] ? bdi_init+0x416/0x510 [ 237.887098] ? wb_init+0x9e0/0x9e0 [ 237.890626] ? bdi_alloc_node+0x67/0xe0 [ 237.894582] ? bdi_alloc_node+0x67/0xe0 [ 237.898538] ? rcu_read_lock_sched_held+0x108/0x120 [ 237.903536] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 237.908802] ? _raw_spin_unlock+0x22/0x30 [ 237.912938] bdi_register_va+0x68/0x80 [ 237.916827] super_setup_bdi_name+0x123/0x220 [ 237.921316] ? kill_block_super+0x100/0x100 [ 237.925629] ? kmem_cache_alloc_trace+0x616/0x780 [ 237.930454] ? match_wildcard+0x3c0/0x3c0 [ 237.934584] ? trace_hardirqs_on+0xd/0x10 [ 237.938733] fuse_fill_super+0xe6e/0x1e20 [ 237.942876] ? fuse_get_root_inode+0x190/0x190 [ 237.947442] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 237.952445] ? kasan_check_read+0x11/0x20 [ 237.956578] ? cap_capable+0x1f9/0x260 [ 237.960453] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 237.965974] ? security_capable+0x99/0xc0 [ 237.970108] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 237.975629] ? ns_capable_common+0x13f/0x170 [ 237.980034] ? get_anon_bdev+0x2f0/0x2f0 [ 237.984080] ? sget+0x113/0x150 [ 237.987346] ? fuse_get_root_inode+0x190/0x190 [ 237.991925] mount_nodev+0x6b/0x110 [ 237.995563] fuse_mount+0x2c/0x40 [ 237.999031] mount_fs+0xae/0x328 [ 238.002387] vfs_kern_mount.part.34+0xd4/0x4d0 [ 238.006951] ? may_umount+0xb0/0xb0 [ 238.010565] ? _raw_read_unlock+0x22/0x30 [ 238.014700] ? __get_fs_type+0x97/0xc0 [ 238.018575] do_mount+0x564/0x3070 [ 238.022111] ? copy_mount_string+0x40/0x40 [ 238.026342] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 238.031087] ? retint_kernel+0x10/0x10 [ 238.034961] ? copy_mount_options+0x1e3/0x380 [ 238.039445] ? write_comp_data+0x70/0x70 [ 238.043514] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 238.049047] ? copy_mount_options+0x285/0x380 [ 238.053528] ksys_mount+0x12d/0x140 [ 238.057148] __x64_sys_mount+0xbe/0x150 [ 238.061107] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 238.066106] do_syscall_64+0x1b1/0x800 [ 238.069973] ? finish_task_switch+0x1ca/0x810 [ 238.074451] ? syscall_return_slowpath+0x5c0/0x5c0 [ 238.079362] ? syscall_return_slowpath+0x30f/0x5c0 [ 238.084277] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 238.089625] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 238.094459] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 238.099640] RIP: 0033:0x455979 [ 238.102812] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 238.110512] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 238.117763] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 238.125019] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 238.132279] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 238.139532] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 2018/05/06 05:52:36 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000180)={0x0, 0x80000001, 0x30, 0x3, 0x67d}, &(0x7f00000001c0)=0x18) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000340)={0xffff, 0x0, 0x3ff, 0xd01, r1}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000200)={r1, @in6={{0xa, 0x1, 0x3, @empty, 0x4}}, [0x6, 0x7, 0x10000, 0xffffffffffffffff, 0x2, 0x2, 0x752, 0x6872, 0x101, 0x3ff, 0x5d4, 0x0, 0xc5, 0xd72, 0x5]}, &(0x7f0000000300)=0x100) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0x0, 0x8, 'queue0\x00'}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000040)={0x0, 0x0, 0x2}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000100)={r2, 0x80000, r0}) r3 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r3) 2018/05/06 05:52:36 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./contrul\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:52:36 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0xffffffff00000000}}) 2018/05/06 05:52:36 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x10000, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x0, &(0x7f0000000040), &(0x7f0000000100)=0x4) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0x0, 0x0, 'queue0\x00', 0x1ff}) r1 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x2, 0x80001) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r1) 2018/05/06 05:52:36 executing program 6: syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x10000200081) close(0xffffffffffffffff) membarrier(0xa, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x6, 0x4000) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x8) ioctl$KDMKTONE(r0, 0x4b30, 0x9) setsockopt$inet_tcp_int(r0, 0x6, 0x8, &(0x7f0000000080)=0x1, 0x4) 2018/05/06 05:52:36 executing program 7: syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x8, 0x81) close(0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x1, 0x4) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000000)={0x0, 0x101}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000280)={r1, 0x9, 0x5, [0x100000000, 0x2, 0xfffffffffffffffd, 0x6, 0xd4cb]}, 0x12) getpeername$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000300)=0x14) bind$packet(r0, &(0x7f0000000340)={0x11, 0x6, r2, 0x1, 0x3f, 0x6, @random="cb5f6196f41a"}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x100000000}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000380)={r4, @in={{0x2, 0x4e23, @multicast2=0xe0000002}}}, 0xfffffd4a) 2018/05/06 05:52:36 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:36 executing program 1 (fault-call:1 fault-nth:60): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) [ 238.580837] FAULT_INJECTION: forcing a failure. [ 238.580837] name failslab, interval 1, probability 0, space 0, times 0 [ 238.592766] CPU: 1 PID: 16423 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 2018/05/06 05:52:37 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0xf000000}}) 2018/05/06 05:52:37 executing program 1 (fault-call:1 fault-nth:61): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:52:37 executing program 7: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) r0 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x7f, 0x80000) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f00000000c0)=0x5, 0x2) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x6, 0x80) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) close(0xffffffffffffffff) [ 238.592779] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 238.592784] Call Trace: [ 238.592809] dump_stack+0x1b9/0x294 2018/05/06 05:52:37 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x29c0, 0x4) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000180)) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x81) close(r1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e22, 0x14e, @mcast2={0xff, 0x2, [], 0x1}, 0x8}}, 0x1}, &(0x7f0000000040)=0x90) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r2, @in6={{0xa, 0x4e20, 0x84e0, @empty, 0x100}}, [0x8, 0x2, 0xec, 0x47, 0xffff, 0x0, 0x7, 0x3f, 0x0, 0xe3, 0x1, 0xfffffffffffffff8, 0x1, 0x100, 0x9]}, &(0x7f0000000080)=0x100) ioctl$TIOCGPTPEER(r0, 0x5441, 0xb) inotify_init1(0x80000) [ 238.592830] ? dump_stack_print_info.cold.2+0x52/0x52 2018/05/06 05:52:37 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:37 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x4000000}}) 2018/05/06 05:52:37 executing program 1 (fault-call:1 fault-nth:62): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) [ 238.592854] should_fail.cold.4+0xa/0x1a [ 238.592874] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 238.592895] ? graph_lock+0x170/0x170 [ 238.592911] ? lock_downgrade+0x8e0/0x8e0 [ 238.592930] ? find_held_lock+0x36/0x1c0 2018/05/06 05:52:37 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0xfffffdfd}}) [ 238.592946] ? __lock_is_held+0xb5/0x140 [ 238.592974] ? check_same_owner+0x320/0x320 [ 238.592989] ? wait_for_completion+0x870/0x870 [ 238.593013] ? rcu_note_context_switch+0x710/0x710 [ 238.593028] ? graph_lock+0x170/0x170 [ 238.593047] __should_failslab+0x124/0x180 [ 238.593067] should_failslab+0x9/0x14 [ 238.593084] kmem_cache_alloc+0x2af/0x760 [ 238.593104] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 238.593122] __kernfs_new_node+0xe7/0x580 [ 238.593140] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 238.593154] ? kernfs_walk_and_get_ns+0x320/0x320 [ 238.593172] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 238.593190] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 238.593204] ? kernfs_put+0x493/0x750 [ 238.593218] ? kernfs_add_one+0x129/0x4d0 [ 238.593234] ? kernfs_get+0x30/0x30 [ 238.593250] kernfs_new_node+0x80/0xf0 [ 238.593267] kernfs_create_dir_ns+0x3d/0x140 [ 238.593286] internal_create_group+0x110/0x970 [ 238.593303] ? internal_create_group+0x347/0x970 [ 238.593325] sysfs_create_group+0x1f/0x30 [ 238.593343] dpm_sysfs_add+0x26/0x210 [ 238.593360] device_add+0xa11/0x16d0 [ 238.593380] ? device_private_init+0x230/0x230 [ 238.593392] ? kfree+0x1e9/0x260 [ 238.593409] ? kfree_const+0x5e/0x70 [ 238.593429] device_create_groups_vargs+0x1ff/0x270 [ 238.593445] device_create_vargs+0x46/0x60 [ 238.593464] bdi_register_va.part.10+0xbb/0x9b0 [ 238.593480] ? cgwb_kill+0x630/0x630 [ 238.593497] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 238.593509] ? bdi_init+0x416/0x510 [ 238.593522] ? wb_init+0x9e0/0x9e0 [ 238.593538] ? bdi_alloc_node+0x67/0xe0 [ 238.593551] ? bdi_alloc_node+0x67/0xe0 [ 238.593566] ? rcu_read_lock_sched_held+0x108/0x120 [ 238.593581] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 238.593600] ? _raw_spin_unlock+0x22/0x30 [ 238.593618] bdi_register_va+0x68/0x80 [ 238.593635] super_setup_bdi_name+0x123/0x220 [ 238.593650] ? kill_block_super+0x100/0x100 [ 238.593667] ? kmem_cache_alloc_trace+0x616/0x780 [ 238.593683] ? match_wildcard+0x3c0/0x3c0 [ 238.593698] ? trace_hardirqs_on+0xd/0x10 [ 238.593720] fuse_fill_super+0xe6e/0x1e20 [ 238.593742] ? fuse_get_root_inode+0x190/0x190 [ 238.593767] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 238.593787] ? kasan_check_read+0x11/0x20 [ 238.593806] ? cap_capable+0x1f9/0x260 [ 238.593828] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 238.593842] ? security_capable+0x99/0xc0 [ 238.593860] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 238.593874] ? ns_capable_common+0x13f/0x170 [ 238.593889] ? get_anon_bdev+0x2f0/0x2f0 [ 238.593902] ? sget+0x113/0x150 [ 238.593918] ? fuse_get_root_inode+0x190/0x190 [ 238.593933] mount_nodev+0x6b/0x110 [ 238.593947] fuse_mount+0x2c/0x40 [ 238.593964] mount_fs+0xae/0x328 [ 238.593982] vfs_kern_mount.part.34+0xd4/0x4d0 [ 238.593997] ? may_umount+0xb0/0xb0 [ 238.594009] ? _raw_read_unlock+0x22/0x30 [ 238.594021] ? __get_fs_type+0x97/0xc0 [ 238.594040] do_mount+0x564/0x3070 [ 238.594059] ? copy_mount_string+0x40/0x40 [ 238.594073] ? rcu_pm_notify+0xc0/0xc0 [ 238.594092] ? copy_mount_options+0x5f/0x380 [ 238.594105] ? rcu_read_lock_sched_held+0x108/0x120 [ 238.594120] ? kmem_cache_alloc_trace+0x616/0x780 [ 238.594139] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 238.594155] ? _copy_from_user+0xdf/0x150 [ 238.594175] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 238.594189] ? copy_mount_options+0x285/0x380 [ 238.594207] ksys_mount+0x12d/0x140 [ 238.594224] __x64_sys_mount+0xbe/0x150 [ 238.594238] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 238.594256] do_syscall_64+0x1b1/0x800 [ 238.594271] ? finish_task_switch+0x1ca/0x810 [ 238.594288] ? syscall_return_slowpath+0x5c0/0x5c0 [ 238.594305] ? syscall_return_slowpath+0x30f/0x5c0 [ 238.594325] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 238.594346] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 238.594366] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 238.594377] RIP: 0033:0x455979 [ 238.594386] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 238.594402] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 238.594411] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 238.594421] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 238.594429] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 238.594438] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 [ 238.601468] QAT: Invalid ioctl [ 238.601538] QAT: Invalid ioctl [ 238.683428] FAULT_INJECTION: forcing a failure. [ 238.683428] name failslab, interval 1, probability 0, space 0, times 0 [ 238.683450] CPU: 0 PID: 16448 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 238.683460] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 238.683466] Call Trace: [ 238.683490] dump_stack+0x1b9/0x294 [ 238.683512] ? dump_stack_print_info.cold.2+0x52/0x52 [ 238.683529] ? __mutex_lock+0x7d9/0x17f0 [ 238.683555] should_fail.cold.4+0xa/0x1a [ 238.683577] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 238.683596] ? kasan_kmalloc+0xc4/0xe0 [ 238.683614] ? graph_lock+0x170/0x170 [ 238.683635] ? find_held_lock+0x36/0x1c0 [ 238.683657] ? __lock_is_held+0xb5/0x140 [ 238.683687] ? check_same_owner+0x320/0x320 [ 238.683703] ? kasan_check_write+0x14/0x20 [ 238.683718] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 238.683735] ? rcu_note_context_switch+0x710/0x710 [ 238.683752] __should_failslab+0x124/0x180 [ 238.683769] should_failslab+0x9/0x14 [ 238.683784] kmem_cache_alloc+0x2af/0x760 [ 238.683800] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 238.683819] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 238.683838] __kernfs_new_node+0xe7/0x580 [ 238.683856] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 238.683871] ? mutex_unlock+0xd/0x10 [ 238.683885] ? kernfs_activate+0x20e/0x2a0 [ 238.683902] ? kernfs_walk_and_get_ns+0x320/0x320 [ 238.683920] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 238.683934] ? kernfs_link_sibling+0x1d2/0x3b0 [ 238.683955] kernfs_new_node+0x80/0xf0 [ 238.683973] __kernfs_create_file+0x4d/0x330 [ 238.683992] sysfs_add_file_mode_ns+0x21a/0x560 [ 238.684012] sysfs_add_file+0x4e/0x60 [ 238.684029] sysfs_merge_group+0xfa/0x230 [ 238.684049] dpm_sysfs_add+0x161/0x210 [ 238.684065] device_add+0xa11/0x16d0 [ 238.684085] ? device_private_init+0x230/0x230 [ 238.684100] ? kfree+0x1e9/0x260 [ 238.684117] ? kfree_const+0x5e/0x70 [ 238.684136] device_create_groups_vargs+0x1ff/0x270 [ 238.684154] device_create_vargs+0x46/0x60 [ 238.684170] bdi_register_va.part.10+0xbb/0x9b0 [ 238.684184] ? cgwb_kill+0x630/0x630 [ 238.684202] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 238.684214] ? bdi_init+0x416/0x510 [ 238.684227] ? wb_init+0x9e0/0x9e0 [ 238.684242] ? bdi_alloc_node+0x67/0xe0 [ 238.684261] ? bdi_alloc_node+0x67/0xe0 [ 238.684279] ? rcu_read_lock_sched_held+0x108/0x120 [ 238.684295] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 238.684314] ? _raw_spin_unlock+0x22/0x30 [ 238.684332] bdi_register_va+0x68/0x80 [ 238.684350] super_setup_bdi_name+0x123/0x220 [ 238.684366] ? kill_block_super+0x100/0x100 [ 238.684382] ? kmem_cache_alloc_trace+0x616/0x780 [ 238.684397] ? match_wildcard+0x3c0/0x3c0 [ 238.684413] ? trace_hardirqs_on+0xd/0x10 [ 238.684432] fuse_fill_super+0xe6e/0x1e20 [ 238.684451] ? fuse_get_root_inode+0x190/0x190 [ 238.684469] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 238.684487] ? kasan_check_read+0x11/0x20 [ 238.684504] ? cap_capable+0x1f9/0x260 [ 238.684525] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 238.684539] ? security_capable+0x99/0xc0 [ 238.684558] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 238.684573] ? ns_capable_common+0x13f/0x170 [ 238.684589] ? get_anon_bdev+0x2f0/0x2f0 [ 238.684603] ? sget+0x113/0x150 [ 238.684620] ? fuse_get_root_inode+0x190/0x190 [ 238.684634] mount_nodev+0x6b/0x110 [ 238.684648] fuse_mount+0x2c/0x40 [ 238.684664] mount_fs+0xae/0x328 [ 238.684683] vfs_kern_mount.part.34+0xd4/0x4d0 [ 238.684700] ? may_umount+0xb0/0xb0 [ 238.684712] ? _raw_read_unlock+0x22/0x30 [ 238.684724] ? __get_fs_type+0x97/0xc0 [ 238.684743] do_mount+0x564/0x3070 [ 238.684759] ? copy_mount_string+0x40/0x40 [ 238.684776] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 238.684794] ? retint_kernel+0x10/0x10 [ 238.684816] ? copy_mount_options+0x1f0/0x380 [ 238.684831] ? __sanitizer_cov_trace_pc+0x3f/0x50 [ 238.684848] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 238.684862] ? copy_mount_options+0x285/0x380 [ 238.684880] ksys_mount+0x12d/0x140 [ 238.684895] __x64_sys_mount+0xbe/0x150 [ 238.684911] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 238.684927] do_syscall_64+0x1b1/0x800 [ 238.684941] ? finish_task_switch+0x1ca/0x810 [ 238.684958] ? syscall_return_slowpath+0x5c0/0x5c0 [ 238.684975] ? syscall_return_slowpath+0x30f/0x5c0 [ 238.684994] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 238.685011] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 238.685030] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 238.685042] RIP: 0033:0x455979 [ 238.685050] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 238.685065] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 238.685074] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 238.685084] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 238.685092] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 238.685102] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 [ 238.824017] FAULT_INJECTION: forcing a failure. [ 238.824017] name failslab, interval 1, probability 0, space 0, times 0 [ 238.824066] CPU: 1 PID: 16466 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 238.824076] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 238.824081] Call Trace: [ 238.824106] dump_stack+0x1b9/0x294 [ 238.824128] ? dump_stack_print_info.cold.2+0x52/0x52 [ 238.824154] should_fail.cold.4+0xa/0x1a [ 238.824175] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 238.824193] ? lock_release+0xa10/0xa10 [ 238.824213] ? check_same_owner+0x320/0x320 [ 238.824230] ? graph_lock+0x170/0x170 [ 238.824248] ? rcu_note_context_switch+0x710/0x710 [ 238.824261] ? find_held_lock+0x36/0x1c0 [ 238.824279] ? find_held_lock+0x36/0x1c0 [ 238.824298] ? __lock_is_held+0xb5/0x140 [ 238.824323] ? check_same_owner+0x320/0x320 [ 238.824342] ? rcu_note_context_switch+0x710/0x710 [ 238.824361] __should_failslab+0x124/0x180 [ 238.824379] should_failslab+0x9/0x14 [ 238.824394] kmem_cache_alloc+0x2af/0x760 [ 238.824412] ? kasan_check_write+0x14/0x20 [ 238.824428] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 238.824447] __kernfs_new_node+0xe7/0x580 [ 238.824464] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 238.824481] ? kasan_check_write+0x14/0x20 [ 238.824496] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 238.824508] ? graph_lock+0x170/0x170 [ 238.824526] ? wait_for_completion+0x870/0x870 [ 238.824545] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 238.824563] kernfs_new_node+0x80/0xf0 [ 238.824592] __kernfs_create_file+0x4d/0x330 [ 238.824614] sysfs_add_file_mode_ns+0x21a/0x560 [ 238.824637] sysfs_add_file+0x4e/0x60 [ 238.824655] sysfs_merge_group+0xfa/0x230 [ 238.824676] dpm_sysfs_add+0x161/0x210 [ 238.824693] device_add+0xa11/0x16d0 [ 238.824712] ? device_private_init+0x230/0x230 [ 238.824724] ? kfree+0x1e9/0x260 [ 238.824750] ? kfree_const+0x5e/0x70 [ 238.824770] device_create_groups_vargs+0x1ff/0x270 [ 238.824790] device_create_vargs+0x46/0x60 [ 238.824812] bdi_register_va.part.10+0xbb/0x9b0 [ 238.824828] ? cgwb_kill+0x630/0x630 [ 238.824848] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 238.824861] ? bdi_init+0x416/0x510 [ 238.824874] ? wb_init+0x9e0/0x9e0 [ 238.824889] ? bdi_alloc_node+0x67/0xe0 [ 238.824903] ? bdi_alloc_node+0x67/0xe0 [ 238.824918] ? rcu_read_lock_sched_held+0x108/0x120 [ 238.824933] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 238.824952] ? _raw_spin_unlock+0x22/0x30 [ 238.824971] bdi_register_va+0x68/0x80 [ 238.824988] super_setup_bdi_name+0x123/0x220 [ 238.825002] ? kill_block_super+0x100/0x100 [ 238.825018] ? kmem_cache_alloc_trace+0x616/0x780 [ 238.825033] ? match_wildcard+0x3c0/0x3c0 [ 238.825045] ? trace_hardirqs_on+0xd/0x10 [ 238.825068] fuse_fill_super+0xe6e/0x1e20 [ 238.825092] ? fuse_get_root_inode+0x190/0x190 [ 238.825110] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 238.825129] ? kasan_check_read+0x11/0x20 [ 238.825146] ? cap_capable+0x1f9/0x260 [ 238.825166] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 238.825177] ? security_capable+0x99/0xc0 [ 238.825195] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 238.825209] ? ns_capable_common+0x13f/0x170 [ 238.825224] ? get_anon_bdev+0x2f0/0x2f0 [ 238.825237] ? sget+0x113/0x150 [ 238.825253] ? fuse_get_root_inode+0x190/0x190 [ 238.825268] mount_nodev+0x6b/0x110 [ 238.825284] fuse_mount+0x2c/0x40 [ 238.825300] mount_fs+0xae/0x328 [ 238.825319] vfs_kern_mount.part.34+0xd4/0x4d0 [ 238.825334] ? may_umount+0xb0/0xb0 [ 238.825347] ? _raw_read_unlock+0x22/0x30 [ 238.825359] ? __get_fs_type+0x97/0xc0 [ 238.825378] do_mount+0x564/0x3070 [ 238.825398] ? copy_mount_string+0x40/0x40 [ 238.825412] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 238.825431] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 238.825449] ? retint_kernel+0x10/0x10 [ 238.825470] ? copy_mount_options+0x1f0/0x380 [ 238.825485] ? copy_mount_options+0x1fa/0x380 [ 238.825502] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 238.825516] ? copy_mount_options+0x285/0x380 [ 238.825534] ksys_mount+0x12d/0x140 [ 238.825551] __x64_sys_mount+0xbe/0x150 [ 238.825565] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 238.825581] do_syscall_64+0x1b1/0x800 [ 238.825596] ? finish_task_switch+0x1ca/0x810 [ 238.825612] ? syscall_return_slowpath+0x5c0/0x5c0 [ 238.825629] ? syscall_return_slowpath+0x30f/0x5c0 [ 238.825647] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 238.825667] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 238.825686] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 238.825697] RIP: 0033:0x455979 [ 238.825706] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/05/06 05:52:38 executing program 2: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0x0, 0x8, 'queue0\x00'}) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200040, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f00000000c0)={0x2, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xd}}, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xb}}, {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}, 0x4, 0x401, 0xfac, 0x7, 0x0, 0x0, 0x3, 0xff, 0x3b1}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) 2018/05/06 05:52:38 executing program 1 (fault-call:1 fault-nth:63): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:52:38 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:38 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x1000000}}) 2018/05/06 05:52:38 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./contrxl\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:52:38 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x141000, 0x0) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000140)=@req={0x10000, 0xffffffff, 0x10001, 0x7fff}, 0x10) close(r0) 2018/05/06 05:52:38 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0x0, 0x0, 'queue0\x00', 0x1ff}) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x3f, 0x3) r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x208000) prctl$intptr(0x17, 0x1) clock_nanosleep(0x7, 0x0, &(0x7f0000000040), &(0x7f0000000100)) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6e61740000000000000066871db8d61a33f0b3c18c882ed3800acb2b72400484f2c282e5e6f20000000000000000000000000000000000000000000002dc000000000000000000000000000000000000000000001eb4edf2e4c685f0688af527a34aaf655b39f3760e06476a7bf1dd05b2191604f4e2a1016f46367db9ce32d13d5e6d153fc74f5c36f1373712f50afc1ada55fe741a44f504337588d7067f32e53ddc4c28e813fd610d2d877216dc4e35b4e1540be4c712103b6271432f8c140c35c5438f081c"], 0x48) r3 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0xa140, 0x0) inotify_init1(0x80800) recvfrom$inet(r3, &(0x7f0000000180)=""/77, 0x4d, 0x2000, &(0x7f0000000200)={0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) ioctl$KVM_GET_SUPPORTED_CPUID(r3, 0xc008ae05, &(0x7f0000000540)=""/4096) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f00000000c0)) ioctl$sock_inet_udp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000240)) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, &(0x7f0000000280)=""/179, &(0x7f0000000340)=0xb3) close(r0) 2018/05/06 05:52:38 executing program 6: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x8100, 0x0) write$evdev(r0, &(0x7f00000000c0)=[{{0x0, 0x7530}, 0x7ff, 0xdf5, 0x8}, {{}, 0xe03e, 0x2, 0xff}, {{0x77359400}, 0x10000, 0x1, 0x2}, {{0x0, 0x7530}, 0x100000001, 0x9, 0x475b}], 0x60) [ 238.825721] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 238.825730] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 238.825739] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 238.825755] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 238.825765] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 [ 239.516540] QAT: Invalid ioctl 2018/05/06 05:52:38 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0xc3ffffff}}) [ 240.309964] FAULT_INJECTION: forcing a failure. [ 240.309964] name failslab, interval 1, probability 0, space 0, times 0 [ 240.321313] CPU: 1 PID: 16509 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 240.328602] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 240.337978] Call Trace: [ 240.340587] dump_stack+0x1b9/0x294 [ 240.344243] ? dump_stack_print_info.cold.2+0x52/0x52 [ 240.349451] ? __mutex_lock+0x7d9/0x17f0 [ 240.353539] should_fail.cold.4+0xa/0x1a 2018/05/06 05:52:38 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x4000}}) [ 240.357630] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 240.362757] ? kasan_kmalloc+0xc4/0xe0 [ 240.366666] ? graph_lock+0x170/0x170 [ 240.370487] ? find_held_lock+0x36/0x1c0 [ 240.374562] ? __lock_is_held+0xb5/0x140 [ 240.378653] ? check_same_owner+0x320/0x320 [ 240.382992] ? kasan_check_write+0x14/0x20 [ 240.387241] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 240.392191] ? rcu_note_context_switch+0x710/0x710 [ 240.397141] __should_failslab+0x124/0x180 [ 240.401390] should_failslab+0x9/0x14 [ 240.405199] kmem_cache_alloc+0x2af/0x760 2018/05/06 05:52:38 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0xf}}) [ 240.409360] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 240.414308] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 240.419348] __kernfs_new_node+0xe7/0x580 [ 240.423522] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 240.428299] ? mutex_unlock+0xd/0x10 [ 240.432083] ? kernfs_activate+0x20e/0x2a0 [ 240.436338] ? kernfs_walk_and_get_ns+0x320/0x320 [ 240.441203] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 240.446770] ? kernfs_link_sibling+0x1d2/0x3b0 [ 240.451374] kernfs_new_node+0x80/0xf0 [ 240.455283] __kernfs_create_file+0x4d/0x330 2018/05/06 05:52:38 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0xfdfdffff00000000}}) 2018/05/06 05:52:38 executing program 6: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f00000000c0)={0x6, 0x1, 0x6, 'queue1\x00', 0x7fffffff}) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000040)=0x3, 0x4) close(0xffffffffffffffff) [ 240.459711] sysfs_add_file_mode_ns+0x21a/0x560 [ 240.464405] sysfs_add_file+0x4e/0x60 [ 240.468222] sysfs_merge_group+0xfa/0x230 [ 240.472395] dpm_sysfs_add+0x161/0x210 [ 240.476301] device_add+0xa11/0x16d0 [ 240.480033] ? device_private_init+0x230/0x230 [ 240.484627] ? kfree+0x1e9/0x260 [ 240.488005] ? kfree_const+0x5e/0x70 [ 240.491729] device_create_groups_vargs+0x1ff/0x270 [ 240.496760] device_create_vargs+0x46/0x60 [ 240.501008] bdi_register_va.part.10+0xbb/0x9b0 [ 240.505696] ? cgwb_kill+0x630/0x630 [ 240.509424] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 240.514980] ? bdi_init+0x416/0x510 [ 240.518621] ? wb_init+0x9e0/0x9e0 [ 240.522171] ? bdi_alloc_node+0x67/0xe0 [ 240.526157] ? bdi_alloc_node+0x67/0xe0 [ 240.530141] ? rcu_read_lock_sched_held+0x108/0x120 [ 240.535166] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 240.540453] ? _raw_spin_unlock+0x22/0x30 [ 240.544621] bdi_register_va+0x68/0x80 [ 240.548519] super_setup_bdi_name+0x123/0x220 [ 240.553020] ? kill_block_super+0x100/0x100 2018/05/06 05:52:38 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0xfffffffe}}) 2018/05/06 05:52:38 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x4080, 0x0) ioctl$SG_SET_TIMEOUT(r0, 0x2201, &(0x7f0000000040)=0x6eb) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0x0, 0x0, 'queue0\x00', 0x1ff}) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r1) [ 240.557348] ? kmem_cache_alloc_trace+0x616/0x780 [ 240.562198] ? match_wildcard+0x3c0/0x3c0 [ 240.566353] ? trace_hardirqs_on+0xd/0x10 [ 240.570513] fuse_fill_super+0xe6e/0x1e20 [ 240.574680] ? fuse_get_root_inode+0x190/0x190 [ 240.579273] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 240.584303] ? kasan_check_read+0x11/0x20 [ 240.588464] ? cap_capable+0x1f9/0x260 [ 240.592366] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 240.597911] ? security_capable+0x99/0xc0 [ 240.602070] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 2018/05/06 05:52:39 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0xffffffc3}}) [ 240.607632] ? ns_capable_common+0x13f/0x170 [ 240.612048] ? get_anon_bdev+0x2f0/0x2f0 [ 240.616114] ? sget+0x113/0x150 [ 240.619404] ? fuse_get_root_inode+0x190/0x190 [ 240.623996] mount_nodev+0x6b/0x110 [ 240.627635] fuse_mount+0x2c/0x40 [ 240.631101] mount_fs+0xae/0x328 [ 240.634501] vfs_kern_mount.part.34+0xd4/0x4d0 [ 240.634517] ? may_umount+0xb0/0xb0 [ 240.634530] ? _raw_read_unlock+0x22/0x30 [ 240.634542] ? __get_fs_type+0x97/0xc0 [ 240.634562] do_mount+0x564/0x3070 [ 240.634581] ? copy_mount_string+0x40/0x40 [ 240.634595] ? rcu_pm_notify+0xc0/0xc0 [ 240.634622] ? copy_mount_options+0x5f/0x380 [ 240.634636] ? rcu_read_lock_sched_held+0x108/0x120 [ 240.634650] ? kmem_cache_alloc_trace+0x616/0x780 [ 240.634666] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 240.634682] ? _copy_from_user+0xdf/0x150 [ 240.634701] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 240.634715] ? copy_mount_options+0x285/0x380 [ 240.634730] ksys_mount+0x12d/0x140 [ 240.634743] __x64_sys_mount+0xbe/0x150 [ 240.634757] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 240.634775] do_syscall_64+0x1b1/0x800 [ 240.634790] ? finish_task_switch+0x1ca/0x810 [ 240.634803] ? syscall_return_slowpath+0x5c0/0x5c0 [ 240.634816] ? syscall_return_slowpath+0x30f/0x5c0 [ 240.634830] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 240.634849] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 240.634869] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 240.634879] RIP: 0033:0x455979 [ 240.634885] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 240.634898] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 240.634905] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 240.634911] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 240.634919] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 240.634928] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 2018/05/06 05:52:39 executing program 2: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0x0, 0x8, 'queue0\x00'}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:52:39 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0x0, 0x0, 'queue0\x00', 0x1ff}) syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) r1 = fcntl$dupfd(r0, 0x406, r0) close(r1) 2018/05/06 05:52:39 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./contr%l\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:52:39 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:39 executing program 7: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rfkill\x00', 0x200000, 0x0) r1 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x81, 0x10500) ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af21, &(0x7f0000000100)={0x0, r1}) close(0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000140)=ANY=[@ANYRES32=0x0, @ANYBLOB="3394bc26a07154c0d5b86201f299a29d4cd001cc5c79eae5000000000000000000000000000000"], &(0x7f0000000180)=0x2b) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000001c0)={r2, 0xffffffffffff0000}, &(0x7f0000000200)=0x8) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x101000, 0x0) fallocate(r1, 0x1, 0x9, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(r1, 0x4c09, 0x3b) 2018/05/06 05:52:39 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x200000000000000}}) 2018/05/06 05:52:39 executing program 1 (fault-call:1 fault-nth:64): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:52:39 executing program 6: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) close(r0) 2018/05/06 05:52:39 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0xfdfdffff}}) [ 241.502920] FAULT_INJECTION: forcing a failure. [ 241.502920] name failslab, interval 1, probability 0, space 0, times 0 [ 241.514303] CPU: 1 PID: 16568 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 241.521587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 241.530945] Call Trace: [ 241.533557] dump_stack+0x1b9/0x294 [ 241.537204] ? dump_stack_print_info.cold.2+0x52/0x52 [ 241.542409] ? mutex_trylock+0x2a0/0x2a0 [ 241.546490] should_fail.cold.4+0xa/0x1a 2018/05/06 05:52:39 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) [ 241.550578] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 241.555693] ? graph_lock+0x170/0x170 [ 241.559538] ? lock_downgrade+0x8e0/0x8e0 [ 241.563698] ? kasan_check_write+0x14/0x20 [ 241.567951] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 241.572892] ? find_held_lock+0x36/0x1c0 [ 241.576974] ? __lock_is_held+0xb5/0x140 [ 241.581060] ? check_same_owner+0x320/0x320 [ 241.585400] ? rcu_note_context_switch+0x710/0x710 [ 241.590347] __should_failslab+0x124/0x180 [ 241.594593] should_failslab+0x9/0x14 [ 241.598405] kmem_cache_alloc_trace+0x2cb/0x780 2018/05/06 05:52:40 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0xf00}}) [ 241.603095] ? device_create_file+0x1e0/0x1e0 [ 241.607601] kobject_uevent_env+0x20f/0xea0 [ 241.611934] ? device_pm_add+0x221/0x340 [ 241.616016] kobject_uevent+0x1f/0x30 [ 241.619825] device_add+0xb01/0x16d0 [ 241.623561] ? device_private_init+0x230/0x230 [ 241.628152] ? kfree+0x1e9/0x260 [ 241.631533] ? kfree_const+0x5e/0x70 [ 241.635259] device_create_groups_vargs+0x1ff/0x270 [ 241.640289] device_create_vargs+0x46/0x60 [ 241.644547] bdi_register_va.part.10+0xbb/0x9b0 [ 241.649233] ? cgwb_kill+0x630/0x630 2018/05/06 05:52:40 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x100000000000000}}) [ 241.652961] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 241.658503] ? bdi_init+0x416/0x510 [ 241.662140] ? wb_init+0x9e0/0x9e0 [ 241.665693] ? bdi_alloc_node+0x67/0xe0 [ 241.669675] ? bdi_alloc_node+0x67/0xe0 [ 241.673654] ? rcu_read_lock_sched_held+0x108/0x120 [ 241.678676] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 241.683964] ? _raw_spin_unlock+0x22/0x30 [ 241.688123] bdi_register_va+0x68/0x80 [ 241.692015] super_setup_bdi_name+0x123/0x220 [ 241.696524] ? kill_block_super+0x100/0x100 2018/05/06 05:52:40 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0xc3ffffff00000000}}) [ 241.700853] ? kmem_cache_alloc_trace+0x616/0x780 [ 241.705704] ? match_wildcard+0x3c0/0x3c0 [ 241.709862] ? trace_hardirqs_on+0xd/0x10 [ 241.714019] fuse_fill_super+0xe6e/0x1e20 [ 241.718181] ? fuse_get_root_inode+0x190/0x190 [ 241.722772] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 241.727800] ? kasan_check_read+0x11/0x20 [ 241.731961] ? cap_capable+0x1f9/0x260 [ 241.735861] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 241.741408] ? security_capable+0x99/0xc0 [ 241.745573] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 241.751119] ? ns_capable_common+0x13f/0x170 [ 241.755558] ? get_anon_bdev+0x2f0/0x2f0 [ 241.759631] ? sget+0x113/0x150 [ 241.762928] ? fuse_get_root_inode+0x190/0x190 [ 241.767530] mount_nodev+0x6b/0x110 [ 241.771169] fuse_mount+0x2c/0x40 [ 241.774632] mount_fs+0xae/0x328 [ 241.778011] vfs_kern_mount.part.34+0xd4/0x4d0 [ 241.782609] ? may_umount+0xb0/0xb0 [ 241.786247] ? _raw_read_unlock+0x22/0x30 [ 241.790403] ? __get_fs_type+0x97/0xc0 [ 241.794305] do_mount+0x564/0x3070 [ 241.797859] ? copy_mount_string+0x40/0x40 [ 241.802100] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 241.807126] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 241.811902] ? retint_kernel+0x10/0x10 [ 241.815810] ? copy_mount_options+0x1f0/0x380 [ 241.820344] ? copy_mount_options+0x202/0x380 [ 241.824861] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 241.830421] ? copy_mount_options+0x285/0x380 [ 241.834933] ksys_mount+0x12d/0x140 [ 241.838574] __x64_sys_mount+0xbe/0x150 [ 241.842588] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 241.847620] do_syscall_64+0x1b1/0x800 [ 241.851523] ? finish_task_switch+0x1ca/0x810 [ 241.856044] ? syscall_return_slowpath+0x5c0/0x5c0 [ 241.860990] ? syscall_return_slowpath+0x30f/0x5c0 [ 241.865933] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 241.871313] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 241.876172] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 241.881363] RIP: 0033:0x455979 [ 241.884552] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 241.892275] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 2018/05/06 05:52:40 executing program 7: r0 = fcntl$getown(0xffffffffffffffff, 0x9) r1 = syz_open_dev$mice(&(0x7f0000001a80)='/dev/input/mice\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001ec0)={0x4, 0x70, 0x0, 0x1, 0x100000001, 0x7f, 0x0, 0x2000000000000, 0x2000, 0x8, 0x3ff, 0x8172, 0x5, 0x7, 0x1, 0x3, 0xbf58, 0x7b, 0x1, 0x1, 0x100000001, 0x8, 0x5, 0x6c5b7691, 0xf4, 0x3, 0x9, 0x6, 0x4, 0xea, 0x6, 0x9, 0x7, 0x7, 0xfffffffffffffffd, 0x1, 0x6, 0x81, 0x0, 0xfff, 0x2, @perf_bp={&(0x7f0000000240), 0x2}, 0x2, 0x6, 0x4, 0x0, 0x1, 0xd58, 0x3}, r0, 0xb, r1, 0x3) accept4$netrom(r1, &(0x7f0000000200), &(0x7f0000000280)=0x10, 0x80000) r2 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) r3 = dup(r2) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1e}}, 0xffffffff}}}, &(0x7f0000000040)=0x84) sendmsg$netrom(r3, &(0x7f00000019c0)={&(0x7f0000000340)=@full={{0x3, {"99ad8c7628aa69"}, 0x4}, [{"37ae76b4586300"}, {"8dc1a6f86cb9dc"}, {"4ed24ed0a29423"}, {"3115c8e3e75cad"}, {"5bfc8aad04acd3"}, {"8201177dbf1b72"}, {"09f6bfac2f1665"}, {"1b6f0d3a6edf2a"}]}, 0x48, &(0x7f0000001680)=[{&(0x7f00000003c0)="62a0ec8fb400ff1d056e60f65bc2ab93a4536de04e21b24f0795cfdff5a88a56c14feef6511ea398f8f656327dfc28f815390d36d7d845954d98a871f49418c5858e70b2a04a8f44cca5da7e42efa506c004106451869094bd88add7df27a64dc96932b9cea5e2329c550d4a97f1e74efc58b03d7889d9bb47e9065e8db921b20a80dcabca2c9c", 0x87}, {&(0x7f0000000480)="538e57a24f40a12862", 0x9}, {&(0x7f00000004c0)="750b6b75c496692872d298bdc15cfe93732ae740cb0016dfc4fb4dd0edfc50debabba649b5d96c990274fd718491b768e91b4a22170bc4d59333101c51138a708fea78dc09fce6baeb5be07e83f85c62be961927e25f7ebdc4f1026ca407f4356f890b8dc465f43255ea5e2e3567217c1676b88d32ddf2f133d735e0c3839b3014f33f293c2f1e33cbd2c3568ba17d70358980f618fd382ac0b64744b73ea9d99a3a697161dc13ffc30a0be0e9907678266c184fd66d0cb06636ac00681d53d28cb24142acfeeb05e1", 0xc9}, {&(0x7f00000005c0)="2df9edb6bd9057403c57e8255a000190e955f8d9ada3524dca142b81c960304603b76bca6d4cfd1c3c26fb79b006281be1cd394edbf066a60565bbbda5443d2919cf1743c44cbef29ca34fb82244641b715e4cdf2ecfcd22ce7120a1001835a42eefef41de7b2d4b6db9adcca99bdd701440b505a86847592843ab0ca169855d46f50d200b3a59156f6b3e87aef683bdd01b91ac158f07fa8789bffd4bd8e75da80551936a5d19f3009073989de5c0d396ddab1c79df177069a6bf9e98e99f911194fcf7ea0262c3e1bd60aea616fce78b3972fd2b966c9fdbf3a3aa3cd793118ad53a3fc0565a55dca32eae1cf683b63bf74f4e890c41dc2689444d36c315be0fa055ac08d38ccf46b00cf447c88c1a2a8167ce05de42a647d126c71b028a58513944ee2bcc46ea46c16b5effc688285b3dc5a2a146929369d5ce6c6d441feda1703eebef267fab73ab3f39ff95e944ea1edf7c954adc52b02451269749eab1e4da9006aed4b100bf247f6a38f2ff84a0869f2cba6755e99357bf0c5962bc907b951d60cfd504f5627cd102aff1aa2685a976d69617a6cfda05d566fa818f407f2d1925203f7647c588a09fc24726b74aa456304e260363a8dafd0c9a11e332572795130594293a87746a9531cbfabce3251e6c87d57b3fccdea41a9a01f77b6b8496d5bbc1b094823b71606f2ed900b591ca6faf4a61e719419861040754b1eca218cb64ffc4ce0e037b36800ef8f581923c85c0fb12b50c76cf40c0198be3a6cbffd7038f5f39bf44095087d249cf108fe21d896535b84b23d46b2109d16912ebb33dc80e5ee26ad7e17ed3a4f11f56bec31078a167c2577197451a871b173dd7d49d0dec8a18a9984aab2799d9d307ddb43ea901217c14eba549cb6838033c0c510d79b883920f8ed07013817e9e5db4e4f850367c0a5b1e397746ed1ac4f59ded3a225409437229bef7ab5e9d009fcb0d48f4ee6245b9e629a1b7f8eb54a639e634ab7c72711c56a6a6a87882f8720c2c3d7c4ded527d32810cffb62941b2f0462aa6e0ebeaaa0b6653111dbfc797fd31ab65c3bb381e4239bd39568b8205072535ccc83d62788dda3547c5daeb8e97be91ab7c6f2d75cea21420209f09897d8a278823bff4736c247556bd01171d18c92a6e702e3b2c63ef46281be3d4a54acfa374e3bb115c7ad1f061a4c00c6061393d4909eb856bae251841e86200bfab6bcbe30471ae736466de0da7a14598a5a5d97c4f93d2e9d05f65adb1f22b0c4cccdf0bf0eb683d8049a50f5491934101aef2530c4bed68ddfb3eb4326e200e9ba0d31ed0e1efb59a57390c303105e2d4198285ffa7ba68c3505641951082db30d2bc1ca6ee216938506193b77d8bdb4666a09c016506c8dc6200096408fd8d906dfc13814350ce4f3530fda9ddaeeb28c7dc414dafc5f07f7261d4a15e3ff5b02352ebdb0a81c0bfe1fb045f0ed5275c37735bd02be63d759975462af7321223aac426d4b6f7a2e064d4e01adc822fa8e911fc03628cd21887bf774d396d9cb3ee85ec1f04b1779ec45e74011b98656fb97eedd6cbd553f4dbd6f8b656acaf792c9e3c0ed8fa89e7e4a5263adee493fc302cc7f6ba7d2442a527f8998b4811977ca969db895317f321e737f78102bbef69554540a8378b11eb6baee0bda37ef53f7701b2eeb5c5495ccee2a551c4ded2ac1874869339614cdf72c028476fdcb672266e10175153b26e77f01b69185f8f6e7bbd3e23030d0f811ccaccbbb9982c53df5820947495984c7681870366b27189bd328f8b9e6e07c67c1d186dd24bd863e9314b9122eeae771dbf72a2fd0b03f918404e21c467e96098f4f0b3b50f0d90e3efce41473de41b41edc9226a3e3f6127121426332a23ed648a095b8e7275d390f2e7ed0d98396b98dc3715d06acd5f5348a75723f3b05bfdb50084219f8aa486472b3943622d2a229bd3a1e4436e0bd81aac3b4ec92bfb05c6c54367621e23b94f87ea2ee949b8fbe4fab1a861dbc1eb199717b5b6063a49031acb264d8b92de39005205b15c024d0f6eed1e04b8328880ed375a64ea629eb745a611704a9d901de535069dc72bed19626de0148290ee7602e20121b2181c29e24676642c6f796ba9a6608356b490705b5ffcba461fa7eba40dfc5291d700a8f0a711015344a88e147f4138c641d3ad4e1d50a7655ae8e8d906f9e53f04b8b3d0f47d2eddbf15be2e708bfcb84af450717c8efb75ae2ce455d40923a0e425a6f6c6affaac3b75a85565f5835f53eb0d68b746b63a5214dea2acde8d0a9a403a3b760b818d204b2f532917e2d4ac5f5cc4d6ab7dd7fdff56721276b8fba2714d9305b408ee3232add1a4dd2e2effdc1fa24872104c3020bcb213bd46700930491e674d5b4f60ad0a1e488e537a65af4b1eb33095070a80b405d6a5fa8d33fa03661a9c9831576e9659e7c141499088d8952a3a0ea1766586d862594942ee2386a4aa7f77912cf9c90055faf5439a4f14aae50265ce82b5ba14e131726fc163712dffdef1f9bd2059da5ad345ae5fbaa6fab586e4ad6bb92e214de08e183802fbf4befa06198cc8f8002a59ac54b6f4d41ce8540d9c587d54e1317d9b7ed415c00b2a14ba4f55074c78c969a26f1665ada95c792084696e0434f3d4fd49db71047b3a031e192483606fc49b8d04275ab2dc39810e7aa5609951179001436da0500f79e5b80ebaedcd98ba4f5bd43d8f3a6ffd44f36a154446d404ce001c928ae57b31bbe8e3dd2207aac0abf6b109e5675feed11bbba3a95562413c3eae771bafcf4053bb398d51aced4838d324b0cecea44b5e0aa309721bd2a7b1ec3d4e564e1cfd8d58315ac5ec70064ca3023ed31e374d0b5a397c4591e0b50b002f8d9d6adfd0328df8acbbb60d1a938e74bcd1d25e4c049724823e0d9134bebda84c17ff4d0b25d0813e899e6328eba8b905526569d4d27d970703cadb014c0cc471dfd71a934c807d16c426fb42b4d3500e44712008e55ad9f641ab5a741cfa7a70be5655bb5ecc652cf88283752c9a3e1c89c021cbe26878020d5c6668aada91bdda2aa65a675ece90648e09dd13494c37bd12cc9e755b673b9e42a2a1deef3ff9e486011ff8f02fdfbe9aabc9882d54079ff29cc1e8f53af8bbc4b4894db691f14321dd6a705f3b06d3fc7f7a2310eb0ed4df867abe2ab839e4c4be6401347596fd61d358534d3dd5b743bfb0d6dfec196ef9978f0dd988511778002d4cbcac3288f18584a95bbbe78764da6e098666ded8bc1d106639977961c18cb31420c16fbf37edfbe435ee931998f55275084d3124ad2a8719c646e7c46101bd712e96dd8bf710e84c63a991d1031fd5f78fa6138589bc1cf91a0232d1d9082cb42495b3807270fefadf18fa4f1b062dbaca5a3416b90bdba00c381e5b19d0640444d241187d7e1cd2fcf541fb0d87c014ff918691f712fa6804b74be446c08778911d61f8c93ce058c4b16e88170c0b444d06a5a68ee27a407d5a9ee4f38e7fc6d109c50b1b2d9fe00219bd582b89501651ddeba3205a5e79ea059ba024130f7b667d8b5ee4586c33cde4a6077c7e0ebfd57205d16d5f174cbe63821c8b488db1f27177ffe92a5277f1b6ab59c138ac23fdc69299e7e057a064ff643ceaa516adb8fd828da7fd71cba0c7e8254e09c48639d1903d64824b05873f61aeec3fa63fb356a48040aab7df4b210cd334674d61736d6afbc2441c4385e0ef23b2b92bd6261c447e655aeeaaf1c7bee9dff39bbb28e06686debe74961e615707e04fc5eb6317713464c431ac224ac1bdbf41bb0cbd4925a6815250996a04f80cd60fd3ccd871705eac8a5e7be51b7b72e088755ac8a062d219d1223b32baf21ae38c2806bfbec4fcfb4a4046a5a952206869ba1a05ee93852de710085904261abf93342ba70eb8154a7ac1bd477b692aaa012758c79e3b9d2b82cec79a0883e9a91e5dfeffcf568bd28d58077c9d211cc854d0bb05fa116a9bab1247b1e9726f0d4a8662b5ee09b4765150b7db6bd260bc64c92798c7d2611322bb9b84d9acade4b20af9fccfcff210bdd699435df7a56e9c16852bcdc59d17d0b890679d3885d462b40a0ea6f55b8147ed78ff6c6853fe21c2b13c04f5019c76c028416a287f759307bc7d98a09e73d9a2aa85b17beffd33c5cd38943c1f5eebdef8f3090e23be7cb3eaa39bd51cb76a9fb443fbd5fb2cab066373ecf6fa1ac983797d18ed547a0d3c99f07c21d44317cb01532c090d201147f360f3d57d07d7ea4d7fc4046cf1cc6dfeed4606100349ba0cfd9bff34a17fa833bc2ea0b02844e2c6749260afea317ab976299704da0bdb927809919bf5b563aa04a576e46e4dcdd5611a8215ab471ba2c5cb052c983b8b14616f429df95d60d740a092290ed5ca3abc770bf774cbe030a52426b6ba7f5588802ae1282bf272e06b01a03d51280a94fcc57982eefc4d09f7a2ccaec76947aa4712f6fabe8086b1d1a13fdc3bd9e7527763a952f814ce7aafbe919dfe0d4161ef299076893a19408d0dd60520bfdf2aeae65f672fa3727924dc147dc915ca2a19ffdc438b0cde27570d969761d3ad2494321e88b557812c80b76b5c54097375403c02cc4715c865795602ff92b7aee963aa34ea5de5fcaa0bd227394238830c974081c3aeacd92a4812ed876354e32411f5a7d543744b81a42c8c4c3b87c0c8e1ef044038608c435ad8fcb0d6fd460d4c6b2374271ebb2269c8a1712eaf94737fb43bea7e6562209058503314a844e519888901312e8808e6f8b6dca4d09211b625a1b5f99b24a8cee0c251388847f09103138b4788f071b0c18c73caaa2f86321ee241d7bfb75203080d6859dab1f893ba82034544e23ba0db55b62e8b90c3bd4ac465b6c23c67418120a5bfbaa8c63a9cd77429943316105cffe6c2f6582387e18bce0345299e46e97a2b4d82a632c75285b0a53f17eccd4c6918df4e4bad90fd851ca97709be3075b907d21531b4e068bb775f4fd145fe1af476d93562339adf9a311e23b3353e47f1852421307715a664404061977cc61d2ea4f202092620e7f1d4814ad8bf6e9b27a715bf003de1ce447e4d75f97cbf7bac3fc8a2ff9a3a557844856f121c153e46a84919fc133884202cb7eb644f669769547dceb5418019bc2b81da61453787a9de21879607a416d58ce673559bd165e59d5c131ac0fa229f0941aa33f51726a6fac0988091a0b4338d89f2617d1d0935a5a4e5ef1268d5577c61a61c22db3305648bf8c64c3ac841383196f2e18b6738da25154229f11cc402679c749f17b199510fcd8b54e901647aca514f214113984195942ced45bd4d43312bf0e88d0d29a5f1c7a1c3103a4f7e3177f2b87dc212b715147721de70df44b279905e53d41f1535b95f4c19fa46c9d5909cd71153c4bb9bef4b4a77f2e9ef4c1f89ee8a5db58f78a0279e593f6fa62b03765877daf87cb08834417ae39b8c9416db73d3c27b3ff6768b62456e40d62a81191dee3d7789e1cc259354b948ced99016ad61531fcda960f2c73727efffa0cd5c0671c4d3e465e14f78f7a9570dec72b6af73cd16bc9aa321662b1e96c728fccd9dbeb897d5aa550cff46dc9fb1f3eb12f2d66e3d494ee8ca099bf2d789aaeaaf031b910fa9341e0a7c72db7d3ad4553fc0c14eb970636d06d42c05a70c8b580e2461a42464fc3e53bd72cb423b3982a453294e7bf11c468dc0a8c8c19287136691c3e3c35731818a5e0dd49f05406ddf343a9e68d171bddab2bdb5e508d8e690a1bb53bbe20c8ddce6", 0x1000}, {&(0x7f00000015c0)="c84a0fff2ee2c18c7e113e4122129dfca38e2e640c573bf47595dec44db89bde5b181e35c2a7cd30e1ca92e13d15a9355bfadc655cd98ec838557458a92641dfa05ef9ddb65865e0c39caa12433a3ab8f98930700ddcca90f811d0b28712ae29fb704a788ccaa2996be9a3661f31463b28a483e6ef762b200dde5e993d5bbca4621b363a18e3db0460e0eea66844846608569c573b798a40c3ba18042a4a22571d58630c2f", 0xa5}], 0x5, &(0x7f0000001700)=[{0x58, 0x0, 0x7, "6864ad29f01126a7eb15847e2e00f6cb0ee8b6bf4d254b079fe5fc7cd0f472a559cc2d9affc25d5ff31fd70b59f596ff452239a33642c4c8474f50f7cdc4264e0dd09c334f6b9c"}, {0x98, 0x10b, 0x4, "b84da44d85a75255a4caaf97e1c6e7921f929c5f206ff559cd13a66b2f67d0ea3fd4ba1f4d9a646499665c7f875ef2ea5d8d8f11ee3f6adfe7f6df09021b85897a0d746cc4afadaddd6e0ed3a5c22188a976ef95b4c8ab299b5e8bf65dba2d23a746a8b95f9839801f71b2f750e0511dd02774c0d003a49a151b71d8a79914e1c8bc"}, {0x110, 0x116, 0x9, "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"}, {0xb8, 0x0, 0x0, "221637e78a71fbd35cfe113e626a5c746a54a8bde7e3ef3954f14e7475f8556552f38fcf2cc5bbde1fa21d798a6e82a136b18ab53a17474c3c32b18b59808ed83bc6da0484ec1bc220f602a2fe81a9c971fe6738103ec3caf0a34d007dd867f3a4f3b91716f454c14631ed374b05c6edfc3bd031164405a248940908880808360b16ed1bb8a56b685a2aee7edfdf5f4403f3d8bdeeec5db61dd9f8c8faebf6fbf314020fa9"}], 0x2b8, 0x40}, 0x4040014) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000300)=0x100000001) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000180)={r4, 0x7}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_NODELAY(r3, 0x84, 0x3, &(0x7f0000000000)=0x9, 0x4) close(0xffffffffffffffff) pipe2(&(0x7f00000002c0), 0x84800) ioctl$sock_netrom_SIOCGSTAMPNS(r1, 0x8907, &(0x7f0000001a00)) ioctl$sock_SIOCINQ(r3, 0x541b, &(0x7f0000001a40)) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000001f40)=@assoc_value={r4, 0xf4d}, &(0x7f0000001f80)=0x8) ioctl$KVM_SET_XSAVE(r1, 0x5000aea5, &(0x7f0000001ac0)={"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"}) 2018/05/06 05:52:40 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x2000000}}) 2018/05/06 05:52:40 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x0, 0x4000000000000000}}) [ 241.899571] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 241.906856] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 241.914141] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 241.921425] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 2018/05/06 05:52:41 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000005380)=[{{&(0x7f0000000000)=@alg, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/59, 0x3b}, {&(0x7f0000000180)=""/134, 0x86}], 0x2, &(0x7f0000000280)=""/110, 0x6e, 0x8}, 0x80000001}, {{&(0x7f0000000300)=@l2, 0x80, &(0x7f0000001680)=[{&(0x7f0000000440)=""/31, 0x1f}, {&(0x7f0000000480)=""/215, 0xd7}, {&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000001580)=""/198, 0xc6}], 0x4, &(0x7f00000016c0)=""/4096, 0x1000, 0xc1677c4}, 0x8}, {{&(0x7f00000026c0)=@in={0x0, 0x0, @rand_addr}, 0x80, &(0x7f0000002840)=[{&(0x7f0000002740)=""/46, 0x2e}, {&(0x7f0000002780)=""/83, 0x53}, {&(0x7f0000002800)=""/50, 0x32}], 0x3, &(0x7f0000002880)=""/131, 0x83, 0x8001}, 0x3599}, {{0x0, 0x0, &(0x7f0000002f40)=[{&(0x7f0000002940)=""/66, 0x42}, {&(0x7f00000029c0)=""/201, 0xc9}, {&(0x7f0000002ac0)=""/227, 0xe3}, {&(0x7f0000002bc0)=""/239, 0xef}, {&(0x7f0000002cc0)=""/27, 0x1b}, {&(0x7f0000002d00)=""/241, 0xf1}, {&(0x7f0000002e00)=""/16, 0x10}, {&(0x7f0000002e40)=""/198, 0xc6}], 0x8, &(0x7f0000002fc0)=""/115, 0x73, 0x1000}, 0x1ff}, {{&(0x7f0000003040)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f00000032c0)=[{&(0x7f00000030c0)=""/223, 0xdf}, {&(0x7f00000031c0)=""/233, 0xe9}], 0x2, &(0x7f0000003300)=""/230, 0xe6, 0x8}, 0xffff}, {{0x0, 0x0, &(0x7f0000003700)=[{&(0x7f0000003400)=""/152, 0x98}, {&(0x7f00000034c0)=""/192, 0xc0}, {&(0x7f0000003580)=""/14, 0xe}, {&(0x7f00000035c0)=""/133, 0x85}, {&(0x7f0000003680)=""/106, 0x6a}], 0x5, &(0x7f0000003780)=""/251, 0xfb, 0x7}, 0x6}, {{&(0x7f0000003880)=@nfc, 0x80, &(0x7f0000003ec0)=[{&(0x7f0000003900)=""/190, 0xbe}, {&(0x7f00000039c0)=""/243, 0xf3}, {&(0x7f0000003ac0)=""/218, 0xda}, {&(0x7f0000003bc0)=""/227, 0xe3}, {&(0x7f0000003cc0)=""/116, 0x74}, {&(0x7f0000003d40)=""/11, 0xb}, {&(0x7f0000003d80)=""/132, 0x84}, {&(0x7f0000003e40)=""/116, 0x74}], 0x8, &(0x7f0000003f40)=""/77, 0x4d, 0x7f}, 0xe3}, {{&(0x7f0000003fc0)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f00000052c0)=[{&(0x7f0000004040)=""/89, 0x59}, {&(0x7f00000040c0)=""/188, 0xbc}, {&(0x7f0000004180)=""/224, 0xe0}, {&(0x7f0000004280)=""/54, 0x36}, {&(0x7f00000042c0)=""/4096, 0x1000}], 0x5, &(0x7f0000005340)=""/40, 0x28, 0x8}, 0x8137}], 0x8, 0x2003, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000056c0)={0x0, 0x0, &(0x7f0000005700)}, &(0x7f0000005640)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000005680)={0xf, 0x1f, 0x8, 0xffffffff, 0x7, 0x4, 0xfff, 0x9, r1}, 0x20) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0x0, 0x8, 'queue0\x00'}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r2 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r2) 2018/05/06 05:52:41 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0x0, 0x0, 'queue0\x00', 0x1ff}) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x400042, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000100)={'broute\x00'}, &(0x7f0000000040)=0x78) 2018/05/06 05:52:41 executing program 6: r0 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x8000080403, 0x440000) close(r0) 2018/05/06 05:52:41 executing program 7: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x200, 0x0) mknod(&(0x7f0000000840)='./file0\x00', 0x0, 0x0) r1 = syz_fuse_mount(&(0x7f0000000080)='./file0\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/55, 0x37}], 0x1, 0x0) utime(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f0000000100)={{0xffffffffffffffff, 0x2, 0x9, 0x0, 0x7f}, 0x6, 0x1, 'id0\x00', 'timer1\x00', 0x0, 0x8000, 0xffff, 0x400, 0x2}) close(0xffffffffffffffff) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x80000, 0x0) faccessat(r2, &(0x7f0000000040)='./file0\x00', 0x8, 0x100) 2018/05/06 05:52:41 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:41 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x0, 0x200000000000000}}) 2018/05/06 05:52:41 executing program 1 (fault-call:1 fault-nth:65): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:52:41 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./contro+\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:52:41 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x0, 0xf}}) 2018/05/06 05:52:41 executing program 6: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r0, 0x4010aeab, &(0x7f0000000040)={0x6}) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000600)) r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) write$binfmt_elf32(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x527) close(0xffffffffffffffff) [ 242.809928] FAULT_INJECTION: forcing a failure. [ 242.809928] name failslab, interval 1, probability 0, space 0, times 0 [ 242.821254] CPU: 1 PID: 16634 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 242.828544] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 242.837910] Call Trace: [ 242.840516] dump_stack+0x1b9/0x294 [ 242.844160] ? dump_stack_print_info.cold.2+0x52/0x52 [ 242.849357] ? __mutex_lock+0x7d9/0x17f0 [ 242.853441] should_fail.cold.4+0xa/0x1a 2018/05/06 05:52:41 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x0, 0xfdfdffff00000000}}) [ 242.857517] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 242.862638] ? kasan_kmalloc+0xc4/0xe0 [ 242.866542] ? graph_lock+0x170/0x170 [ 242.870362] ? find_held_lock+0x36/0x1c0 [ 242.874450] ? __lock_is_held+0xb5/0x140 [ 242.878546] ? check_same_owner+0x320/0x320 [ 242.882882] ? kasan_check_write+0x14/0x20 [ 242.887141] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 242.892087] ? rcu_note_context_switch+0x710/0x710 [ 242.897036] __should_failslab+0x124/0x180 [ 242.901291] should_failslab+0x9/0x14 [ 242.905108] kmem_cache_alloc+0x2af/0x760 [ 242.909266] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 242.914217] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 242.919250] __kernfs_new_node+0xe7/0x580 [ 242.923409] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 242.928186] ? mutex_unlock+0xd/0x10 [ 242.931914] ? kernfs_activate+0x20e/0x2a0 [ 242.936161] ? kernfs_walk_and_get_ns+0x320/0x320 [ 242.941016] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 242.946568] ? kernfs_link_sibling+0x1d2/0x3b0 [ 242.951172] kernfs_new_node+0x80/0xf0 [ 242.955077] __kernfs_create_file+0x4d/0x330 2018/05/06 05:52:41 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x0, 0x400000000000000}}) [ 242.959499] sysfs_add_file_mode_ns+0x21a/0x560 [ 242.964183] sysfs_add_file+0x4e/0x60 [ 242.967997] sysfs_merge_group+0xfa/0x230 [ 242.972172] dpm_sysfs_add+0x161/0x210 [ 242.976074] device_add+0xa11/0x16d0 [ 242.979806] ? device_private_init+0x230/0x230 [ 242.984401] ? kfree+0x1e9/0x260 [ 242.988220] ? kfree_const+0x5e/0x70 [ 242.991946] device_create_groups_vargs+0x1ff/0x270 [ 242.996982] device_create_vargs+0x46/0x60 [ 243.001226] bdi_register_va.part.10+0xbb/0x9b0 [ 243.005900] ? cgwb_kill+0x630/0x630 2018/05/06 05:52:41 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x0, 0xfdfdffff}}) [ 243.009625] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 243.015166] ? bdi_init+0x416/0x510 [ 243.018798] ? wb_init+0x9e0/0x9e0 [ 243.022341] ? bdi_alloc_node+0x67/0xe0 [ 243.026315] ? bdi_alloc_node+0x67/0xe0 [ 243.030294] ? rcu_read_lock_sched_held+0x108/0x120 [ 243.035316] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 243.040604] ? _raw_spin_unlock+0x22/0x30 [ 243.044790] bdi_register_va+0x68/0x80 [ 243.048689] super_setup_bdi_name+0x123/0x220 [ 243.053188] ? kill_block_super+0x100/0x100 2018/05/06 05:52:41 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) [ 243.057514] ? kmem_cache_alloc_trace+0x616/0x780 [ 243.062363] ? match_wildcard+0x3c0/0x3c0 [ 243.066518] ? trace_hardirqs_on+0xd/0x10 [ 243.070674] fuse_fill_super+0xe6e/0x1e20 [ 243.074838] ? fuse_get_root_inode+0x190/0x190 [ 243.079438] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 243.084466] ? kasan_check_read+0x11/0x20 [ 243.088622] ? cap_capable+0x1f9/0x260 [ 243.092519] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 243.098057] ? security_capable+0x99/0xc0 [ 243.102221] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 2018/05/06 05:52:41 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x0, 0x40000000}}) [ 243.107771] ? ns_capable_common+0x13f/0x170 [ 243.112184] ? get_anon_bdev+0x2f0/0x2f0 [ 243.116277] ? sget+0x113/0x150 [ 243.119570] ? fuse_get_root_inode+0x190/0x190 [ 243.124163] mount_nodev+0x6b/0x110 [ 243.127800] fuse_mount+0x2c/0x40 [ 243.131835] mount_fs+0xae/0x328 [ 243.135207] vfs_kern_mount.part.34+0xd4/0x4d0 [ 243.139795] ? may_umount+0xb0/0xb0 [ 243.143426] ? _raw_read_unlock+0x22/0x30 [ 243.147577] ? __get_fs_type+0x97/0xc0 [ 243.151476] do_mount+0x564/0x3070 [ 243.155026] ? copy_mount_string+0x40/0x40 2018/05/06 05:52:41 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x0, 0x1000000}}) [ 243.159273] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 243.164047] ? retint_kernel+0x10/0x10 [ 243.167949] ? copy_mount_options+0x1f0/0x380 [ 243.172448] ? __sanitizer_cov_trace_pc+0x38/0x50 [ 243.177295] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 243.182834] ? copy_mount_options+0x285/0x380 [ 243.187338] ksys_mount+0x12d/0x140 [ 243.190972] __x64_sys_mount+0xbe/0x150 [ 243.194949] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 243.199975] do_syscall_64+0x1b1/0x800 [ 243.203866] ? finish_task_switch+0x1ca/0x810 [ 243.208368] ? syscall_return_slowpath+0x5c0/0x5c0 [ 243.213311] ? syscall_return_slowpath+0x30f/0x5c0 [ 243.218250] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 243.223626] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 243.228483] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 243.233673] RIP: 0033:0x455979 [ 243.236863] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 243.244578] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 243.251848] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 243.259109] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 243.266388] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 243.273666] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 2018/05/06 05:52:42 executing program 2: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0x0, 0x8, 'queue0\x00'}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.stat\x00', 0x0, 0x0) r3 = dup2(r1, r1) getsockopt$EBT_SO_GET_INIT_ENTRIES(r2, 0x0, 0x83, &(0x7f0000000240)={'filter\x00', 0x0, 0x4, 0x98, [], 0x1, &(0x7f0000000100)=[{}], &(0x7f0000000180)=""/152}, &(0x7f00000002c0)=0x78) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f0000000040)=r3) 2018/05/06 05:52:42 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:42 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./contro-\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:52:42 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x0, 0x4}}) 2018/05/06 05:52:42 executing program 1 (fault-call:1 fault-nth:66): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:52:42 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x4, 0x81) close(0xffffffffffffffff) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x5, 0x8000) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x19dd319a, 0x6, 0x4, 0x9, 0x8}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000100)={r2, 0x100}, &(0x7f0000000140)=0x8) r3 = getpgrp(0x0) r4 = geteuid() stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000540)=0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f00000008c0)={{0x8, 0x1}, 'port1\x00', 0x80, 0xc0000, 0x80000001, 0x7, 0x9, 0x40, 0x0, 0x0, 0x6, 0x4}) getresuid(&(0x7f0000000580), &(0x7f00000005c0)=0x0, &(0x7f0000000600)) r8 = getgid() ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000640)=0x0) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x7, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0]) sendmsg$netlink(r1, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f00000001c0)={0x260, 0x1d, 0xa00, 0x70bd2d, 0x25dfdbff, "", [@nested={0x194, 0x68, [@typed={0x8, 0x81, @u32}, @generic="e7efaf165ef0d0b91ce0494de33b93d39dd6842e27eb3a0d5ea6b3859ee2ccb9e36679613ba35160538f3745937ce2775562449c4c865218beb5be181af92d031cab5bc4754254f28bb093b86adb47a4039d745ad877bfdd7763b3cd04b83da44a8f7fdc358795f94a3a185f46ee9fe4ba9e07f27b12b51ab43e2ecaa07b517f5557ab5e1fa547ce9677e3e3dee9fdad74c267a9046aea8e9327e3c282150991d06c1ccece31a21ee29e71a051afa4325d1bbf5c2fa397f5422ecf149dd32911989a833533f0101a31", @typed={0x14, 0xf, @ipv6=@mcast1={0xff, 0x1, [], 0x1}}, @generic="6340612bc04e917e57ca176babfb608925631e6e02831806eae751f1f4ef04ca188cc19df81422519540cc1c31e15117cde89f2744be6d55b2ab34ff3cf9d15ccd3eb43098fa57267405aaf2b07d2d7cc8024a0fcd792365c72292ae0f0802a73036d06bcd42a8d3c3ff751852", @typed={0x8, 0x71, @fd=r1}, @typed={0x34, 0x1, @binary="a9e37ccce6f06e8bf81cc568341075e9a7111eca8423da1ae055eb8eac9901685239e6c5287163c73797004355"}]}, @generic="6758942514d6e9211efd0fda62b8ba8fbc651dc5412c71566fb5d54e13bc2320f72a0aa7792b3d4395bdee9827eddfe49887c749a5e94bdff195f57dfade2bc85b99954f3500919a10e76fc6ed93aacc0b26601813fef3e161169db1010f1985d40596c6e494c804985c46f4b5f57af9de5132dd055e4514de040942dc42e747fd5f10569a749e1876a3529e0491e13d21996992cecf507aa2cac5d3adcfb6e6618e1b5b8fdb2b7fc21245b7b063c784b4e3be793486dc8e9b"]}, 0x260}], 0x1, &(0x7f0000000780)=[@rights={0x30, 0x1, 0x1, [r0, r0, r1, r0, r1, r0, r0]}, @rights={0x18, 0x1, 0x1, [r1]}, @cred={0x20, 0x1, 0x2, r3, r4, r5}, @rights={0x18, 0x1, 0x1, [r0]}, @cred={0x20, 0x1, 0x2, r6, r7, r8}, @cred={0x20, 0x1, 0x2, r9, r10, r11}, @rights={0x30, 0x1, 0x1, [r1, r0, r0, r0, r0, r0, r1]}], 0xf0, 0x4000000}, 0x4040) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000180)={r1, r1, 0x9, 0x1}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b00)={r1, 0x0, 0x6e, 0xd0, &(0x7f0000000980)="2d808fcb11ee1dc0b8ccfcd00fb32908aee82d47e07f348cefbe185904778b804cd43315116be9fe0d0a13877637148870e56a9c357c3f9601383dbe17504b8a1c038c24fbe41f36faa47b285e9bff7d49bfb69544f18dd0a4dbf4913eea4e103e9424f5e4db5e1b1331c5f32654", &(0x7f0000000a00)=""/208, 0x4, 0x8}, 0x28) 2018/05/06 05:52:42 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0x0, 0x0, 'queue0\x00', 0x1ff}) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x1, 0x4000) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:52:42 executing program 6: r0 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x80ffffff, 0x85) r1 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x3, 0x8000) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000140)) recvmsg$netrom(r1, &(0x7f0000000640)={&(0x7f0000000180)=@full={{0x3, {"baa716f3d345e8"}, 0x8}, [{"5508a2f7fdd518"}, {"3856b8a74cde0b"}, {"be2fd39b17b22f"}, {"8476048060e9f9"}, {"09316aab5341de"}, {"1ceaaf1a5f77ac"}, {"8d9dddef035469"}, {"0f840d42649500"}]}, 0x48, &(0x7f00000004c0)=[{&(0x7f0000000200)="905129e1cf218cd529b938bd0a845a7095dfa69fd267dc85a18b6f3ae31b3ad19f097832942440fb29fcaffea8364a046ea3a65ee38e98d3af1f5dcc26a0837136c235167cd5b427f407fb22fe66e9acc6da88f28e62ca9442ba620ceaddc016f7df5baf5f6f61494708c344f35fcf08f57aab8b853031316e1884d360d269f6352ee3b5ad8eeacb0878124b0d6989c93549344b7a76d59bbbcd9c6647fec53cd276a0ea74a78fe14a843c4f0c86179499b4", 0xb2}, {&(0x7f00000002c0)="b8dbe921c19b134cbec2ac0f79c1aeca0350177961aef600ef1a2527e588207369cafa80a56e4c1c57d8c2d2d641b5dc4d075aa210c80b4caa42f3de2d4da2589fed782ae51cd3c124f38e645fde627c6bef3a9b0d261a090e0936872de1f5141bcc6beb8b424b3c820b7b3293585e69672349863c917aea3bd35d894687ce32ab54335115ffec57f74c49e3ccdaa0e79d8a82e246a6d11b0762627f96e282b678d2cd6a3ad61bea6a15a24f69315f297544ffebbd7e03", 0xb7}, {&(0x7f0000000380)="54b9cc297bcb91d21f74f179ab5c1c7f8e82290a0991915a8101aba832e754654379af0366d09bce3702058c26ddfb6d01c473a95bcc0ca211dc512cce886432126e876a54ea5239d1be0bccbe5f78025aece603782c01d0000eadde1a8eff08c87bef37c3d9d9e35c8b2d61581ebe8aa0c35ad45e9cb37dcf6376d6c7ceeb008a0c44dca991739dd6a22668b60d09b5ed190799d563952be4d5aaa1e5ff0bfd47a2e36d01d65f5184800142467dd3b05ae841ddcc6bb343ee68829dbb244b3a078180b3f44158ff64cf53b7a63cce2b195babdf62717d4d0acbe0fd80ef79f5d53b4c", 0xe3}, {&(0x7f0000000480)="f5ae58ad0e9024ab3cd27a2c15f2d0c0c452d805a8f7247294266fc486382f10d1319051c9a1762db9e6de1e2559d6a1ad60b6131a9d", 0x36}], 0x4, &(0x7f0000000500)=[{0x78, 0x29, 0x9, "741ff254b0cb05ff0ef4e9b5af71397c4c71825ff70c8848db6156ad8b4e324d5b6f6ca51f0b8fdb7341f2286667c60349c19a1b0514900253d8d263e261ae04b13101317dc663eeefd171bfb11d1a788768cd2893a574a32c28146af8a309a91729536a1f44732e"}, {0x18, 0x115, 0x9, "1b2db7ecaba4"}, {0xa0, 0x109, 0x9, "1c7014059746b531bdcdaa571ca51bccd9b069fde2b039466cedd682cecafe40d47d3e6f0ef1ead77c24fdda58c168d18e5f5907df1cc2f2e7111ff888f982ba116ac535b0fdd142136d83399b2b9ab3609e92481cb73fb44adcb0b343d4c5d5df1e44f133396faf1731eaf719908e793855dad80632f118f4ba3ca76be0a4d458b4e9642f9dda80a1509cad5f"}], 0x130, 0x8000}, 0x10000) close(r0) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x3, 0x4000) recvfrom$ipx(r2, &(0x7f0000000040)=""/13, 0xd, 0x40, &(0x7f00000000c0)={0x4, 0x7, 0x0, "e02683d75696", 0x401}, 0x10) [ 243.887644] FAULT_INJECTION: forcing a failure. [ 243.887644] name failslab, interval 1, probability 0, space 0, times 0 [ 243.899459] CPU: 1 PID: 16701 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 243.906743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 243.916106] Call Trace: [ 243.918720] dump_stack+0x1b9/0x294 [ 243.922382] ? dump_stack_print_info.cold.2+0x52/0x52 [ 243.927677] ? kobject_uevent_env+0x62e/0xea0 [ 243.932194] should_fail.cold.4+0xa/0x1a 2018/05/06 05:52:42 executing program 6: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) 2018/05/06 05:52:42 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x0, 0xffffffff00000000}}) 2018/05/06 05:52:42 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x0, 0xf00}}) [ 243.936269] ? debug_check_no_locks_freed+0x310/0x310 [ 243.941484] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 243.946606] ? __might_sleep+0x95/0x190 [ 243.950605] ? graph_lock+0x170/0x170 [ 243.954418] ? __mutex_lock+0x7d9/0x17f0 [ 243.958494] ? unwind_get_return_address+0x61/0xa0 [ 243.963439] ? find_held_lock+0x36/0x1c0 [ 243.967520] ? __lock_is_held+0xb5/0x140 [ 243.971610] ? check_same_owner+0x320/0x320 [ 243.975953] ? rcu_note_context_switch+0x710/0x710 [ 243.980899] ? put_dec+0xf0/0xf0 [ 243.984277] ? format_decode+0x1a9/0xae0 2018/05/06 05:52:42 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x0, 0x300000000000000}}) 2018/05/06 05:52:42 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x0, 0xc3ffffff00000000}}) [ 243.988351] __should_failslab+0x124/0x180 [ 243.992597] should_failslab+0x9/0x14 [ 243.996412] kmem_cache_alloc_node+0x272/0x780 [ 244.001018] __alloc_skb+0x111/0x780 [ 244.004754] ? skb_scrub_packet+0x580/0x580 [ 244.009089] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 244.014302] ? netlink_has_listeners+0x2ff/0x4c0 [ 244.019074] ? netlink_tap_init_net+0x3c0/0x3c0 [ 244.023765] kobject_uevent_env+0x801/0xea0 [ 244.028099] ? device_pm_add+0x221/0x340 [ 244.032186] kobject_uevent+0x1f/0x30 2018/05/06 05:52:42 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x0, 0x100000000000000}}) 2018/05/06 05:52:42 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)="2e2f66696c6530ff", &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) [ 244.036000] device_add+0xb01/0x16d0 [ 244.039732] ? device_private_init+0x230/0x230 [ 244.044333] ? kfree+0x1e9/0x260 [ 244.047709] ? kfree_const+0x5e/0x70 [ 244.051434] device_create_groups_vargs+0x1ff/0x270 [ 244.056467] device_create_vargs+0x46/0x60 [ 244.060714] bdi_register_va.part.10+0xbb/0x9b0 [ 244.065392] ? cgwb_kill+0x630/0x630 [ 244.069116] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 244.074657] ? bdi_init+0x416/0x510 [ 244.078304] ? wb_init+0x9e0/0x9e0 [ 244.081861] ? bdi_alloc_node+0x67/0xe0 2018/05/06 05:52:42 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) [ 244.085843] ? bdi_alloc_node+0x67/0xe0 [ 244.089829] ? rcu_read_lock_sched_held+0x108/0x120 [ 244.094861] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 244.100766] ? _raw_spin_unlock+0x22/0x30 [ 244.104927] bdi_register_va+0x68/0x80 [ 244.108827] super_setup_bdi_name+0x123/0x220 [ 244.113340] ? kill_block_super+0x100/0x100 [ 244.117674] ? kmem_cache_alloc_trace+0x616/0x780 [ 244.122527] ? match_wildcard+0x3c0/0x3c0 [ 244.126686] ? trace_hardirqs_on+0xd/0x10 [ 244.130847] fuse_fill_super+0xe6e/0x1e20 [ 244.135004] ? fuse_get_root_inode+0x190/0x190 [ 244.139598] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 244.144626] ? kasan_check_read+0x11/0x20 [ 244.148788] ? cap_capable+0x1f9/0x260 [ 244.152699] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 244.158244] ? security_capable+0x99/0xc0 [ 244.162402] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 244.167945] ? ns_capable_common+0x13f/0x170 [ 244.172362] ? get_anon_bdev+0x2f0/0x2f0 [ 244.176425] ? sget+0x113/0x150 [ 244.179712] ? fuse_get_root_inode+0x190/0x190 [ 244.184300] mount_nodev+0x6b/0x110 [ 244.187934] fuse_mount+0x2c/0x40 [ 244.191385] mount_fs+0xae/0x328 [ 244.194740] vfs_kern_mount.part.34+0xd4/0x4d0 [ 244.199320] ? may_umount+0xb0/0xb0 [ 244.202929] ? _raw_read_unlock+0x22/0x30 [ 244.207058] ? __get_fs_type+0x97/0xc0 [ 244.210932] do_mount+0x564/0x3070 [ 244.214473] ? copy_mount_string+0x40/0x40 [ 244.218695] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 244.223700] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 244.228465] ? retint_kernel+0x10/0x10 [ 244.232359] ? copy_mount_options+0x1f0/0x380 [ 244.236847] ? copy_mount_options+0x1f6/0x380 [ 244.241345] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 244.246867] ? copy_mount_options+0x285/0x380 [ 244.251359] ksys_mount+0x12d/0x140 [ 244.254990] __x64_sys_mount+0xbe/0x150 [ 244.258952] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 244.263957] do_syscall_64+0x1b1/0x800 [ 244.267836] ? finish_task_switch+0x1ca/0x810 [ 244.272332] ? syscall_return_slowpath+0x5c0/0x5c0 [ 244.277246] ? syscall_return_slowpath+0x30f/0x5c0 [ 244.282179] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 244.287544] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 244.292373] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 244.297553] RIP: 0033:0x455979 [ 244.300734] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 244.308425] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 244.315679] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 244.322939] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 244.330201] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 244.337461] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 [ 244.534444] device bridge_slave_1 left promiscuous mode [ 244.540138] bridge0: port 2(bridge_slave_1) entered disabled state [ 244.551630] device bridge_slave_0 left promiscuous mode [ 244.557238] bridge0: port 1(bridge_slave_0) entered disabled state [ 244.591439] team0 (unregistering): Port device team_slave_1 removed [ 244.604330] team0 (unregistering): Port device team_slave_0 removed [ 244.614133] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 244.631558] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 244.661182] bond0 (unregistering): Released all slaves 2018/05/06 05:52:43 executing program 2: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0x0, 0x8, 'queue0\x00'}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) r2 = dup2(r1, r1) ioctl$TIOCGWINSZ(r2, 0x5413, &(0x7f0000000000)) 2018/05/06 05:52:43 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:43 executing program 1 (fault-call:1 fault-nth:67): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:52:43 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x0, 0x4000000}}) 2018/05/06 05:52:43 executing program 7: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_RESET_OWNER(r0, 0xaf02, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) r2 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x5, 0x4000) read(r2, &(0x7f00000000c0)=""/154, 0x9a) fcntl$setpipe(r1, 0x407, 0x0) readahead(r2, 0x8001, 0x40) 2018/05/06 05:52:43 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0x0, 0x0, 'queue0\x00', 0x1ff}) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0xd53, 0x0) sysfs$3(0x3) 2018/05/06 05:52:43 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./contro.\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:52:43 executing program 6: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x4, 0x8000) close(0xffffffffffffffff) 2018/05/06 05:52:43 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:43 executing program 6: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x800) ioctl$KVM_ASSIGN_DEV_IRQ(r0, 0x4040ae70, &(0x7f0000000040)={0x1f, 0x4, 0x2, 0x2}) 2018/05/06 05:52:43 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x0, 0x4000}}) [ 245.061617] FAULT_INJECTION: forcing a failure. [ 245.061617] name failslab, interval 1, probability 0, space 0, times 0 [ 245.072963] CPU: 1 PID: 16770 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 245.080257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 245.089617] Call Trace: [ 245.092222] dump_stack+0x1b9/0x294 [ 245.095876] ? dump_stack_print_info.cold.2+0x52/0x52 [ 245.101075] ? is_bpf_text_address+0xd7/0x170 [ 245.105584] ? kernel_text_address+0x79/0xf0 [ 245.110003] ? __unwind_start+0x166/0x330 [ 245.114167] should_fail.cold.4+0xa/0x1a [ 245.118234] ? __save_stack_trace+0x7e/0xd0 [ 245.122657] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 245.127775] ? graph_lock+0x170/0x170 [ 245.132125] ? save_stack+0x43/0xd0 [ 245.135765] ? kasan_kmalloc+0xc4/0xe0 [ 245.139669] ? kasan_slab_alloc+0x12/0x20 [ 245.143835] ? find_held_lock+0x36/0x1c0 [ 245.147915] ? __lock_is_held+0xb5/0x140 [ 245.151997] ? check_same_owner+0x320/0x320 [ 245.156332] ? rcu_note_context_switch+0x710/0x710 [ 245.161281] __should_failslab+0x124/0x180 [ 245.165530] should_failslab+0x9/0x14 [ 245.169342] kmem_cache_alloc_node_trace+0x26f/0x770 [ 245.174463] __kmalloc_node_track_caller+0x33/0x70 [ 245.179408] __kmalloc_reserve.isra.38+0x3a/0xe0 [ 245.184173] __alloc_skb+0x14d/0x780 [ 245.187893] ? skb_scrub_packet+0x580/0x580 [ 245.192217] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 245.197423] ? netlink_has_listeners+0x2ff/0x4c0 [ 245.202181] ? netlink_tap_init_net+0x3c0/0x3c0 [ 245.206864] kobject_uevent_env+0x801/0xea0 [ 245.211187] ? device_pm_add+0x221/0x340 [ 245.215262] kobject_uevent+0x1f/0x30 [ 245.219067] device_add+0xb01/0x16d0 [ 245.222791] ? device_private_init+0x230/0x230 [ 245.227375] ? kfree+0x1e9/0x260 [ 245.230748] ? kfree_const+0x5e/0x70 [ 245.234469] device_create_groups_vargs+0x1ff/0x270 [ 245.239490] device_create_vargs+0x46/0x60 [ 245.243730] bdi_register_va.part.10+0xbb/0x9b0 [ 245.248396] ? cgwb_kill+0x630/0x630 [ 245.252116] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 245.257650] ? bdi_init+0x416/0x510 [ 245.261277] ? wb_init+0x9e0/0x9e0 [ 245.264819] ? bdi_alloc_node+0x67/0xe0 [ 245.268790] ? bdi_alloc_node+0x67/0xe0 [ 245.272766] ? rcu_read_lock_sched_held+0x108/0x120 [ 245.277784] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 245.283065] ? _raw_spin_unlock+0x22/0x30 [ 245.287217] bdi_register_va+0x68/0x80 [ 245.291114] super_setup_bdi_name+0x123/0x220 [ 245.295609] ? kill_block_super+0x100/0x100 [ 245.299941] ? kmem_cache_alloc_trace+0x616/0x780 [ 245.304788] ? match_wildcard+0x3c0/0x3c0 [ 245.308935] ? trace_hardirqs_on+0xd/0x10 [ 245.313089] fuse_fill_super+0xe6e/0x1e20 [ 245.317251] ? fuse_get_root_inode+0x190/0x190 [ 245.321839] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 245.326861] ? kasan_check_read+0x11/0x20 [ 245.331009] ? cap_capable+0x1f9/0x260 [ 245.334906] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 245.340442] ? security_capable+0x99/0xc0 [ 245.344593] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 245.350128] ? ns_capable_common+0x13f/0x170 [ 245.354538] ? get_anon_bdev+0x2f0/0x2f0 [ 245.358599] ? sget+0x113/0x150 [ 245.361885] ? fuse_get_root_inode+0x190/0x190 [ 245.366468] mount_nodev+0x6b/0x110 [ 245.370095] fuse_mount+0x2c/0x40 [ 245.373549] mount_fs+0xae/0x328 [ 245.376917] vfs_kern_mount.part.34+0xd4/0x4d0 [ 245.381505] ? may_umount+0xb0/0xb0 [ 245.385131] ? _raw_read_unlock+0x22/0x30 [ 245.389280] ? __get_fs_type+0x97/0xc0 [ 245.393171] do_mount+0x564/0x3070 [ 245.396713] ? copy_mount_string+0x40/0x40 [ 245.400947] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 245.405707] ? retint_kernel+0x10/0x10 [ 245.409599] ? copy_mount_options+0x1f0/0x380 [ 245.414094] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 245.418937] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 245.424470] ? copy_mount_options+0x285/0x380 [ 245.428967] ksys_mount+0x12d/0x140 [ 245.432600] __x64_sys_mount+0xbe/0x150 [ 245.436577] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 245.441595] do_syscall_64+0x1b1/0x800 [ 245.445489] ? finish_task_switch+0x1ca/0x810 [ 245.449987] ? syscall_return_slowpath+0x5c0/0x5c0 [ 245.454937] ? syscall_return_slowpath+0x30f/0x5c0 [ 245.459870] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 245.465246] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 245.470093] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 245.475281] RIP: 0033:0x455979 [ 245.478464] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 245.486176] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 245.493447] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 245.500726] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 2018/05/06 05:52:43 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x0, 0x2}}) [ 245.507999] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 245.515268] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 2018/05/06 05:52:43 executing program 1 (fault-call:1 fault-nth:68): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) [ 245.560622] IPVS: ftp: loaded support on port[0] = 21 2018/05/06 05:52:44 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x0, 0xf00000000000000}}) [ 245.612961] FAULT_INJECTION: forcing a failure. [ 245.612961] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 245.624819] CPU: 1 PID: 16786 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 245.632096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 245.641451] Call Trace: [ 245.644052] dump_stack+0x1b9/0x294 [ 245.647695] ? dump_stack_print_info.cold.2+0x52/0x52 [ 245.652897] ? kasan_check_write+0x14/0x20 [ 245.657146] should_fail.cold.4+0xa/0x1a [ 245.661223] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 245.666343] ? debug_check_no_locks_freed+0x310/0x310 [ 245.671539] ? find_held_lock+0x36/0x1c0 [ 245.675609] ? rcu_note_context_switch+0x710/0x710 [ 245.680551] ? __might_sleep+0x95/0x190 [ 245.684534] ? kasan_check_write+0x14/0x20 [ 245.688768] ? __mutex_lock+0x7d9/0x17f0 [ 245.692830] ? find_held_lock+0x36/0x1c0 [ 245.696901] ? mutex_trylock+0x2a0/0x2a0 [ 245.700962] ? lock_downgrade+0x8e0/0x8e0 [ 245.705119] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 245.710673] ? should_fail+0x21b/0xbcd [ 245.714571] __alloc_pages_nodemask+0x34e/0xd70 [ 245.719253] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 245.724274] ? lock_downgrade+0x8e0/0x8e0 [ 245.728430] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 245.733366] ? find_held_lock+0x36/0x1c0 [ 245.737438] ? __lock_is_held+0xb5/0x140 [ 245.741526] ? check_same_owner+0x320/0x320 [ 245.745858] cache_grow_begin+0x72/0x6c0 [ 245.749927] kmem_cache_alloc_trace+0x6a5/0x780 [ 245.754607] ? device_create_file+0x1e0/0x1e0 [ 245.759106] kobject_uevent_env+0x20f/0xea0 [ 245.763429] ? device_pm_add+0x221/0x340 [ 245.767499] kobject_uevent+0x1f/0x30 [ 245.771301] device_add+0xb01/0x16d0 [ 245.775020] ? device_private_init+0x230/0x230 [ 245.779601] ? kfree+0x1e9/0x260 [ 245.782970] ? kfree_const+0x5e/0x70 [ 245.786686] device_create_groups_vargs+0x1ff/0x270 [ 245.791707] device_create_vargs+0x46/0x60 [ 245.795945] bdi_register_va.part.10+0xbb/0x9b0 [ 245.800615] ? cgwb_kill+0x630/0x630 [ 245.804329] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 245.809860] ? bdi_init+0x416/0x510 [ 245.813494] ? wb_init+0x9e0/0x9e0 [ 245.817036] ? bdi_alloc_node+0x67/0xe0 [ 245.821009] ? bdi_alloc_node+0x67/0xe0 [ 245.824989] ? rcu_read_lock_sched_held+0x108/0x120 [ 245.830009] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 245.835302] ? _raw_spin_unlock+0x22/0x30 [ 245.839454] bdi_register_va+0x68/0x80 [ 245.843346] super_setup_bdi_name+0x123/0x220 [ 245.847850] ? kill_block_super+0x100/0x100 [ 245.852180] ? kmem_cache_alloc_trace+0x616/0x780 [ 245.857034] ? match_wildcard+0x3c0/0x3c0 2018/05/06 05:52:44 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./contro0\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) [ 245.861193] ? trace_hardirqs_on+0xd/0x10 [ 245.865348] fuse_fill_super+0xe6e/0x1e20 [ 245.869506] ? fuse_get_root_inode+0x190/0x190 [ 245.874093] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 245.879121] ? kasan_check_read+0x11/0x20 [ 245.883281] ? cap_capable+0x1f9/0x260 [ 245.887181] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 245.892728] ? security_capable+0x99/0xc0 [ 245.896890] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 245.902430] ? ns_capable_common+0x13f/0x170 [ 245.906843] ? get_anon_bdev+0x2f0/0x2f0 [ 245.910905] ? sget+0x113/0x150 [ 245.914192] ? fuse_get_root_inode+0x190/0x190 [ 245.918777] mount_nodev+0x6b/0x110 [ 245.922408] fuse_mount+0x2c/0x40 [ 245.925861] mount_fs+0xae/0x328 [ 245.929233] vfs_kern_mount.part.34+0xd4/0x4d0 [ 245.933813] ? may_umount+0xb0/0xb0 [ 245.937437] ? _raw_read_unlock+0x22/0x30 [ 245.941579] ? __get_fs_type+0x97/0xc0 [ 245.945472] do_mount+0x564/0x3070 [ 245.949011] ? do_raw_spin_unlock+0x9e/0x2e0 [ 245.953422] ? copy_mount_string+0x40/0x40 [ 245.957657] ? rcu_pm_notify+0xc0/0xc0 [ 245.961550] ? copy_mount_options+0x5f/0x380 [ 245.965959] ? rcu_read_lock_sched_held+0x108/0x120 [ 245.970977] ? kmem_cache_alloc_trace+0x616/0x780 [ 245.975828] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 245.981373] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 245.986909] ? copy_mount_options+0x285/0x380 [ 245.991409] ksys_mount+0x12d/0x140 [ 245.995036] __x64_sys_mount+0xbe/0x150 [ 245.999013] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 246.004033] do_syscall_64+0x1b1/0x800 [ 246.007921] ? finish_task_switch+0x1ca/0x810 [ 246.012423] ? syscall_return_slowpath+0x5c0/0x5c0 [ 246.017356] ? syscall_return_slowpath+0x30f/0x5c0 [ 246.022287] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 246.027654] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 246.032502] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 246.037690] RIP: 0033:0x455979 [ 246.040879] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 246.048593] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 246.055864] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 246.063134] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 246.070405] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 246.077676] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 [ 246.646252] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.652661] bridge0: port 1(bridge_slave_0) entered disabled state [ 246.659857] device bridge_slave_0 entered promiscuous mode [ 246.684783] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.691174] bridge0: port 2(bridge_slave_1) entered disabled state [ 246.698385] device bridge_slave_1 entered promiscuous mode [ 246.722477] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 246.747087] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 246.829805] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 246.855622] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 246.956336] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 246.963446] team0: Port device team_slave_0 added [ 246.986573] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 246.994293] team0: Port device team_slave_1 added [ 247.017542] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 247.042765] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 247.067831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 247.093676] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 247.309151] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.315550] bridge0: port 2(bridge_slave_1) entered forwarding state [ 247.322195] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.328559] bridge0: port 1(bridge_slave_0) entered forwarding state [ 248.107775] 8021q: adding VLAN 0 to HW filter on device bond0 [ 248.186622] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 248.265416] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 248.271682] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 248.278784] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 248.356819] 8021q: adding VLAN 0 to HW filter on device team0 2018/05/06 05:52:47 executing program 2: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0x0, 0x8, 'queue0\x00'}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) close(r0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x1, 0x200) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={'bond0\x00', {0x2, 0x4e23, @broadcast=0xffffffff}}) ppoll(&(0x7f0000000100)=[{r1, 0x4a0}, {0xffffffffffffffff, 0x2}], 0x2, &(0x7f0000000180), &(0x7f00000001c0)={0x400}, 0x8) 2018/05/06 05:52:47 executing program 6: r0 = syz_open_dev$sndpcmp(&(0x7f0000000200)='/dev/snd/pcmC#D#p\x00', 0xff, 0x0) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f00000000c0)={{0xcf, 0x3f}, 0x40}, 0x10) mq_open(&(0x7f0000000000)="76626f786e6574302897282800", 0x843, 0x82, &(0x7f0000000040)={0x3, 0x1, 0x2, 0x1ff, 0x0, 0x2, 0x376d, 0x6}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000140)={0x20, @time={0x0, 0x989680}, 0x4, {0x3, 0xffffffffffff22f2}, 0x1, 0x2, 0x7}) r1 = signalfd(0xffffffffffffff9c, &(0x7f0000000080)={0x7}, 0x8) close(r1) 2018/05/06 05:52:47 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:47 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0x0, 0x0, 'queue0\x00', 0x1ff}) r0 = msgget$private(0x0, 0x120) msgctl$IPC_RMID(r0, 0x0) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r1) 2018/05/06 05:52:47 executing program 1 (fault-call:1 fault-nth:69): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:52:47 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x0, 0x2000000}}) 2018/05/06 05:52:47 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x1003, 0x8000082) close(0xffffffffffffffff) dup2(r0, r0) 2018/05/06 05:52:47 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./contro#\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) [ 248.875577] FAULT_INJECTION: forcing a failure. [ 248.875577] name failslab, interval 1, probability 0, space 0, times 0 [ 248.886933] CPU: 1 PID: 17075 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 248.894340] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 248.903710] Call Trace: [ 248.906324] dump_stack+0x1b9/0x294 [ 248.909974] ? dump_stack_print_info.cold.2+0x52/0x52 [ 248.915169] ? lock_downgrade+0x8e0/0x8e0 [ 248.919342] should_fail.cold.4+0xa/0x1a 2018/05/06 05:52:47 executing program 2: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0x0, 0x8, 'queue0\x00'}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x80000001, 0x82003) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000040)={0x303, 0x33}, 0x4) 2018/05/06 05:52:47 executing program 7: r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x100000000, 0x10100) connect$llc(r0, &(0x7f00000000c0)={0x1a, 0x0, 0x3, 0x100, 0x0, 0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0xb8d6) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x5, 0x100) 2018/05/06 05:52:47 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x0, 0xf000000}}) [ 248.923432] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 248.928548] ? graph_lock+0x170/0x170 [ 248.932361] ? kernel_text_address+0x79/0xf0 [ 248.936781] ? __unwind_start+0x166/0x330 [ 248.940938] ? __kernel_text_address+0xd/0x40 [ 248.945449] ? find_held_lock+0x36/0x1c0 [ 248.949523] ? __lock_is_held+0xb5/0x140 [ 248.953618] ? check_same_owner+0x320/0x320 [ 248.957953] ? device_create_groups_vargs+0x1ff/0x270 [ 248.963153] ? device_create_vargs+0x46/0x60 [ 248.967566] ? bdi_register_va.part.10+0xbb/0x9b0 2018/05/06 05:52:47 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x0, 0xc3ffffff}}) [ 248.972421] ? rcu_note_context_switch+0x710/0x710 [ 248.977358] ? mount_nodev+0x6b/0x110 [ 248.981162] ? fuse_mount+0x2c/0x40 [ 248.984887] ? mount_fs+0xae/0x328 [ 248.988435] __should_failslab+0x124/0x180 [ 248.992681] should_failslab+0x9/0x14 [ 248.996495] kmem_cache_alloc+0x2af/0x760 [ 249.000664] skb_clone+0x1ed/0x4f0 [ 249.004218] ? refcount_add_not_zero+0x2d0/0x320 [ 249.008984] ? skb_split+0x11d0/0x11d0 [ 249.012885] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 249.017910] ? netlink_trim+0x1b2/0x370 2018/05/06 05:52:47 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:47 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x0, 0x3}}) [ 249.021895] ? netlink_skb_destructor+0x210/0x210 [ 249.026742] ? cleanup_uevent_env+0x40/0x40 [ 249.031075] netlink_broadcast_filtered+0x1024/0x1580 [ 249.036279] ? __netlink_sendskb+0xd0/0xd0 [ 249.040538] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 249.046083] ? refcount_inc_not_zero+0x1dd/0x2d0 [ 249.050853] ? refcount_add_not_zero+0x320/0x320 [ 249.055620] ? cleanup_uevent_env+0x40/0x40 [ 249.059957] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 249.064983] kobject_uevent_env+0x6e4/0xea0 [ 249.069322] ? device_pm_add+0x221/0x340 2018/05/06 05:52:47 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x0, 0xfeffffff00000000}}) [ 249.073403] kobject_uevent+0x1f/0x30 [ 249.077206] device_add+0xb01/0x16d0 [ 249.080939] ? device_private_init+0x230/0x230 [ 249.085524] ? kfree+0x1e9/0x260 [ 249.088897] ? kfree_const+0x5e/0x70 [ 249.092623] device_create_groups_vargs+0x1ff/0x270 [ 249.097658] device_create_vargs+0x46/0x60 [ 249.101909] bdi_register_va.part.10+0xbb/0x9b0 [ 249.106854] ? cgwb_kill+0x630/0x630 [ 249.110580] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 249.116120] ? bdi_init+0x416/0x510 [ 249.119749] ? wb_init+0x9e0/0x9e0 2018/05/06 05:52:47 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:47 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x0, 0xffffffc3}}) [ 249.123297] ? bdi_alloc_node+0x67/0xe0 [ 249.127275] ? bdi_alloc_node+0x67/0xe0 [ 249.131782] ? rcu_read_lock_sched_held+0x108/0x120 [ 249.136799] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 249.142078] ? _raw_spin_unlock+0x22/0x30 [ 249.146235] bdi_register_va+0x68/0x80 [ 249.150132] super_setup_bdi_name+0x123/0x220 [ 249.154632] ? kill_block_super+0x100/0x100 [ 249.158965] ? kmem_cache_alloc_trace+0x616/0x780 [ 249.163811] ? match_wildcard+0x3c0/0x3c0 [ 249.167967] ? trace_hardirqs_on+0xd/0x10 [ 249.172128] fuse_fill_super+0xe6e/0x1e20 [ 249.176286] ? fuse_get_root_inode+0x190/0x190 [ 249.180877] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 249.185900] ? kasan_check_read+0x11/0x20 [ 249.190064] ? cap_capable+0x1f9/0x260 [ 249.193967] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 249.199511] ? security_capable+0x99/0xc0 [ 249.203670] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 249.209215] ? ns_capable_common+0x13f/0x170 [ 249.213628] ? get_anon_bdev+0x2f0/0x2f0 [ 249.217694] ? sget+0x113/0x150 [ 249.220976] ? fuse_get_root_inode+0x190/0x190 [ 249.225564] mount_nodev+0x6b/0x110 [ 249.229195] fuse_mount+0x2c/0x40 [ 249.232649] mount_fs+0xae/0x328 [ 249.236021] vfs_kern_mount.part.34+0xd4/0x4d0 [ 249.240609] ? may_umount+0xb0/0xb0 [ 249.244237] ? _raw_read_unlock+0x22/0x30 [ 249.248387] ? __get_fs_type+0x97/0xc0 [ 249.252286] do_mount+0x564/0x3070 [ 249.255832] ? copy_mount_string+0x40/0x40 [ 249.260059] ? rcu_pm_notify+0xc0/0xc0 [ 249.263944] ? copy_mount_options+0x5f/0x380 [ 249.268338] ? rcu_read_lock_sched_held+0x108/0x120 [ 249.273347] ? kmem_cache_alloc_trace+0x616/0x780 [ 249.278175] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 249.283707] ? _copy_from_user+0xdf/0x150 [ 249.287843] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 249.293380] ? copy_mount_options+0x285/0x380 [ 249.297872] ksys_mount+0x12d/0x140 [ 249.301484] __x64_sys_mount+0xbe/0x150 [ 249.305444] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 249.310452] do_syscall_64+0x1b1/0x800 [ 249.314324] ? finish_task_switch+0x1ca/0x810 [ 249.318803] ? syscall_return_slowpath+0x5c0/0x5c0 [ 249.323730] ? syscall_return_slowpath+0x30f/0x5c0 [ 249.328648] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 249.334004] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 249.338838] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 249.344022] RIP: 0033:0x455979 [ 249.347212] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 249.354916] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 249.362172] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 249.369433] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 249.376683] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 249.383937] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 2018/05/06 05:52:48 executing program 2: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0x0, 0x8, 'queue0\x00'}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0xfffffffffffffffd) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:52:48 executing program 1 (fault-call:1 fault-nth:70): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:52:48 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200080, 0x0) ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000000100)) 2018/05/06 05:52:48 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0x0, 0x0, 'queue0\x00', 0x1ff}) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x2, 0x0) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) 2018/05/06 05:52:48 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./contro*\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:52:48 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x0, 0xfffffdfd}}) 2018/05/06 05:52:48 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)="2e2f66696c6530a0", &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:48 executing program 6: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_X86_SETUP_MCE(r0, 0x4008ae9c, &(0x7f0000000040)={0x8, 0x3, 0x3}) r2 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) io_setup(0x6, &(0x7f00000000c0)=0x0) io_submit(r3, 0xa, &(0x7f00000016c0)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x2, r1, &(0x7f00000001c0)="b65a67012622391501b62e04a5338c87ec895a66b7b83107afb450d40ef33683a2656af40f31c3c07987071411a3a1e84e0d59c7f488", 0x36, 0x0, 0x0, 0x0, r0}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x2, 0x5, r1, &(0x7f0000000240)="88be43ef290c6c8cfe437522a6e0b5a6eec6", 0x12, 0x0, 0x0, 0x0, r1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x7, 0x8, r1, &(0x7f00000002c0)="bdde898b40013ff3", 0x8, 0x5, 0x0, 0x0, r1}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x3, 0xfffffffffffffff8, r2, &(0x7f0000000340)="b00e80ef4ec64952159a731f472afb8b98fd3f226f58cd566fc6c30f33fbd25f57c5157b4d05d916878d", 0x2a, 0x9, 0x0, 0x1, r0}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0xf, 0x1f, r0, &(0x7f00000003c0)="885be84cc8c1b064fea8b4725284df6ad652a60e76341f68cd849deab54edf40e2ceb484219cc9", 0x27, 0xffff, 0x0, 0x0, r1}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x1, 0x4, r1, &(0x7f0000000440)="7b5df7dd9c6e46e932bf7ab69b9e64a070d1df543783095cf4ac31ddcc6004a6e08768e22b314e891d1357058442d3a00e", 0x31, 0x4d, 0x0, 0x0, r1}, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x8, 0x7f, r2, &(0x7f00000004c0)="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", 0x1000, 0x80, 0x0, 0x1, r0}, &(0x7f0000001540)={0x0, 0x0, 0x0, 0x0, 0x8, r1, &(0x7f0000001500)="f69797a9bcbc0ae6249db148bc65222dc6f89449ed5dc071588e9859ad09e43bcb33382b213592a5540a6f62c22cbfb78896220d4fee5b8ab04d540e867ae660", 0x40, 0x9, 0x0, 0x1, r1}, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0xf, 0x7ff, r2, &(0x7f0000001580)="a7cc2d1349efdf28b487d4b8917229b88f1711c5a29ace9c9f", 0x19, 0xaf5, 0x0, 0x1, r0}, &(0x7f0000001680)={0x0, 0x0, 0x0, 0xe, 0x6, r1, &(0x7f0000001600)="56cac9a9bc8582ea5dc5fe4e82fb6944796c8e8dd6cd311b7eaff62186e72478d7a9b6e47a952d8e70d4653f6b95e5aa77c7d911027401adc8bb034d926cc942b6d8609a80c2a8145351fb1b9eda01bf76e7bacf4fd4c2f6", 0x58, 0x3, 0x0, 0x0, r1}]) close(0xffffffffffffffff) write$cgroup_pid(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="3633333035303234395ef6dad7389a225e4efd8847a0c386ab45fbb7a957055d7e5ece3bd3defb1ff578a9d360d67eda110f00f9ba04d7c09ecd10fe34965af79d1cef2b159c435d7456dde381eb7a89fbfad7b68bc7b9aaeab22c0bc269daaa6ee20044c4a8a1ff3b2793bc8f4f15f7573e95b87ac6dadfe7f90c2c13df6146d2a50449529f55d163069ee10a88638ce69930c633f3a0c1"], 0xa) [ 249.891442] FAULT_INJECTION: forcing a failure. [ 249.891442] name failslab, interval 1, probability 0, space 0, times 0 [ 249.903310] CPU: 1 PID: 17135 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 249.910595] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 249.919952] Call Trace: [ 249.922560] dump_stack+0x1b9/0x294 [ 249.926205] ? dump_stack_print_info.cold.2+0x52/0x52 [ 249.931409] ? d_add+0x605/0xa10 [ 249.934783] ? lock_downgrade+0x8e0/0x8e0 [ 249.938943] should_fail.cold.4+0xa/0x1a [ 249.943015] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 249.948127] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 249.953147] ? graph_lock+0x170/0x170 [ 249.956954] ? __lockdep_init_map+0x105/0x590 [ 249.961458] ? find_held_lock+0x36/0x1c0 [ 249.965524] ? __lock_is_held+0xb5/0x140 [ 249.969607] ? check_same_owner+0x320/0x320 [ 249.973950] ? rcu_note_context_switch+0x710/0x710 [ 249.978898] __should_failslab+0x124/0x180 [ 249.983150] should_failslab+0x9/0x14 [ 249.986965] kmem_cache_alloc+0x2af/0x760 2018/05/06 05:52:48 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x0, 0xfffffffe}}) [ 249.991132] alloc_inode+0xb2/0x190 [ 249.994771] new_inode_pseudo+0x69/0x1a0 [ 249.998837] ? prune_icache_sb+0x1a0/0x1a0 [ 250.003083] ? down_read+0x1b0/0x1b0 [ 250.006798] ? mntput+0x74/0xa0 [ 250.010089] new_inode+0x1c/0x40 [ 250.013468] debugfs_get_inode+0x19/0x120 [ 250.017622] debugfs_create_dir+0x75/0x3c0 [ 250.021875] bdi_register_va.part.10+0x318/0x9b0 [ 250.026636] ? cgwb_kill+0x630/0x630 [ 250.030357] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 250.035904] ? bdi_init+0x416/0x510 [ 250.039540] ? wb_init+0x9e0/0x9e0 [ 250.043092] ? bdi_alloc_node+0x67/0xe0 [ 250.047071] ? bdi_alloc_node+0x67/0xe0 [ 250.051058] ? rcu_read_lock_sched_held+0x108/0x120 [ 250.056085] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 250.061369] ? _raw_spin_unlock+0x22/0x30 [ 250.065523] bdi_register_va+0x68/0x80 [ 250.069426] super_setup_bdi_name+0x123/0x220 [ 250.073927] ? kill_block_super+0x100/0x100 [ 250.078257] ? kmem_cache_alloc_trace+0x616/0x780 [ 250.083105] ? match_wildcard+0x3c0/0x3c0 [ 250.087259] ? trace_hardirqs_on+0xd/0x10 [ 250.091419] fuse_fill_super+0xe6e/0x1e20 [ 250.095581] ? fuse_get_root_inode+0x190/0x190 [ 250.100174] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 250.105201] ? kasan_check_read+0x11/0x20 [ 250.109357] ? cap_capable+0x1f9/0x260 [ 250.113257] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 250.118801] ? security_capable+0x99/0xc0 [ 250.122958] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 250.128497] ? ns_capable_common+0x13f/0x170 [ 250.132914] ? get_anon_bdev+0x2f0/0x2f0 [ 250.136977] ? sget+0x113/0x150 [ 250.140262] ? fuse_get_root_inode+0x190/0x190 [ 250.144853] mount_nodev+0x6b/0x110 [ 250.148488] fuse_mount+0x2c/0x40 [ 250.151943] mount_fs+0xae/0x328 [ 250.155321] vfs_kern_mount.part.34+0xd4/0x4d0 [ 250.159908] ? may_umount+0xb0/0xb0 [ 250.163536] ? _raw_read_unlock+0x22/0x30 [ 250.167685] ? __get_fs_type+0x97/0xc0 [ 250.171577] do_mount+0x564/0x3070 [ 250.175126] ? copy_mount_string+0x40/0x40 [ 250.179362] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 250.184123] ? retint_kernel+0x10/0x10 [ 250.188022] ? copy_mount_options+0x1a1/0x380 [ 250.192521] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 250.197421] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 250.202964] ? copy_mount_options+0x285/0x380 [ 250.207464] ksys_mount+0x12d/0x140 [ 250.211096] __x64_sys_mount+0xbe/0x150 [ 250.215074] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 250.220108] do_syscall_64+0x1b1/0x800 [ 250.223998] ? finish_task_switch+0x1ca/0x810 [ 250.228503] ? syscall_return_slowpath+0x5c0/0x5c0 [ 250.233442] ? syscall_return_slowpath+0x30f/0x5c0 [ 250.238558] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 250.243930] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 250.248779] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 250.253970] RIP: 0033:0x455979 [ 250.257156] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 250.264868] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 250.272138] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 250.279409] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 2018/05/06 05:52:48 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x0, 0x300}}) [ 250.286680] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 250.293961] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 2018/05/06 05:52:48 executing program 1 (fault-call:1 fault-nth:71): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:52:48 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:48 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x0, 0xfeffffff}}) [ 250.394734] FAULT_INJECTION: forcing a failure. [ 250.394734] name failslab, interval 1, probability 0, space 0, times 0 [ 250.406272] CPU: 0 PID: 17147 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 250.413552] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 250.422904] Call Trace: [ 250.425505] dump_stack+0x1b9/0x294 [ 250.429143] ? dump_stack_print_info.cold.2+0x52/0x52 [ 250.434349] ? kasan_check_write+0x14/0x20 [ 250.438593] ? finish_task_switch+0x28b/0x810 [ 250.443100] should_fail.cold.4+0xa/0x1a [ 250.447168] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 250.452284] ? __schedule+0x809/0x1e30 [ 250.456184] ? __sched_text_start+0x8/0x8 [ 250.460340] ? find_held_lock+0x36/0x1c0 [ 250.464418] ? __lock_is_held+0xb5/0x140 [ 250.468499] ? check_same_owner+0x320/0x320 [ 250.472834] __should_failslab+0x124/0x180 [ 250.477076] should_failslab+0x9/0x14 [ 250.480885] kmem_cache_alloc+0x2af/0x760 [ 250.485044] ? _raw_spin_unlock_irq+0x27/0x70 [ 250.489554] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 250.494579] __d_alloc+0xc0/0xd30 [ 250.498042] ? shrink_dcache_for_umount+0x290/0x290 [ 250.503061] ? preempt_notifier_register+0x1e0/0x1e0 [ 250.508188] ? debug_check_no_locks_freed+0x310/0x310 [ 250.513390] ? __schedule+0x809/0x1e30 [ 250.517297] d_alloc+0x8e/0x370 [ 250.520585] ? print_usage_bug+0xc0/0xc0 [ 250.524651] ? __d_alloc+0xd30/0xd30 [ 250.528375] d_alloc_parallel+0x152/0x1e80 [ 250.532617] ? kobject_uevent+0x1f/0x30 [ 250.536601] ? graph_lock+0x170/0x170 [ 250.540409] ? __lock_acquire+0x7f5/0x5140 [ 250.544653] ? __d_lookup_rcu+0xa80/0xa80 [ 250.548803] ? print_usage_bug+0xc0/0xc0 [ 250.552864] ? find_held_lock+0x36/0x1c0 [ 250.556935] ? lock_downgrade+0x8e0/0x8e0 [ 250.561098] ? mark_held_locks+0xc9/0x160 [ 250.565260] ? __raw_spin_lock_init+0x1c/0x100 [ 250.569843] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 250.574858] ? __lockdep_init_map+0x105/0x590 [ 250.579352] ? __lockdep_init_map+0x105/0x590 [ 250.583849] ? lockdep_init_map+0x9/0x10 [ 250.587909] ? __init_waitqueue_head+0x96/0x140 [ 250.592575] ? init_wait_entry+0x1b0/0x1b0 [ 250.596811] ? d_alloc_parallel+0x1e80/0x1e80 [ 250.601309] ? lock_release+0xa10/0xa10 [ 250.605292] __lookup_slow+0x1e6/0x540 [ 250.609193] ? vfs_unlink+0x510/0x510 [ 250.612997] ? d_lookup+0x219/0x330 [ 250.616640] lookup_one_len+0x1c7/0x210 [ 250.620617] ? lookup_one_len_unlocked+0xf0/0xf0 [ 250.625377] ? down_write+0x87/0x120 [ 250.629089] ? start_creating+0xb1/0x200 [ 250.633150] ? down_read+0x1b0/0x1b0 [ 250.636866] ? mntput+0x74/0xa0 [ 250.640149] ? simple_pin_fs+0xa4/0x190 [ 250.644127] start_creating+0xc6/0x200 [ 250.648017] debugfs_create_dir+0x23/0x3c0 [ 250.652256] bdi_register_va.part.10+0x318/0x9b0 [ 250.657011] ? cgwb_kill+0x630/0x630 [ 250.660728] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 250.666265] ? bdi_init+0x416/0x510 [ 250.669888] ? wb_init+0x9e0/0x9e0 [ 250.673439] ? bdi_alloc_node+0x67/0xe0 [ 250.677411] ? bdi_alloc_node+0x67/0xe0 [ 250.681383] ? rcu_read_lock_sched_held+0x108/0x120 [ 250.686409] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 250.691701] ? _raw_spin_unlock+0x22/0x30 [ 250.695854] bdi_register_va+0x68/0x80 [ 250.699745] super_setup_bdi_name+0x123/0x220 [ 250.704243] ? kill_block_super+0x100/0x100 [ 250.708567] ? kmem_cache_alloc_trace+0x616/0x780 [ 250.713409] ? match_wildcard+0x3c0/0x3c0 [ 250.717557] ? trace_hardirqs_on+0xd/0x10 [ 250.721714] fuse_fill_super+0xe6e/0x1e20 [ 250.725869] ? fuse_get_root_inode+0x190/0x190 [ 250.730460] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 250.735479] ? kasan_check_read+0x11/0x20 [ 250.739629] ? cap_capable+0x1f9/0x260 [ 250.743523] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 250.749063] ? security_capable+0x99/0xc0 [ 250.753215] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 250.758752] ? ns_capable_common+0x13f/0x170 [ 250.763161] ? get_anon_bdev+0x2f0/0x2f0 [ 250.767225] ? sget+0x113/0x150 [ 250.770509] ? fuse_get_root_inode+0x190/0x190 [ 250.775091] mount_nodev+0x6b/0x110 [ 250.778724] fuse_mount+0x2c/0x40 [ 250.782179] mount_fs+0xae/0x328 [ 250.785552] vfs_kern_mount.part.34+0xd4/0x4d0 [ 250.790140] ? may_umount+0xb0/0xb0 [ 250.793770] ? _raw_read_unlock+0x22/0x30 [ 250.797918] ? __get_fs_type+0x97/0xc0 [ 250.801808] do_mount+0x564/0x3070 [ 250.805357] ? copy_mount_string+0x40/0x40 [ 250.809591] ? rcu_pm_notify+0xc0/0xc0 [ 250.813487] ? copy_mount_options+0x5f/0x380 [ 250.817895] ? rcu_read_lock_sched_held+0x108/0x120 [ 250.822918] ? kmem_cache_alloc_trace+0x616/0x780 [ 250.827779] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 250.833328] ? copy_mount_options+0x285/0x380 [ 250.837834] ksys_mount+0x12d/0x140 [ 250.841471] __x64_sys_mount+0xbe/0x150 [ 250.845458] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 250.850479] do_syscall_64+0x1b1/0x800 [ 250.854363] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 250.859215] ? syscall_return_slowpath+0x5c0/0x5c0 [ 250.864159] ? syscall_return_slowpath+0x30f/0x5c0 [ 250.869093] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 250.874462] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 250.879315] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 250.884503] RIP: 0033:0x455979 [ 250.887691] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/05/06 05:52:49 executing program 7: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x8000, 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f00000000c0)=0x4) ioctl$DRM_IOCTL_MAP_BUFS(r0, 0xc0186419, &(0x7f0000001480)={0x4, &(0x7f0000000180)=""/198, &(0x7f0000001400)=[{0x44, 0xbe, 0x6, &(0x7f0000000280)=""/190}, {0x1, 0x1000, 0x9, &(0x7f0000000340)=""/4096}, {0x10001, 0x5b, 0x7ff, &(0x7f0000001340)=""/91}, {0x5, 0x2a, 0x1000000020, &(0x7f00000013c0)=""/42}]}) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000100)='selfvboxnet1\x00', 0x2) faccessat(r1, &(0x7f00000014c0)='./file0\x00', 0x34, 0x200) [ 250.895402] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 250.902671] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 250.909936] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 250.917205] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 250.924471] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 2018/05/06 05:52:49 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:49 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)="2e2f636f6e74726f6ce4", 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:52:50 executing program 2: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0x0, 0x8, 'queue0\x00'}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ustat(0xafa, &(0x7f0000000000)) close(r0) 2018/05/06 05:52:50 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0x0, 0x0, 'queue0\x00', 0x1ff}) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x1000, 0x80) ioctl$VHOST_GET_VRING_BASE(r1, 0xc008af12, &(0x7f0000000200)) r2 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x1, 0x43a980) ioctl$TUNSETLINK(r2, 0x400454cd, 0xffff) r3 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) r4 = openat$cgroup_ro(r2, &(0x7f0000000340)="65746c622e74c97381000000", 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r2, 0xae44, 0x6) faccessat(r4, &(0x7f00000001c0)='./file0\x00', 0x180, 0x800) splice(r3, &(0x7f0000000140), r0, &(0x7f0000000180)=0x46, 0x1, 0x2) close(r0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000300)={0x0, 0x4473, 0xb7, 0xdf, 0x1, 0xc869}, &(0x7f0000000500)=0x14) sendmsg$inet_sctp(r2, &(0x7f0000000600)={&(0x7f0000000000)=@in6={0xa, 0x4e24, 0x1, @remote={0xfe, 0x80, [], 0xbb}, 0x1f}, 0x1c, &(0x7f00000002c0)=[{&(0x7f0000000440)="8ff4a326333d8ea078a1396f57a0b270824dd551c973a84bc9531b0fcd69be26bcd5a6188dd4496a10e3615bf29045680bccdc44653f8b9a0c8042b1caca8fb47a269b600bb9937919b200efa8d90c3a641357776ae4899e888dd8472691726a4b592273114f39e8de25525b834cf2aaa2a58bc65b536f168ad9c0393a50f13d579983ca6471a62e9b52420954bc47381b11f8244ede1817798b3647ce7fa766", 0xa0}], 0x1, &(0x7f0000000540)=[@sndrcv={0x30, 0x84, 0x1, {0x2, 0x8000, 0x8008, 0x80000000, 0x8001, 0x1, 0x20, 0x200, r5}}, @authinfo={0x18, 0x84, 0x6, {0x3}}, @dstaddrv6={0x20, 0x84, 0x8}, @prinfo={0x18, 0x84, 0x5, {0x10, 0x3}}, @authinfo={0x18, 0x84, 0x6, {0x3}}, @init={0x18, 0x84, 0x0, {0x44, 0x81, 0xd170, 0x2}}], 0xb0, 0x8080}, 0x4080) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000240)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000280)={r6}) 2018/05/06 05:52:50 executing program 1 (fault-call:1 fault-nth:72): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:52:50 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x0, 0x3000000}}) 2018/05/06 05:52:50 executing program 6: syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x6, 0x83) r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x2, 0x101000) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2004}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x58, r1, 0x111, 0x70bd26, 0x25dfdbff, {0xb}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xe9}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x29a3}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1f}, @IPVS_SVC_ATTR_AF={0x8, 0x1}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5}]}, 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) close(0xffffffffffffffff) fsetxattr(r0, &(0x7f0000000200)=@random={'trusted.', 'ovf\x00'}, &(0x7f0000000240)='\x00', 0x1, 0x1) 2018/05/06 05:52:50 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x8e, 0xd713, 0xf235, 0x1, 0x7fff}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000100)={r2, 0xc7, "0ca8338bb0f57c3ff3668b5d0221ccf3489659117ee8db052c672841710389478ee099f4f842d84d1599e110f22f9941d39a697c91b6fe604836f8edcf21e15a87f266151f06289e9b80942c24b0f073047137226421b9da632602791ceaaf879e382c0699e58a3fc49cb9226fa2eb8e95739e0871ce5a86e55319cae5812615011f9da814e98262baba096a803039cc15d56dd82c80a5e3f267d85c1bca4eddbd00131b640ce67baa6caf91deb445b252b56cb37f4b986695e98581a340d9e09c09404348439e"}, &(0x7f0000000200)=0xcf) 2018/05/06 05:52:50 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)="2e2f66696c653010", &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:50 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)="2e2f636f6e74726f6c8c", 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) [ 251.970192] FAULT_INJECTION: forcing a failure. [ 251.970192] name failslab, interval 1, probability 0, space 0, times 0 [ 251.981603] CPU: 1 PID: 17189 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 251.988889] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 251.998249] Call Trace: [ 252.000857] dump_stack+0x1b9/0x294 [ 252.004494] ? dump_stack_print_info.cold.2+0x52/0x52 [ 252.009686] ? kernel_text_address+0x79/0xf0 [ 252.014113] ? __unwind_start+0x166/0x330 [ 252.018264] ? __kernel_text_address+0xd/0x40 [ 252.022777] should_fail.cold.4+0xa/0x1a [ 252.026859] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 252.031975] ? __lock_acquire+0x7f5/0x5140 [ 252.036226] ? __lock_acquire+0x7f5/0x5140 [ 252.040473] ? save_stack+0xa9/0xd0 [ 252.044113] ? graph_lock+0x170/0x170 [ 252.047923] ? kasan_kmalloc+0xc4/0xe0 [ 252.051815] ? kasan_slab_alloc+0x12/0x20 [ 252.055973] ? find_held_lock+0x36/0x1c0 [ 252.060040] ? __lock_is_held+0xb5/0x140 [ 252.064118] ? check_same_owner+0x320/0x320 [ 252.068440] ? __lock_acquire+0x7f5/0x5140 [ 252.072678] ? rcu_note_context_switch+0x710/0x710 [ 252.077617] __should_failslab+0x124/0x180 [ 252.081859] should_failslab+0x9/0x14 [ 252.085665] kmem_cache_alloc+0x2af/0x760 [ 252.089831] ? debug_check_no_locks_freed+0x310/0x310 [ 252.095083] __d_alloc+0xc0/0xd30 [ 252.098554] ? __lock_acquire+0x7f5/0x5140 [ 252.102802] ? shrink_dcache_for_umount+0x290/0x290 [ 252.107828] ? print_usage_bug+0xc0/0xc0 [ 252.111907] ? debug_check_no_locks_freed+0x310/0x310 [ 252.117096] ? print_usage_bug+0xc0/0xc0 [ 252.121162] ? __lock_acquire+0x7f5/0x5140 [ 252.125416] d_alloc+0x8e/0x370 [ 252.128706] ? __d_alloc+0xd30/0xd30 [ 252.132432] d_alloc_parallel+0x152/0x1e80 [ 252.136673] ? graph_lock+0x170/0x170 [ 252.140487] ? __lock_acquire+0x7f5/0x5140 [ 252.144728] ? debug_check_no_locks_freed+0x310/0x310 [ 252.149924] ? __d_lookup_rcu+0xa80/0xa80 [ 252.154079] ? print_usage_bug+0xc0/0xc0 [ 252.158143] ? find_held_lock+0x36/0x1c0 [ 252.162216] ? lock_downgrade+0x8e0/0x8e0 [ 252.166369] ? __kernel_text_address+0xd/0x40 2018/05/06 05:52:50 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x2}}) 2018/05/06 05:52:50 executing program 6: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) close(0xffffffffffffffff) [ 252.170872] ? mark_held_locks+0xc9/0x160 [ 252.175023] ? __raw_spin_lock_init+0x1c/0x100 [ 252.179611] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 252.184633] ? __lockdep_init_map+0x105/0x590 [ 252.189134] ? __lockdep_init_map+0x105/0x590 [ 252.193635] ? lockdep_init_map+0x9/0x10 [ 252.197702] ? __init_waitqueue_head+0x96/0x140 [ 252.202373] ? init_wait_entry+0x1b0/0x1b0 [ 252.206608] ? d_alloc_parallel+0x1e80/0x1e80 [ 252.211111] ? lock_release+0xa10/0xa10 [ 252.215096] __lookup_slow+0x1e6/0x540 [ 252.218991] ? vfs_unlink+0x510/0x510 [ 252.222799] ? d_lookup+0x219/0x330 [ 252.226445] lookup_one_len+0x1c7/0x210 [ 252.230425] ? lookup_one_len_unlocked+0xf0/0xf0 [ 252.235188] ? down_write+0x87/0x120 [ 252.238904] ? start_creating+0xb1/0x200 [ 252.242968] ? down_read+0x1b0/0x1b0 [ 252.246686] ? mntput+0x74/0xa0 [ 252.249965] ? simple_pin_fs+0xa4/0x190 [ 252.253944] start_creating+0xc6/0x200 [ 252.257839] __debugfs_create_file+0x63/0x400 [ 252.262344] debugfs_create_file+0x57/0x70 [ 252.266588] bdi_register_va.part.10+0x365/0x9b0 [ 252.271349] ? cgwb_kill+0x630/0x630 [ 252.275073] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 252.280614] ? bdi_init+0x416/0x510 [ 252.284254] ? wb_init+0x9e0/0x9e0 [ 252.287801] ? bdi_alloc_node+0x67/0xe0 [ 252.292415] ? bdi_alloc_node+0x67/0xe0 [ 252.296396] ? rcu_read_lock_sched_held+0x108/0x120 [ 252.301421] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 252.306706] ? _raw_spin_unlock+0x22/0x30 [ 252.310865] bdi_register_va+0x68/0x80 [ 252.314763] super_setup_bdi_name+0x123/0x220 [ 252.319262] ? kill_block_super+0x100/0x100 [ 252.323588] ? kmem_cache_alloc_trace+0x616/0x780 [ 252.328433] ? match_wildcard+0x3c0/0x3c0 [ 252.332585] ? trace_hardirqs_on+0xd/0x10 [ 252.336744] fuse_fill_super+0xe6e/0x1e20 [ 252.340915] ? fuse_get_root_inode+0x190/0x190 [ 252.345853] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 252.350880] ? kasan_check_read+0x11/0x20 [ 252.355033] ? cap_capable+0x1f9/0x260 [ 252.358928] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 252.364466] ? security_capable+0x99/0xc0 [ 252.368619] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 252.374158] ? ns_capable_common+0x13f/0x170 [ 252.378569] ? get_anon_bdev+0x2f0/0x2f0 [ 252.382629] ? sget+0x113/0x150 [ 252.385919] ? fuse_get_root_inode+0x190/0x190 [ 252.390503] mount_nodev+0x6b/0x110 [ 252.394133] fuse_mount+0x2c/0x40 [ 252.397588] mount_fs+0xae/0x328 [ 252.400963] vfs_kern_mount.part.34+0xd4/0x4d0 [ 252.405548] ? may_umount+0xb0/0xb0 [ 252.409180] ? _raw_read_unlock+0x22/0x30 [ 252.413330] ? __get_fs_type+0x97/0xc0 [ 252.417227] do_mount+0x564/0x3070 [ 252.420776] ? copy_mount_string+0x40/0x40 [ 252.425012] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 252.429779] ? retint_kernel+0x10/0x10 [ 252.433680] ? copy_mount_options+0x1e3/0x380 [ 252.438181] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 252.443727] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 252.449268] ? copy_mount_options+0x285/0x380 [ 252.453767] ksys_mount+0x12d/0x140 [ 252.457407] __x64_sys_mount+0xbe/0x150 [ 252.461381] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 252.466402] do_syscall_64+0x1b1/0x800 [ 252.470294] ? syscall_return_slowpath+0x5c0/0x5c0 [ 252.475227] ? syscall_return_slowpath+0x30f/0x5c0 [ 252.480162] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 252.485531] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 252.490379] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 252.495567] RIP: 0033:0x455979 [ 252.498752] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 252.506461] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 252.513731] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 252.521003] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 252.528273] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 252.535541] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 2018/05/06 05:52:51 executing program 2: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0x0, 0x8, 'queue0\x00'}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x3ff, 0x8000) write$binfmt_elf32(r0, &(0x7f0000000180)={{0x7f, 0x45, 0x4c, 0x46, 0x101, 0x10001, 0x63d, 0x6, 0xffffffff, 0x3, 0x3e, 0x5, 0x32d, 0x38, 0x17e, 0x10000, 0xef, 0x20, 0x2, 0x7fffffff, 0x1, 0x4}, [{0x70000000, 0x3082, 0x1, 0x9, 0x7, 0x40, 0x1, 0x8e}, {0x5, 0xebe, 0x10001, 0x6, 0x8000, 0x9, 0x1f, 0x3ff}], "2859553fc570bb65aaf4ca706d26547b1d546636e0f45d", [[]]}, 0x18f) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r1) syncfs(r1) 2018/05/06 05:52:51 executing program 1 (fault-call:1 fault-nth:73): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:52:51 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x0, 0x0, 0xffffffff00000000}}) 2018/05/06 05:52:51 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)="2e2f66696c6530ff", &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:51 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x401, 0x20000000000081) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f00000000c0)="6c7676acaeadf88bf125e227ad7df07442a0fea222b80b66be4a54fbb665924132c6beca04dc691a3d196f3c7e0edb17c9d8362ad542f9d7bf9176717e0a8f99043408b663f703e0456d0bad13a44761d43556bd854f64450355d5be71d765e910057d6f908e20f77504a2bef1f6297d4f93f74a793901a83b42faed93d96e6902ccaaf38ada") getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000001c0)={{{@in6=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000000)=0xe8) getresgid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000002c0)) fchown(r0, r1, r2) close(r0) 2018/05/06 05:52:51 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0x0, 0x0, 'queue0\x00', 0x1ff}) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x3, 0x80040) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x23, &(0x7f0000000040)={@broadcast, @empty, 0x0}, &(0x7f0000000100)=0xc) r3 = geteuid() setuid(r3) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000140)={'vcan0\x00', r2}) statx(r1, &(0x7f0000000180)='./file0\x00', 0x3000, 0xfff, &(0x7f00000001c0)) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) 2018/05/06 05:52:51 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:52:51 executing program 6: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0xfffffffffffffffe, 0x4000) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) ioctl$KVM_GET_IRQCHIP(r0, 0xc208ae62, &(0x7f00000000c0)=@ioapic) close(0xffffffffffffffff) 2018/05/06 05:52:51 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x0, 0x0, 0xf000000}}) [ 253.086106] FAULT_INJECTION: forcing a failure. [ 253.086106] name failslab, interval 1, probability 0, space 0, times 0 [ 253.097463] CPU: 1 PID: 17219 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 253.104744] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 253.114106] Call Trace: [ 253.116710] dump_stack+0x1b9/0x294 [ 253.120351] ? dump_stack_print_info.cold.2+0x52/0x52 [ 253.125561] should_fail.cold.4+0xa/0x1a [ 253.130080] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 253.135202] ? graph_lock+0x170/0x170 [ 253.139013] ? print_usage_bug+0xc0/0xc0 [ 253.143091] ? find_held_lock+0x36/0x1c0 [ 253.147162] ? __lock_is_held+0xb5/0x140 [ 253.151240] ? check_same_owner+0x320/0x320 [ 253.155568] ? print_usage_bug+0xc0/0xc0 [ 253.159644] ? rcu_note_context_switch+0x710/0x710 [ 253.164603] __should_failslab+0x124/0x180 [ 253.168855] should_failslab+0x9/0x14 [ 253.172662] kmem_cache_alloc+0x2af/0x760 [ 253.176821] __d_alloc+0xc0/0xd30 [ 253.180279] ? graph_lock+0x170/0x170 2018/05/06 05:52:51 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x4}}) [ 253.184085] ? shrink_dcache_for_umount+0x290/0x290 [ 253.189120] ? debug_check_no_locks_freed+0x310/0x310 [ 253.194319] ? __lock_is_held+0xb5/0x140 [ 253.198390] ? __account_cfs_rq_runtime+0x600/0x600 [ 253.203430] d_alloc+0x8e/0x370 [ 253.206717] ? print_usage_bug+0xc0/0xc0 [ 253.210788] ? __d_alloc+0xd30/0xd30 [ 253.214517] d_alloc_parallel+0x152/0x1e80 [ 253.218760] ? graph_lock+0x170/0x170 [ 253.222574] ? __lock_acquire+0x7f5/0x5140 [ 253.226823] ? print_usage_bug+0xc0/0xc0 [ 253.230899] ? __d_lookup_rcu+0xa80/0xa80 2018/05/06 05:52:51 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x4000000000000000}}) [ 253.235054] ? print_usage_bug+0xc0/0xc0 [ 253.239126] ? find_held_lock+0x36/0x1c0 [ 253.243209] ? lock_downgrade+0x8e0/0x8e0 [ 253.247368] ? mark_held_locks+0xc9/0x160 [ 253.251526] ? __raw_spin_lock_init+0x1c/0x100 [ 253.256115] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 253.261132] ? __lockdep_init_map+0x105/0x590 [ 253.265633] ? __lockdep_init_map+0x105/0x590 [ 253.270134] ? lockdep_init_map+0x9/0x10 [ 253.274200] ? __init_waitqueue_head+0x96/0x140 [ 253.278873] ? init_wait_entry+0x1b0/0x1b0 [ 253.283115] ? d_alloc_parallel+0x1e80/0x1e80 [ 253.287624] ? lock_release+0xa10/0xa10 [ 253.291599] ? graph_lock+0x170/0x170 [ 253.295410] __lookup_slow+0x1e6/0x540 [ 253.299299] ? vfs_unlink+0x510/0x510 [ 253.303108] ? d_lookup+0x219/0x330 [ 253.306755] lookup_one_len+0x1c7/0x210 [ 253.310735] ? lookup_one_len_unlocked+0xf0/0xf0 [ 253.315497] ? down_write+0x87/0x120 [ 253.319219] ? start_creating+0xb1/0x200 [ 253.323284] ? down_read+0x1b0/0x1b0 [ 253.327002] ? mntput+0x74/0xa0 [ 253.330285] ? simple_pin_fs+0xa4/0x190 2018/05/06 05:52:51 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x0, 0x0, 0xfdfdffff}}) [ 253.334267] start_creating+0xc6/0x200 [ 253.338158] debugfs_create_dir+0x23/0x3c0 [ 253.342396] bdi_register_va.part.10+0x318/0x9b0 [ 253.347153] ? cgwb_kill+0x630/0x630 [ 253.350872] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 253.356412] ? bdi_init+0x416/0x510 [ 253.360041] ? wb_init+0x9e0/0x9e0 [ 253.363585] ? bdi_alloc_node+0x67/0xe0 [ 253.367566] ? bdi_alloc_node+0x67/0xe0 [ 253.371550] ? rcu_read_lock_sched_held+0x108/0x120 [ 253.376572] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 253.381865] bdi_register_va+0x68/0x80 [ 253.385758] super_setup_bdi_name+0x123/0x220 [ 253.390257] ? kill_block_super+0x100/0x100 [ 253.394584] ? kmem_cache_alloc_trace+0x616/0x780 [ 253.399436] ? match_wildcard+0x3c0/0x3c0 [ 253.403588] ? trace_hardirqs_on+0xd/0x10 [ 253.407751] fuse_fill_super+0xe6e/0x1e20 [ 253.411908] ? fuse_get_root_inode+0x190/0x190 [ 253.416501] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 253.421527] ? kasan_check_read+0x11/0x20 [ 253.425681] ? cap_capable+0x1f9/0x260 [ 253.429578] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 253.435143] ? security_capable+0x99/0xc0 [ 253.439305] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 253.444845] ? ns_capable_common+0x13f/0x170 [ 253.449261] ? get_anon_bdev+0x2f0/0x2f0 [ 253.453322] ? sget+0x113/0x150 [ 253.456612] ? fuse_get_root_inode+0x190/0x190 [ 253.461199] mount_nodev+0x6b/0x110 [ 253.464828] fuse_mount+0x2c/0x40 [ 253.468282] mount_fs+0xae/0x328 [ 253.471655] vfs_kern_mount.part.34+0xd4/0x4d0 [ 253.476240] ? may_umount+0xb0/0xb0 [ 253.479865] ? _raw_read_unlock+0x22/0x30 [ 253.484014] ? __get_fs_type+0x97/0xc0 [ 253.487906] do_mount+0x564/0x3070 [ 253.491528] ? copy_mount_string+0x40/0x40 [ 253.495850] ? rcu_pm_notify+0xc0/0xc0 [ 253.499746] ? copy_mount_options+0x5f/0x380 [ 253.504154] ? rcu_read_lock_sched_held+0x108/0x120 [ 253.509172] ? kmem_cache_alloc_trace+0x616/0x780 [ 253.514020] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 253.519564] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 253.525106] ? copy_mount_options+0x285/0x380 [ 253.529609] ksys_mount+0x12d/0x140 [ 253.533244] __x64_sys_mount+0xbe/0x150 [ 253.537219] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 253.542239] do_syscall_64+0x1b1/0x800 [ 253.546126] ? finish_task_switch+0x1ca/0x810 [ 253.550624] ? syscall_return_slowpath+0x5c0/0x5c0 [ 253.555558] ? syscall_return_slowpath+0x30f/0x5c0 [ 253.560501] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 253.565871] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 253.570718] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 253.575925] RIP: 0033:0x455979 [ 253.579111] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/05/06 05:52:52 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x0, 0x0, 0xf00}}) 2018/05/06 05:52:52 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:52 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x0, 0x0, 0xf00000000000000}}) [ 253.586821] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 253.594091] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 253.601357] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 253.608624] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 253.615892] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 2018/05/06 05:52:52 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x101, 0x218002) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) recvmmsg(r1, &(0x7f0000001740)=[{{0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000280)=""/190, 0xbe}, {&(0x7f0000000340)=""/179, 0xb3}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/175, 0xaf}, {&(0x7f0000000540)=""/62, 0x3e}, {&(0x7f0000000580)=""/121, 0x79}, {&(0x7f0000000600)=""/90, 0x5a}, {&(0x7f0000000680)=""/129, 0x81}, {&(0x7f0000000740)=""/50, 0x32}], 0x9, &(0x7f0000000840)=""/130, 0x82, 0x3}, 0x81}, {{&(0x7f0000000900)=@generic, 0x80, &(0x7f0000000a40)=[{&(0x7f0000000980)=""/186, 0xba}], 0x1, &(0x7f0000000a80)=""/205, 0xcd, 0x2}, 0x7f}, {{&(0x7f0000000b80)=@nl, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000c00)=""/20, 0x14}, {&(0x7f0000000c40)=""/11, 0xb}, {&(0x7f0000000c80)=""/68, 0x44}, {&(0x7f0000000d00)=""/207, 0xcf}], 0x4, &(0x7f0000000e40)=""/154, 0x9a, 0x7fffffff}, 0x6}, {{&(0x7f0000000f00)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000000f80)=""/109, 0x6d}, {&(0x7f0000001000)=""/242, 0xf2}, {&(0x7f0000001100)=""/152, 0x98}, {&(0x7f00000011c0)=""/63, 0x3f}, {&(0x7f0000001200)=""/190, 0xbe}, {&(0x7f00000012c0)=""/70, 0x46}, {&(0x7f0000001340)=""/8, 0x8}, {&(0x7f0000001380)=""/244, 0xf4}, {&(0x7f0000001480)=""/177, 0xb1}, {&(0x7f0000001540)=""/59, 0x3b}], 0xa, &(0x7f0000001640)=""/247, 0xf7, 0x6}, 0x7}], 0x4, 0x40010120, &(0x7f0000001840)={0x0, 0x1c9c380}) r2 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffff8) r3 = request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000240)='\x00', 0xfffffffffffffff9) keyctl$instantiate(0xc, r2, &(0x7f0000000100)="d5638ff9c593eccbda63edc6022551513e3a238a06b8f7ac86543d643a1214bc379fad7aed3960e1d68dc70dd19cd1cc33ceb1394b249dd19b7da4702c9c3862ba9a76ff05aa87a041e6dbd2f9e824b6ab464a860aa9beb23bb5e7041d382e6ee7726970b51e544d9a05f4f1d19c0c6c7cb4749669f5ec658d634b6b713c3f6afa21ef202f3341a623c2b45ed0515002e7104d83685cadc0979a723b32126b5c3448f07ae2164c195d85ffcef65dbf8ba5f3f0285e0d", 0xb6, r3) 2018/05/06 05:52:52 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f0000000500)={0x366b812e, 0x0, 0x6, 'queue0\x00', 0x4}) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000140)) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r1) 2018/05/06 05:52:52 executing program 1 (fault-call:1 fault-nth:74): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:52:52 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x0, 0x0, 0xfeffffff00000000}}) 2018/05/06 05:52:52 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0x0, 0x0, 'queue0\x00', 0x1ff}) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000140), &(0x7f0000000180)=0x0, &(0x7f00000001c0)) fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f0000000280)=[0x0, 0xffffffffffffffff]) fstat(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0, 0x0}, &(0x7f0000000440)=0xc) getgroups(0x6, &(0x7f0000000480)=[r1, r2, r3, r4, r5, r6]) r7 = syz_open_dev$admmidi(&(0x7f00000004c0)='/dev/admmidi#\x00', 0x8000, 0x800) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000500)={0x0, 0x4}, &(0x7f0000000540)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r7, 0x84, 0x72, &(0x7f0000000580)={r8, 0x6}, 0xc) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) 2018/05/06 05:52:52 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) [ 254.137708] FAULT_INJECTION: forcing a failure. [ 254.137708] name failslab, interval 1, probability 0, space 0, times 0 [ 254.149092] CPU: 0 PID: 17273 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 254.156368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 254.165719] Call Trace: [ 254.168315] dump_stack+0x1b9/0x294 [ 254.171958] ? dump_stack_print_info.cold.2+0x52/0x52 [ 254.177148] ? kernel_text_address+0x79/0xf0 [ 254.181558] ? __unwind_start+0x166/0x330 [ 254.185712] ? __kernel_text_address+0xd/0x40 [ 254.190212] should_fail.cold.4+0xa/0x1a [ 254.194276] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 254.199478] ? __lock_acquire+0x7f5/0x5140 [ 254.203712] ? __lock_acquire+0x7f5/0x5140 [ 254.207947] ? save_stack+0xa9/0xd0 [ 254.211578] ? graph_lock+0x170/0x170 [ 254.215387] ? kasan_kmalloc+0xc4/0xe0 [ 254.219283] ? kasan_slab_alloc+0x12/0x20 [ 254.223441] ? find_held_lock+0x36/0x1c0 [ 254.227509] ? __lock_is_held+0xb5/0x140 [ 254.231593] ? check_same_owner+0x320/0x320 [ 254.235922] ? __lock_acquire+0x7f5/0x5140 [ 254.240165] ? rcu_note_context_switch+0x710/0x710 [ 254.245104] __should_failslab+0x124/0x180 [ 254.249342] should_failslab+0x9/0x14 [ 254.253142] kmem_cache_alloc+0x2af/0x760 [ 254.257291] ? debug_check_no_locks_freed+0x310/0x310 [ 254.262490] __d_alloc+0xc0/0xd30 [ 254.265958] ? __lock_acquire+0x7f5/0x5140 [ 254.270206] ? shrink_dcache_for_umount+0x290/0x290 [ 254.275232] ? print_usage_bug+0xc0/0xc0 [ 254.279314] ? debug_check_no_locks_freed+0x310/0x310 [ 254.284504] ? print_usage_bug+0xc0/0xc0 [ 254.288572] ? __lock_acquire+0x7f5/0x5140 [ 254.292825] d_alloc+0x8e/0x370 [ 254.296115] ? __d_alloc+0xd30/0xd30 [ 254.299842] d_alloc_parallel+0x152/0x1e80 [ 254.304078] ? graph_lock+0x170/0x170 [ 254.307888] ? __lock_acquire+0x7f5/0x5140 [ 254.312124] ? debug_check_no_locks_freed+0x310/0x310 [ 254.317322] ? __d_lookup_rcu+0xa80/0xa80 [ 254.321495] ? print_usage_bug+0xc0/0xc0 [ 254.325574] ? find_held_lock+0x36/0x1c0 [ 254.329645] ? lock_downgrade+0x8e0/0x8e0 [ 254.333799] ? __kernel_text_address+0xd/0x40 [ 254.338304] ? mark_held_locks+0xc9/0x160 [ 254.342459] ? __raw_spin_lock_init+0x1c/0x100 [ 254.347050] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 254.352066] ? __lockdep_init_map+0x105/0x590 [ 254.356561] ? __lockdep_init_map+0x105/0x590 [ 254.361059] ? lockdep_init_map+0x9/0x10 [ 254.365120] ? __init_waitqueue_head+0x96/0x140 [ 254.369790] ? init_wait_entry+0x1b0/0x1b0 [ 254.374026] ? d_alloc_parallel+0x1e80/0x1e80 [ 254.378526] ? lock_release+0xa10/0xa10 [ 254.382505] __lookup_slow+0x1e6/0x540 [ 254.386395] ? vfs_unlink+0x510/0x510 [ 254.390206] ? d_lookup+0x219/0x330 [ 254.393849] lookup_one_len+0x1c7/0x210 [ 254.397831] ? lookup_one_len_unlocked+0xf0/0xf0 [ 254.402592] ? down_write+0x87/0x120 [ 254.406309] ? start_creating+0xb1/0x200 [ 254.410370] ? down_read+0x1b0/0x1b0 [ 254.414088] ? mntput+0x74/0xa0 [ 254.417368] ? simple_pin_fs+0xa4/0x190 [ 254.421345] start_creating+0xc6/0x200 [ 254.425235] __debugfs_create_file+0x63/0x400 [ 254.429736] debugfs_create_file+0x57/0x70 [ 254.433978] bdi_register_va.part.10+0x365/0x9b0 [ 254.438741] ? cgwb_kill+0x630/0x630 [ 254.442458] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 254.447993] ? bdi_init+0x416/0x510 [ 254.451622] ? wb_init+0x9e0/0x9e0 [ 254.455163] ? bdi_alloc_node+0x67/0xe0 [ 254.459134] ? bdi_alloc_node+0x67/0xe0 [ 254.463109] ? rcu_read_lock_sched_held+0x108/0x120 [ 254.468145] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 254.473426] ? _raw_spin_unlock+0x22/0x30 [ 254.477576] bdi_register_va+0x68/0x80 [ 254.481470] super_setup_bdi_name+0x123/0x220 [ 254.485966] ? kill_block_super+0x100/0x100 [ 254.490293] ? kmem_cache_alloc_trace+0x616/0x780 [ 254.495136] ? match_wildcard+0x3c0/0x3c0 [ 254.499284] ? trace_hardirqs_on+0xd/0x10 [ 254.503440] fuse_fill_super+0xe6e/0x1e20 [ 254.507598] ? fuse_get_root_inode+0x190/0x190 [ 254.512189] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 254.517209] ? kasan_check_read+0x11/0x20 [ 254.521366] ? cap_capable+0x1f9/0x260 [ 254.525261] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 254.530801] ? security_capable+0x99/0xc0 [ 254.534954] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 254.540490] ? ns_capable_common+0x13f/0x170 [ 254.544918] ? get_anon_bdev+0x2f0/0x2f0 [ 254.548978] ? sget+0x113/0x150 [ 254.552265] ? fuse_get_root_inode+0x190/0x190 [ 254.556852] mount_nodev+0x6b/0x110 [ 254.560482] fuse_mount+0x2c/0x40 [ 254.563936] mount_fs+0xae/0x328 [ 254.567320] vfs_kern_mount.part.34+0xd4/0x4d0 [ 254.571903] ? may_umount+0xb0/0xb0 [ 254.575532] ? _raw_read_unlock+0x22/0x30 [ 254.579678] ? __get_fs_type+0x97/0xc0 [ 254.583573] do_mount+0x564/0x3070 [ 254.587123] ? copy_mount_string+0x40/0x40 [ 254.591360] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 254.596119] ? retint_kernel+0x10/0x10 [ 254.600016] ? copy_mount_options+0x213/0x380 [ 254.604517] ? __sanitizer_cov_trace_const_cmp4+0x11/0x20 [ 254.610058] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 254.615593] ? copy_mount_options+0x285/0x380 [ 254.620093] ksys_mount+0x12d/0x140 [ 254.623726] __x64_sys_mount+0xbe/0x150 [ 254.627700] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 254.632718] do_syscall_64+0x1b1/0x800 [ 254.636620] ? finish_task_switch+0x1ca/0x810 [ 254.641117] ? syscall_return_slowpath+0x5c0/0x5c0 [ 254.646048] ? syscall_return_slowpath+0x30f/0x5c0 [ 254.650983] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 254.656356] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 254.661203] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 254.666389] RIP: 0033:0x455979 [ 254.669573] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 254.677285] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 254.684553] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 254.691822] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 254.699090] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 254.706357] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 2018/05/06 05:52:53 executing program 7: close(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xffffffff, 0x20200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000040)=[@in6={0xa, 0x4e22, 0x101, @loopback={0x0, 0x1}, 0x3}, @in={0x2, 0x4e23, @rand_addr=0x2}, @in={0x2, 0x4e23}, @in6={0xa, 0x4e21, 0x6, @empty, 0x5}, @in6={0xa, 0x4e20, 0x7, @remote={0xfe, 0x80, [], 0xbb}, 0xffff}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1c}}, @in6={0xa, 0x4e20, 0x7ff, @mcast2={0xff, 0x2, [], 0x1}, 0x4}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in6={0xa, 0x4e24, 0x400, @loopback={0x0, 0x1}, 0x80000000}, @in={0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}], 0xdc) 2018/05/06 05:52:53 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x2000000}}) 2018/05/06 05:52:53 executing program 6: syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x5197fc) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f00000000c0)={0x4, 0xce8, 0xfe8f, 0x6, 0x5, 0x3}) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f0000000080)={0x9, 0xffffffffffffffc1, 0x1, 0x3}) 2018/05/06 05:52:53 executing program 1 (fault-call:1 fault-nth:75): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:52:53 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:53 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0x0, 0x0, 'queue0\x00', 0x1ff}) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x88201, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000180)=0x3, 0x4) r2 = syz_open_dev$mouse(&(0x7f0000000600)='/dev/input/mouse#\x00', 0x80b, 0x0) ioctl$VT_WAITACTIVE(r2, 0x5607) fstat(r1, &(0x7f0000000780)) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r0) r3 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x8, 0x80000) ioctl$sock_bt_bnep_BNEPCONNADD(r3, 0x400442c8, &(0x7f0000000800)={r3, 0x657b, 0x0, "5d4c7b27aa7a57a0da21fbc4b99e9385fcdee33b4f926a4e5617f75725ae66c5fa6d988fc77559b03110daa2e42aa75d39501e1f277a4f3512799f323b34f9816f0e9b680ae2fa786e6078ca1d7da2a14f8b33219bb9db91593b6d9ac46fa7e17d8ab79c4d73d1c91dcd771db3e9989b1875f38289ddea6c440c4fff2382379ae5fd93faeebf833fbb1b270c914fc17f4eb2319c19454eda46a5f0296eaff7298c8237a33c8d45497bc4612a944dc05038c27df048e6ed3b023cfb4b546b5c27ee674a068bb4a35ce8a196a5fc04730f5a82eb44fe428716c8a353a1f8adc513a7e3ae944e9a0ba84496eaf286fde091d8729567a2a6"}) getsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f00000001c0), &(0x7f0000000200)=0x8) ioctl$TIOCCONS(r3, 0x541d) r4 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x7ffffffa, 0x400) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r3, 0x800448d2, &(0x7f0000000740)={0x0, &(0x7f0000000a40)=[{}, {}]}) ioctl$KVM_DEASSIGN_DEV_IRQ(r4, 0x4040ae75, &(0x7f0000000040)={0x10000, 0x5, 0x401, 0x200}) sendmsg(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000240)="65ab7ad5df5752e7203e9aa4e0589152c0b86f03131732e76b86a747b52ade22f2f4a2dea237dcede318171581cfb6de61992fa20cc8e4234a355a0f2dffd152e64fdde5481473af39b166dd9578fb4e0bd4851c4f9d7d1f82f87e2c74f8f4cc1b246092eab030278540609fb4d07bf89e1b65659101effda8a604ed3a30add0c93832fff6353a14f175887c106c1b4ec5acbdb2e7624869f3fe18a50d74154455", 0xa1}, {&(0x7f0000000300)="1e879491ce44004a8e1417", 0xb}], 0x2, &(0x7f0000000440)=[{0x50, 0x6, 0x200, "213f3c30b6fb294dd493f024edd150056a504f2523753e7797e99793738aed66813ae83f5fbf2abc4380f20cf1a906dfafdd4e5df664199aebc850fd80964b"}, {0x110, 0x10b, 0x1000, "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"}], 0x160, 0x20000000}, 0x40) 2018/05/06 05:52:53 executing program 2: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0x0, 0x8, 'queue0\x00'}) r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x6, 0x101000) ioctl$KVM_SET_SIGNAL_MASK(r0, 0x4004ae8b, &(0x7f0000000180)={0xaf, "ed78497da817ad593e0e76426cd8f390274407eed3e4fcad6d007df30091ca3ecbf88df884aa87b5aa6414b1e69a504fac860a5269c877d7f314448e467134cbcbea2a253cd5e6df5a5567bf0a46cd85c2f81c27e1f476d59bb9cec5e7129bcf8659be82391acbb49e9779c339cbc47937c2ba8186a60fc035f69babbfd18c13e2abe1bb16aea2ec9b9bbec2012adbe52aa216e961c84b137c5a749bae084004828b825d279678341777cfe025c3df"}) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000040)) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000140)) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(r1) [ 255.153525] FAULT_INJECTION: forcing a failure. [ 255.153525] name failslab, interval 1, probability 0, space 0, times 0 [ 255.164856] CPU: 1 PID: 17285 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 255.172137] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 255.181492] Call Trace: [ 255.184094] dump_stack+0x1b9/0x294 [ 255.187729] ? dump_stack_print_info.cold.2+0x52/0x52 [ 255.192926] ? __lock_acquire+0x7f5/0x5140 [ 255.197169] ? __lock_acquire+0x7f5/0x5140 [ 255.201420] should_fail.cold.4+0xa/0x1a [ 255.205509] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 255.210625] ? debug_check_no_locks_freed+0x310/0x310 [ 255.215825] ? kasan_check_write+0x14/0x20 [ 255.220071] ? __init_rwsem+0x1c4/0x290 [ 255.224058] ? graph_lock+0x170/0x170 [ 255.227870] ? find_held_lock+0x36/0x1c0 [ 255.231944] ? find_held_lock+0x36/0x1c0 [ 255.236017] ? __lock_is_held+0xb5/0x140 [ 255.240101] ? check_same_owner+0x320/0x320 [ 255.244430] ? graph_lock+0x170/0x170 [ 255.248242] ? rcu_note_context_switch+0x710/0x710 2018/05/06 05:52:53 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) [ 255.253182] __should_failslab+0x124/0x180 [ 255.257428] should_failslab+0x9/0x14 [ 255.261237] kmem_cache_alloc+0x2af/0x760 [ 255.265397] ? find_held_lock+0x36/0x1c0 [ 255.269652] fuse_alloc_inode+0x96/0x4f0 [ 255.273721] ? fuse_dev_alloc+0x4e0/0x4e0 [ 255.277876] ? lock_downgrade+0x8e0/0x8e0 [ 255.282039] ? kasan_check_read+0x11/0x20 [ 255.286198] ? do_raw_spin_unlock+0x9e/0x2e0 [ 255.290618] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 255.295221] ? kasan_check_write+0x14/0x20 [ 255.299477] ? find_inode.isra.19+0xc3/0x1d0 [ 255.303893] ? fuse_dev_alloc+0x4e0/0x4e0 [ 255.308045] alloc_inode+0x63/0x190 [ 255.311680] iget5_locked+0x20e/0x570 [ 255.315486] ? fuse_inode_eq+0x80/0x80 [ 255.319374] ? fuse_init_file_inode+0x70/0x70 [ 255.323873] ? inode_lru_isolate+0x580/0x580 [ 255.328285] ? cgwb_kill+0x630/0x630 [ 255.332011] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 255.337556] ? print_usage_bug+0xc0/0xc0 [ 255.341624] fuse_iget+0x1cc/0x820 [ 255.345171] ? fuse_change_attributes+0x810/0x810 [ 255.350016] ? _raw_spin_unlock+0x22/0x30 [ 255.354172] fuse_get_root_inode+0x121/0x190 [ 255.358584] ? fuse_iget+0x820/0x820 [ 255.362308] ? _raw_spin_unlock_bh+0x30/0x40 [ 255.366719] ? bdi_set_max_ratio+0x112/0x150 [ 255.371129] fuse_fill_super+0x11e0/0x1e20 [ 255.375378] ? fuse_get_root_inode+0x190/0x190 [ 255.379966] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 255.384992] ? kasan_check_read+0x11/0x20 [ 255.389151] ? cap_capable+0x1f9/0x260 [ 255.393055] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 255.398603] ? security_capable+0x99/0xc0 [ 255.402766] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 255.408311] ? ns_capable_common+0x13f/0x170 [ 255.412732] ? get_anon_bdev+0x2f0/0x2f0 [ 255.416803] ? sget+0x113/0x150 [ 255.420096] ? fuse_get_root_inode+0x190/0x190 [ 255.424688] mount_nodev+0x6b/0x110 [ 255.428324] fuse_mount+0x2c/0x40 [ 255.431824] mount_fs+0xae/0x328 [ 255.435203] vfs_kern_mount.part.34+0xd4/0x4d0 [ 255.439798] ? may_umount+0xb0/0xb0 [ 255.443423] ? _raw_read_unlock+0x22/0x30 [ 255.447576] ? __get_fs_type+0x97/0xc0 [ 255.451468] do_mount+0x564/0x3070 [ 255.455013] ? copy_mount_string+0x40/0x40 [ 255.459258] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 255.464021] ? retint_kernel+0x10/0x10 [ 255.467921] ? copy_mount_options+0x213/0x380 [ 255.472422] ? __sanitizer_cov_trace_pc+0x11/0x50 [ 255.477275] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 255.482817] ? copy_mount_options+0x285/0x380 [ 255.487323] ksys_mount+0x12d/0x140 [ 255.490956] __x64_sys_mount+0xbe/0x150 [ 255.494936] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 255.499960] do_syscall_64+0x1b1/0x800 [ 255.503852] ? finish_task_switch+0x1ca/0x810 [ 255.508352] ? syscall_return_slowpath+0x5c0/0x5c0 [ 255.513295] ? syscall_return_slowpath+0x30f/0x5c0 [ 255.518233] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 255.523605] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 255.528457] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 255.533643] RIP: 0033:0x455979 [ 255.536832] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 255.544540] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 255.551809] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 255.559077] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 255.566344] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 255.573610] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 2018/05/06 05:52:54 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x400000000000000}}) 2018/05/06 05:52:54 executing program 6: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x80000000000000, 0x80000003effe) close(0xffffffffffffffff) 2018/05/06 05:52:54 executing program 7: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x7, 0x80001) r1 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) sendmsg$nl_netfilter(r0, &(0x7f00000015c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001580)={&(0x7f0000000100)={0x1480, 0x4, 0xb, 0x20, 0x70bd2d, 0x25dfdbfc, {0xf, 0x0, 0x7}, [@typed={0x4, 0x46}, @typed={0x8, 0xc, @ipv4=@rand_addr=0x100000000}, @generic="0ff792ded44f6d4d6ea65fb1bfb725a8becc1a6ab909c275db37456a56009e55bfb64d0b45e6591099c0fa5c12a192b64baa923d797b9f27650dd911e0befe580811c6dd4534455fa814186e19b9a37970eb4c68a733cf44b4f948336cbdda6efad1c190354630cf8a68f9bb207d3e2c767b57225d00bf0f28c282abcda834ee35f61f56df6aedaa21f7db", @typed={0xc, 0x73, @u64=0x40}, @nested={0x2bc, 0x17, [@generic="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", @generic="ccc72f15c30de2547f6c6258c238773a83522b606cd09719c3c872cc7341d0ccc31cf72ec3298e4c", @generic="fc65c6c3b859d41784acbc2471c96f4dd42118d83a5b54afbe5c83549137b5637cc99389cf59d934bf7eb660fee8421645e2d311c456dafb6fa8f8d2668ed983dd4bff3812dc8f9d5426a2633baccfef6182cf1de7b898e448d0f7d20be4816fff042c7027ccf3bac41ae37967d1adc11e5ef242dcba44213dda01815ce8805d70404bb5f37394e32daef1720c8c4680ccf2e9fbac28affa3b2b9cfab517a8212c07ead03b091ff5f370fa1ea0", @generic="4b5587e838c00c8b5c442b2d5be7e07b48f3a2571dde02f22d63da60de3436e64af9bb898592c3fb3aaaccee7df1c0e0ec8a940fad9174faff5a78072a88ec2a3cc6bc0938cab8995c2ff63891d5e346b1f8eabd28ee211cb73debec11f78179e2ea9abde20e383f052eceb4009a79afb617f149b6a6ab49a7fe03009be5674feca6b5d0f2cb4959414c62bd6beca7bd95a0cbf74faf0aedd72b3c1e7859e9643d03", @generic="6239702195f5b5754867976f96edaaa695cf30a552f1cbd10885082a1bd503a1506b588efd7621d10a6febfbc07bfea5914b28ae98c1c51e5e92db03ee2515bc7ad9de8d"]}, @generic="3b3a23a5426a437e5a82229a45be32b43f34214b41bf59611474c3bcb111dcfbccd3", @generic="537150d4148e79d9877617ee2d302ffe69b966dfa01fddf47e22c4dfe5d59dc04e1305633060a12a8f0031d6e7f81f0cf1ac337699c26f19e6b56415cd36ecf36eb171d0ddcded2bca9081066b8b209d5e838b469e7c5d9209430e423943222b5aa94f3aaa038362df93505a26e48ad3da7919157ed5c10db4e0587f0747c011241df05345f6a9c511e47b81345e7330d67197bb6ba638b001ba88d24806e5c904c780061979bd1dddb9677ee5953cb8886f2805fa448d8d29a68302876b01d1bea4a45d7a842ad7445e74091320b4cecfd240547f8dbbd0a66b2854f7e17027032638f24b182d04307bfccf0a29842811882a36f3666b6b3c903e98c1a421506d30802d072e88d7948a43cd799597aaa0954d0b1835cb54da08d2006e8aa06f4a1eadd973844c8ce5f12e502666a28fa94ac02e122a9ccdc68ab5487f092426f6c1e83d968fb5e0140455ba7a6f81417b57e931dc68293257f7eb68e7e6d31340b6a1694991aac16d69214379208d1be6e32ee1fda63e2e2fcd10411a06d11567ea27ab8979d51b86bb0ae16b328387ce2e56bb0cde53d9bc4a7550647b0f6c1a939986dc885d769cedcc8054c1e8d063c2aa8f3f587feceb91ba02f8944c54a9d126cfb144eb8b912941686ad758a7878e9770a6d4c6773902ca61b1d0b65599c721ef5f6d64e70cc4e3813d5b1f73efaf6b9a2cbb39c3fae5f14436a1991b16bc2ec006230cbd5d0862461ec9ce3c2571d1d19960bd854eb55b4d3d659158269e3adf5741e364159f2631924a8e8e9560da28b25112644c082c6974cca80dd328a54251ad6f5bff7bc9e96acb4ae47f58d65c015340c7bc10d12934c61dd5b3cb2bfdbf5642b0a86fe5199817e53dcca6954288278528e33149071917e0dc2fec475f429ed0cd2e60a4f8393913c2c19b61c06df993bbd1ebd1d8175725f2383ffe3488f9091d693d51e1db84196eefa5da38033a1a66b9ab3005c476ed4279b2fc5493c3bb5e7f3cece0e6826727cdc3e7a4a57252a06be9a949af2ae87cc578e1dc67509ad75cb583febf25018cc631838c95971d65a195972c882324243b70b68514ead9177c6164d6da735a228a3ec1290493b03564e00beab21f9b8ce1cace4c55c33802e3c2bf6f6ef133612a66f3ba6d12128ad03ef31e12027191b5cd532640e05642e048d73793f8f4ba96fe5f98a9bc18aceb3e148b8d8b1bb7140085de8b892ad45100de4bbfcc70bd6a01d644338baa1cb97b6f54a33887305b7a7f09c6d5b36a1a1282706dbca68a26ef1b5a89df6c9757e4a923015e600a84a9d8f74f23d9a8bf27a54b479999a1492270db9db12c611555a638c8af985924910e24c9adfb88d0dbeea9255292d426a894fafbd1f1ea2b8f7d07e7b798cf11f46e701e7a8dd95c76cb147c32b1b7ab1c33eebaba295622d206e87acf911b205fb75f15f20dba536d16ecee70f488e6e5fff5dd93d6c4a936635c6a26c703f3b00e736ef01f415ea54875c10ac7231a783a75201b3b7104ad2471402446cc294c555228d1f91f4fb3c0317a3276604121677fe17aa35028d18d0ed82c140a76c4be66bcb57a75b54e8432545cc84129e5d11f3f480f788aad4e1bb05024975ca5e12d8516f0c0bce0ac029e31c71c9036a2325bd83a0072477cf63c15c979b3cb316c07f93a6c1221ce13ee4b43e0625a06d94a90eb96b89050da11656e4d6c75203031df62d4d0fb6e3e4fadec65ffb9d3974b4ed6dfba1ae208c0062ec1c16d07d699cc9f204bd088b741fb79596a72b5dc6ab2355fc42d4ee36ca225eaf6a950bbe8c4d8929473b3e16d933d81c1fb98bb993059c7658373da62dcb26e3ae23a92b999f1550095174adfd24d95c7da55b3e5c1908b2b07eff7a0aa878c9bfc55a1c5baf3972788ace39641b10dfdacd9eaea45379bb4e6e048559f56b1d1f7a67b6aba9120b28ca76781324e9e4838eec3f96debde55c0383752f0e8a90cf83126e3774af23b4a1dbc0ce4b24ffd4f604e4098a1c0ffb0febf0510c37de9e35de312b21b1a484a7e0fef31cf5f771364db2920a526aa26ac5c9f0a0357e0e839926375643d9796db10a68223d94e43b953bcdcfc1c50404f1277d6dd48df7ec39a6dfeb9f0f23c8b4fc4679055b1dcc891b60563f705f4f38916a105fe03436a0400445af5866a78967c06436f0c6784ee6d1425ede83aac7b9105ec6112d01f616895b82aa2542c982cf5b0d917cfdc3564aa841de57e9cff0177a25f89364b732e739aed02f71c6c2a526132a9cfea105cee1115692d7027b3285dd26cb50beeddf8008b09cad2ceb849273c97d1ed840f407f3a5716e8128e4936424e57ab5cb319ae4a849d35f94119130322476d52421ee94fa05fbb5de153b0db9b53a288203ab7f074bfe178f17b71049e51633f5db60243ebd659573c033b462436792090a3955a742e5901b8674c2d3db10778db72edefebe5b28c60cb197f7f2f713f6aac9cb8fcfc43ee433ff36e7f81b11f73a8fe2c386e32c8658de14421e349cf8af0717619d307e2d5598167580a1cb494ecdb1385d7448afbeb53b0e42d97b6cdd0e9f6e85678fb297d6aec1be6686ab03f757245845ced9f5bb772461ea5760104cbcfed6d36ddfa7bd10dd23e13b62663d25e1a51da890e4f3c57dcfa8ad3d53481a5881d0fdebaf0a91fcd0570a51e36bf650e7ca535aa6bb7621fd164a61d009580d06e60c8e5dcdefd1da40a901d44a4da527495d6a3c9a6afff77e8330c36b610d74d43529f9360ae87753e8cce57d56cd654073717482d42fc44cdcdf9efd6b4d0933eda8a8ba1847e12f9738d7c82eb1bad65abf1a11158256fd8eaf02564293908a2be70121b17cfe07db1d80b6d9b68fabb48fe07bcdc52dc65c3d18ec24777b77e22f934ed595785be72f030171b9dc52fa6edd8b16150929c7f29f92972aa61e7ea0c1fc4a2f39e815492caec39373768f0d207c54a6bdf81d569692f68afd0d3205530b1684e0eb05b7b65fbd1c3e0f64c7f0079d5503c4314fa805858c893e7569052bf49be60e8f8e7fb2169df3499a0e3a752bcefed66d93bd76161ba3b15d22b5b44ce31fc07c851a11d7afe6d6e613f873c673369173803b831a7d26fe0bf2805fb4f7eea8844211d4b1f3e4874f67afc65cd6493631b84cee3de37a923c0803f85c413eac8dc0d79292dcab9a6cc24c0cef0db296fac8c3cc6068951a7a7c405a433a092c11b09d9750589f566831221eeb76a71689eec8ffbe25a4a73adc46f0c5a2db51bc279d4d2ae1dd00fbb25357a128fd0a64f15868a8b4af6c7e70e3905ee13570a77f117e814575ced48b6269e44d264deeb012e82e8367a26ac2fc67644cb1cfef47d689668d6e29938ae3674d24b97de3a4cecdc15a4cbc3cca60067d2df6df1d800d593de2f0d1de342e402a4765617b6c8d1f109c05830c31d4e936da358581718b049a6e61628b42de2cd8bedd77209cd1d710ae8344b69dd11940ea6471f3e9cd5164bf8acf9ef0f645cd74909bd5d79a3c3d43d4d262fe7241c33d2d53881524434f15adcdfce2b37a1a5967791e6dca3f9fa9c2b818ba902beeb94e5ba8df13117197b1e274b706ab4a3ab88c6cd51bfea4c53cc48051773cf752ca9fd37f5c1fcd23762818bf5f2b2089ffa8315b15088a2425caa9946c7b9f924894334cb9871a639b0a1b98820922b5dec42fb9d5640221cf91a5e5ad13d6d245016b6f76ecaebe3f2c224b3eba2c82031e0cf8240af0d205504936d9c90cc580a0acf6a630879dbd472b0a45762b7647cec1ad229473d4016f82a020686f642f8aba980b50a2841294903cbe398ff4c242ec1814818f977b9377ee4df4a1b9a9d33ee6fc9ee34ebdf81ca6956e6e44bea5b19bef42edfdfe0038941ceae1b383101a5589a0da309d6ed0ad739e10b2139ae7458b3a5ef2c70ae0a297006d2a19e40e387fa1ef8670a8dc112e56af255ac1ebe4522d8e9885bde4f506cb9338e33cde7eb9cdf2894c7c3c2027c4033088fc48206d9a0337c5a2202ca7ab7c5f267d7918edb7d535be829cf5a14b794239435d071929efbf7e05766be2d5332be1e074bd5135cca17827d2d7f4988a8de8cee0246f3502536569f8794bf46d07e3cf45aa455efcddd2f1029c8e8ae1f9cff592055f5ef5270a2bb81eaaa46760f6ff3de32bb3d9f992e5eae50a14b595b21e3acd8039d41a367d578c94127641b4b18ac2917b1efdb10f2e6b459b196b379d87fdb4bde9300afab27cad129c6513dc35bef52d35eedfcc3456d437225724fe7ca764aa4cefb399a0b586ba784637950c724a25a8b055524dcecf6fcf3aa14a80e00f905062db2746ad2a7f4103974eaba945b6ed096814aedb4ac44033c4b90468bae711c75bbf7abe71eb01308411117c63bcafb105b284e3a6b1f4d3d844db43588d51a7fdd73d2d119004c7add21260288ab19191e2bc8d073d1ffbb84ec590abf5faf975f8894a04ebeb451dcc4e4c442c58887b8e1957946c8e5cb0251a6aa2df7312a88c957f081e1d3a8e03324b8c69b2802115b44a17cd5a362516a913573dd5a99b48cb97f8d0e6fa971d7db1aa2ee8033658c89646c094895fb1b9becd925d145dfa4608244250aa0bd4843e3e3c5b967725f507f2d898e423e579584368f1375e526c64cf43ab51d1df9687f8172e5f7453d65eef16af4a9923ad1103d9bd1453dd309bb37129691dd0317d7ef2ef1e6ae7cddc1b98b40fb958ea9afc23b4db0990b8cbc62c87c343ef0e9e198517af363c5cee4c82ad14db7b56acb6c2af76bbe6652be403ec1ec7e67d5ae53803c250c9e86b83b0c55f8989b6649da723475f86d7b348aa65f33896cd8f6e9e8f4775a228a11e082c744165ecbbd647642e2aabaab10300cbb4ca293e081288053195357246ba8160568deb1a5b757c192095a771972f5af93c26a9d40a4913df5dd17e10b020835edfc98741ece6bc825d7d3ed2049aa3c88848a56bff0dba7030155096c493164c20af9dd9d38d336355c23f34afac5a398fd361d8a50c2d62941d4937667974e95d601c9d16b1cc2154dcdbd07a61656853fc13e64e9c12d76e2382488626dcdc610695dde62b5832ea091d647aeea7fdd7dbef07dfb8320284974de78d02e883bcc1c08663385674db38d6e1e398b4d8e4a9d7eda0c25f7304c909b5249ba33e9d6948c68ceb45aadef9976702dac4c46cae3522fc2b7ab08b5c0e52228788de3abc3d0f78667065db06e060aa9c2f48b08552d2406875f869e0bf8f417307e4a3f9a56c9685742ff308c25293d6cf490e28905b32e6270dbb13522488d43f46b18afc3a7ff0441d45466ab815ac1bd86cac07c396194f350deb8686667128f078ad53000ece80dd18ccaacf9ee2b050da33e1e9664d4fb3947b76894c6d06906ea68c852fd2d1d6fddce8d13047606f806aedce4745a9df57bd9572273b05eeb815b5d2a3d0f9272568698a7cd88786e8458ac40c2286feaa000e156743779c11cd55375b48b96950d703a2b6d0ae4a558c68488e8a66b5e92f1f25c0fa380f620856f8e17a8f73d6e2099578a5b51c4c6daab6358fda5405c6b763829b9ec47db598c02f2fe045ca2c14ca185f1f5c2219badb190d8e1fac1753cead2d3934142bdbff991307fcb44045db73556f26ac8a770051de994680cce13de6449c2ed287ef04e8ea097e6d31fb057d333a227f48487ba91e7f9b82f77f0bd62dc88019d288b3a9dd7d6d6fa9964789673cedcaa1eb5b1296d3c2624e4ee18a204306d", @generic="d5ed26670593bfd1da8a76642b7187a86de43a22fa86bfd9901b396302907bccaa503c7f75c868f9a0ccb038e375d71a4e06e51293c85ff3e2d8324a826862f6e513f85dcb0e944adc1b18d077f7395fa3378ab4d86aa1e6a2c2bb9fbaa62297efa5aabbb82b50f898726629bfb85ee95950451fd97592a9fcc55822612e23b80e19db2b45d233b22523a8966a05cbd7878513264dd081391cd00d2cc2de2a02e037f72695872f9476762061dedfc197cc1f8860cb5be057a671683fc8ff550f3fb977968301823f408ab08f8dd07badb20639a94da6b941d9d061164debc47b0e2198", @typed={0x8, 0x25, @fd=r1}]}, 0x1480}, 0x1, 0x0, 0x0, 0x8000}, 0x240088c5) r2 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0xfffffffffffffffd, 0x85) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000000)) close(0xffffffffffffffff) close(r2) 2018/05/06 05:52:54 executing program 1 (fault-call:1 fault-nth:76): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:52:54 executing program 2: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0x0, 0x8, 'queue0\x00'}) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x7, 0x204400) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) socketpair(0x5, 0x7, 0x6, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x40) close(r0) 2018/05/06 05:52:54 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:54 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000240)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000002c0)='./control/file0\x00') syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./control/file0\x00') close(r0) 2018/05/06 05:52:54 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x0, 0x0, 0x0, 'queue0\x00', 0x1ff}) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) r1 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x7, 0x40) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e20, 0xfffffffffffffff7, @empty, 0x4}}, 0x2, 0x8000, 0xfff, "589984b147ab470fdb81c4aea24ad6de6871d465abe52933bc9e8a9229b86112f0e644f49bfd6f6a98a44c1cb70e2c1e3886a73f88cd4988e32cdcc90f5418586020eba658b9396afa214c5da0f4d07a"}, 0xd8) close(r0) [ 256.280480] FAULT_INJECTION: forcing a failure. [ 256.280480] name failslab, interval 1, probability 0, space 0, times 0 [ 256.291862] CPU: 0 PID: 17322 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 256.299152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 256.308507] Call Trace: [ 256.311104] dump_stack+0x1b9/0x294 [ 256.314734] ? dump_stack_print_info.cold.2+0x52/0x52 [ 256.319929] ? lockdep_init_map+0x9/0x10 [ 256.324001] should_fail.cold.4+0xa/0x1a [ 256.328069] ? do_raw_write_unlock.cold.8+0x3d/0x3d [ 256.333089] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 256.338195] ? graph_lock+0x170/0x170 [ 256.341997] ? find_held_lock+0x36/0x1c0 [ 256.346059] ? find_held_lock+0x36/0x1c0 [ 256.350123] ? __lock_is_held+0xb5/0x140 [ 256.354196] ? check_same_owner+0x320/0x320 [ 256.358520] ? make_kgid+0x23/0x30 [ 256.362072] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 256.367624] ? rcu_note_context_switch+0x710/0x710 [ 256.372571] __should_failslab+0x124/0x180 [ 256.376825] should_failslab+0x9/0x14 [ 256.380636] kmem_cache_alloc+0x2af/0x760 [ 256.384791] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 256.389387] ? kasan_check_write+0x14/0x20 [ 256.393631] ? do_raw_spin_lock+0xc1/0x200 [ 256.397881] __d_alloc+0xc0/0xd30 [ 256.401347] ? fuse_iget+0x1dd/0x820 [ 256.405066] ? shrink_dcache_for_umount+0x290/0x290 [ 256.410091] ? fuse_change_attributes+0x810/0x810 [ 256.414941] ? _raw_spin_unlock+0x22/0x30 [ 256.419096] ? fuse_get_root_inode+0x121/0x190 [ 256.423682] ? fuse_iget+0x820/0x820 [ 256.427407] d_make_root+0x42/0x90 2018/05/06 05:52:54 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x0, 0x0, 0xfffffffe}}) 2018/05/06 05:52:54 executing program 7: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) close(0xffffffffffffffff) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x88000, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000100)=0x7fffffff, 0x4) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x1, 0x0) setsockopt$packet_int(r1, 0x107, 0x1e, &(0x7f0000000040)=0x3, 0x4) [ 256.430950] fuse_fill_super+0x120e/0x1e20 [ 256.435204] ? fuse_get_root_inode+0x190/0x190 [ 256.439802] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 256.444832] ? kasan_check_read+0x11/0x20 [ 256.449007] ? cap_capable+0x1f9/0x260 [ 256.452899] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 256.458442] ? security_capable+0x99/0xc0 [ 256.462600] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 256.468139] ? ns_capable_common+0x13f/0x170 [ 256.472558] ? get_anon_bdev+0x2f0/0x2f0 [ 256.476627] ? sget+0x113/0x150 2018/05/06 05:52:54 executing program 6: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x81) r0 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x8000, 0x10000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@dev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000280)={@dev={0xfe, 0x80, [], 0x12}, r1}, 0x14) close(0xffffffffffffffff) 2018/05/06 05:52:54 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x3}}) [ 256.479912] ? fuse_get_root_inode+0x190/0x190 [ 256.484500] mount_nodev+0x6b/0x110 [ 256.488132] fuse_mount+0x2c/0x40 [ 256.491590] mount_fs+0xae/0x328 [ 256.494967] vfs_kern_mount.part.34+0xd4/0x4d0 [ 256.499551] ? may_umount+0xb0/0xb0 [ 256.503182] ? _raw_read_unlock+0x22/0x30 [ 256.507330] ? __get_fs_type+0x97/0xc0 [ 256.511222] do_mount+0x564/0x3070 [ 256.514768] ? copy_mount_string+0x40/0x40 [ 256.519005] ? rcu_pm_notify+0xc0/0xc0 [ 256.522906] ? copy_mount_options+0x5f/0x380 2018/05/06 05:52:54 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x200000000000000}}) [ 256.527316] ? rcu_read_lock_sched_held+0x108/0x120 [ 256.532335] ? kmem_cache_alloc_trace+0x616/0x780 [ 256.537187] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 256.542734] ? _copy_from_user+0xdf/0x150 [ 256.546892] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 256.552436] ? copy_mount_options+0x285/0x380 [ 256.556947] ksys_mount+0x12d/0x140 [ 256.560596] __x64_sys_mount+0xbe/0x150 [ 256.564593] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 256.569610] do_syscall_64+0x1b1/0x800 [ 256.573500] ? syscall_return_slowpath+0x5c0/0x5c0 [ 256.578435] ? syscall_return_slowpath+0x30f/0x5c0 [ 256.583371] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 256.588771] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 256.593628] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 256.598822] RIP: 0033:0x455979 [ 256.602013] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 256.609729] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 256.616997] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 256.624270] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 2018/05/06 05:52:55 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)="2e2f66696c6530fd", &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/05/06 05:52:55 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x0, 0x0, 0xfdfdffff00000000}}) [ 256.631542] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 256.638812] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 2018/05/06 05:52:55 executing program 1 (fault-call:1 fault-nth:77): mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000180)='./control\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) 2018/05/06 05:52:55 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x4000}}) 2018/05/06 05:52:55 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x300000000000000}}) [ 256.741099] FAULT_INJECTION: forcing a failure. [ 256.741099] name failslab, interval 1, probability 0, space 0, times 0 [ 256.752459] CPU: 0 PID: 17345 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 256.759736] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 256.769093] Call Trace: [ 256.771691] dump_stack+0x1b9/0x294 [ 256.775329] ? dump_stack_print_info.cold.2+0x52/0x52 [ 256.780532] ? kasan_check_write+0x14/0x20 [ 256.784778] ? finish_task_switch+0x28b/0x810 2018/05/06 05:52:55 executing program 4: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0xff7b, 0x0, 0x0, 0x0, 0x20, 0x5}}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0/', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) [ 256.789289] should_fail.cold.4+0xa/0x1a [ 256.793360] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 256.798484] ? __schedule+0x809/0x1e30 [ 256.802385] ? __sched_text_start+0x8/0x8 [ 256.806541] ? find_held_lock+0x36/0x1c0 [ 256.810617] ? __lock_is_held+0xb5/0x140 [ 256.814700] ? check_same_owner+0x320/0x320 [ 256.819030] ? graph_lock+0x170/0x170 [ 256.822848] ? graph_lock+0x170/0x170 [ 256.826662] __should_failslab+0x124/0x180 [ 256.830910] should_failslab+0x9/0x14 [ 256.834719] kmem_cache_alloc+0x2af/0x760 2018/05/06 05:52:55 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x1000000}}) [ 256.838878] ? find_held_lock+0x36/0x1c0 [ 256.842954] fuse_alloc_inode+0x96/0x4f0 [ 256.847024] ? fuse_dev_alloc+0x4e0/0x4e0 [ 256.851185] ? lock_downgrade+0x8e0/0x8e0 [ 256.855350] ? kasan_check_read+0x11/0x20 [ 256.859508] ? do_raw_spin_unlock+0x9e/0x2e0 [ 256.863926] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 256.868522] ? kasan_check_write+0x14/0x20 [ 256.872768] ? find_inode.isra.19+0xc3/0x1d0 [ 256.877184] ? fuse_dev_alloc+0x4e0/0x4e0 [ 256.881342] alloc_inode+0x63/0x190 [ 256.884982] iget5_locked+0x20e/0x570 [ 256.888790] ? fuse_inode_eq+0x80/0x80 [ 256.892691] ? fuse_init_file_inode+0x70/0x70 [ 256.897204] ? inode_lru_isolate+0x580/0x580 [ 256.901619] ? cgwb_kill+0x630/0x630 [ 256.905350] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 256.910898] ? print_usage_bug+0xc0/0xc0 [ 256.914970] fuse_iget+0x1cc/0x820 [ 256.918521] ? fuse_change_attributes+0x810/0x810 [ 256.923383] fuse_get_root_inode+0x121/0x190 [ 256.927799] ? fuse_iget+0x820/0x820 [ 256.931533] ? _raw_spin_unlock_bh+0x30/0x40 [ 256.935947] ? bdi_set_max_ratio+0x112/0x150 [ 256.940361] fuse_fill_super+0x11e0/0x1e20 [ 256.944611] ? fuse_get_root_inode+0x190/0x190 [ 256.949207] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 256.954230] ? kasan_check_read+0x11/0x20 [ 256.958384] ? cap_capable+0x1f9/0x260 [ 256.962284] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 256.967831] ? security_capable+0x99/0xc0 [ 256.971986] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 256.977522] ? ns_capable_common+0x13f/0x170 [ 256.981930] ? get_anon_bdev+0x2f0/0x2f0 [ 256.985992] ? sget+0x113/0x150 [ 256.989274] ? fuse_get_root_inode+0x190/0x190 [ 256.993862] mount_nodev+0x6b/0x110 [ 256.997500] fuse_mount+0x2c/0x40 [ 257.000959] mount_fs+0xae/0x328 [ 257.004333] vfs_kern_mount.part.34+0xd4/0x4d0 [ 257.008920] ? may_umount+0xb0/0xb0 [ 257.012548] ? _raw_read_unlock+0x22/0x30 [ 257.016697] ? __get_fs_type+0x97/0xc0 [ 257.020592] do_mount+0x564/0x3070 [ 257.024142] ? copy_mount_string+0x40/0x40 [ 257.028379] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 257.033397] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 257.038162] ? retint_kernel+0x10/0x10 [ 257.042060] ? copy_mount_options+0x1f0/0x380 [ 257.046557] ? copy_mount_options+0x1fa/0x380 [ 257.051059] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 257.056593] ? copy_mount_options+0x285/0x380 [ 257.061092] ksys_mount+0x12d/0x140 [ 257.064732] __x64_sys_mount+0xbe/0x150 [ 257.068715] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 257.073744] do_syscall_64+0x1b1/0x800 [ 257.077639] ? finish_task_switch+0x1ca/0x810 [ 257.082144] ? syscall_return_slowpath+0x5c0/0x5c0 [ 257.087081] ? syscall_return_slowpath+0x30f/0x5c0 [ 257.092019] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 257.097398] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 257.102249] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 257.107438] RIP: 0033:0x455979 [ 257.110626] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 257.118341] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 257.125612] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 257.132889] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 2018/05/06 05:52:55 executing program 2: ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000380)={0x101, 0x0, 0x8, 'queue0\x00'}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x800, 0x81) close(r0) 2018/05/06 05:52:55 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x4000000}}) [ 257.140162] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 257.147428] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 [ 257.170532] ================================================================== [ 257.177945] BUG: KASAN: use-after-free in __lock_acquire+0x3888/0x5140 [ 257.184620] Read of size 8 at addr ffff8801b173e748 by task syz-executor1/17345 [ 257.192062] [ 257.193696] CPU: 0 PID: 17345 Comm: syz-executor1 Not tainted 4.17.0-rc3+ #35 [ 257.200965] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 257.210316] Call Trace: [ 257.212912] dump_stack+0x1b9/0x294 [ 257.216547] ? dump_stack_print_info.cold.2+0x52/0x52 [ 257.221740] ? printk+0x9e/0xba [ 257.225026] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 257.229781] ? kasan_check_write+0x14/0x20 [ 257.234021] print_address_description+0x6c/0x20b [ 257.238866] ? __lock_acquire+0x3888/0x5140 [ 257.243189] kasan_report.cold.7+0x242/0x2fe [ 257.247599] __asan_report_load8_noabort+0x14/0x20 [ 257.252526] __lock_acquire+0x3888/0x5140 [ 257.256670] ? lock_downgrade+0x8e0/0x8e0 [ 257.260825] ? kasan_check_read+0x11/0x20 [ 257.264974] ? rcu_is_watching+0x85/0x140 [ 257.269124] ? debug_check_no_locks_freed+0x310/0x310 [ 257.274316] ? is_bpf_text_address+0xd7/0x170 [ 257.278813] ? kernel_text_address+0x79/0xf0 [ 257.283221] ? __unwind_start+0x166/0x330 [ 257.287369] ? __kernel_text_address+0xd/0x40 [ 257.291869] ? unwind_get_return_address+0x61/0xa0 [ 257.297313] ? __save_stack_trace+0x7e/0xd0 [ 257.301642] ? save_stack+0xa9/0xd0 [ 257.305265] ? save_stack+0x43/0xd0 [ 257.308886] ? __kasan_slab_free+0x11a/0x170 [ 257.313293] ? kasan_slab_free+0xe/0x10 [ 257.317265] ? kfree+0xd9/0x260 [ 257.320547] ? unregister_shrinker+0x216/0x3a0 [ 257.325126] ? deactivate_locked_super+0x70/0x100 [ 257.330138] ? mount_nodev+0xfa/0x110 [ 257.333932] ? fuse_mount+0x2c/0x40 [ 257.337557] ? mount_fs+0xae/0x328 [ 257.341097] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 257.345844] ? do_mount+0x564/0x3070 [ 257.349553] ? ksys_mount+0x12d/0x140 [ 257.353347] ? graph_lock+0x170/0x170 [ 257.357146] ? kasan_check_read+0x11/0x20 [ 257.361290] ? do_raw_spin_unlock+0x9e/0x2e0 [ 257.365701] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 257.370276] ? print_usage_bug+0xc0/0xc0 [ 257.374332] ? kasan_check_write+0x14/0x20 [ 257.378566] ? do_raw_spin_lock+0xc1/0x200 [ 257.382804] lock_acquire+0x1dc/0x520 [ 257.386604] ? fuse_kill_sb_anon+0x50/0xb0 [ 257.390838] ? lock_release+0xa10/0xa10 [ 257.394815] ? check_same_owner+0x320/0x320 [ 257.399135] ? quarantine_put+0xeb/0x190 [ 257.403196] ? rcu_note_context_switch+0x710/0x710 [ 257.408128] ? __might_sleep+0x95/0x190 [ 257.412102] down_write+0x87/0x120 [ 257.415646] ? fuse_kill_sb_anon+0x50/0xb0 [ 257.419884] ? down_read+0x1b0/0x1b0 [ 257.423597] ? perf_trace_mm_vmscan_writepage+0x750/0x750 [ 257.429136] fuse_kill_sb_anon+0x50/0xb0 [ 257.433197] deactivate_locked_super+0x97/0x100 [ 257.437864] ? fuse_get_root_inode+0x190/0x190 [ 257.442443] mount_nodev+0xfa/0x110 [ 257.446069] fuse_mount+0x2c/0x40 [ 257.449522] mount_fs+0xae/0x328 [ 257.452893] vfs_kern_mount.part.34+0xd4/0x4d0 [ 257.457473] ? may_umount+0xb0/0xb0 [ 257.461094] ? _raw_read_unlock+0x22/0x30 [ 257.465233] ? __get_fs_type+0x97/0xc0 [ 257.469119] do_mount+0x564/0x3070 [ 257.472658] ? copy_mount_string+0x40/0x40 [ 257.476887] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 257.481897] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 257.486656] ? retint_kernel+0x10/0x10 [ 257.490540] ? copy_mount_options+0x1f0/0x380 [ 257.495030] ? copy_mount_options+0x1fa/0x380 [ 257.499524] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 257.505055] ? copy_mount_options+0x285/0x380 [ 257.509549] ksys_mount+0x12d/0x140 [ 257.513174] __x64_sys_mount+0xbe/0x150 [ 257.517148] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 257.522161] do_syscall_64+0x1b1/0x800 [ 257.526045] ? finish_task_switch+0x1ca/0x810 [ 257.530543] ? syscall_return_slowpath+0x5c0/0x5c0 [ 257.535467] ? syscall_return_slowpath+0x30f/0x5c0 [ 257.540398] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 257.545762] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 257.550614] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 257.555797] RIP: 0033:0x455979 [ 257.558981] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 257.566688] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 257.573955] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 257.581226] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 257.588496] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 257.595759] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 [ 257.603029] [ 257.604647] Allocated by task 17345: [ 257.608359] save_stack+0x43/0xd0 [ 257.611809] kasan_kmalloc+0xc4/0xe0 [ 257.615515] kmem_cache_alloc_trace+0x152/0x780 [ 257.620174] fuse_fill_super+0xc92/0x1e20 [ 257.624400] mount_nodev+0x6b/0x110 [ 257.628015] fuse_mount+0x2c/0x40 [ 257.631464] mount_fs+0xae/0x328 [ 257.634826] vfs_kern_mount.part.34+0xd4/0x4d0 [ 257.639400] do_mount+0x564/0x3070 [ 257.642935] ksys_mount+0x12d/0x140 [ 257.646556] __x64_sys_mount+0xbe/0x150 [ 257.650523] do_syscall_64+0x1b1/0x800 [ 257.654406] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 257.659581] [ 257.661195] Freed by task 17354: [ 257.664557] save_stack+0x43/0xd0 [ 257.668009] __kasan_slab_free+0x11a/0x170 [ 257.672236] kasan_slab_free+0xe/0x10 [ 257.676028] kfree+0xd9/0x260 [ 257.679129] rcu_process_callbacks+0xa69/0x15f0 [ 257.683793] __do_softirq+0x2e0/0xaf5 [ 257.687575] [ 257.689195] The buggy address belongs to the object at ffff8801b173e480 [ 257.689195] which belongs to the cache kmalloc-1024 of size 1024 [ 257.702020] The buggy address is located 712 bytes inside of [ 257.702020] 1024-byte region [ffff8801b173e480, ffff8801b173e880) [ 257.713969] The buggy address belongs to the page: [ 257.718892] page:ffffea0006c5cf80 count:1 mapcount:0 mapping:ffff8801b173e000 index:0xffff8801b173e000 compound_mapcount: 0 [ 257.730155] flags: 0x2fffc0000008100(slab|head) [ 257.734835] raw: 02fffc0000008100 ffff8801b173e000 ffff8801b173e000 0000000100000005 [ 257.742713] raw: ffffea0006b8f0a0 ffffea0006be6520 ffff8801da800ac0 0000000000000000 [ 257.750582] page dumped because: kasan: bad access detected [ 257.756276] [ 257.757887] Memory state around the buggy address: [ 257.762810] ffff8801b173e600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 257.770160] ffff8801b173e680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 257.777512] >ffff8801b173e700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 257.784856] ^ [ 257.790555] ffff8801b173e780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 257.797904] ffff8801b173e800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 257.805334] ================================================================== [ 257.812681] Disabling lock debugging due to kernel taint [ 257.818116] Kernel panic - not syncing: panic_on_warn set ... [ 257.818116] [ 257.825478] CPU: 0 PID: 17345 Comm: syz-executor1 Tainted: G B 4.17.0-rc3+ #35 [ 257.834126] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 257.843468] Call Trace: [ 257.846054] dump_stack+0x1b9/0x294 [ 257.849678] ? dump_stack_print_info.cold.2+0x52/0x52 [ 257.854869] ? lock_downgrade+0x8e0/0x8e0 [ 257.859008] ? vprintk_default+0x28/0x30 [ 257.863062] ? __lock_acquire+0x3790/0x5140 [ 257.867376] panic+0x22f/0x4de [ 257.870561] ? add_taint.cold.5+0x16/0x16 [ 257.874701] ? add_taint.cold.5+0x5/0x16 [ 257.878759] ? do_raw_spin_unlock+0x9e/0x2e0 [ 257.883159] ? __lock_acquire+0x3888/0x5140 [ 257.887469] kasan_end_report+0x47/0x4f [ 257.891433] kasan_report.cold.7+0x76/0x2fe [ 257.895753] __asan_report_load8_noabort+0x14/0x20 [ 257.900674] __lock_acquire+0x3888/0x5140 [ 257.904813] ? lock_downgrade+0x8e0/0x8e0 [ 257.908953] ? kasan_check_read+0x11/0x20 [ 257.913093] ? rcu_is_watching+0x85/0x140 [ 257.917236] ? debug_check_no_locks_freed+0x310/0x310 [ 257.922418] ? is_bpf_text_address+0xd7/0x170 [ 257.926905] ? kernel_text_address+0x79/0xf0 [ 257.931307] ? __unwind_start+0x166/0x330 [ 257.935445] ? __kernel_text_address+0xd/0x40 [ 257.939933] ? unwind_get_return_address+0x61/0xa0 [ 257.944858] ? __save_stack_trace+0x7e/0xd0 [ 257.949175] ? save_stack+0xa9/0xd0 [ 257.952795] ? save_stack+0x43/0xd0 [ 257.956412] ? __kasan_slab_free+0x11a/0x170 [ 257.960816] ? kasan_slab_free+0xe/0x10 [ 257.964779] ? kfree+0xd9/0x260 [ 257.968053] ? unregister_shrinker+0x216/0x3a0 [ 257.972625] ? deactivate_locked_super+0x70/0x100 [ 257.977456] ? mount_nodev+0xfa/0x110 [ 257.982120] ? fuse_mount+0x2c/0x40 [ 257.985744] ? mount_fs+0xae/0x328 [ 257.989277] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 257.994023] ? do_mount+0x564/0x3070 [ 257.997727] ? ksys_mount+0x12d/0x140 [ 258.001526] ? graph_lock+0x170/0x170 [ 258.005318] ? kasan_check_read+0x11/0x20 [ 258.009456] ? do_raw_spin_unlock+0x9e/0x2e0 [ 258.013856] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 258.018428] ? print_usage_bug+0xc0/0xc0 [ 258.022483] ? kasan_check_write+0x14/0x20 [ 258.026711] ? do_raw_spin_lock+0xc1/0x200 [ 258.031210] lock_acquire+0x1dc/0x520 [ 258.035003] ? fuse_kill_sb_anon+0x50/0xb0 [ 258.039231] ? lock_release+0xa10/0xa10 [ 258.043196] ? check_same_owner+0x320/0x320 [ 258.047506] ? quarantine_put+0xeb/0x190 [ 258.051560] ? rcu_note_context_switch+0x710/0x710 [ 258.056480] ? __might_sleep+0x95/0x190 [ 258.060451] down_write+0x87/0x120 [ 258.063985] ? fuse_kill_sb_anon+0x50/0xb0 [ 258.068212] ? down_read+0x1b0/0x1b0 [ 258.071917] ? perf_trace_mm_vmscan_writepage+0x750/0x750 [ 258.077445] fuse_kill_sb_anon+0x50/0xb0 [ 258.081499] deactivate_locked_super+0x97/0x100 [ 258.086159] ? fuse_get_root_inode+0x190/0x190 [ 258.090734] mount_nodev+0xfa/0x110 [ 258.094352] fuse_mount+0x2c/0x40 [ 258.097796] mount_fs+0xae/0x328 [ 258.101156] vfs_kern_mount.part.34+0xd4/0x4d0 [ 258.105733] ? may_umount+0xb0/0xb0 [ 258.109351] ? _raw_read_unlock+0x22/0x30 [ 258.113490] ? __get_fs_type+0x97/0xc0 [ 258.117370] do_mount+0x564/0x3070 [ 258.120903] ? copy_mount_string+0x40/0x40 [ 258.125128] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 258.130141] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 258.134887] ? retint_kernel+0x10/0x10 [ 258.138767] ? copy_mount_options+0x1f0/0x380 [ 258.143256] ? copy_mount_options+0x1fa/0x380 [ 258.147747] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 258.153277] ? copy_mount_options+0x285/0x380 [ 258.157763] ksys_mount+0x12d/0x140 [ 258.161381] __x64_sys_mount+0xbe/0x150 [ 258.165349] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 258.170356] do_syscall_64+0x1b1/0x800 [ 258.174237] ? finish_task_switch+0x1ca/0x810 [ 258.178733] ? syscall_return_slowpath+0x5c0/0x5c0 [ 258.183654] ? syscall_return_slowpath+0x30f/0x5c0 [ 258.188579] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 258.193935] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 258.198769] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 258.203950] RIP: 0033:0x455979 [ 258.207126] RSP: 002b:00007fe77d61a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 258.214827] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000455979 [ 258.222787] RDX: 00000000004c15cc RSI: 0000000020000180 RDI: 00000000004dd5c5 [ 258.230049] RBP: 0000000000000000 R08: 00007fe77d61a820 R09: 0000000000000000 [ 258.237308] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 258.244578] R13: 0000000020000180 R14: 0000000000000000 R15: 0000000000000000 [ 258.252321] Dumping ftrace buffer: [ 258.255839] (ftrace buffer empty) [ 258.259521] Kernel Offset: disabled [ 258.263123] Rebooting in 86400 seconds..