2c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="e3b40600ffffffff0400f0ff0000fafffb0e41da189c304034954b00a7172d5e6dc38f66721366162882a4b0446dab26cec9fe84f07c159cf49afd24cace5f89fb796dcf6b63f8c34f74923a544e4b9117efca7fcf0d58ef9782471fc22b1cd4d176eb466033081f5586965779409edd2110c47c593b483c5ced0bc800e7845f453818e2132c03ad73f4deb06e463de7bfeeaa6d5b35bb64800f5b11638eabab477af9deec6901ecddc340c4159fd55e378eec26aa4ad929b91e15017c9e7349a2d6a972cc7d757062c059dbbe5ca8ade65bb423aa45b1ba0f5c01a9997f104ae8b1530200b507d4c8db246a7375c203cd2961957b180236e6ee9ba5d55fae5a254bf7bbcd948f625d4bfd8a2231bf9b7c5f0000000000"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 710.490045] ? rcu_note_context_switch+0x710/0x710 [ 710.490059] ? lock_acquire+0x1d5/0x580 [ 710.490067] ? lock_acquire+0x1d5/0x580 [ 710.490079] ? __lock_acquire+0x664/0x3e00 [ 710.490099] ? should_fail+0x23b/0xa40 [ 710.490108] ? blkdev_get+0x5f4/0xb00 [ 710.490121] __alloc_pages_nodemask+0x327/0xdd0 [ 710.490129] ? lock_acquire+0x1d5/0x580 [ 710.490138] ? mount_bdev+0x73/0x370 [ 710.490149] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 710.490163] ? find_held_lock+0x35/0x1d0 [ 710.490175] ? __lock_is_held+0xb6/0x140 [ 710.490193] ? check_same_owner+0x320/0x320 2018/03/31 11:16:45 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:45 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:45 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 710.490201] ? sget_userns+0x27d/0xe40 [ 710.490214] cache_grow_begin+0x72/0x640 [ 710.490227] kmem_cache_alloc_trace+0x3f1/0x740 [ 710.490238] ? security_capable+0x8e/0xc0 [ 710.490253] sget_userns+0x2a3/0xe40 [ 710.490261] ? kill_litter_super+0x90/0x90 [ 710.490273] ? ns_test_super+0x50/0x50 [ 710.490282] ? loop_unregister_transfer+0x90/0x90 [ 710.490291] ? destroy_unused_super.part.6+0xd0/0xd0 [ 710.490299] ? do_raw_spin_trylock+0x190/0x190 [ 710.490312] ? kobject_put+0x6b/0x250 2018/03/31 11:16:46 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="e3b40600ffffffff0400f0ff0000fafffb0e41da189c304034954b00a7172d5e6dc38f66721366162882a4b0446dab26cec9fe84f07c159cf49afd24cace5f89fb796dcf6b63f8c34f74923a544e4b9117efca7fcf0d58ef9782471fc22b1cd4d176eb466033081f5586965779409edd2110c47c593b483c5ced0bc800e7845f453818e2132c03ad73f4deb06e463de7bfeeaa6d5b35bb64800f5b11638eabab477af9deec6901ecddc340c4159fd55e378eec26aa4ad929b91e15017c9e7349a2d6a972cc7d757062c059dbbe5ca8ade65bb423aa45b1ba0f5c01a9997f104ae8b1530200b507d4c8db246a7375c203cd2961957b180236e6ee9ba5d55fae5a254bf7bbcd948f625d4bfd8a2231bf9b7c5f0000000000"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:46 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 710.490324] ? blkdev_get+0x3a1/0xb00 [ 710.490336] ? cap_capable+0x1b5/0x230 [ 710.490345] ? __blkdev_get+0x13b0/0x13b0 [ 710.490355] ? security_capable+0x8e/0xc0 [ 710.490364] ? kill_litter_super+0x90/0x90 [ 710.490372] ? ns_capable_common+0xcf/0x160 [ 710.490381] ? ns_test_super+0x50/0x50 [ 710.490389] ? kill_litter_super+0x90/0x90 [ 710.490396] sget+0xd2/0x120 [ 710.490408] mount_bdev+0x109/0x370 [ 710.490417] ? xfs_test_remount_options.isra.19+0x90/0x90 [ 710.490428] xfs_fs_mount+0x34/0x40 [ 710.490438] mount_fs+0x66/0x2d0 2018/03/31 11:16:46 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 710.490450] vfs_kern_mount.part.26+0xc6/0x4a0 [ 710.490459] ? may_umount+0xa0/0xa0 [ 710.490469] ? _raw_read_unlock+0x22/0x30 [ 710.701760] ? __get_fs_type+0x8a/0xc0 [ 710.705648] do_mount+0xea4/0x2bb0 [ 710.709181] ? __might_fault+0x110/0x1d0 [ 710.713239] ? copy_mount_string+0x40/0x40 [ 710.717467] ? check_same_owner+0x320/0x320 [ 710.721782] ? __check_object_size+0x8b/0x530 [ 710.726263] ? __might_sleep+0x95/0x190 [ 710.730214] ? kasan_check_write+0x14/0x20 [ 710.734429] ? _copy_from_user+0x99/0x110 [ 710.738560] ? memdup_user+0x5e/0x90 [ 710.742250] ? copy_mount_options+0x1f7/0x2e0 [ 710.746721] SyS_mount+0xab/0x120 [ 710.750146] ? copy_mnt_ns+0xb30/0xb30 [ 710.754014] do_syscall_64+0x281/0x940 [ 710.757883] ? vmalloc_sync_all+0x30/0x30 [ 710.762013] ? _raw_spin_unlock_irq+0x27/0x70 [ 710.766487] ? finish_task_switch+0x1c1/0x7e0 [ 710.770955] ? syscall_return_slowpath+0x550/0x550 [ 710.775855] ? syscall_return_slowpath+0x2ac/0x550 [ 710.780758] ? prepare_exit_to_usermode+0x350/0x350 [ 710.785750] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 710.791091] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 710.795908] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 710.801072] RIP: 0033:0x454e79 [ 710.804233] RSP: 002b:00007ff701201c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 710.811913] RAX: ffffffffffffffda RBX: 00007ff7012026d4 RCX: 0000000000454e79 [ 710.819161] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 00000000200007c0 [ 710.826410] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 710.833651] R10: 000000000080c400 R11: 0000000000000246 R12: 0000000000000014 [ 710.840891] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000009 [ 710.852304] print_req_error: I/O error, dev loop3, sector 0 [ 710.854262] device bridge0 left promiscuous mode [ 710.858969] print_req_error: I/O error, dev loop3, sector 0 [ 710.863068] device bridge0 left promiscuous mode [ 710.873678] device bridge0 left promiscuous mode [ 710.900406] device bridge0 left promiscuous mode 2018/03/31 11:16:46 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:46 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) accept(r2, &(0x7f0000000280)=@l2, &(0x7f0000000200)=0x80) fcntl$setflags(r0, 0x2, 0x1) getuid() getpid() getuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r4 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000180)) r5 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x9, 0x100) ioctl$sock_inet6_SIOCSIFDSTADDR(r5, 0x8918, &(0x7f00000001c0)={@ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, 0x72, r3}) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)=ANY=[@ANYRES32, @ANYRES32=r4, @ANYBLOB="52ff010000000000", @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="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"], @ANYBLOB="00010100470d000001000000000000008cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c284361"]) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e", 0x60) 2018/03/31 11:16:46 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000300)) r3 = socket$kcm(0x29, 0x0, 0x0) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/mixer\x00', 0x10141, 0x0) setsockopt$inet_tcp_buf(r4, 0x6, 0x1f, &(0x7f0000000940)="0c6ce99f3936deaa9ad2ceb273f4796c3909a5f9a3c49d2d21e0c0ebb8942d01af3117e4f9bd1ed56e765bc05d76a26f4edabc081d89073d37d55c21c8df40514ee49b4435b785a6ee8d5eaef02175f603f46cf34cf711696376fcdb8a18b23b9b43c935d77bd4180c22bad26d1778131bf3e7680429333f6fee77d328fe6feb0ed79cd8bac1ea7f3e1883fd75e43ed6ff400e1bfe9230b5938a9c8230e9da17d8b9665dc6df3d86ae6fad1e58d4ea2be5afa606e2c063e25456821cad2147de0c9249b39014c19c619dc15954d39370d5cd8dbda2", 0xd5) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r5 = accept4(0xffffffffffffffff, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) r6 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r6, 0x400448c8, &(0x7f0000000840)={r5, r3, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223"}) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a8aa852b8e27cc4bed332dce5509fd49b6bd003f5b909778d20c97eda3326371d0d383e1c5f6e3fc2f5e61c4ce6b047104b3f22820012533d5e52a704f1faa5bb4478a0c58345f1aa8bbf1e7fd008c4", 0xc4) 2018/03/31 11:16:46 executing program 3 (fault-call:2 fault-nth:10): open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f00000006c0), 0x33040, &(0x7f00000006c0)=ANY=[]) mount(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='xfs\x00', 0x80c400, 0x0) 2018/03/31 11:16:46 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x13) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r2, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0xac, r3, 0x601, 0x70bd26, 0x25dfdbfc, {0x11}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local={0xfe, 0x80, [], 0xaa}}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x401}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x400}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1ff}, @IPVS_CMD_ATTR_DEST={0x50, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x3}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xfff}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@remote={0xfe, 0x80, [], 0xbb}}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}]}]}, 0xac}, 0x1, 0x0, 0x0, 0x20000800}, 0xc1c624801918ba65) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r4 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r5 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r5, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r6 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r6, 0x400448c8, &(0x7f0000000840)={r5, r4, 0xffffffffffffff52, 0x1, &(0x7f00000006c0)="e411b82d239f02360b33ab01086a0910f47bfaaa10d5cb1dd0d5e6120a061bee3a5045c09ff7eb5a798d477b3db7121ae6a2193d00a22c1d20a716d6fb8def52aaf549d2", 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r6, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="e3b40600ffffffff0400f0ff0000fafffb0e41da189c304034954b00a7172d5e6dc38f66721366162882a4b0446dab26cec9fe84f07c159cf49afd24cace5f89fb796dcf6b63f8c34f74923a544e4b9117efca7fcf0d58ef9782471fc22b1cd4d176eb466033081f5586965779409edd2110c47c593b483c5ced0bc800e7845f453818e2132c03ad73f4deb06e463de7bfeeaa6d5b35bb64800f5b11638eabab477af9deec6901ecddc340c4159fd55e378eec26aa4ad929b91e15017c9e7349a2d6a972cc7d757062c059dbbe5ca8ade65bb423aa45b1ba0f5c01a9997f104ae8b1530200b507d4c8db246a7375c203cd2961957b180236e6ee9ba5d55fae5a254bf7bbcd948f625d4bfd8a2231bf9b7c5f00000000"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:46 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='teql0\x00', 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000001c0)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x28500, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r3 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r4 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) getresgid(&(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) setsockopt$ipx_IPX_TYPE(r4, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r5 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000200)=0x80, 0x4) ioctl$sock_bt_hidp_HIDPCONNADD(r5, 0x400448c8, &(0x7f0000000840)={r4, r3, 0xffffffffffffff52, 0x1, &(0x7f00000006c0)="e411b82d239f02360b33ab01086a0910f47bfaaa10d5cb1dd0d5e6120a061bee3a5045c09ff7eb5a798d477b3db7121ae6a2193d00a22c1d20a716d6fb8def52aaf549d2", 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:46 executing program 7: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f00004c0000)={0xa, 0x3, 0x0, @ipv4={[], [0xff, 0xff]}, 0x9}, 0xffffffffffffff92) listen(r2, 0x43) accept(r2, &(0x7f0000000000)=@rc, &(0x7f0000000040)=0xa) shutdown(r2, 0x0) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r3, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000300)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000000280)=0xe8) getgid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000005f00)) r6 = accept4(r4, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) r7 = semget$private(0x0, 0x0, 0x5) semtimedop(r7, &(0x7f00000001c0)=[{0x4, 0x2, 0x1800}, {0x3}, {0x1, 0x8, 0x800}, {0x0, 0x100000001, 0x1000}, {0x1, 0x8, 0x1000}], 0x5, &(0x7f0000000200)) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) 2018/03/31 11:16:46 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f0000a8bfff)=""/1, 0x805031ae) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)) ioctl$TCXONC(r1, 0x540a, 0x3) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000180)) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x4000, 0x0) semget$private(0x0, 0x7, 0x0) syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') r4 = openat(r2, &(0x7f0000000100)='./file0\x00', 0x10000, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x90, &(0x7f0000000380)=[@in6={0xa, 0x4e21, 0x5, @local={0xfe, 0x80, [], 0xaa}, 0x2b}, @in={0x2, 0x4e20, @multicast2=0xe0000002}, @in6={0xa, 0x4e23, 0x1, @ipv4={[], [0xff, 0xff], @rand_addr}, 0x3f}, @in6={0xa, 0x4e23, 0xffff, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0xf}}, 0x7}, @in={0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}, @in6={0xa, 0x4e23, 0x0, @empty, 0x401}]}, &(0x7f0000000280)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f00000002c0)={0xc2, 0x4, 0x1f, 0x4, r5}, &(0x7f0000000440)=0x10) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x3400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000600)=ANY=[@ANYBLOB="ffee18ce27590e5c3e669eaff3da1d5e219d2ec1be876dba1575ca9d93580538cee1362a5d78a3c7a8a83af3d43ef9b4e29c56c98117e4ad69a017426f7034fec3a8b375590564fb17966a2584ada998d702f6af69b1570291a9d6802441a950f05e509eaa7d63f18d4cf278d8f33d2ec41111c7db8552281bab3e328340b7e5903f6785a1825e31a14a16b8b84e8048ff66423a911129c9098d8aea6578bba3c1a416c02d87550fce024e1de10bf403b18257e4459b82bb97f63565ed99f27fbfe94b540042b6381ca5b1a61a4dd35e", @ANYRES16=r3, @ANYBLOB="000000000000fbdbdf25090000000800050002000000080005005400000008000500000000000800050000020000ce6f39d90fd4571e93bd00d2492a98876f56fbf6603909ea40a6b7d7977aed7ffdde4bbdfc66ca629e593824e3b4a80528c4cab7a337a78e07000000d3092af4b96d6441161e6acbe3ed55d40848af140cc1416f00117a11d805debba1b820b2e9a8b5d36a1fbb"], 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x4040014) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f0000000240)={0x100000000, 0x7, 0x8, 0x998, "1f9f07a075e202ea74f09d2516a64861e4e9e4bd51f6ab370c58d6e647a77241dd28f90817b0826e270f0d93", 0xc9b}) getsockopt$llc_int(r2, 0x10c, 0x0, &(0x7f0000000040), &(0x7f00000000c0)=0x4) [ 711.542274] device bridge0 entered promiscuous mode [ 711.549170] device bridge0 entered promiscuous mode [ 711.554452] device bridge0 entered promiscuous mode [ 711.559972] device bridge0 entered promiscuous mode [ 711.571237] FAULT_INJECTION: forcing a failure. [ 711.571237] name failslab, interval 1, probability 0, space 0, times 0 [ 711.582781] CPU: 0 PID: 16385 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #8 2018/03/31 11:16:46 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(0xffffffffffffffff, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="e3b40600ffffffff0400f0ff0000fafffb0e41da189c304034954b00a7172d5e6dc38f66721366162882a4b0446dab26cec9fe84f07c159cf49afd24cace5f89fb796dcf6b63f8c34f74923a544e4b9117efca7fcf0d58ef9782471fc22b1cd4d176eb466033081f5586965779409edd2110c47c593b483c5ced0bc800e7845f453818e2132c03ad73f4deb06e463de7bfeeaa6d5b35bb64800f5b11638eabab477af9deec6901ecddc340c4159fd55e378eec26aa4ad929b91e15017c9e7349a2d6a972cc7d757062c059dbbe5ca8ade65bb423aa45b1ba0f5c01a9997f104ae8b1530200b507d4c8db246a7375c203cd2961957b180236e6ee9ba5d55fae5a254bf7bbcd948f625d4bfd8a2231bf9b7c5f0000000000"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 711.589960] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 711.599311] Call Trace: [ 711.601902] dump_stack+0x194/0x24d [ 711.605538] ? arch_local_irq_restore+0x53/0x53 [ 711.610200] ? __save_stack_trace+0x7e/0xd0 [ 711.614534] should_fail+0x8c0/0xa40 [ 711.618252] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 711.623355] ? kasan_kmalloc+0xad/0xe0 [ 711.627241] ? kmem_cache_alloc_trace+0x136/0x740 [ 711.632077] ? __memcg_init_list_lru_node+0x169/0x270 [ 711.637273] ? __list_lru_init+0x544/0x750 2018/03/31 11:16:47 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(0xffffffffffffffff, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 711.641505] ? sget_userns+0x691/0xe40 [ 711.645393] ? mount_fs+0x66/0x2d0 [ 711.648934] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 711.653679] ? do_mount+0xea4/0x2bb0 [ 711.657381] ? SyS_mount+0xab/0x120 [ 711.661002] ? do_syscall_64+0x281/0x940 [ 711.665072] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 711.670434] ? find_held_lock+0x35/0x1d0 [ 711.674496] ? __lock_is_held+0xb6/0x140 [ 711.678575] ? check_same_owner+0x320/0x320 [ 711.682897] ? rcu_note_context_switch+0x710/0x710 [ 711.687838] should_failslab+0xec/0x120 2018/03/31 11:16:47 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(0xffffffffffffffff, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:47 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(0xffffffffffffffff, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="e3b40600ffffffff0400f0ff0000fafffb0e41da189c304034954b00a7172d5e6dc38f66721366162882a4b0446dab26cec9fe84f07c159cf49afd24cace5f89fb796dcf6b63f8c34f74923a544e4b9117efca7fcf0d58ef9782471fc22b1cd4d176eb466033081f5586965779409edd2110c47c593b483c5ced0bc800e7845f453818e2132c03ad73f4deb06e463de7bfeeaa6d5b35bb64800f5b11638eabab477af9deec6901ecddc340c4159fd55e378eec26aa4ad929b91e15017c9e7349a2d6a972cc7d757062c059dbbe5ca8ade65bb423aa45b1ba0f5c01a9997f104ae8b1530200b507d4c8db246a7375c203cd2961957b180236e6ee9ba5d55fae5a254bf7bbcd948f625d4bfd8a2231bf9b7c5f0000000000"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 711.691819] kmem_cache_alloc_trace+0x4b/0x740 [ 711.696397] ? __kmalloc_node+0x33/0x70 [ 711.700378] ? __kmalloc_node+0x33/0x70 [ 711.705822] ? rcu_read_lock_sched_held+0x108/0x120 [ 711.710856] __memcg_init_list_lru_node+0x169/0x270 [ 711.715878] ? list_lru_add+0x7c0/0x7c0 [ 711.719850] ? __kmalloc_node+0x47/0x70 [ 711.723824] __list_lru_init+0x544/0x750 [ 711.727891] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 711.733779] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 711.738879] ? __lockdep_init_map+0xe4/0x650 [ 711.743285] ? lockdep_init_map+0x9/0x10 [ 711.747343] sget_userns+0x691/0xe40 [ 711.751057] ? kill_litter_super+0x90/0x90 [ 711.755289] ? ns_test_super+0x50/0x50 [ 711.759163] ? destroy_unused_super.part.6+0xd0/0xd0 [ 711.764250] ? do_raw_spin_trylock+0x190/0x190 [ 711.768827] ? kobject_put+0x6b/0x250 [ 711.772628] ? blkdev_get+0x3a1/0xb00 [ 711.776427] ? cap_capable+0x1b5/0x230 [ 711.780308] ? __blkdev_get+0x13b0/0x13b0 [ 711.784443] ? security_capable+0x8e/0xc0 [ 711.788565] ? kill_litter_super+0x90/0x90 [ 711.792775] ? ns_capable_common+0xcf/0x160 [ 711.797074] ? ns_test_super+0x50/0x50 [ 711.800935] ? kill_litter_super+0x90/0x90 [ 711.805148] sget+0xd2/0x120 [ 711.808146] mount_bdev+0x109/0x370 [ 711.811751] ? xfs_test_remount_options.isra.19+0x90/0x90 [ 711.817265] xfs_fs_mount+0x34/0x40 [ 711.820873] mount_fs+0x66/0x2d0 [ 711.824217] vfs_kern_mount.part.26+0xc6/0x4a0 [ 711.828786] ? may_umount+0xa0/0xa0 [ 711.832396] ? _raw_read_unlock+0x22/0x30 [ 711.836533] ? __get_fs_type+0x8a/0xc0 [ 711.840408] do_mount+0xea4/0x2bb0 [ 711.843926] ? __might_fault+0x110/0x1d0 [ 711.847970] ? copy_mount_string+0x40/0x40 [ 711.852203] ? check_same_owner+0x320/0x320 [ 711.856513] ? __check_object_size+0x8b/0x530 [ 711.860986] ? __might_sleep+0x95/0x190 [ 711.864952] ? kasan_check_write+0x14/0x20 [ 711.869172] ? _copy_from_user+0x99/0x110 [ 711.873301] ? memdup_user+0x5e/0x90 [ 711.876994] ? copy_mount_options+0x1f7/0x2e0 [ 711.881481] SyS_mount+0xab/0x120 [ 711.884922] ? copy_mnt_ns+0xb30/0xb30 [ 711.888790] do_syscall_64+0x281/0x940 [ 711.892669] ? vmalloc_sync_all+0x30/0x30 [ 711.896809] ? _raw_spin_unlock_irq+0x27/0x70 [ 711.901278] ? finish_task_switch+0x1c1/0x7e0 [ 711.905766] ? syscall_return_slowpath+0x550/0x550 [ 711.910684] ? syscall_return_slowpath+0x2ac/0x550 [ 711.915591] ? prepare_exit_to_usermode+0x350/0x350 [ 711.920601] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 711.925950] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 711.930773] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 711.935936] RIP: 0033:0x454e79 [ 711.939097] RSP: 002b:00007ff701201c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 711.946778] RAX: ffffffffffffffda RBX: 00007ff7012026d4 RCX: 0000000000454e79 [ 711.954029] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 00000000200007c0 [ 711.961280] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 711.968525] R10: 000000000080c400 R11: 0000000000000246 R12: 0000000000000014 [ 711.975773] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000a [ 711.986871] device bridge0 left promiscuous mode 2018/03/31 11:16:47 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r3 = socket$kcm(0x29, 0x0, 0x0) r4 = dup2(r0, r3) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r4, 0x84, 0x7, &(0x7f00000001c0)={0x367}, 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r5 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r5, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r6 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r6, 0x400448c8, &(0x7f0000000840)={r5, r3, 0xffffffffffffff52, 0x1, &(0x7f00000006c0)="e411b82d239f02360b33ab01086a0910f47bfaaa10d5cb1dd0d5e6120a061bee3a5045c09ff7eb5a798d477b3db7121ae6a2193d00a22c1d20a716d6fb8def52aaf549d2", 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r6, 0x84, 0x77, &(0x7f0000000a80)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:47 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r3 = socket$kcm(0x29, 0x0, 0x0) r4 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x6, 0x10040) ioctl$sock_bt_hidp_HIDPCONNADD(r4, 0x400448c8, &(0x7f0000000280)={r2, r3, 0x7, 0x80, &(0x7f00000001c0), 0x1, 0x3, 0x6, 0xe, 0x56ff, 0x0, 0x8000, "278ef8bf8ef56540a3ae5172c6632a193ab2e237b86f46fd8b75df80144210ae3625655a9ec11864b0183ee0"}) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r5 = accept4(0xffffffffffffffff, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) r6 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r6, 0x400448c8, &(0x7f0000000840)={r5, r3, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223"}) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a8aa852b8e27cc4bed332dce5509fd49b6bd003f5b909778d20c97eda3326371d0d383e1c5f6e3fc2f5e61c4ce6b047104b3f22820012533d5e52a704f1faa5bb4478a0c58345f1aa8bbf1e7fd008c4", 0xc4) 2018/03/31 11:16:47 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(0xffffffffffffffff, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:47 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r3 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r4 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r4, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r5 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r5, 0x400448c8, &(0x7f0000000840)=ANY=[@ANYRES32, @ANYRES32=r3, @ANYBLOB="0cff010000000000", @ANYPTR=&(0x7f0000000280)=ANY=[@ANYBLOB="69281ce9f952d4c0cff0d3bb1fecf3ad3feaa044c53141d7d1d9c8048941cd0d8eebbf3b100417a1f76e01e69377458f98c2776b646d8febac235fd6d6c0ef3e2199fcf58bec90159fd6ba305b61a9806adbe356081674cf0063b24147286525ff667a0b50610b4e0a7488ee74c20feb2e5828d079aff792db2013954574b2d01f7662268f5c97c01844286f6512286f80990c9e3e8545daa433504db2944ac259c389047d1b23b4589d009419f0b2a0d6e6e73baf8b23"], @ANYBLOB="00010100470d000001000000000000008cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff3a84859a91e82420045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c284361"]) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e", 0x60) [ 711.992967] device bridge0 left promiscuous mode [ 711.997971] device bridge0 left promiscuous mode [ 712.004411] device bridge0 left promiscuous mode 2018/03/31 11:16:47 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r3 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r4 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r4, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r5 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r5, 0x400448c8, &(0x7f0000000840)=ANY=[@ANYRES32=r4, @ANYRES32=r3, @ANYBLOB="52ff010000000000", @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYBLOB="6411b802239f02360b33ab01086a09aea27bfaaa10d5cb1dd0d5e6120a477b3db7121ae6a2193d00a22c1d20a716d6fb6821fa0704a8ba"], @ANYBLOB="00011100470d000001000000060000008cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"]) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:47 executing program 3 (fault-call:2 fault-nth:11): open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f00000006c0), 0x33040, &(0x7f00000006c0)=ANY=[]) mount(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='xfs\x00', 0x80c400, 0x0) 2018/03/31 11:16:47 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(0xffffffffffffffff, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 712.035436] device bridge0 entered promiscuous mode [ 712.046716] device bridge0 entered promiscuous mode [ 712.061190] device bridge0 entered promiscuous mode [ 712.075627] device bridge0 entered promiscuous mode [ 712.122934] FAULT_INJECTION: forcing a failure. [ 712.122934] name failslab, interval 1, probability 0, space 0, times 0 [ 712.134312] CPU: 1 PID: 16437 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #8 [ 712.141487] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 712.150827] Call Trace: [ 712.153415] dump_stack+0x194/0x24d [ 712.157044] ? arch_local_irq_restore+0x53/0x53 [ 712.161719] should_fail+0x8c0/0xa40 [ 712.165429] ? is_bpf_text_address+0xa4/0x120 [ 712.169927] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 712.175027] ? __kernel_text_address+0xd/0x40 [ 712.179518] ? unwind_get_return_address+0x61/0xa0 [ 712.184450] ? find_held_lock+0x35/0x1d0 [ 712.188509] ? __lock_is_held+0xb6/0x140 [ 712.192572] ? check_same_owner+0x320/0x320 [ 712.196892] ? rcu_note_context_switch+0x710/0x710 [ 712.201827] should_failslab+0xec/0x120 [ 712.205805] kmem_cache_alloc_trace+0x4b/0x740 [ 712.210382] ? __kmalloc_node+0x33/0x70 [ 712.214357] ? __kmalloc_node+0x33/0x70 [ 712.218335] ? rcu_read_lock_sched_held+0x108/0x120 2018/03/31 11:16:47 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800), 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="e3b40600ffffffff0400f0ff0000fafffb0e41da189c304034954b00a7172d5e6dc38f66721366162882a4b0446dab26cec9fe84f07c159cf49afd24cace5f89fb796dcf6b63f8c34f74923a544e4b9117efca7fcf0d58ef9782471fc22b1cd4d176eb466033081f5586965779409edd2110c47c593b483c5ced0bc800e7845f453818e2132c03ad73f4deb06e463de7bfeeaa6d5b35bb64800f5b11638eabab477af9deec6901ecddc340c4159fd55e378eec26aa4ad929b91e15017c9e7349a2d6a972cc7d757062c059dbbe5ca8ade65bb423aa45b1ba0f5c01a9997f104ae8b1530200b507d4c8db246a7375c203cd2961957b180236e6ee9ba5d55fae5a254bf7bbcd948f625d4bfd8a2231bf9b7c5f0000000000"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:47 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800), 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:47 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800), 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 712.223348] __memcg_init_list_lru_node+0x169/0x270 [ 712.228366] ? list_lru_add+0x7c0/0x7c0 [ 712.232336] ? __kmalloc_node+0x47/0x70 [ 712.236310] __list_lru_init+0x544/0x750 [ 712.240367] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 712.246251] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 712.251269] ? __lockdep_init_map+0xe4/0x650 [ 712.255679] ? lockdep_init_map+0x9/0x10 [ 712.259740] sget_userns+0x691/0xe40 [ 712.263450] ? kill_litter_super+0x90/0x90 [ 712.267678] ? ns_test_super+0x50/0x50 [ 712.271564] ? destroy_unused_super.part.6+0xd0/0xd0 [ 712.276663] ? do_raw_spin_trylock+0x190/0x190 [ 712.281241] ? kobject_put+0x6b/0x250 [ 712.285033] ? blkdev_get+0x3a1/0xb00 [ 712.288824] ? cap_capable+0x1b5/0x230 [ 712.292692] ? __blkdev_get+0x13b0/0x13b0 [ 712.296825] ? security_capable+0x8e/0xc0 [ 712.300967] ? kill_litter_super+0x90/0x90 [ 712.305180] ? ns_capable_common+0xcf/0x160 [ 712.309485] ? ns_test_super+0x50/0x50 [ 712.313350] ? kill_litter_super+0x90/0x90 [ 712.317582] sget+0xd2/0x120 [ 712.320590] mount_bdev+0x109/0x370 [ 712.324208] ? xfs_test_remount_options.isra.19+0x90/0x90 [ 712.329730] xfs_fs_mount+0x34/0x40 [ 712.333333] mount_fs+0x66/0x2d0 [ 712.336686] vfs_kern_mount.part.26+0xc6/0x4a0 [ 712.341248] ? may_umount+0xa0/0xa0 [ 712.344860] ? _raw_read_unlock+0x22/0x30 [ 712.348989] ? __get_fs_type+0x8a/0xc0 [ 712.352852] do_mount+0xea4/0x2bb0 [ 712.356367] ? __might_fault+0x110/0x1d0 [ 712.360403] ? copy_mount_string+0x40/0x40 [ 712.364622] ? check_same_owner+0x320/0x320 [ 712.368937] ? __check_object_size+0x8b/0x530 [ 712.373433] ? __might_sleep+0x95/0x190 [ 712.377404] ? kasan_check_write+0x14/0x20 [ 712.381624] ? _copy_from_user+0x99/0x110 [ 712.385750] ? memdup_user+0x5e/0x90 [ 712.389438] ? copy_mount_options+0x1f7/0x2e0 [ 712.393916] SyS_mount+0xab/0x120 [ 712.397345] ? copy_mnt_ns+0xb30/0xb30 [ 712.401205] do_syscall_64+0x281/0x940 [ 712.405068] ? vmalloc_sync_all+0x30/0x30 [ 712.409193] ? _raw_spin_unlock_irq+0x27/0x70 [ 712.413664] ? finish_task_switch+0x1c1/0x7e0 [ 712.418134] ? syscall_return_slowpath+0x550/0x550 [ 712.423042] ? syscall_return_slowpath+0x2ac/0x550 [ 712.427953] ? prepare_exit_to_usermode+0x350/0x350 [ 712.432947] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 712.438300] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 712.443140] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 712.448319] RIP: 0033:0x454e79 [ 712.451492] RSP: 002b:00007ff701201c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 712.459188] RAX: ffffffffffffffda RBX: 00007ff7012026d4 RCX: 0000000000454e79 [ 712.466445] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 00000000200007c0 [ 712.473700] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 712.480956] R10: 000000000080c400 R11: 0000000000000246 R12: 0000000000000014 [ 712.488210] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000b [ 712.497302] device bridge0 left promiscuous mode [ 712.503262] device bridge0 left promiscuous mode [ 712.508189] device bridge0 left promiscuous mode [ 712.513280] device bridge0 left promiscuous mode 2018/03/31 11:16:47 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) r3 = dup(r0) r4 = openat(r3, &(0x7f0000000300)='./file0\x00', 0x200000, 0x10120) perf_event_open$cgroup(&(0x7f0000000280)={0x5, 0x70, 0x8, 0xfffffffffffffff7, 0x2, 0x7, 0x0, 0x7, 0x20, 0x0, 0xb5, 0x31, 0x1, 0x400, 0x8, 0x3, 0x3ff, 0x4, 0x2, 0x6, 0x1, 0x10001, 0xfffffffffffffffb, 0x0, 0x4, 0x3, 0x7, 0x2, 0x8, 0x2a3, 0x1, 0x6, 0xffff, 0x2, 0x6, 0xfffffffffffff6d2, 0x7fffffff, 0x7fff, 0x0, 0x101, 0x1, @perf_bp={&(0x7f0000000040), 0x4}, 0x801, 0x3, 0x1fd, 0x0, 0x8, 0x96b3, 0xffffffffffffffda}, r3, 0x4, r4, 0x1) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)=ANY=[@ANYRES32, @ANYRES32=r5, @ANYBLOB="52ff010000000000", @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB="aa71f6bd2676d5d15c3c1f090669f2f5488fb790666685c23ee11e41671343095ae9eada7a9fc1bdc2558aa3576cbea54019c76c70514b9993629f"], @ANYBLOB="00010100470d000001000000000000008cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c284361"]) socket(0x5, 0x6, 0x6) write(r0, &(0x7f00000001c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e", 0x60) socket$pppoe(0x18, 0x1, 0x0) 2018/03/31 11:16:47 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) r3 = accept(r0, 0x0, &(0x7f0000000200)) syz_open_dev$audion(&(0x7f0000000d80)='/dev/audio#\x00', 0x10000, 0x101800) socketpair$inet6(0xa, 0x3, 0x2, &(0x7f0000000dc0)) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000e00)=0xe8) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r3, 0x10e, 0x2, &(0x7f0000000040)=0x3, 0x4) r6 = accept4(0xffffffffffffffff, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223"}) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a8aa852b8e27cc4bed332dce5509fd49b6bd003f5b909778d20c97eda3326371d0d383e1c5f6e3fc2f5e61c4ce6b047104b3f22820012533d5e52a704f1faa5bb4478a0c58345f1aa8bbf1e7fd008c4", 0xc4) 2018/03/31 11:16:47 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r3 = socket$kcm(0x29, 0x8007, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x20100, 0x0) mq_getsetattr(r4, &(0x7f00000002c0)={0x400, 0x64, 0x2b, 0x0, 0x3, 0x0, 0x100000001}, &(0x7f0000000300)) r5 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r5, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r6 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r6, 0x400448c8, &(0x7f0000000840)={r5, r3, 0xffffffffffffff52, 0x1, &(0x7f00000006c0)="e411b82d239f02360b33ab01086a0910f47bfaaa10d5cb1dd0d5e6120a061bee3a5045c09ff7eb5a798d477b3db7121ae6a2193d00a22c1d20a716d6fb8def52aaf549d2", 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r6, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000340)=r0, 0x4) 2018/03/31 11:16:47 executing program 7: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f00004c0000)={0xa, 0x3, 0x0, @ipv4={[], [0xff, 0xff]}, 0x9}, 0xffffffffffffff92) listen(r0, 0x6) accept(r2, &(0x7f0000000000)=@rc, &(0x7f0000000040)=0xa) shutdown(r2, 0x0) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r3, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000003c0)=0xfffffffffffffe66) getgid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000005f00)) r6 = accept4(r4, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) r7 = semget$private(0x0, 0x0, 0x5) semtimedop(r7, &(0x7f00000001c0)=[{0x4, 0x2, 0x1800}, {0x3}, {0x1, 0x8, 0x800}, {0x0, 0x100000001, 0x1000}, {0x1, 0x8, 0x1000}], 0x5, &(0x7f0000000200)) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f00000002c0)=0x4, 0x4) accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) 2018/03/31 11:16:47 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f0000a8bfff)=""/1, 0x805031ae) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)) ioctl$TCXONC(r1, 0x540a, 0x3) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000180)) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x4000, 0x0) semget$private(0x0, 0x7, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4) syz_open_pts(r0, 0x0) r3 = dup3(r1, r0, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r3, 0x0, 0x80, 0x8c, &(0x7f0000000280)="8266bc0cf0a05ec8b3a747ec11413a46e4ea064917b8c712893a814b4c7af5a5d02765876010f1f3a606341a29294f92e93fd1339e1cf79ba1f8f85742f72e863f58bbdfb6ac386eb6a42e62d651d53bc9affe0a194f1eb73c5ceff7e9d269a5c188ef1445e528575ec1177cad4eeb930f1f918dea29b65ec41f1bfe46d1a955", &(0x7f0000000380)=""/140, 0x6, 0x9e3}, 0x28) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x3400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x34, r4, 0x0, 0x0, 0x25dfdbfb, {0x9}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x54}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x200}]}, 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x4040014) getsockopt$llc_int(r2, 0x10c, 0x0, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 2018/03/31 11:16:47 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:47 executing program 4: r0 = syz_open_dev$sndmidi(&(0x7f0000000200)='/dev/snd/midiC#D#\x00', 0x200000000000, 0x200) bind$rds(r0, &(0x7f0000000280)={0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000040)={r2, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000000c0)={r2, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000002980)) r4 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_ifreq(r4, 0x89ff, &(0x7f00000002c0)={'vcan0\x00', @ifru_map={0xe1, 0x7, 0xd032, 0x20000000000000, 0x8c51, 0x7}}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000001c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000005f00)) r6 = accept4(r3, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0)="e411b82d239f02360b33ab01086a0910f47bfaaa10d5cb1dd0d5e6120a061bee3a5045c09ff7eb5a798d477b3db7121ae6a2193d00a22c1d20a716d6fb8def52aaf549d2", 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r3, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:47 executing program 3 (fault-call:2 fault-nth:12): open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f00000006c0), 0x33040, &(0x7f00000006c0)=ANY=[]) mount(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='xfs\x00', 0x80c400, 0x0) [ 712.648468] device bridge0 entered promiscuous mode [ 712.661264] device bridge0 entered promiscuous mode [ 712.671756] device bridge0 entered promiscuous mode [ 712.676995] device bridge0 entered promiscuous mode [ 712.685515] FAULT_INJECTION: forcing a failure. [ 712.685515] name failslab, interval 1, probability 0, space 0, times 0 [ 712.696797] CPU: 0 PID: 16480 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #8 [ 712.703978] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 712.713323] Call Trace: [ 712.715914] dump_stack+0x194/0x24d [ 712.719541] ? arch_local_irq_restore+0x53/0x53 [ 712.724210] ? __save_stack_trace+0x7e/0xd0 [ 712.728535] should_fail+0x8c0/0xa40 [ 712.732247] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 712.737347] ? kasan_kmalloc+0xad/0xe0 [ 712.741229] ? kmem_cache_alloc_trace+0x136/0x740 [ 712.746063] ? __memcg_init_list_lru_node+0x169/0x270 [ 712.751243] ? __list_lru_init+0x544/0x750 [ 712.755468] ? sget_userns+0x691/0xe40 [ 712.759348] ? mount_fs+0x66/0x2d0 [ 712.762884] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 712.767636] ? do_mount+0xea4/0x2bb0 [ 712.771340] ? SyS_mount+0xab/0x120 [ 712.774960] ? do_syscall_64+0x281/0x940 [ 712.779018] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 712.784384] ? find_held_lock+0x35/0x1d0 [ 712.788448] ? __lock_is_held+0xb6/0x140 [ 712.792516] ? check_same_owner+0x320/0x320 2018/03/31 11:16:48 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:48 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 712.796839] ? rcu_note_context_switch+0x710/0x710 [ 712.801770] should_failslab+0xec/0x120 [ 712.805744] kmem_cache_alloc_trace+0x4b/0x740 [ 712.810317] ? __kmalloc_node+0x33/0x70 [ 712.814287] ? __kmalloc_node+0x33/0x70 [ 712.818255] ? rcu_read_lock_sched_held+0x108/0x120 [ 712.823269] __memcg_init_list_lru_node+0x169/0x270 [ 712.828279] ? list_lru_add+0x7c0/0x7c0 [ 712.832245] ? __kmalloc_node+0x47/0x70 [ 712.836219] __list_lru_init+0x544/0x750 [ 712.840277] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 712.846160] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 712.851170] ? __lockdep_init_map+0xe4/0x650 [ 712.855565] ? lockdep_init_map+0x9/0x10 [ 712.859609] sget_userns+0x691/0xe40 [ 712.863305] ? kill_litter_super+0x90/0x90 [ 712.867512] ? ns_test_super+0x50/0x50 [ 712.871372] ? destroy_unused_super.part.6+0xd0/0xd0 [ 712.876451] ? do_raw_spin_trylock+0x190/0x190 [ 712.881014] ? kobject_put+0x6b/0x250 [ 712.884795] ? blkdev_get+0x3a1/0xb00 [ 712.888945] ? cap_capable+0x1b5/0x230 [ 712.892815] ? __blkdev_get+0x13b0/0x13b0 [ 712.896946] ? security_capable+0x8e/0xc0 [ 712.901069] ? kill_litter_super+0x90/0x90 [ 712.905278] ? ns_capable_common+0xcf/0x160 [ 712.909573] ? ns_test_super+0x50/0x50 [ 712.913438] ? kill_litter_super+0x90/0x90 [ 712.917658] sget+0xd2/0x120 [ 712.920656] mount_bdev+0x109/0x370 [ 712.924267] ? xfs_test_remount_options.isra.19+0x90/0x90 [ 712.929788] xfs_fs_mount+0x34/0x40 [ 712.933395] mount_fs+0x66/0x2d0 [ 712.936744] vfs_kern_mount.part.26+0xc6/0x4a0 [ 712.941301] ? may_umount+0xa0/0xa0 [ 712.944911] ? _raw_read_unlock+0x22/0x30 [ 712.949034] ? __get_fs_type+0x8a/0xc0 [ 712.952907] do_mount+0xea4/0x2bb0 [ 712.956438] ? __might_fault+0x110/0x1d0 [ 712.960492] ? copy_mount_string+0x40/0x40 [ 712.964713] ? check_same_owner+0x320/0x320 [ 712.969011] ? __check_object_size+0x8b/0x530 [ 712.973487] ? __might_sleep+0x95/0x190 [ 712.977447] ? kasan_check_write+0x14/0x20 [ 712.981665] ? _copy_from_user+0x99/0x110 [ 712.985798] ? memdup_user+0x5e/0x90 [ 712.989488] ? copy_mount_options+0x1f7/0x2e0 [ 712.993967] SyS_mount+0xab/0x120 [ 712.997401] ? copy_mnt_ns+0xb30/0xb30 [ 713.001276] do_syscall_64+0x281/0x940 [ 713.005146] ? vmalloc_sync_all+0x30/0x30 [ 713.009269] ? _raw_spin_unlock_irq+0x27/0x70 [ 713.013742] ? finish_task_switch+0x1c1/0x7e0 [ 713.018230] ? syscall_return_slowpath+0x550/0x550 [ 713.023141] ? syscall_return_slowpath+0x2ac/0x550 [ 713.028047] ? prepare_exit_to_usermode+0x350/0x350 [ 713.033041] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 713.038378] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 713.043205] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 713.048373] RIP: 0033:0x454e79 [ 713.051534] RSP: 002b:00007ff701201c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 713.059215] RAX: ffffffffffffffda RBX: 00007ff7012026d4 RCX: 0000000000454e79 [ 713.066459] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 00000000200007c0 [ 713.073700] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 713.080945] R10: 000000000080c400 R11: 0000000000000246 R12: 0000000000000014 [ 713.088195] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000c [ 713.102239] device bridge0 left promiscuous mode [ 713.108819] device bridge0 left promiscuous mode [ 713.113977] device bridge0 left promiscuous mode [ 713.150223] device bridge0 left promiscuous mode 2018/03/31 11:16:49 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:49 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sync() setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() r3 = creat(&(0x7f0000000040)='./file0\x00', 0x80) mmap$binder(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2, 0x10, r3, 0x0) getsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000200), &(0x7f0000000280)=0x4) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000700)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r4 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000180)) syz_mount_image$bfs(&(0x7f00000002c0)='bfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x4, &(0x7f0000000bc0)=[{&(0x7f0000000340)="7f8598cfe49e31f66517898834f0f322a7e6796e8f14ef4f", 0x18, 0x2}, {&(0x7f0000000800)="7f798c7896a092c1a7e2fc85c594857cdef1b48f5e4f76386dfcbfc09b349a7d774f25540b9e4312ede1cf946f841a18b54ba3141e81b0f4cd110077609c224d99d7628a3654e4f0661073b9d6afc675f9075c852aab02e2a5854b22f3fb8e23d11c1305e41d4e350b8e975acbc96f74163bd43be6789c4d02056f1d549f2136497bd1aef95274e26d45d945fe97edbaf8d7a54d2e4eb7bc640beb9433c23dbea8766c61576b79fa852261af7b623cddecfb1e3b5db4b51d65e4651e79b4540ef38179eac3e56bf976ebbf3abf6cc2b238971b30b74dfb044a381fbbcd3b36d18ad271c874818b8f71af1e5746f3b5e69e2bce1742aeaf57", 0xf8, 0x8}, {&(0x7f00000006c0)="e96bf11babc8982c8daead3a344daf3d8b924bbff329f8a9595255a7fe17b87d1f059598fb", 0x25, 0x100}, {&(0x7f0000000900)="cd0422be0b3adba9ce89c0e45de253cc6b779d26b3dff92ef018c9dbaeaa6e178ef6e1f1faf5f8b9123ca2815942663cd69224ff934442fcacfb720d5ae9a5b5a26dfaec8f313c25fc42e941a6057e2aceaeb1acae98b36d9e18534c215c2203af9fcd87aab29004270273153d9af20acbe60efadb321964eba8f06f2de9859d6a49db4ce4914b78ffe4c29121119fc8dae5397492f685d39244d516f78d005314ebb56e0119b971b78a14e19da59dd8d69a2e699c0ae9923fd7873324c39c8abb7dd37b5b8da17725de55787d566b82b24db97cfef62bb0e1a454293e4ba3df201cdc32dfc16d5a69e8f2b7deea5c416f32a72f44", 0xf5, 0x100000000}], 0x2000, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000001c0)) r5 = accept4(0xffffffffffffffff, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) r6 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r6, 0x400448c8, &(0x7f0000000a00)=ANY=[@ANYRES32=r5, @ANYRES32=r4, @ANYBLOB="000000000000000047bb3412be25649600000000000000000fcbcae5e58040255039b704e5bba20f0493d59fc3fe82e6f054fa8fcec6e80914d49171142d1d11808d4bfafd4db86950b04bb2b662198e3199b5a8ce466a62b236a44b7de68b236e83d7609fea9a828bb831ddba46dedc90a0841b0086cc36a5c478445aa5ad05d15070fd651a87e678e766e850c246b698bd16df72d36b1aae349c603601278821b1b20000000000ba00000000000000000000000000000000", @ANYPTR=&(0x7f00000004c0)=ANY=[@ANYBLOB="44878a70bd645aa934b5461acf65eb9ce22da298c643e34d04ab5afeb5a0068e7f8055d7a85ed6afb26c2d7451002c62d8f7ffffffffffffff48615807ff30574b07f1000d6a09e83d042457cf729b3754efe23e239d31c9dc6cd3850f20fe408278e8887c4788555379c3c9b884c4f1a11062ee77218c465bc120752d21917eb4a78aa6d2a30293826b26a8171aa679cd3cbaad0ac5f03da051fc09900d31ac27ec175f6ffdda58b1fb23a6cfe528be52519bc2063f25bc16a4b416e0f6f1c7fad393f6728948108d84128c117b8e00000000000000000000000000000000"], @ANYBLOB="000101000000000001000000060000008cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223"]) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a8aa852b8e27cc4bed332dce5509fd49b6bd003f5b909778d20c97eda3326371d0d383e1c5f6e3fc2f5e61c4ce6b047104b3f22820012533d5e52a704f1faa5bb4478a0c58345f1aa8bbf1e7fd008c4", 0xc4) 2018/03/31 11:16:49 executing program 3 (fault-call:2 fault-nth:13): open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f00000006c0), 0x33040, &(0x7f00000006c0)=ANY=[]) mount(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='xfs\x00', 0x80c400, 0x0) 2018/03/31 11:16:49 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) r3 = syz_open_dev$vcsa(&(0x7f00000004c0)='/dev/vcsa#\x00', 0xffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000a80)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xffffffffffffff94) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) getsockopt$inet_sctp_SCTP_NODELAY(r3, 0x84, 0x3, &(0x7f0000000380), &(0x7f00000003c0)=0x4) r4 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000180)) getsockopt$packet_int(r0, 0x107, 0xc, &(0x7f0000000200), &(0x7f0000000340)=0x4) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r5 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r4, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r6 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) getsockopt$inet6_buf(r6, 0x29, 0x5c, &(0x7f0000000280)=""/184, &(0x7f00000001c0)=0xb8) ioctl$sock_bt_hidp_HIDPCONNADD(r6, 0x400448c8, &(0x7f0000000840)={r5, r4, 0xffffffffffffff52, 0x1, &(0x7f00000006c0)="e411b82d239f02360b33ab01086a0910f47bfaaa10d5cb1dd0d5e6120a061bee3a5045c09ff7eb5a798d477b3db7121ae6a2193d00a22c1d20a716d6fb8def52aaf549d2", 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r6, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="e3b40600ffffffff0400f0ff0000fafffb0e41da189c304034954b00a7172d5e6dc38f66721366162882a4b0446dab26cec9fe84f07c159cf49afd24cace5f89fb796dcf6b63f8c34f74923a544e4b9117efca7fcf0d58ef9782471fc22b1cd4d176eb466033081f5586965779409edd2110c47c593b483c5ced0bc800e7845f453818e2132c03ad73f4deb06e463de7bfeeaa6d5b35bb64800f5b11638eabab477af9deec6901ecddc340c4159fd55e378eec26aa4ad929b91e15017c9e7349a2d6a972cc7d757062c059dbbe5ca8ade65bb423aa45b1ba0f5c01a9997f104ae8b1530200b507d4c8db246a7375c203cd2961957b180236e6ee9ba5d55fae5a254bf7bbcd948f625d4bfd8a2231bf9b7c5f00000000"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:49 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) r3 = syz_open_dev$sndpcmc(&(0x7f0000000700)='/dev/snd/pcmC#D#c\x00', 0x400000008, 0x48c00) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000940)={0x0, @empty, @rand_addr}, &(0x7f0000000980)=0xc) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r4 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r5 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r5, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f00000001c0)={'security\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) r6 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r6, 0x400448c8, &(0x7f0000000840)=ANY=[@ANYRES32, @ANYRES32=r4, @ANYBLOB="52ff010000000000", @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB="63a941b4cacb7dafe545a3646a0137e12310af2d45917426bfdeb5e6abf2b4c61c6e93b9fecdf76a9746ff09590a21f58b8198802f"], @ANYBLOB="00010100470d000001000000000000008cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c284361"]) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e", 0x60) 2018/03/31 11:16:49 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f0000a8bfff)=""/1, 0x805031ae) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)) ioctl$TCXONC(r1, 0x540a, 0x3) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000180)) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x3ffc, 0x0) semget$private(0x0, 0x7, 0x0) syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x3400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x34, r3, 0x0, 0x0, 0x25dfdbfb, {0x9}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x54}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x200}]}, 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x4040014) getsockopt$llc_int(r2, 0x10c, 0x0, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 2018/03/31 11:16:49 executing program 7: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f00004c0000)={0xa, 0x3, 0x0, @ipv4={[], [0xff, 0xff]}, 0x9}, 0xffffffffffffff92) listen(r2, 0x43) accept(r2, &(0x7f0000000000)=@rc, &(0x7f0000000040)=0xa) shutdown(r0, 0x800005) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r3, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r4 = socket$netlink(0x10, 0x3, 0x13) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000003c0)=0xfffffffffffffe66) getgid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000005f00)) r6 = accept4(r4, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) r7 = semget$private(0x0, 0x0, 0x5) semtimedop(r7, &(0x7f00000001c0)=[{0x4, 0x2, 0x1800}, {0x3}, {0x1, 0x8, 0x800}, {0x0, 0x100000001, 0x1000}, {0x1, 0x8, 0x1000}], 0x5, &(0x7f0000000200)) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) 2018/03/31 11:16:49 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000fc0)='/dev/qat_adf_ctl\x00', 0x2000, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r3, 0x119, 0x1, &(0x7f0000001000), 0x4) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r4 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r5 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r5, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r6 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r6, 0x400448c8, &(0x7f0000000840)={r5, r4, 0xffffffffffffff52, 0x1, &(0x7f00000006c0)="e411b82d239f02360b33ab01086a0910f47bfaaa10d5cb1dd0d5e6120a061bee3a5045c09ff7eb5a798d477b3db7121ae6a2193d00a22c1d20a716d6fb8def52aaf549d2", 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r6, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 713.701787] device bridge0 entered promiscuous mode [ 713.708278] device bridge0 entered promiscuous mode [ 713.715822] device bridge0 entered promiscuous mode [ 713.726516] FAULT_INJECTION: forcing a failure. [ 713.726516] name failslab, interval 1, probability 0, space 0, times 0 [ 713.738244] CPU: 1 PID: 16527 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #8 2018/03/31 11:16:49 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:49 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r3 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r4 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r4, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r5 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r5, 0x400448c8, &(0x7f0000000280)=ANY=[@ANYRES32, @ANYRES32=r3, @ANYBLOB="52ff010000000000", @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYBLOB], @ANYBLOB="00010100470d000001000000000000008cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287abadf5f20d45fc60d8a670a9337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c284361"]) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e", 0x60) [ 713.738274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 713.738280] Call Trace: [ 713.757493] dump_stack+0x194/0x24d [ 713.761119] ? arch_local_irq_restore+0x53/0x53 [ 713.765781] ? __save_stack_trace+0x7e/0xd0 [ 713.770107] should_fail+0x8c0/0xa40 [ 713.773820] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 713.778924] ? kasan_kmalloc+0xad/0xe0 [ 713.782804] ? kmem_cache_alloc_trace+0x136/0x740 [ 713.787652] ? __memcg_init_list_lru_node+0x169/0x270 2018/03/31 11:16:49 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r3 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r4 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r4, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r5 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r5, 0x400448c8, &(0x7f0000000840)={r4, r3, 0xffffffffffffff52, 0x1, &(0x7f00000006c0)="e411b82d239f02360b33ab01086a0910f47bfaaa10d5cb1dd0d5e6120a061bee3a5045c09ff7eb5a798d477b3db7121ae6a2193d00a22c1d20a716d6fb8def52aaf549d2", 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 713.787661] ? __list_lru_init+0x544/0x750 [ 713.787673] ? sget_userns+0x691/0xe40 [ 713.787683] ? mount_fs+0x66/0x2d0 [ 713.787695] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 713.787703] ? do_mount+0xea4/0x2bb0 [ 713.787710] ? SyS_mount+0xab/0x120 [ 713.787720] ? do_syscall_64+0x281/0x940 [ 713.787731] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 713.787745] ? find_held_lock+0x35/0x1d0 [ 713.787758] ? __lock_is_held+0xb6/0x140 [ 713.787777] ? check_same_owner+0x320/0x320 [ 713.787789] ? rcu_note_context_switch+0x710/0x710 [ 713.787804] should_failslab+0xec/0x120 [ 713.787813] kmem_cache_alloc_trace+0x4b/0x740 [ 713.787822] ? __kmalloc_node+0x33/0x70 [ 713.787829] ? __kmalloc_node+0x33/0x70 [ 713.787844] ? rcu_read_lock_sched_held+0x108/0x120 [ 713.787858] __memcg_init_list_lru_node+0x169/0x270 [ 713.787871] ? list_lru_add+0x7c0/0x7c0 [ 713.787880] ? __kmalloc_node+0x47/0x70 [ 713.787895] __list_lru_init+0x544/0x750 [ 713.787910] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 713.787924] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 713.787935] ? __lockdep_init_map+0xe4/0x650 2018/03/31 11:16:49 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:49 executing program 3 (fault-call:2 fault-nth:14): open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f00000006c0), 0x33040, &(0x7f00000006c0)=ANY=[]) mount(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='xfs\x00', 0x80c400, 0x0) 2018/03/31 11:16:49 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={0xffffffffffffffff, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:49 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={0xffffffffffffffff, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="e3b40600ffffffff0400f0ff0000fafffb0e41da189c304034954b00a7172d5e6dc38f66721366162882a4b0446dab26cec9fe84f07c159cf49afd24cace5f89fb796dcf6b63f8c34f74923a544e4b9117efca7fcf0d58ef9782471fc22b1cd4d176eb466033081f5586965779409edd2110c47c593b483c5ced0bc800e7845f453818e2132c03ad73f4deb06e463de7bfeeaa6d5b35bb64800f5b11638eabab477af9deec6901ecddc340c4159fd55e378eec26aa4ad929b91e15017c9e7349a2d6a972cc7d757062c059dbbe5ca8ade65bb423aa45b1ba0f5c01a9997f104ae8b1530200b507d4c8db246a7375c203cd2961957b180236e6ee9ba5d55fae5a254bf7bbcd948f625d4bfd8a2231bf9b7c5f0000000000"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:49 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={0xffffffffffffffff, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="e3b40600ffffffff0400f0ff0000fafffb0e41da189c304034954b00a7172d5e6dc38f66721366162882a4b0446dab26cec9fe84f07c159cf49afd24cace5f89fb796dcf6b63f8c34f74923a544e4b9117efca7fcf0d58ef9782471fc22b1cd4d176eb466033081f5586965779409edd2110c47c593b483c5ced0bc800e7845f453818e2132c03ad73f4deb06e463de7bfeeaa6d5b35bb64800f5b11638eabab477af9deec6901ecddc340c4159fd55e378eec26aa4ad929b91e15017c9e7349a2d6a972cc7d757062c059dbbe5ca8ade65bb423aa45b1ba0f5c01a9997f104ae8b1530200b507d4c8db246a7375c203cd2961957b180236e6ee9ba5d55fae5a254bf7bbcd948f625d4bfd8a2231bf9b7c5f0000000000"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 713.787949] ? lockdep_init_map+0x9/0x10 [ 713.787960] sget_userns+0x691/0xe40 [ 713.787970] ? kill_litter_super+0x90/0x90 [ 713.787982] ? ns_test_super+0x50/0x50 [ 713.787993] ? destroy_unused_super.part.6+0xd0/0xd0 [ 713.788001] ? do_raw_spin_trylock+0x190/0x190 [ 713.788013] ? kobject_put+0x6b/0x250 [ 713.788025] ? blkdev_get+0x3a1/0xb00 [ 713.788038] ? cap_capable+0x1b5/0x230 [ 713.788047] ? __blkdev_get+0x13b0/0x13b0 [ 713.788059] ? security_capable+0x8e/0xc0 [ 713.788068] ? kill_litter_super+0x90/0x90 [ 713.788078] ? ns_capable_common+0xcf/0x160 [ 713.788087] ? ns_test_super+0x50/0x50 [ 713.788094] ? kill_litter_super+0x90/0x90 [ 713.788102] sget+0xd2/0x120 [ 713.788113] mount_bdev+0x109/0x370 [ 713.788123] ? xfs_test_remount_options.isra.19+0x90/0x90 [ 713.788133] xfs_fs_mount+0x34/0x40 [ 713.788143] mount_fs+0x66/0x2d0 [ 713.788156] vfs_kern_mount.part.26+0xc6/0x4a0 [ 713.788167] ? may_umount+0xa0/0xa0 [ 713.788176] ? _raw_read_unlock+0x22/0x30 [ 713.788186] ? __get_fs_type+0x8a/0xc0 [ 713.788198] do_mount+0xea4/0x2bb0 [ 713.788206] ? __might_fault+0x110/0x1d0 [ 713.788218] ? copy_mount_string+0x40/0x40 [ 713.788227] ? check_same_owner+0x320/0x320 [ 713.788236] ? __check_object_size+0x8b/0x530 [ 713.788250] ? __might_sleep+0x95/0x190 [ 713.788264] ? kasan_check_write+0x14/0x20 [ 713.788273] ? _copy_from_user+0x99/0x110 [ 713.788285] ? memdup_user+0x5e/0x90 [ 713.788293] ? copy_mount_options+0x1f7/0x2e0 [ 713.788304] SyS_mount+0xab/0x120 [ 713.788312] ? copy_mnt_ns+0xb30/0xb30 [ 713.788322] do_syscall_64+0x281/0x940 [ 713.788332] ? vmalloc_sync_all+0x30/0x30 [ 713.788340] ? _raw_spin_unlock_irq+0x27/0x70 [ 713.788348] ? finish_task_switch+0x1c1/0x7e0 [ 713.788358] ? syscall_return_slowpath+0x550/0x550 [ 713.788368] ? syscall_return_slowpath+0x2ac/0x550 [ 713.788379] ? prepare_exit_to_usermode+0x350/0x350 [ 713.788390] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 713.788402] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 713.788415] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 713.788423] RIP: 0033:0x454e79 [ 713.788428] RSP: 002b:00007ff701201c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 713.788438] RAX: ffffffffffffffda RBX: 00007ff7012026d4 RCX: 0000000000454e79 [ 713.788444] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 00000000200007c0 [ 713.788449] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 713.788455] R10: 000000000080c400 R11: 0000000000000246 R12: 0000000000000014 [ 713.788459] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000d [ 713.805314] device bridge0 left promiscuous mode [ 713.816467] device bridge0 left promiscuous mode [ 713.823533] device bridge0 entered promiscuous mode [ 713.845816] device bridge0 entered promiscuous mode [ 713.854773] device bridge0 entered promiscuous mode [ 714.226894] device bridge0 left promiscuous mode [ 714.245187] device bridge0 left promiscuous mode [ 714.256240] device bridge0 left promiscuous mode [ 714.268945] FAULT_INJECTION: forcing a failure. [ 714.268945] name failslab, interval 1, probability 0, space 0, times 0 [ 714.280241] CPU: 0 PID: 16573 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #8 [ 714.287418] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 714.296769] Call Trace: [ 714.299354] dump_stack+0x194/0x24d [ 714.302987] ? arch_local_irq_restore+0x53/0x53 [ 714.307652] ? __save_stack_trace+0x7e/0xd0 [ 714.311981] should_fail+0x8c0/0xa40 [ 714.315694] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 714.320791] ? kasan_kmalloc+0xad/0xe0 [ 714.324675] ? kmem_cache_alloc_trace+0x136/0x740 [ 714.329513] ? __memcg_init_list_lru_node+0x169/0x270 [ 714.334685] ? __list_lru_init+0x544/0x750 [ 714.338893] ? sget_userns+0x691/0xe40 [ 714.342765] ? mount_fs+0x66/0x2d0 [ 714.346298] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 714.351036] ? do_mount+0xea4/0x2bb0 [ 714.354730] ? SyS_mount+0xab/0x120 [ 714.358331] ? do_syscall_64+0x281/0x940 [ 714.362366] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 714.367715] ? find_held_lock+0x35/0x1d0 [ 714.371753] ? __lock_is_held+0xb6/0x140 [ 714.375808] ? check_same_owner+0x320/0x320 [ 714.380119] ? rcu_note_context_switch+0x710/0x710 [ 714.385051] should_failslab+0xec/0x120 [ 714.389020] kmem_cache_alloc_trace+0x4b/0x740 [ 714.393584] ? __kmalloc_node+0x33/0x70 [ 714.397532] ? __kmalloc_node+0x33/0x70 [ 714.401482] ? rcu_read_lock_sched_held+0x108/0x120 [ 714.406482] __memcg_init_list_lru_node+0x169/0x270 [ 714.411481] ? list_lru_add+0x7c0/0x7c0 [ 714.415428] ? __kmalloc_node+0x47/0x70 [ 714.419474] __list_lru_init+0x544/0x750 [ 714.423520] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 714.429384] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 714.434383] ? __lockdep_init_map+0xe4/0x650 [ 714.438763] ? lockdep_init_map+0x9/0x10 [ 714.442805] sget_userns+0x691/0xe40 [ 714.446500] ? kill_litter_super+0x90/0x90 [ 714.450715] ? ns_test_super+0x50/0x50 [ 714.454578] ? destroy_unused_super.part.6+0xd0/0xd0 [ 714.459651] ? do_raw_spin_trylock+0x190/0x190 [ 714.464208] ? kobject_put+0x6b/0x250 [ 714.467995] ? blkdev_get+0x3a1/0xb00 [ 714.471777] ? cap_capable+0x1b5/0x230 [ 714.475641] ? __blkdev_get+0x13b0/0x13b0 [ 714.479767] ? security_capable+0x8e/0xc0 [ 714.483890] ? kill_litter_super+0x90/0x90 [ 714.488096] ? ns_capable_common+0xcf/0x160 [ 714.492391] ? ns_test_super+0x50/0x50 [ 714.496254] ? kill_litter_super+0x90/0x90 [ 714.500460] sget+0xd2/0x120 [ 714.503456] mount_bdev+0x109/0x370 [ 714.507055] ? xfs_test_remount_options.isra.19+0x90/0x90 [ 714.512566] xfs_fs_mount+0x34/0x40 [ 714.516167] mount_fs+0x66/0x2d0 [ 714.519510] vfs_kern_mount.part.26+0xc6/0x4a0 [ 714.524065] ? may_umount+0xa0/0xa0 [ 714.527680] ? _raw_read_unlock+0x22/0x30 [ 714.531822] ? __get_fs_type+0x8a/0xc0 [ 714.535705] do_mount+0xea4/0x2bb0 [ 714.539231] ? __might_fault+0x110/0x1d0 [ 714.543266] ? copy_mount_string+0x40/0x40 [ 714.547478] ? check_same_owner+0x320/0x320 [ 714.551772] ? __check_object_size+0x8b/0x530 [ 714.556248] ? __might_sleep+0x95/0x190 [ 714.560209] ? kasan_check_write+0x14/0x20 [ 714.564424] ? _copy_from_user+0x99/0x110 [ 714.568548] ? memdup_user+0x5e/0x90 [ 714.572245] ? copy_mount_options+0x1f7/0x2e0 [ 714.576730] SyS_mount+0xab/0x120 [ 714.580160] ? copy_mnt_ns+0xb30/0xb30 [ 714.584031] do_syscall_64+0x281/0x940 [ 714.587901] ? vmalloc_sync_all+0x30/0x30 [ 714.592040] ? _raw_spin_unlock_irq+0x27/0x70 [ 714.596511] ? finish_task_switch+0x1c1/0x7e0 [ 714.600987] ? syscall_return_slowpath+0x550/0x550 [ 714.605917] ? syscall_return_slowpath+0x2ac/0x550 [ 714.610829] ? prepare_exit_to_usermode+0x350/0x350 [ 714.615838] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 714.621196] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 714.626037] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 714.631216] RIP: 0033:0x454e79 [ 714.634387] RSP: 002b:00007ff701201c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 714.642075] RAX: ffffffffffffffda RBX: 00007ff7012026d4 RCX: 0000000000454e79 [ 714.649318] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 00000000200007c0 [ 714.656564] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 714.663814] R10: 000000000080c400 R11: 0000000000000246 R12: 0000000000000014 [ 714.671055] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000e [ 714.688854] device bridge0 left promiscuous mode 2018/03/31 11:16:50 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, 0xffffffffffffffff, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:50 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f0000a8bfff)=""/1, 0x805031ae) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)) ioctl$TCXONC(r1, 0x540a, 0x3) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000180)) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x4000, 0x0) semget$private(0x0, 0x7, 0x0) syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) ioctl$TIOCMBIS(r1, 0x5416, &(0x7f0000000100)=0x4) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x3400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x34, r3, 0x0, 0x0, 0x25dfdbfb, {0x9}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x54}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x200}]}, 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x4040014) getsockopt$llc_int(r2, 0x10c, 0x0, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 2018/03/31 11:16:50 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) vmsplice(r2, &(0x7f0000000540)=[{&(0x7f00000001c0)="02ce9f0adb7333f6156d08e99177c94bd1655e3b94bfbf442c3df7288539ddc703155812923f843ae4d4096ee84227982b61168afb89c25033f0f9fd405fba83b72ea546f5e5ac7ba003cd082aa27e7f18af01278a6002abd13ebdc003d2122eaf84", 0x62}, {&(0x7f0000000280)="bc4ea63a37a4671d108310f201092d17fca5e6e62f7fc430fa1436e840885c500e0a82ef05ca159e0ce180cf3f3b6d97d39fd8893376a5ff8434d7d19a29c779dba7c5f414b72d0768fd4b71e4fc8e2a74d5f2b811e67774dbbbbee77f762dcbd9e7c5c5ce0860eb05973a50cf79426ef785b9386ea2c93c24ea8b004a40516c23f61780b8afee307d13566c67f4a03b95540515bf60694e9526290f1b1ffb88f96c693217cffdd9f8748d1788bb7949387286738974afdcbe6e56df9efdf24982cc3f2b0109e39dfeea748c5dbe1a13e2120d8eff21c5f580", 0xd9}, {&(0x7f00000004c0)="166209f7b5c4f9af2afef09e5b3d19c119b01f509f4df98e671dc124fb54f1fe85e3b5a090ac5ef3c92d47b6800794ec27f9e66eb7a8ce3d72693994dac079", 0x3f}, {&(0x7f0000000a80)="d4466b8b364a18fad2b578d0029200e87f2bab74e2da2c57fb128b79942479e7d2cd1710c6253dd43f1d10cf6a8040942e7e217926c6df2d751c71fdfad10d0835f67751f81b86c66132c42832f387b676dd29e1ba363f7684266c7633a7897433974ad3aff5ea6a017865c95eaf00311b00d3ee9ce4139ca55367d100ca5f28c0d758612d6e61494e6718a53a09e162058ec30f0b73c5287b1079dc03957d7179bf9bb6e1f5e4ee1e633cfad0f761b656181d633fb88e580daf30f0bf942bd3b5ad63043dd864feba449e8c623496d019dbfbb733bbef719ebebd11cb747b", 0xdf}, {&(0x7f0000000b80)="50292b1380efa4d426aab5731e3cd0eb42f1344f6ba21f0624703cb9e45bf03c51f800f62c09224673a87d1de7110941ebd16714f99a4cebcbb3b92fbd16b8172571a0598e55cc5ac81ab51b13a39196d4f5a271c8d10e13fcde13a17caff0190a58dec8cc0016d2dd3981810bc30e12630d73f6de02b5452562bf3d69dcc73fd32e37eb3d2645419ac57957b376c8b0a12e1d72877e1ee0a678e9fe36809a5ae27aae9662d92854d35bcfcf4b3c43254f02cd361f267330c6dbf460f8f160d8335a9df7d1399430dcfb7e733ee54debbc2d933c9b2d5290e79f60e45bf7acf6a785415a57394608", 0xe8}, {&(0x7f0000000c80)="ad04150192c855e8f95843ed235e249334b28b43b1f01563f5249ded07419b98b685588b047f619a629d9af4781884036824c9fedbcddd8c73008e96a429eac16e272e71b9ae5764db1303bb09430b68288a5cfd741238a09560c323993c8927f0d2f1d7c7d767c5be9ae8f5738d7ec46fa61a9887473764a1006592fe56c97ce5a88ea4a9d687c101ad053f6a5066b7fafa5feb98547dee43be0ed9d46abef665513d515bf2ea47101117942257cc13599ed09b4996c8b2f542af5cbd3cf175e36a3fcaae197c5ca07576904e44c5d156a0dc5472399ca0fae8bde687a5f4", 0xdf}, {&(0x7f0000000500)="e7e7af683e011415d33748bdba9d", 0xe}], 0x7, 0x8) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900)={0x0, 0x0, 0x0}, &(0x7f0000002940)=0xc) fchown(r2, r3, r4) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0)="e411b82d239f02360b33ab01086a0910f47bfaaa10d5cb1dd0d5e6120a061bee3a5045c09ff7eb5a798d477b3db7121ae6a2193d00a22c1d20a716d6fb8def52aaf549d2", 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:50 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0xe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r3 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r4 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r4, 0x100, 0x1, &(0x7f0000000280)=0xd, 0x1a7) r5 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) socket(0x10, 0x3, 0xfffffffffffffffa) ioctl$sock_bt_hidp_HIDPCONNADD(r5, 0x400448c8, &(0x7f0000000840)={0xffffffffffffffff, r3, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x0, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c284361"}) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e", 0x60) 2018/03/31 11:16:50 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r3 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r4 = accept4(0xffffffffffffffff, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) r5 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r5, 0x400448c8, &(0x7f0000000a00)=ANY=[@ANYRES32=r4, @ANYRES32=r3, @ANYBLOB="52ff010000001200596f6bbc819b9afea323b960429e6d5e1553476a56f4ab8e1ad686dfa85ea8decbfe61d6f8038ada717381704fb3cf64293b3fec026b17a0f485f9d15afc72ab7a57a96650d60878638c1fc94819335d99644bc21a2182151a3b7ce7647c4e0eace07aad84f4e38e9f8e97aad314b234a79165d8ff1d00a5505d1c33f89db0a9f994a355ae8acecbc1b90be02219fcfc1ea7b40decb87dea686a0afff64fe27fe3d66e8774b037c18d8e439730ae31bd7dbb9223d2fa02ce905750fe9fb71bfe148a9669f915670d9559728f23b1c20000", @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYBLOB], @ANYBLOB="000101000000000001000000060000008cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223"]) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a8aa852b8e27cc4bed332dce5509fd49b6bd003f5b909778d20c97eda3326371d0d383e1c5f6e3fc2f5e61c4ce6b047104b3f22820012533d5e52a704f1faa5bb4478a0c58345f1aa8bbf1e7fd008c4", 0xc4) 2018/03/31 11:16:50 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x6) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x7, 0x80000) setsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000280)={{{@in6, @in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, 0x4e22, 0x3f, 0x4e20, 0x73a, 0xa, 0x20, 0x80, 0x16, r3, r4}, {0x5e800fe0, 0x1, 0x8, 0x7, 0x100000001, 0x1, 0x8, 0x1}, {0x8, 0x8001, 0xfffffffffffffe00, 0x100000000}, 0x93b4, 0x6e6bb9, 0x0, 0x1}, {{@in6=@dev={0xfe, 0x80, [], 0x12}, 0x4d3, 0x3e}, 0xa, @in6=@mcast2={0xff, 0x2, [], 0x1}, 0x3504, 0x3, 0x1, 0xff, 0x5, 0x5, 0x9}}, 0xe8) r7 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r7, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r8 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r8, 0x400448c8, &(0x7f0000000840)={r7, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0)="e411b82d239f02360b33ab01086a0910f47bfaaa10d5cb1dd0d5e6120a061bee3a5045c09ff7eb5a798d477b3db7121ae6a2193d00a22c1d20a716d6fb8def52aaf549d2", 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r8, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:50 executing program 3 (fault-call:2 fault-nth:15): open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f00000006c0), 0x33040, &(0x7f00000006c0)=ANY=[]) mount(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='xfs\x00', 0x80c400, 0x0) 2018/03/31 11:16:50 executing program 7: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f00004c0000)={0xa, 0x3, 0x0, @ipv4={[], [0xff, 0xff]}, 0x9}, 0xffffffffffffff92) listen(r2, 0x43) accept(r2, &(0x7f0000000000)=@rc, &(0x7f0000000040)=0xa) shutdown(r2, 0x0) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r3, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x4) socket$netlink(0x10, 0x3, 0x4) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2, 0x0, 0xffefffffffffffff}}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00006dfff0)='/dev/sequencer2\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0xd) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, &(0x7f0000000100), 0x4) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x640, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000400)=ANY=[], &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x94, &(0x7f0000000240)=[@in={0x2, 0x4e21, @loopback=0x7f000001}, @in={0x2, 0x4e20}, @in6={0xa, 0x4e21, 0x0, @loopback={0x0, 0x1}, 0x3f}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x17}}, @in6={0xa, 0x4e21, 0x29, @mcast2={0xff, 0x2, [], 0x1}, 0x93}, @in={0x2, 0x0, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}, 0x580b}]}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000380), &(0x7f00000003c0)=0xb) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r5, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x5}, 0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r4, 0x84, 0x70, &(0x7f0000000140)={r6, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, [0x0, 0x0, 0x9, 0x0, 0x6, 0x8, 0x0, 0x0, 0x3, 0x7, 0x6f, 0x0, 0x100000000, 0x2, 0x6]}, &(0x7f0000000500)=0x100) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000003c0)=0xfffffffffffffe66) 2018/03/31 11:16:50 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, 0xffffffffffffffff, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 714.803896] device bridge0 entered promiscuous mode [ 714.822320] device bridge0 entered promiscuous mode [ 714.831531] device bridge0 entered promiscuous mode [ 714.837682] device bridge0 entered promiscuous mode [ 714.846548] FAULT_INJECTION: forcing a failure. [ 714.846548] name failslab, interval 1, probability 0, space 0, times 0 [ 714.857931] CPU: 1 PID: 16605 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #8 [ 714.865112] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 714.874455] Call Trace: [ 714.877038] dump_stack+0x194/0x24d [ 714.880668] ? arch_local_irq_restore+0x53/0x53 [ 714.885341] ? __save_stack_trace+0x7e/0xd0 [ 714.889676] should_fail+0x8c0/0xa40 [ 714.893388] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 714.898486] ? kasan_kmalloc+0xad/0xe0 [ 714.902371] ? kmem_cache_alloc_trace+0x136/0x740 [ 714.907211] ? __memcg_init_list_lru_node+0x169/0x270 [ 714.912393] ? __list_lru_init+0x544/0x750 [ 714.916625] ? sget_userns+0x691/0xe40 [ 714.920510] ? mount_fs+0x66/0x2d0 [ 714.924043] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 714.928793] ? do_mount+0xea4/0x2bb0 [ 714.932496] ? SyS_mount+0xab/0x120 [ 714.936116] ? do_syscall_64+0x281/0x940 [ 714.940176] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 714.945538] ? find_held_lock+0x35/0x1d0 [ 714.949598] ? __lock_is_held+0xb6/0x140 2018/03/31 11:16:50 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, 0xffffffffffffffff, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="e3b40600ffffffff0400f0ff0000fafffb0e41da189c304034954b00a7172d5e6dc38f66721366162882a4b0446dab26cec9fe84f07c159cf49afd24cace5f89fb796dcf6b63f8c34f74923a544e4b9117efca7fcf0d58ef9782471fc22b1cd4d176eb466033081f5586965779409edd2110c47c593b483c5ced0bc800e7845f453818e2132c03ad73f4deb06e463de7bfeeaa6d5b35bb64800f5b11638eabab477af9deec6901ecddc340c4159fd55e378eec26aa4ad929b91e15017c9e7349a2d6a972cc7d757062c059dbbe5ca8ade65bb423aa45b1ba0f5c01a9997f104ae8b1530200b507d4c8db246a7375c203cd2961957b180236e6ee9ba5d55fae5a254bf7bbcd948f625d4bfd8a2231bf9b7c5f0000000000"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:50 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0x0, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 714.953667] ? check_same_owner+0x320/0x320 [ 714.957991] ? rcu_note_context_switch+0x710/0x710 [ 714.962925] should_failslab+0xec/0x120 [ 714.966899] kmem_cache_alloc_trace+0x4b/0x740 [ 714.971478] ? __kmalloc_node+0x33/0x70 [ 714.975447] ? __kmalloc_node+0x33/0x70 [ 714.979416] ? rcu_read_lock_sched_held+0x108/0x120 [ 714.984434] __memcg_init_list_lru_node+0x169/0x270 [ 714.989445] ? list_lru_add+0x7c0/0x7c0 [ 714.993415] ? __kmalloc_node+0x47/0x70 [ 714.997393] __list_lru_init+0x544/0x750 2018/03/31 11:16:50 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0x0, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 715.001453] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 715.007334] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 715.012351] ? __lockdep_init_map+0xe4/0x650 [ 715.016763] ? lockdep_init_map+0x9/0x10 [ 715.020819] sget_userns+0x691/0xe40 [ 715.024523] ? kill_litter_super+0x90/0x90 [ 715.028751] ? ns_test_super+0x50/0x50 [ 715.032634] ? destroy_unused_super.part.6+0xd0/0xd0 [ 715.037737] ? do_raw_spin_trylock+0x190/0x190 [ 715.042315] ? kobject_put+0x6b/0x250 [ 715.046111] ? blkdev_get+0x3a1/0xb00 [ 715.049914] ? cap_capable+0x1b5/0x230 2018/03/31 11:16:50 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0x0, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:50 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x0, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 715.053798] ? __blkdev_get+0x13b0/0x13b0 [ 715.057938] ? security_capable+0x8e/0xc0 [ 715.062081] ? kill_litter_super+0x90/0x90 [ 715.066305] ? ns_capable_common+0xcf/0x160 [ 715.070623] ? ns_test_super+0x50/0x50 [ 715.074499] ? kill_litter_super+0x90/0x90 [ 715.078723] sget+0xd2/0x120 [ 715.081744] mount_bdev+0x109/0x370 [ 715.085363] ? xfs_test_remount_options.isra.19+0x90/0x90 [ 715.090895] xfs_fs_mount+0x34/0x40 [ 715.094514] mount_fs+0x66/0x2d0 [ 715.097876] vfs_kern_mount.part.26+0xc6/0x4a0 2018/03/31 11:16:50 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x0, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 715.102451] ? may_umount+0xa0/0xa0 [ 715.106073] ? _raw_read_unlock+0x22/0x30 [ 715.110214] ? __get_fs_type+0x8a/0xc0 [ 715.114096] do_mount+0xea4/0x2bb0 [ 715.117627] ? __might_fault+0x110/0x1d0 [ 715.121686] ? copy_mount_string+0x40/0x40 [ 715.125914] ? check_same_owner+0x320/0x320 [ 715.130228] ? __check_object_size+0x8b/0x530 [ 715.134725] ? __might_sleep+0x95/0x190 [ 715.138699] ? kasan_check_write+0x14/0x20 [ 715.142930] ? _copy_from_user+0x99/0x110 [ 715.147071] ? memdup_user+0x5e/0x90 [ 715.150779] ? copy_mount_options+0x1f7/0x2e0 2018/03/31 11:16:50 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x0, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 715.155276] SyS_mount+0xab/0x120 [ 715.158716] ? copy_mnt_ns+0xb30/0xb30 [ 715.162601] do_syscall_64+0x281/0x940 [ 715.166482] ? vmalloc_sync_all+0x30/0x30 [ 715.170628] ? _raw_spin_unlock_irq+0x27/0x70 [ 715.175120] ? finish_task_switch+0x1c1/0x7e0 [ 715.179612] ? syscall_return_slowpath+0x550/0x550 [ 715.184540] ? syscall_return_slowpath+0x2ac/0x550 [ 715.189464] ? prepare_exit_to_usermode+0x350/0x350 [ 715.194475] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 715.199833] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 715.204678] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 715.209854] RIP: 0033:0x454e79 [ 715.213024] RSP: 002b:00007ff701201c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 715.220712] RAX: ffffffffffffffda RBX: 00007ff7012026d4 RCX: 0000000000454e79 [ 715.227963] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 00000000200007c0 [ 715.235205] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 715.242457] R10: 000000000080c400 R11: 0000000000000246 R12: 0000000000000014 [ 715.249702] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000f [ 715.263206] device bridge0 left promiscuous mode [ 715.268293] device bridge0 left promiscuous mode [ 715.274735] device bridge0 left promiscuous mode [ 715.279936] device bridge0 left promiscuous mode 2018/03/31 11:16:51 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x0, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="e3b40600ffffffff0400f0ff0000fafffb0e41da189c304034954b00a7172d5e6dc38f66721366162882a4b0446dab26cec9fe84f07c159cf49afd24cace5f89fb796dcf6b63f8c34f74923a544e4b9117efca7fcf0d58ef9782471fc22b1cd4d176eb466033081f5586965779409edd2110c47c593b483c5ced0bc800e7845f453818e2132c03ad73f4deb06e463de7bfeeaa6d5b35bb64800f5b11638eabab477af9deec6901ecddc340c4159fd55e378eec26aa4ad929b91e15017c9e7349a2d6a972cc7d757062c059dbbe5ca8ade65bb423aa45b1ba0f5c01a9997f104ae8b1530200b507d4c8db246a7375c203cd2961957b180236e6ee9ba5d55fae5a254bf7bbcd948f625d4bfd8a2231bf9b7c5f0000000000"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:51 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f0000000440)=""/163) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f0000a8bfff)=""/1, 0x805031ae) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)) ioctl$TCXONC(r1, 0x540a, 0x3) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000180)) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x4000, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r2, 0x408c5333, &(0x7f0000000380)={0xffffffff80000001, 0xee, 0x9, 'queue0\x00', 0x101}) semget$private(0x0, 0x7, 0x0) syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') ioctl$int_out(r2, 0x5462, &(0x7f0000000100)) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x3400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x34, r3, 0x0, 0x0, 0x25dfdbfb, {0x9}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x54}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x200}]}, 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x4040014) getsockopt$llc_int(r2, 0x10c, 0x0, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 2018/03/31 11:16:51 executing program 3 (fault-call:2 fault-nth:16): open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f00000006c0), 0x33040, &(0x7f00000006c0)=ANY=[]) mount(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='xfs\x00', 0x80c400, 0x0) 2018/03/31 11:16:51 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r3 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r4 = accept4(0xffffffffffffffff, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r4, 0x84, 0x15, &(0x7f0000000040)={0xfff}, 0x1) ioctl$sock_SIOCOUTQ(r3, 0x5411, &(0x7f0000000300)) r5 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r5, 0x400448c8, &(0x7f0000000840)={r4, r3, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223"}) getsockopt$inet_sctp_SCTP_CONTEXT(r5, 0x84, 0x11, &(0x7f00000001c0)={0x0, 0x3}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r5, 0x84, 0x22, &(0x7f0000000280)={0x101, 0x200, 0x9, 0xfffffffffffff9e0, r6}, &(0x7f00000002c0)=0x10) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a8aa852b8e27cc4bed332dce5509fd49b6bd003f5b909778d20c97eda3326371d0d383e1c5f6e3fc2f5e61c4ce6b047104b3f22820012533d5e52a704f1faa5bb4478a0c58345f1aa8bbf1e7fd008c4", 0xc4) 2018/03/31 11:16:51 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000001c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r3 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r4 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r4, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r5 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r5, 0x400448c8, &(0x7f0000000840)={r4, r3, 0xffffffffffffff52, 0x1, &(0x7f00000006c0)="e411b82d239f02360b33ab01086a0910f47bfaaa10d5cb1dd0d5e6120a061bee3a5045c09ff7eb5a798d477b3db7121ae6a2193d00a22c1d20a716d6fb8def52aaf549d2", 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:51 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x1f) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r3 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r4 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r4, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r5 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r5, 0x400448c8, &(0x7f0000000840)={r4, r3, 0xffffffffffffff52, 0x1, &(0x7f00000006c0)="e411b82d239f02360b33ab01086a0910f47bfaaa10d5cb1dd0d5e6120a061bee3a5045c09ff7eb5a798d477b3db7121ae6a2193d00a22c1d20a716d6fb8def52aaf549d2", 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:51 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r3 = socket$kcm(0x29, 0x0, 0x0) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x2100, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r4, 0x111, 0x1, 0x8, 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r5 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r5, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r6 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r6, 0x400448c8, &(0x7f0000000840)={0xffffffffffffffff, r3, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x0, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c284361"}) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e", 0x60) 2018/03/31 11:16:51 executing program 7: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f00004c0000)={0xa, 0x3, 0x0, @ipv4={[], [0xff, 0xff]}, 0x9}, 0xffffffffffffff92) listen(r2, 0x43) accept(r2, &(0x7f0000000000)=@rc, &(0x7f0000000040)=0xa) shutdown(r2, 0x0) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r3, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000003c0)=0xfffffffffffffe66) getgid() getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000005f00)) r6 = accept4(r4, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) r7 = semget$private(0x0, 0x0, 0x5) semtimedop(r7, &(0x7f00000001c0)=[{0x4, 0x2, 0x1800}, {0x3}, {0x1, 0x8, 0x800}, {0x0, 0x100000001, 0x1000}, {0x1, 0x8, 0x1000}], 0x5, &(0x7f0000000200)) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) [ 715.927664] device bridge0 entered promiscuous mode [ 715.932846] device bridge0 entered promiscuous mode [ 715.942847] device bridge0 entered promiscuous mode [ 715.949117] device bridge0 entered promiscuous mode [ 715.960327] FAULT_INJECTION: forcing a failure. [ 715.960327] name failslab, interval 1, probability 0, space 0, times 0 [ 715.971659] CPU: 0 PID: 16676 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #8 [ 715.978839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 715.988186] Call Trace: [ 715.990778] dump_stack+0x194/0x24d [ 715.994405] ? arch_local_irq_restore+0x53/0x53 [ 715.999066] ? __save_stack_trace+0x7e/0xd0 [ 716.003390] should_fail+0x8c0/0xa40 [ 716.007105] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 716.012202] ? kasan_kmalloc+0xad/0xe0 [ 716.016083] ? kmem_cache_alloc_trace+0x136/0x740 [ 716.020923] ? __memcg_init_list_lru_node+0x169/0x270 [ 716.026103] ? __list_lru_init+0x544/0x750 [ 716.030334] ? sget_userns+0x691/0xe40 [ 716.034229] ? mount_fs+0x66/0x2d0 [ 716.037768] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 716.042518] ? do_mount+0xea4/0x2bb0 [ 716.046226] ? SyS_mount+0xab/0x120 [ 716.049850] ? do_syscall_64+0x281/0x940 [ 716.053907] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 716.059269] ? find_held_lock+0x35/0x1d0 [ 716.063333] ? __lock_is_held+0xb6/0x140 [ 716.067401] ? check_same_owner+0x320/0x320 [ 716.071722] ? rcu_note_context_switch+0x710/0x710 2018/03/31 11:16:51 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x0, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:51 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x0, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:51 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x0, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 716.076653] should_failslab+0xec/0x120 [ 716.080619] kmem_cache_alloc_trace+0x4b/0x740 [ 716.085194] ? __kmalloc_node+0x33/0x70 [ 716.089167] ? __kmalloc_node+0x33/0x70 [ 716.093135] ? rcu_read_lock_sched_held+0x108/0x120 [ 716.098176] __memcg_init_list_lru_node+0x169/0x270 [ 716.103196] ? list_lru_add+0x7c0/0x7c0 [ 716.107173] ? __kmalloc_node+0x47/0x70 [ 716.111154] __list_lru_init+0x544/0x750 [ 716.115214] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 716.121097] ? trace_hardirqs_on_caller+0x421/0x5c0 2018/03/31 11:16:51 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x0, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 716.126113] ? __lockdep_init_map+0xe4/0x650 [ 716.130523] ? lockdep_init_map+0x9/0x10 [ 716.134579] sget_userns+0x691/0xe40 [ 716.138288] ? kill_litter_super+0x90/0x90 [ 716.142519] ? ns_test_super+0x50/0x50 [ 716.146401] ? destroy_unused_super.part.6+0xd0/0xd0 [ 716.151499] ? do_raw_spin_trylock+0x190/0x190 [ 716.156078] ? kobject_put+0x6b/0x250 [ 716.159876] ? blkdev_get+0x3a1/0xb00 [ 716.163677] ? cap_capable+0x1b5/0x230 [ 716.167559] ? __blkdev_get+0x13b0/0x13b0 [ 716.171703] ? security_capable+0x8e/0xc0 2018/03/31 11:16:51 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x0, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 716.175842] ? kill_litter_super+0x90/0x90 [ 716.180070] ? ns_capable_common+0xcf/0x160 [ 716.184386] ? ns_test_super+0x50/0x50 [ 716.188265] ? kill_litter_super+0x90/0x90 [ 716.192491] sget+0xd2/0x120 [ 716.195504] mount_bdev+0x109/0x370 [ 716.199126] ? xfs_test_remount_options.isra.19+0x90/0x90 [ 716.204666] xfs_fs_mount+0x34/0x40 [ 716.208284] mount_fs+0x66/0x2d0 [ 716.211645] vfs_kern_mount.part.26+0xc6/0x4a0 [ 716.216224] ? may_umount+0xa0/0xa0 [ 716.219846] ? _raw_read_unlock+0x22/0x30 [ 716.223988] ? __get_fs_type+0x8a/0xc0 2018/03/31 11:16:51 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:51 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="e3b40600ffffffff0400f0ff0000fafffb0e41da189c304034954b00a7172d5e6dc38f66721366162882a4b0446dab26cec9fe84f07c159cf49afd24cace5f89fb796dcf6b63f8c34f74923a544e4b9117efca7fcf0d58ef9782471fc22b1cd4d176eb466033081f5586965779409edd2110c47c593b483c5ced0bc800e7845f453818e2132c03ad73f4deb06e463de7bfeeaa6d5b35bb64800f5b11638eabab477af9deec6901ecddc340c4159fd55e378eec26aa4ad929b91e15017c9e7349a2d6a972cc7d757062c059dbbe5ca8ade65bb423aa45b1ba0f5c01a9997f104ae8b1530200b507d4c8db246a7375c203cd2961957b180236e6ee9ba5d55fae5a254bf7bbcd948f625d4bfd8a2231bf9b7c5f0000000000"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 716.227874] do_mount+0xea4/0x2bb0 [ 716.231402] ? __might_fault+0x110/0x1d0 [ 716.235457] ? copy_mount_string+0x40/0x40 [ 716.239683] ? check_same_owner+0x320/0x320 [ 716.244001] ? __check_object_size+0x8b/0x530 [ 716.248491] ? __might_sleep+0x95/0x190 [ 716.252466] ? kasan_check_write+0x14/0x20 [ 716.256695] ? _copy_from_user+0x99/0x110 [ 716.260839] ? memdup_user+0x5e/0x90 [ 716.264547] ? copy_mount_options+0x1f7/0x2e0 [ 716.269037] SyS_mount+0xab/0x120 [ 716.272482] ? copy_mnt_ns+0xb30/0xb30 2018/03/31 11:16:51 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 716.276364] do_syscall_64+0x281/0x940 [ 716.280247] ? vmalloc_sync_all+0x30/0x30 [ 716.284389] ? _raw_spin_unlock_irq+0x27/0x70 [ 716.288879] ? finish_task_switch+0x1c1/0x7e0 [ 716.293370] ? syscall_return_slowpath+0x550/0x550 [ 716.298292] ? syscall_return_slowpath+0x2ac/0x550 [ 716.303216] ? prepare_exit_to_usermode+0x350/0x350 [ 716.308230] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 716.313588] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 716.318429] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 716.323609] RIP: 0033:0x454e79 [ 716.326785] RSP: 002b:00007ff701201c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 716.334486] RAX: ffffffffffffffda RBX: 00007ff7012026d4 RCX: 0000000000454e79 [ 716.341749] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 00000000200007c0 [ 716.349008] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 716.356265] R10: 000000000080c400 R11: 0000000000000246 R12: 0000000000000014 [ 716.363526] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000010 [ 716.374924] device bridge0 left promiscuous mode [ 716.379855] device bridge0 left promiscuous mode [ 716.384701] device bridge0 left promiscuous mode [ 716.389867] device bridge0 left promiscuous mode 2018/03/31 11:16:52 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x0, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:52 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) r2 = creat(&(0x7f00000004c0)='./file0\x00', 0x4) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000540)=0x9, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0xfcac) r3 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000002c0)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000029c0)) r6 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000005f00)) ptrace$getregset(0x4204, r5, 0x203, &(0x7f0000000280)={&(0x7f00000001c0)=""/117, 0x75}) r7 = accept4(r3, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r7, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x101000, 0x104) getsockopt$inet_dccp_int(r7, 0x21, 0x10, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000080)={'bcsf0\x00', r4}) sendto(r7, &(0x7f0000000640)="834d750af0e54513f56a415af97606961b75bf0fac1d7500fac90f9ee517c51b0089f653cc13e7d4b807cf1a0159cf7ee4121f67ccdc7c53229c71e8dc14bfef601f0dededc3276e18a57b84769808f6c96d5e301deba76605e86703859f263b5803cc4085c59fbfc7b4c598d61a96016248e093d2dc4fea9d4a2d42ef17bcc1e9295fdfa9b02808a8bb92d0fc426a0b2cfecffd3c9a6e913ed70c5f37f0c3af00113c1383b9dab094dc4aeff241dfc0ac15c53603246ab7f47d1a48e21464631025a861fdd2eba1e244b09bc85c9f999fbdc962303c16", 0xd7, 0x80, 0x0, 0x0) r8 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000500)=0x80, 0x800) ioctl$sock_bt_hidp_HIDPCONNADD(r8, 0x400448c8, &(0x7f0000000840)={0xffffffffffffffff, r6, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x0, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c284361"}) ioctl$VHOST_RESET_OWNER(r2, 0xaf02, 0x0) write(r3, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e", 0x60) 2018/03/31 11:16:52 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r3 = socket$kcm(0x29, 0x0, 0x0) writev(r3, &(0x7f00000001c0)=[{&(0x7f0000000280)="1df41c9fe84d5adfa20ebfbbc5e819a906a431a7ed90a815e22d79f256452fd86410ec064f0275490881a3b3c2e738d7f31827fdf2dd34946c1664e758d664107ddbcf1051047c780b7c52fa277a4082eb7562d826210a1c4383d6ffb6a607a80464a3a92554d80b5c3c61f74fa3d7863974e68d123651ac6c1ac8ee8e063cb0fd3748", 0x83}, {&(0x7f0000001240)="8023a177f4a30b9848ea802caea1e3b75958b3219b1d2cc341a6e188eb089857cd892d8d836abe5b20d9a07024eec795966d1a2dbca8f68567ce7913fe3d29dd35640a219c7b8c1e565c12fe2a0d80bb9172ac84add63e9c86dff0d4ecb74e2e9cacf20754d536355f872ec9f76b36ca49d7245e83d548b3d8ebdb9665a04848f0f4bd401ea326688714b92eb85eec9eda3597b1dbbb1ffb37b1ec6fc6db8594614fb6f752ffe5813c946c008b5f1888ce687139070f9d8e9855b7fe7cf7075d6d962e101aa864fe963871d684d7f1ffc9fc2d8e5b41e83b989328f9f191336fae3ebe3c8aea5d2767ff9359d2b8bb9d6ca6e328c9267ecc07bc592ea7703022e75b2f3c5e245b4fe92b2ec3d9d9d78505af5aabc46491aae53a913220126bd5877aa9a55deacb55e57ba43cad04788bc79feef902cdfa5684e8165086f21ee580c9908473f9fda6d7aaf764dbbb60bfd2e95b548c257ce8745941b60f48823e664a496c8b265e28f3c775e68a5c42075e63d1df5bd64eb72645ad24b44c68bca0ea24fb3084f16337a74a1cb2cd870881c9f1aad92dac5ce8e7c0b5f99cef4f73335786d10e0a0422c095ad2da2d952c71210007dc4bf793dfd6311a70ea100fa4fc8fc9d9ce30ec679aa98917679a24cfd6ae13c028fb73f195566f223bf3e59a89e3c4d1607d055419acc2a997fc418c321ecb67c41a3573f64a346d907bd12b6ae64cc7ce86505dfb07156a4620e577bc846a1457d32b3faa80993e92adc017ebad6fdbe8b0beb68260795f8388ddfa3bd2d7b5da1725c8d7f09e05729cd64d3fc2b5afa1d9d2d0b218a36140555372c36aa4d628804e287a82fac4ebfe0e274604ff797bec4d3f485f057f3ffdc971a6ce489b8ea9fced45061ef22b410908bf0554a1a316e91c7b6d2137be1fe29bb17e1a327095831b1bb485adbaabc6c8bea8e25664b03b9fbe6eac2795781c21fb8055d0fab91e4129482657bd075feb91965d5b3fa1e016bc65a7dddd8ead81fad4bd2e64fbcf9a2100f38d9be69970a3d8884636b16ccf9480ec4dfc29a74f15a7af76c113f8141b160a7b02de113cebb73eb9bfe7d37c440ef025f61d52583efb674690b81bbbdde2c685e01d0a5858be2ef0544136a25d02de184e9f3d82f0c1518e6fa249f13611899c968e6cc9de04717d8850872efe752c19cf4967347fcc552d9c72559863ac8fb6736ecb0676995cfa8b1722f114b810884d3c58f3d1f25b48942a4ff6527a502c3c8875641bfc9cf550dcf1b7311fe6567ae7caf7e84f3224570b656a7173cc5316162c8ba408bdaa1cde10328159704bb9b7ca6c8e076b4a24fc05cfbb1f63345b8bdcb0b8b442bbb379e5859f91edea7822ed9d099753b236b2163af8f7ba7e69a79d4fc1adecfc349876444bfc2dcbfe23f3388b417b630c054fd8caf41aab42e35cecb772c88017133ff17efde028002f4f324ce3837aa153b7a9bd6e7fda35f5c25ee808d525777d1fb655670a2e2014ecd0f67c8e57ebc832dc08bc351a0c3439c766b5a2c1fb6506639df8bb1198d81aaed8a97c4587bdc47d6922e2bc859074c22acc8423b3ecd0509f8916d5e758e6878ad0bdb4cda656cd71ade6b3260d54349131de440952d0c256cbd9e3a51a72b146e3b2771c86a5d9b7cf2558e35124fabaadfed40e39dc278324e50ca87998eff658ded63a6b069ab57c2e5c39b7ef10618d80e726622b4e1eb09e932224fd737f015fc165b0673a9bbe84193b713baca25e48f6d92fde91a82a3f689e5c335ecddbe05d91b7a381f8d199e877c4fcb1d17da7d0134794fe47771bb0235f05586d0d53b339256459499545ad3f601ae0d89a4ec32c916a741f654c4d68d387bd23a5273a21471740c758e4a604c98590b98eb2b5194887d76cf50a2133b3734f6f062c73d5f38911799873bdffaa14f65607632c3d6b3a087c5958d8d9e7f8b3cd820324dbcfa8ae33661ef6f2e1a14f45b9c111f60458a3c05fb6255263804505f2c03df6434406d3d068607211d450b5c8514ac793a5944ed3d8e4a25a85a4b70fcb8b4653c24fc412db587b73800f89434359fd5d5c1b42d5f46b9882bbb102ccc6150166688dc87edcdb1ba78909701c06a0ae6767985a72050f00f67913fbd4829ff24e9a5005647d458ebae7e7578b860d2bb1ea24eb791d439042217ac94cb7ccdc1907501daaab774c001fce1cafc9173d2ebb03eb278fcdd01cfd14882c5c858532dc637bc9d3a5e50623495b00915bc2978b533cf514e2ca07f210d224e1ceba692152cb87a04d1490902ac22796438715e5080f69c073ed4edc61e9e982047fe514e776fc338ece9c36d0bc92b78a91fb75fe053d843f0bdfc297bbc411bcea28e051600569c2698c3af70aa8b4bba2fcb6d20f9ef1f1488cc0ad0a221de8f89c111ec721806e85271ca0713b237f7826b461c8eae8c2a151fb0ae036f81100441addc929892a78ecc75ce2e110cf77e228bf59925281e59e58dfed2283133744311f577fdaf85035f123b1eab880c9ce661d74ea7125bf17aade302651b068224cafa109c5470b7f5292f84a33de3ef7672600ac3ddd9c49839edf6c612ec7a45946b27f40bb4f0bb9af72c11325a553c4748dab3272022854e1253b6e331366298434c6dd9cb7b6b9d38e7a04f5065f5778d9e747c3ac29e90d3825eadf68eb7f2e9d4506ffe4083fb4fc38bcaea5ea69344cb3399c6246496a85e3ccd8c1b93c3d56f9d3990891607c167e893b0571f04d566a269d85dcdb9a0d272c9abf3c0e207a735cf19b5d8316b46d5e4b5432949d681ffa5a567ddaea2284500f3f20c4e7d7d7d1dbb4429130c4a148fe2558f7eb2d7f5edb9df931dd4fb32f0712bbe90c9fb1f2d4a3b9ff1e984e6d4ab6dce88ff330547d52e5daa8338d760ee49c1e3a305042fc993f17242183805f1db44d8f75a5755dd9b730656fce6f454497753f94ed7759752542f3aae61d0f863f3cb3c8c78e41b1b82fb573f56115743fa3d9e90af0b12cea0fac7cab4889e50d9b04fd421a7dded93183203646d11e1daf6513755e83c3bbe805acf13d27fe13ef5a562d12e71cd11cb7e158be31e1725dd50e20592e92959fa46b173f8f705d1c69227becad90faa242a1083d439426c4bbd4f6b74b3e1607adc1937aa3a094440d9a3af74a3077cf6d003671de30792a1b89abaec8f68d5e978cea0ef1fab52eda255c16edbb76ea5d04e66e231705ba57e08741b867c8f04c85f47ec203c99df8ab91b34b5164670930b63765d6d7ebbfb1739ed9a47f865be366fcfe25a90dd7151912e44e9449f75b29a49093388206b90edfee4aa1041346709dd7277d56cec1f77f5cf7cdf530263e094453c75e942393bfee77a2ebe1902c863ae3da5d28c45a30bfc8c7c84fd2ce6ba0bc21ad3c1ec29925fd317c29cd541485d88533b0115152facd474ac7621e2004cc576aa1d9a6e851e2d6709f79047e5395b5e6db8030926b46f786b4efd95a42f5a9d14130000894545ace20ccb5fd4392fbafae931cca536517133fc3bc62d39f1fc2d152a13adb42602cbb95bce517c899ad76cec338111f4ff7d47b49b2d0bb26f275c408e51f8f2bf300cb8e1163a5175300c21724c7954362fd63a28f2e0e11fa186bf8834ea8d48b1b669ef19ba87b7553cfabdde5578f59b8d043663c1eea80e5bef6f4c736efc51ea8a417c9e99b13bf8617ea6de78c7e53c66587a0931079e680c4cc2316f6dc9d8e9388b0213c4741c4781102c4525b1f6f162b7ac6f2148d890746c9feeffbf9d3632d795509b122d1942072dd2d96dbf83ca9591d5db4d8ad88aac820104af5ad7f2db634090b236957e89a1a028bf494da19e293499fdfe670f1cf5556a3f35028634f4080bece934a8dd76d85ddfe5703971b514250b323f1a09e0f5d1cc030f0e460f78e7a290e658847bc5f281e0453fed69a167eab9727e1daa6aee462fbbad9332dc78014e1a0a6861a216ea40908d1a59a69d32807795252ed9ce13490ee463fc2422f84535332c3c668419b51e86d2204c296feff7e74c472a616d692df4560e13dc4b631d5e4a04e214cda0516d73edfa3f30446c7c05236e7c8f45835378b6a3119158834001d877df01d43c6096f981cebf8c56351b5824aae4e765c144113d4d929a6abeb956e48e7572387f3c0a1e7006a21b1827b13e140ed4c8603d0c6642c86d01ce5a29625507133a6c3717d929d2eb72936604cf5e42c212b04fdcce062542a1730ca972da686c1bbc92f70fdbccd912c707b18d9bfab427b896fa09502720476fc6de55a148ede60f5a0c8522043dfe6c77b1e3cfe911282a7849c70f20eec398338c22d63d43c55fdcedcff18c024ea450ad0e8422b5a064c74a13a187644d1ccb77a00dcb4e103b1e54f852372258e2e7533f313e75836f035cbb23955c2378f94146a8a922055b00087d3a398cf26e563dc41220868167a7c4632b4c52b6b9f5595a9d53c96e763459d5449751e0b82a8f2128966bc4551a1eb0d70bba4a348a934dc037e91ec88233ba4ba88209b73228523579ffb3b51ed5bc5a686720c1f79f782351742c426a6f1405aad4b9c400ca972c2ef04cc66e4bdc4d451a6c82bfab2a80553324c95dbefd17dfb5b70e12faa831789e9ef352e2922109e61b19f4da8afa5a7d7fbc4a6cd657daffabf4f2c8e205fc20dfc1739a9c37589abc880d17d9a21837b2c754ade2c40d88fddf8e88f6620c40c9f954e5f8bcdac0aa2c1a290bed6a93ef121adc6f1ed3c77e56fdc1496c10da5d564a963b9be31e7bdc5dad45c01283b471d8a4c4a6dd07da4023642f8cd864cf998ddd817f8954975ad0f953ae53b0139cc04e6296abc3e7dbe7cf286de761aed172597bcd89cc840df490133adeb4f29776664720c603a2977cb5f5bb2a65de74d7950f06afc5e054bb143c20d6ca6c27a31814ed9ed5e425e5651c0868d5c8a5f80d80a65d2e15bb9c77a999006a50e2bff0199cda9b5088dbe4560f68baf469db9b0b90b149747064f6891da4b01edafd715299c324fe42cb33ee98cf22debcc9b1ae9ec4dcce051e541ee918368c17d94cc46f22ca2d228cdd761b642ae801a423b30807aefb098800635ece27fd5bf163c0c595ed87b2dda8c505a2914c860c242c963f1a36453452629159f7eab763cfb940d8e18bf28e407c2fd13bae2dbaa0b4e494a09f0ecd463a6dd09dc4ac865dce0d82d7f8e808de7e7664f314dae6d4efe9faf8e0b35387dcf3bcf79dcc256bacb3f0e2af6c6033c251b06224f5f3318adc7cea7b9bd8c35e9edd30c0de7d55d04892a23437917f265ca6583214ec0643603f548fda7e3f0370d1d64bfdfece5217f73ee6404bbea04004c5c06a0170c7255724d0da1c28a58df88783779d95e7b412ba00a798b72c031d57663dafbacbbb01e3e6f5e243573f0dfb65482cddb759737ea0cecfb6804cda64fcfb62b69a098a8f4dedceb75ecb4f89f446c0a13a93bdbebd0d043132dbfd6c1b4f3d8485caacb1077c8c68a32082214e96f2e37b0796ea0f280d17575eb139b85e52ff0711da9569990a67e39567840202da9d65c16c917f2e97c4a846ad999719917f1aa9ce2c04131113cbe90a53052fb656f2c2b0794ede749cf4edce194ee76361078fd26bbe0d1aa6f4d5d464d3fc9ab8d867e4572b9fff08503603adc94ebbffd5599c2afd0430e52e790cb9f4f2624e9def24273077a9a7adead180a8bd567a9cdbe47c4bdbd05ef97ef5f75c37d148908d28f9bb4d9011e4d0", 0x1000}], 0x2) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r4 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r4, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r5 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r5, 0x400448c8, &(0x7f0000000840)={r4, r3, 0xffffffffffffff52, 0x1, &(0x7f00000006c0)="e411b82d239f02360b33ab01086a0910f47bfaaa10d5cb1dd0d5e6120a061bee3a5045c09ff7eb5a798d477b3db7121ae6a2193d00a22c1d20a716d6fb8def52aaf549d2", 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:52 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) r3 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x765, 0x2000) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000280)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r4 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r5 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r5, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r6 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r6, 0x400448c8, &(0x7f0000000840)={r5, r4, 0xffffffffffffff52, 0x1, &(0x7f00000006c0)="e411b82d239f02360b33ab01086a0910f47bfaaa10d5cb1dd0d5e6120a061bee3a5045c09ff7eb5a798d477b3db7121ae6a2193d00a22c1d20a716d6fb8def52aaf549d2", 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r6, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:52 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r3 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r4 = accept4(0xffffffffffffffff, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) r5 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r5, 0x400448c8, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYRES32=r3, @ANYBLOB="52ea010023000000f29b4bec90453dbc0f193b2757defe40a6e3", @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYBLOB], @ANYBLOB="000101000000000001000000060000008cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223"]) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a8aa852b8e27cc4bed332dce5509fd49b6bd003f5b909778d20c97eda3326371d0d383e1c5f6e3fc2f5e61c4ce6b047104b3f22820012533d5e52a704f1faa5bb4478a0c58345f1aa8bbf1e7fd008c4", 0xfffffffffffffe9e) 2018/03/31 11:16:52 executing program 7: r0 = socket$packet(0x11, 0x20000000000, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f00004c0000)={0xa, 0x3, 0x0, @ipv4={[], [0xff, 0xff]}, 0x9}, 0xffffffffffffff92) listen(r2, 0x43) r3 = accept(r2, &(0x7f0000000000)=@rc, &(0x7f0000000040)=0xa) shutdown(r2, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r4, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x6) r5 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000003c0)=0xfffffffffffffe66) getgid() getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000280)) r6 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000002c0)) r7 = accept4(r5, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) r8 = semget$private(0x0, 0x0, 0x8) semtimedop(r8, &(0x7f00000001c0)=[{0x4, 0x2, 0x1800}, {0x3}, {0x1, 0x8, 0x800}, {0x0, 0x100000001, 0x1000}, {0x1, 0x8, 0x1000}], 0x5, &(0x7f0000000200)) setsockopt$ipx_IPX_TYPE(r7, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) 2018/03/31 11:16:52 executing program 3 (fault-call:2 fault-nth:17): open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f00000006c0), 0x33040, &(0x7f00000006c0)=ANY=[]) mount(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='xfs\x00', 0x80c400, 0x0) 2018/03/31 11:16:52 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f0000a8bfff)=""/1, 0x805031ae) r2 = dup3(r0, r1, 0x80000) ioctl$EVIOCGKEYCODE_V2(r2, 0x80284504, &(0x7f0000000380)=""/139) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)) ioctl$TCXONC(r1, 0x540a, 0x3) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000180)) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x4000, 0x0) semget$private(0x0, 0x7, 0x0) syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x3400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x34, r4, 0x0, 0x0, 0x25dfdbfb, {0x9}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x54}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x200}]}, 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x4040014) getsockopt$llc_int(r3, 0x10c, 0x0, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 2018/03/31 11:16:52 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x0, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 717.140865] device bridge0 entered promiscuous mode [ 717.146345] device bridge0 entered promiscuous mode [ 717.155565] device bridge0 entered promiscuous mode [ 717.156630] FAULT_INJECTION: forcing a failure. [ 717.156630] name failslab, interval 1, probability 0, space 0, times 0 [ 717.167348] device bridge0 entered promiscuous mode [ 717.171863] CPU: 0 PID: 16738 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #8 [ 717.171872] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 717.171875] Call Trace: [ 717.171891] dump_stack+0x194/0x24d [ 717.171905] ? arch_local_irq_restore+0x53/0x53 [ 717.171914] ? __save_stack_trace+0x7e/0xd0 [ 717.171930] should_fail+0x8c0/0xa40 [ 717.212260] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 717.217368] ? kasan_kmalloc+0xad/0xe0 [ 717.221252] ? kmem_cache_alloc_trace+0x136/0x740 [ 717.226107] ? __memcg_init_list_lru_node+0x169/0x270 [ 717.231290] ? __list_lru_init+0x544/0x750 [ 717.235519] ? sget_userns+0x691/0xe40 [ 717.239403] ? mount_fs+0x66/0x2d0 [ 717.242935] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 717.247684] ? do_mount+0xea4/0x2bb0 [ 717.251388] ? SyS_mount+0xab/0x120 [ 717.255004] ? do_syscall_64+0x281/0x940 [ 717.259064] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 717.264424] ? find_held_lock+0x35/0x1d0 [ 717.268482] ? __lock_is_held+0xb6/0x140 [ 717.272544] ? check_same_owner+0x320/0x320 [ 717.276861] ? rcu_note_context_switch+0x710/0x710 [ 717.281788] should_failslab+0xec/0x120 [ 717.285753] kmem_cache_alloc_trace+0x4b/0x740 2018/03/31 11:16:52 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x0, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="e3b40600ffffffff0400f0ff0000fafffb0e41da189c304034954b00a7172d5e6dc38f66721366162882a4b0446dab26cec9fe84f07c159cf49afd24cace5f89fb796dcf6b63f8c34f74923a544e4b9117efca7fcf0d58ef9782471fc22b1cd4d176eb466033081f5586965779409edd2110c47c593b483c5ced0bc800e7845f453818e2132c03ad73f4deb06e463de7bfeeaa6d5b35bb64800f5b11638eabab477af9deec6901ecddc340c4159fd55e378eec26aa4ad929b91e15017c9e7349a2d6a972cc7d757062c059dbbe5ca8ade65bb423aa45b1ba0f5c01a9997f104ae8b1530200b507d4c8db246a7375c203cd2961957b180236e6ee9ba5d55fae5a254bf7bbcd948f625d4bfd8a2231bf9b7c5f0000000000"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:52 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x0, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="e3b40600ffffffff0400f0ff0000fafffb0e41da189c304034954b00a7172d5e6dc38f66721366162882a4b0446dab26cec9fe84f07c159cf49afd24cace5f89fb796dcf6b63f8c34f74923a544e4b9117efca7fcf0d58ef9782471fc22b1cd4d176eb466033081f5586965779409edd2110c47c593b483c5ced0bc800e7845f453818e2132c03ad73f4deb06e463de7bfeeaa6d5b35bb64800f5b11638eabab477af9deec6901ecddc340c4159fd55e378eec26aa4ad929b91e15017c9e7349a2d6a972cc7d757062c059dbbe5ca8ade65bb423aa45b1ba0f5c01a9997f104ae8b1530200b507d4c8db246a7375c203cd2961957b180236e6ee9ba5d55fae5a254bf7bbcd948f625d4bfd8a2231bf9b7c5f0000000000"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:52 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x0, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 717.290326] ? __kmalloc_node+0x33/0x70 [ 717.294292] ? __kmalloc_node+0x33/0x70 [ 717.298258] ? rcu_read_lock_sched_held+0x108/0x120 [ 717.303274] __memcg_init_list_lru_node+0x169/0x270 [ 717.308286] ? list_lru_add+0x7c0/0x7c0 [ 717.312251] ? __kmalloc_node+0x47/0x70 [ 717.316220] __list_lru_init+0x544/0x750 [ 717.320279] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 717.326158] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 717.331171] ? __lockdep_init_map+0xe4/0x650 [ 717.335577] ? lockdep_init_map+0x9/0x10 2018/03/31 11:16:52 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x0, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:52 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 717.339631] sget_userns+0x691/0xe40 [ 717.343338] ? kill_litter_super+0x90/0x90 [ 717.347567] ? ns_test_super+0x50/0x50 [ 717.351449] ? destroy_unused_super.part.6+0xd0/0xd0 [ 717.356544] ? do_raw_spin_trylock+0x190/0x190 [ 717.361124] ? kobject_put+0x6b/0x250 [ 717.364918] ? blkdev_get+0x3a1/0xb00 [ 717.368709] ? cap_capable+0x1b5/0x230 [ 717.372586] ? __blkdev_get+0x13b0/0x13b0 [ 717.376727] ? security_capable+0x8e/0xc0 [ 717.380868] ? kill_litter_super+0x90/0x90 [ 717.385104] ? ns_capable_common+0xcf/0x160 2018/03/31 11:16:52 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="e3b40600ffffffff0400f0ff0000fafffb0e41da189c304034954b00a7172d5e6dc38f66721366162882a4b0446dab26cec9fe84f07c159cf49afd24cace5f89fb796dcf6b63f8c34f74923a544e4b9117efca7fcf0d58ef9782471fc22b1cd4d176eb466033081f5586965779409edd2110c47c593b483c5ced0bc800e7845f453818e2132c03ad73f4deb06e463de7bfeeaa6d5b35bb64800f5b11638eabab477af9deec6901ecddc340c4159fd55e378eec26aa4ad929b91e15017c9e7349a2d6a972cc7d757062c059dbbe5ca8ade65bb423aa45b1ba0f5c01a9997f104ae8b1530200b507d4c8db246a7375c203cd2961957b180236e6ee9ba5d55fae5a254bf7bbcd948f625d4bfd8a2231bf9b7c5f0000000000"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:52 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 717.389425] ? ns_test_super+0x50/0x50 [ 717.393307] ? kill_litter_super+0x90/0x90 [ 717.397532] sget+0xd2/0x120 [ 717.400541] mount_bdev+0x109/0x370 [ 717.404168] ? xfs_test_remount_options.isra.19+0x90/0x90 [ 717.409700] xfs_fs_mount+0x34/0x40 [ 717.413321] mount_fs+0x66/0x2d0 [ 717.416685] vfs_kern_mount.part.26+0xc6/0x4a0 [ 717.421260] ? may_umount+0xa0/0xa0 [ 717.424879] ? _raw_read_unlock+0x22/0x30 [ 717.429015] ? __get_fs_type+0x8a/0xc0 [ 717.432905] do_mount+0xea4/0x2bb0 [ 717.436441] ? __might_fault+0x110/0x1d0 [ 717.440497] ? copy_mount_string+0x40/0x40 [ 717.444723] ? check_same_owner+0x320/0x320 [ 717.449043] ? __check_object_size+0x8b/0x530 [ 717.453537] ? __might_sleep+0x95/0x190 [ 717.457497] ? kasan_check_write+0x14/0x20 [ 717.461705] ? _copy_from_user+0x99/0x110 [ 717.465828] ? memdup_user+0x5e/0x90 [ 717.469514] ? copy_mount_options+0x1f7/0x2e0 [ 717.473986] SyS_mount+0xab/0x120 [ 717.477414] ? copy_mnt_ns+0xb30/0xb30 [ 717.481276] do_syscall_64+0x281/0x940 [ 717.485138] ? vmalloc_sync_all+0x30/0x30 [ 717.489263] ? _raw_spin_unlock_irq+0x27/0x70 [ 717.493730] ? finish_task_switch+0x1c1/0x7e0 [ 717.498198] ? syscall_return_slowpath+0x550/0x550 [ 717.503109] ? syscall_return_slowpath+0x2ac/0x550 [ 717.508016] ? prepare_exit_to_usermode+0x350/0x350 [ 717.513024] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 717.518375] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 717.523219] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 717.528386] RIP: 0033:0x454e79 [ 717.531561] RSP: 002b:00007ff701201c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 717.539242] RAX: ffffffffffffffda RBX: 00007ff7012026d4 RCX: 0000000000454e79 [ 717.546493] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 00000000200007c0 [ 717.553743] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 717.560992] R10: 000000000080c400 R11: 0000000000000246 R12: 0000000000000014 [ 717.568257] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000011 [ 717.588935] device bridge0 left promiscuous mode [ 717.593885] device bridge0 left promiscuous mode [ 717.598786] device bridge0 left promiscuous mode [ 717.603734] device bridge0 left promiscuous mode 2018/03/31 11:16:53 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f0212"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:53 executing program 3 (fault-call:2 fault-nth:18): open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f00000006c0), 0x33040, &(0x7f00000006c0)=ANY=[]) mount(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='xfs\x00', 0x80c400, 0x0) 2018/03/31 11:16:53 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)=0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x10000, 0x0) connect$bt_sco(r4, &(0x7f0000000280)={0x1f, {0x5b65, 0x6b, 0x0, 0x80, 0x6}}, 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) ioctl$sock_SIOCSPGRP(r5, 0x8902, &(0x7f00000001c0)=r3) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0)="e411b82d239f02360b33ab01086a0910f47bfaaa10d5cb1dd0d5e6120a061bee3a5045c09ff7eb5a798d477b3db7121ae6a2193d00a22c1d20a716d6fb8def52aaf549d2", 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:53 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) socketpair(0xd, 0x5, 0x7f, &(0x7f0000000340)={0xffffffffffffffff}) ioctl$VHOST_VSOCK_SET_GUEST_CID(r3, 0x4008af60, &(0x7f00000004c0)={@reserved=0x1}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r4 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYBLOB="a1000000154da772250288926fa187e40ff2d7a1e4179dbe204cd3e04b5e9fb9646a3e46dbf32e7e7646e561348f3366e674581d10da307df0d70801000000e18abcd6bb08340525580a76c0d5d89d6e42ba43537e2e06bd8448411de718f49d612f1554cd12d8987bccfd61b9e3771584dfb9c44f06fd5f3d31d4ed593bdab563dc2e67e1a785cf75c7e92b5bb1088467d7226574cef53d8dae7592979db4fa27b626f112"], &(0x7f0000000040)=0xa9) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000001c0)={r5, 0x7}, &(0x7f0000000200)=0x8) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={0xffffffffffffffff, r4, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x0, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c284361"}) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e", 0x60) 2018/03/31 11:16:53 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r3 = socket$kcm(0x29, 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f0000000200)=0x1, 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000180)) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x101002, 0x0) ioctl$KVM_GET_SREGS(r5, 0x8138ae83, &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(0xffffffffffffffff, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)=ANY=[@ANYRES32=r6, @ANYRES32=r3, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYBLOB], @ANYBLOB="000101000000000001000000060000008cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223"]) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a8aa852b8e27cc4bed332dce5509fd49b6bd003f5b909778d20c97eda3326371d0d383e1c5f6e3fc2f5e61c4ce6b047104b3f22820012533d5e52a704f1faa5bb4478a0c58345f1aa8bbf1e7fd008c4", 0xc4) 2018/03/31 11:16:53 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r3 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r4 = syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x8, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f0000000200)=@assoc_value={0x0, 0x4}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r4, 0x84, 0x77, &(0x7f00000002c0)={r5, 0x7e, 0xa, [0x8001, 0x1, 0x2, 0xff, 0x4, 0x7, 0x7, 0xd29b, 0x1f, 0x8000]}, &(0x7f0000000300)=0x1c) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r3, 0xffffffffffffff52, 0x1, &(0x7f00000006c0)="e411b82d239f02360b33ab01086a0910f47bfaaa10d5cb1dd0d5e6120a061bee3a5045c09ff7eb5a798d477b3db7121ae6a2193d00a22c1d20a716d6fb8def52aaf549d2", 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000ac0)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:53 executing program 7 (fault-call:0 fault-nth:0): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000180)={[{@session={'session', 0x3d, [0x34, 0x0]}, 0x2c}]}) 2018/03/31 11:16:53 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f0000a8bfff)=""/1, 0x805031ae) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)=0x1) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000380)="ce0cfb68826e2d609b0415a63f5e165e", 0x10) ioctl$TCXONC(r1, 0x540a, 0x3) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000180)) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x4000, 0x0) semget$private(0x0, 0x7, 0x0) syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x3400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000100)=ANY=[@ANYBLOB="340000000cc353dacbe8d2aa81674a22249f7f9938865496e2bda4168c5060d0711693d23ae78d870b06cf9a30f2114b7669ae4ac8d831", @ANYRES16=r4, @ANYBLOB="000000000000fbdbdf25090000000700000000000000080005005400000008000500000000000800050000020000"], 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x4040014) getsockopt$llc_int(r3, 0x10c, 0x0, &(0x7f0000000040), &(0x7f00000000c0)=0x4) [ 718.198545] device bridge0 entered promiscuous mode [ 718.206610] device bridge0 entered promiscuous mode [ 718.212221] device bridge0 entered promiscuous mode [ 718.223645] device bridge0 entered promiscuous mode [ 718.229482] FAULT_INJECTION: forcing a failure. [ 718.229482] name failslab, interval 1, probability 0, space 0, times 0 [ 718.240777] CPU: 1 PID: 16801 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #8 [ 718.247957] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 718.257303] Call Trace: [ 718.259892] dump_stack+0x194/0x24d [ 718.263518] ? arch_local_irq_restore+0x53/0x53 [ 718.268185] ? lock_downgrade+0x980/0x980 [ 718.272332] should_fail+0x8c0/0xa40 [ 718.276045] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 718.281143] ? __f_unlock_pos+0x19/0x20 [ 718.285113] ? lock_downgrade+0x980/0x980 [ 718.289253] ? get_pid_task+0xbc/0x140 [ 718.293136] ? proc_fail_nth_write+0x9b/0x1d0 [ 718.297635] ? find_held_lock+0x35/0x1d0 [ 718.301704] ? check_same_owner+0x320/0x320 [ 718.306022] ? rcu_note_context_switch+0x710/0x710 [ 718.310952] should_failslab+0xec/0x120 [ 718.314920] __kmalloc+0x63/0x760 [ 718.318370] ? strncpy_from_user+0x430/0x430 [ 718.322769] ? __sb_end_write+0xa0/0xd0 [ 718.326744] ? SyS_memfd_create+0xca/0x4c0 [ 718.330984] SyS_memfd_create+0xca/0x4c0 [ 718.335041] ? memfd_fcntl+0x1240/0x1240 [ 718.339100] ? do_syscall_64+0xb7/0x940 [ 718.343071] ? memfd_fcntl+0x1240/0x1240 2018/03/31 11:16:53 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f0212"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:53 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f0212"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:53 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:53 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 718.347133] do_syscall_64+0x281/0x940 [ 718.351189] ? vmalloc_sync_all+0x30/0x30 [ 718.355340] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 718.360871] ? syscall_return_slowpath+0x550/0x550 [ 718.365795] ? syscall_return_slowpath+0x2ac/0x550 [ 718.370726] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 718.376086] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 718.380933] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 718.386116] RIP: 0033:0x454e79 [ 718.389294] RSP: 002b:00007f2fe9255bb8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 2018/03/31 11:16:53 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 718.397007] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000454e79 [ 718.404269] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004b9c15 [ 718.411537] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 718.418800] R10: 0000000020000100 R11: 0000000000000246 R12: 0000000000000013 [ 718.426059] R13: 0000000000000668 R14: 00000000006fba60 R15: 0000000000000000 [ 718.440177] device bridge0 left promiscuous mode 2018/03/31 11:16:53 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 718.447434] device bridge0 left promiscuous mode [ 718.455249] FAULT_INJECTION: forcing a failure. [ 718.455249] name failslab, interval 1, probability 0, space 0, times 0 [ 718.460798] device bridge0 left promiscuous mode [ 718.466519] CPU: 1 PID: 16797 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #8 [ 718.478398] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 718.487546] device bridge0 left promiscuous mode [ 718.487823] Call Trace: [ 718.487842] dump_stack+0x194/0x24d 2018/03/31 11:16:53 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:53 executing program 7 (fault-call:0 fault-nth:1): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000180)={[{@session={'session', 0x3d, [0x34, 0x0]}, 0x2c}]}) [ 718.487858] ? arch_local_irq_restore+0x53/0x53 [ 718.487870] ? __save_stack_trace+0x7e/0xd0 [ 718.487887] should_fail+0x8c0/0xa40 [ 718.511451] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 718.516555] ? kasan_kmalloc+0xad/0xe0 [ 718.520452] ? kmem_cache_alloc_trace+0x136/0x740 [ 718.525293] ? __memcg_init_list_lru_node+0x169/0x270 [ 718.530261] FAULT_INJECTION: forcing a failure. [ 718.530261] name failslab, interval 1, probability 0, space 0, times 0 [ 718.530475] ? __list_lru_init+0x544/0x750 [ 718.530486] ? sget_userns+0x691/0xe40 [ 718.530497] ? mount_fs+0x66/0x2d0 [ 718.530510] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 718.530518] ? do_mount+0xea4/0x2bb0 [ 718.530530] ? SyS_mount+0xab/0x120 [ 718.565296] ? do_syscall_64+0x281/0x940 [ 718.569342] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 718.574689] ? find_held_lock+0x35/0x1d0 [ 718.578731] ? __lock_is_held+0xb6/0x140 [ 718.582781] ? check_same_owner+0x320/0x320 [ 718.587083] ? rcu_note_context_switch+0x710/0x710 [ 718.591998] should_failslab+0xec/0x120 [ 718.595953] kmem_cache_alloc_trace+0x4b/0x740 [ 718.600515] ? __kmalloc_node+0x33/0x70 [ 718.604469] ? __kmalloc_node+0x33/0x70 [ 718.608423] ? rcu_read_lock_sched_held+0x108/0x120 [ 718.613423] __memcg_init_list_lru_node+0x169/0x270 [ 718.618423] ? list_lru_add+0x7c0/0x7c0 [ 718.622384] ? __kmalloc_node+0x47/0x70 [ 718.626344] __list_lru_init+0x544/0x750 [ 718.630385] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 718.636249] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 718.641248] ? __lockdep_init_map+0xe4/0x650 [ 718.645636] ? lockdep_init_map+0x9/0x10 [ 718.649677] sget_userns+0x691/0xe40 [ 718.653367] ? kill_litter_super+0x90/0x90 [ 718.657583] ? ns_test_super+0x50/0x50 [ 718.661461] ? destroy_unused_super.part.6+0xd0/0xd0 [ 718.666540] ? do_raw_spin_trylock+0x190/0x190 [ 718.671106] ? kobject_put+0x6b/0x250 [ 718.674893] ? blkdev_get+0x3a1/0xb00 [ 718.678678] ? cap_capable+0x1b5/0x230 [ 718.682542] ? __blkdev_get+0x13b0/0x13b0 [ 718.686671] ? security_capable+0x8e/0xc0 [ 718.690801] ? kill_litter_super+0x90/0x90 [ 718.695019] ? ns_capable_common+0xcf/0x160 [ 718.699320] ? ns_test_super+0x50/0x50 [ 718.703184] ? kill_litter_super+0x90/0x90 [ 718.707398] sget+0xd2/0x120 [ 718.710403] mount_bdev+0x109/0x370 [ 718.714014] ? xfs_test_remount_options.isra.19+0x90/0x90 [ 718.719900] xfs_fs_mount+0x34/0x40 [ 718.723513] mount_fs+0x66/0x2d0 [ 718.726861] vfs_kern_mount.part.26+0xc6/0x4a0 [ 718.731429] ? may_umount+0xa0/0xa0 [ 718.735037] ? _raw_read_unlock+0x22/0x30 [ 718.739167] ? __get_fs_type+0x8a/0xc0 [ 718.743036] do_mount+0xea4/0x2bb0 [ 718.746559] ? __might_fault+0x110/0x1d0 [ 718.750599] ? copy_mount_string+0x40/0x40 [ 718.754813] ? check_same_owner+0x320/0x320 [ 718.759112] ? __check_object_size+0x8b/0x530 [ 718.763592] ? __might_sleep+0x95/0x190 [ 718.767553] ? kasan_check_write+0x14/0x20 [ 718.771768] ? _copy_from_user+0x99/0x110 [ 718.775902] ? memdup_user+0x5e/0x90 [ 718.779593] ? copy_mount_options+0x1f7/0x2e0 [ 718.784071] SyS_mount+0xab/0x120 [ 718.787501] ? copy_mnt_ns+0xb30/0xb30 [ 718.791369] do_syscall_64+0x281/0x940 [ 718.795235] ? vmalloc_sync_all+0x30/0x30 [ 718.799364] ? _raw_spin_unlock_irq+0x27/0x70 [ 718.803838] ? finish_task_switch+0x1c1/0x7e0 [ 718.808315] ? syscall_return_slowpath+0x550/0x550 [ 718.813223] ? syscall_return_slowpath+0x2ac/0x550 [ 718.818132] ? prepare_exit_to_usermode+0x350/0x350 [ 718.823132] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 718.828476] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 718.833305] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 718.838475] RIP: 0033:0x454e79 [ 718.841646] RSP: 002b:00007ff701201c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 718.849333] RAX: ffffffffffffffda RBX: 00007ff7012026d4 RCX: 0000000000454e79 [ 718.856581] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 00000000200007c0 [ 718.863828] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 718.871077] R10: 000000000080c400 R11: 0000000000000246 R12: 0000000000000014 [ 718.878325] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000012 [ 718.885587] CPU: 0 PID: 16827 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #8 2018/03/31 11:16:54 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="e3b40600ffffffff0400f0ff0000fafffb0e41da189c304034954b00a7172d5e6dc38f66721366162882a4b0446dab26cec9fe84f07c159cf49afd24cace5f89fb796dcf6b63f8c34f74923a544e4b9117efca7fcf0d58ef9782471fc22b1cd4d176eb466033081f5586965779409edd2110c47c593b483c5ced0bc800e7845f453818e2132c03ad73f4deb06e463de7bfeeaa6d5b35bb64800f5b11638eabab477af9deec6901ecddc340c4159fd55e378eec26aa4ad929b91e15017c9e7349a2d6a972cc7d757062c059dbbe5ca8ade65bb423aa45b1ba0f5c01a9997f104ae8b1530200b507d4c8db246a7375c203cd2961957b180236e6ee9ba5d55fae5a254bf7bbcd948f625d4bfd8a2231bf9b7c5f0000000000"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:54 executing program 3 (fault-call:2 fault-nth:19): open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f00000006c0), 0x33040, &(0x7f00000006c0)=ANY=[]) mount(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='xfs\x00', 0x80c400, 0x0) [ 718.893293] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 718.902645] Call Trace: [ 718.905238] dump_stack+0x194/0x24d [ 718.908867] ? arch_local_irq_restore+0x53/0x53 [ 718.913536] should_fail+0x8c0/0xa40 [ 718.917247] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 718.922345] ? find_held_lock+0x35/0x1d0 [ 718.926400] ? trace_hardirqs_off+0x10/0x10 [ 718.930714] ? find_held_lock+0x35/0x1d0 [ 718.934778] ? check_same_owner+0x320/0x320 [ 718.939095] ? rcu_note_context_switch+0x710/0x710 [ 718.944031] should_failslab+0xec/0x120 [ 718.948004] kmem_cache_alloc+0x47/0x760 [ 718.952054] ? __alloc_fd+0x29b/0x750 [ 718.955835] ? lock_downgrade+0x980/0x980 [ 718.959958] __d_alloc+0xc1/0xbd0 [ 718.963387] ? kasan_kmalloc+0xad/0xe0 [ 718.967254] ? __kmalloc+0x162/0x760 [ 718.970952] ? shrink_dcache_for_umount+0x290/0x290 [ 718.975956] ? do_raw_spin_trylock+0x190/0x190 [ 718.980519] ? __lock_is_held+0xb6/0x140 [ 718.984559] ? _raw_spin_unlock+0x22/0x30 [ 718.988683] ? __alloc_fd+0x29b/0x750 [ 718.992461] ? exit_files+0xb0/0xb0 [ 718.996072] ? __might_fault+0x110/0x1d0 [ 719.000113] ? lock_downgrade+0x980/0x980 [ 719.004241] d_alloc_pseudo+0x1d/0x30 [ 719.008030] __shmem_file_setup+0x1c1/0x6a0 [ 719.012345] ? __check_object_size+0x8b/0x530 [ 719.016833] ? shmem_fill_super+0xa10/0xa10 [ 719.021140] ? get_unused_fd_flags+0x121/0x190 [ 719.025707] ? __alloc_fd+0x750/0x750 [ 719.029493] ? kasan_check_write+0x14/0x20 [ 719.033704] ? _copy_from_user+0x99/0x110 [ 719.037838] SyS_memfd_create+0x3ba/0x4c0 [ 719.041969] ? memfd_fcntl+0x1240/0x1240 [ 719.046006] ? do_syscall_64+0xb7/0x940 [ 719.049970] ? memfd_fcntl+0x1240/0x1240 [ 719.054021] do_syscall_64+0x281/0x940 [ 719.057897] ? vmalloc_sync_all+0x30/0x30 [ 719.062027] ? _raw_spin_unlock_irq+0x27/0x70 [ 719.066510] ? finish_task_switch+0x1c1/0x7e0 [ 719.070994] ? syscall_return_slowpath+0x550/0x550 [ 719.075908] ? syscall_return_slowpath+0x2ac/0x550 [ 719.080822] ? prepare_exit_to_usermode+0x350/0x350 [ 719.085822] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 719.091171] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 719.096003] entry_SYSCALL_64_after_hwframe+0x42/0xb7 2018/03/31 11:16:54 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6b, 0x400) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r3 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r4 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r4, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r5 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r5, 0x400448c8, &(0x7f0000000840)={r4, r3, 0xffffffffffffff52, 0x1, &(0x7f00000006c0)="e411b82d239f02360b33ab01086a0910f47bfaaa10d5cb1dd0d5e6120a061bee3a5045c09ff7eb5a798d477b3db7121ae6a2193d00a22c1d20a716d6fb8def52aaf549d2", 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:54 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) dup3(r2, r2, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000280)=""/203) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r3 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r4 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r4, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r5 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) r6 = shmget$private(0x0, 0x2000, 0x78000500, &(0x7f0000ffe000/0x2000)=nil) shmat(r6, &(0x7f0000ffd000/0x3000)=nil, 0x1000) ioctl$sock_bt_hidp_HIDPCONNADD(r5, 0x400448c8, &(0x7f00000004c0)=ANY=[@ANYRES32, @ANYRES32=r3, @ANYBLOB="529dc315ff010000000000", @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYBLOB], @ANYBLOB="00010100470d000001000000000000008cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e64c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f0198648935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c284361"]) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e", 0x60) 2018/03/31 11:16:54 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x10001, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r3 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r4 = accept4(0xffffffffffffffff, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) r5 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r5, 0x400448c8, &(0x7f0000000840)={r4, r3, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223"}) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a8aa852b8e27cc4bed332dce5509fd49b6bd003f5b909778d20c97eda3326371d0d383e1c5f6e3fc2f5e61c4ce6b047104b3f22820012533d5e52a704f1faa5bb4478a0c58345f1aa8bbf1e7fd008c4", 0xc4) 2018/03/31 11:16:54 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x22, 0x250400) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000a80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000bc0)=0xffffffffffffffc2) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r3 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r4 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r4, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r5 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r5, 0x400448c8, &(0x7f0000000840)={r4, r3, 0xffffffffffffff52, 0x1, &(0x7f00000006c0)="e411b82d239f02360b33ab01086a0910f47bfaaa10d5cb1dd0d5e6120a061bee3a5045c09ff7eb5a798d477b3db7121ae6a2193d00a22c1d20a716d6fb8def52aaf549d2", 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="e3b40600ffffffff0400f0ff0000fafffb0e41da189c304034954b00a7172d5e6dc38f66721366162882a4b0446dab26cec9fe84f07c159cf49afd24cace5f89fb796dcf6b63f8c34f74923a544e4b9117efca7fcf0d58ef9782471fc22b1cd4d176eb466033081f5586965779409edd2110c47c593b483c5ced0bc800e7845f453818e2132c03ad73f4deb06e463de7bfeeaa6d5b35bb64800f5b11638eabab477af9deec6901ecddc340c4159fd55e378eec26aa4ad929b91e15017c9e7349a2d6a972cc7d757062c059dbbe5ca8ade65bb423aa45b1ba0f5c01a9997f104ae8b1530200b507d4c8db246a7375c203cd2961957b180236e6ee9ba5d55fae5a254bf7bbcd948f625d4bfd8a2231bf9b7c5f00000000"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 719.101173] RIP: 0033:0x454e79 [ 719.104334] RSP: 002b:00007f2fe9255bb8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 719.112017] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000454e79 [ 719.119275] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004b9c15 [ 719.126525] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 719.133780] R10: 0000000020000100 R11: 0000000000000246 R12: 0000000000000013 [ 719.141036] R13: 0000000000000668 R14: 00000000006fba60 R15: 0000000000000001 [ 719.173156] device bridge0 entered promiscuous mode [ 719.191430] device bridge0 entered promiscuous mode [ 719.196591] device bridge0 entered promiscuous mode [ 719.203849] device bridge0 entered promiscuous mode [ 719.212621] FAULT_INJECTION: forcing a failure. [ 719.212621] name failslab, interval 1, probability 0, space 0, times 0 [ 719.223887] CPU: 1 PID: 16845 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #8 [ 719.231068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 719.240411] Call Trace: [ 719.242994] dump_stack+0x194/0x24d [ 719.246621] ? arch_local_irq_restore+0x53/0x53 [ 719.251283] ? __save_stack_trace+0x7e/0xd0 [ 719.255609] should_fail+0x8c0/0xa40 [ 719.259318] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 719.264589] ? kasan_kmalloc+0xad/0xe0 [ 719.268470] ? kmem_cache_alloc_trace+0x136/0x740 [ 719.273307] ? __memcg_init_list_lru_node+0x169/0x270 [ 719.278491] ? __list_lru_init+0x544/0x750 [ 719.282716] ? sget_userns+0x691/0xe40 [ 719.286598] ? mount_fs+0x66/0x2d0 [ 719.290132] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 719.294883] ? do_mount+0xea4/0x2bb0 [ 719.298587] ? SyS_mount+0xab/0x120 [ 719.302208] ? do_syscall_64+0x281/0x940 [ 719.306264] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 719.311626] ? find_held_lock+0x35/0x1d0 [ 719.315682] ? __lock_is_held+0xb6/0x140 [ 719.319745] ? check_same_owner+0x320/0x320 [ 719.324065] ? rcu_note_context_switch+0x710/0x710 [ 719.329000] should_failslab+0xec/0x120 [ 719.332974] kmem_cache_alloc_trace+0x4b/0x740 [ 719.337552] ? __kmalloc_node+0x33/0x70 [ 719.341529] __memcg_init_list_lru_node+0x169/0x270 [ 719.346545] ? list_lru_add+0x7c0/0x7c0 [ 719.350514] ? __kmalloc_node+0x47/0x70 [ 719.354487] __list_lru_init+0x544/0x750 [ 719.358547] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 719.364421] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 719.369414] ? __lockdep_init_map+0xe4/0x650 [ 719.373797] ? lockdep_init_map+0x9/0x10 [ 719.377834] sget_userns+0x691/0xe40 [ 719.381526] ? kill_litter_super+0x90/0x90 [ 719.385736] ? ns_test_super+0x50/0x50 [ 719.389611] ? destroy_unused_super.part.6+0xd0/0xd0 [ 719.394695] ? do_raw_spin_trylock+0x190/0x190 [ 719.399255] ? kobject_put+0x6b/0x250 [ 719.403040] ? blkdev_get+0x3a1/0xb00 [ 719.406826] ? cap_capable+0x1b5/0x230 [ 719.410690] ? __blkdev_get+0x13b0/0x13b0 [ 719.414813] ? security_capable+0x8e/0xc0 [ 719.418935] ? kill_litter_super+0x90/0x90 [ 719.423145] ? ns_capable_common+0xcf/0x160 [ 719.427442] ? ns_test_super+0x50/0x50 [ 719.431312] ? kill_litter_super+0x90/0x90 [ 719.435520] sget+0xd2/0x120 [ 719.438516] mount_bdev+0x109/0x370 [ 719.442116] ? xfs_test_remount_options.isra.19+0x90/0x90 [ 719.447628] xfs_fs_mount+0x34/0x40 [ 719.451239] mount_fs+0x66/0x2d0 [ 719.454594] vfs_kern_mount.part.26+0xc6/0x4a0 [ 719.459170] ? may_umount+0xa0/0xa0 [ 719.462780] ? _raw_read_unlock+0x22/0x30 [ 719.466910] ? __get_fs_type+0x8a/0xc0 [ 719.470777] do_mount+0xea4/0x2bb0 [ 719.474295] ? __might_fault+0x110/0x1d0 [ 719.478333] ? copy_mount_string+0x40/0x40 [ 719.482543] ? check_same_owner+0x320/0x320 [ 719.486840] ? __check_object_size+0x8b/0x530 [ 719.491316] ? __might_sleep+0x95/0x190 [ 719.495266] ? kasan_check_write+0x14/0x20 [ 719.499487] ? _copy_from_user+0x99/0x110 [ 719.503610] ? memdup_user+0x5e/0x90 [ 719.507301] ? copy_mount_options+0x1f7/0x2e0 [ 719.511781] SyS_mount+0xab/0x120 [ 719.515224] ? copy_mnt_ns+0xb30/0xb30 [ 719.519091] do_syscall_64+0x281/0x940 [ 719.522956] ? vmalloc_sync_all+0x30/0x30 [ 719.527077] ? _raw_spin_unlock_irq+0x27/0x70 [ 719.531550] ? finish_task_switch+0x1c1/0x7e0 [ 719.536032] ? syscall_return_slowpath+0x550/0x550 [ 719.540937] ? syscall_return_slowpath+0x2ac/0x550 [ 719.545837] ? prepare_exit_to_usermode+0x350/0x350 [ 719.550829] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 719.556175] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 719.561007] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 719.566176] RIP: 0033:0x454e79 [ 719.569341] RSP: 002b:00007ff701201c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 719.577044] RAX: ffffffffffffffda RBX: 00007ff7012026d4 RCX: 0000000000454e79 [ 719.584295] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 00000000200007c0 [ 719.591536] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 719.598790] R10: 000000000080c400 R11: 0000000000000246 R12: 0000000000000014 [ 719.606036] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000013 [ 719.617984] device bridge0 left promiscuous mode [ 719.622991] device bridge0 left promiscuous mode 2018/03/31 11:16:55 executing program 7 (fault-call:0 fault-nth:2): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000180)={[{@session={'session', 0x3d, [0x34, 0x0]}, 0x2c}]}) 2018/03/31 11:16:55 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c284361"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="e3b40600ffffffff0400f0ff0000fafffb0e41da189c304034954b00a7172d5e6dc38f66721366162882a4b0446dab26cec9fe84f07c159cf49afd24cace5f89fb796dcf6b63f8c34f74923a544e4b9117efca7fcf0d58ef9782471fc22b1cd4d176eb466033081f5586965779409edd2110c47c593b483c5ced0bc800e7845f453818e2132c03ad73f4deb06e463de7bfeeaa6d5b35bb64800f5b11638eabab477af9deec6901ecddc340c4159fd55e378eec26aa4ad929b91e15017c9e7349a2d6a972cc7d757062c059dbbe5ca8ade65bb423aa45b1ba0f5c01a9997f104ae8b1530200b507d4c8db246a7375c203cd2961957b180236e6ee9ba5d55fae5a254bf7bbcd948f625d4bfd8a2231bf9b7c5f0000000000"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:55 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f0000a8bfff)=""/1, 0x805031ae) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)) ioctl$TCXONC(r1, 0x540a, 0x3) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000180)) ioctl$KDSETMODE(r1, 0x4b3a, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x8, 0x8000) getsockopt$inet_udp_int(r2, 0x11, 0x1, &(0x7f0000000140), &(0x7f0000000280)=0x4) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x4000, 0x0) semget$private(0x0, 0x7, 0x0) syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x3400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x34, r4, 0x0, 0x0, 0x25dfdbfb, {0x9}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x54}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x200}]}, 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x4040014) getsockopt$llc_int(r3, 0x10c, 0x0, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 2018/03/31 11:16:55 executing program 3 (fault-call:2 fault-nth:20): open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f00000006c0), 0x33040, &(0x7f00000006c0)=ANY=[]) mount(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='xfs\x00', 0x80c400, 0x0) 2018/03/31 11:16:55 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) rt_sigreturn() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = dup3(r0, r2, 0x80000) setsockopt$RDS_CONG_MONITOR(r3, 0x114, 0x6, &(0x7f00000001c0), 0x4) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r4 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r5 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r5, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r6 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r6, 0x400448c8, &(0x7f0000000840)={r5, r4, 0xffffffffffffff52, 0x1, &(0x7f00000006c0)="e411b82d239f02360b33ab01086a0910f47bfaaa10d5cb1dd0d5e6120a061bee3a5045c09ff7eb5a798d477b3db7121ae6a2193d00a22c1d20a716d6fb8def52aaf549d2", 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r6, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:55 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x80000200000a) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) r3 = memfd_create(&(0x7f0000000280)='bridge0\x00', 0x3) ioctl$EVIOCGSND(r3, 0x8040451a, &(0x7f00000002c0)=""/13) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r4 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r5 = accept4(r2, &(0x7f00000001c0)=@can, &(0x7f0000000040)=0x399, 0x0) setsockopt$ipx_IPX_TYPE(r5, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r6 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r6, 0x400448c8, &(0x7f0000000840)=ANY=[@ANYRES32, @ANYRES32=r4, @ANYBLOB="52ff010000000000", @ANYPTR=&(0x7f0000000300)=ANY=[@ANYBLOB="25d4e008dbb12a2aef4bcf260404ba792c6d3e096f780b"], @ANYBLOB="00010100470d000001000000000000008cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c284361"]) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e", 0x60) 2018/03/31 11:16:55 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r3 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r4 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r4, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r5 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r5, 0x400448c8, &(0x7f0000000840)={r4, r3, 0xffffffffffffff52, 0x1, &(0x7f00000006c0)="e411b82d239f02360b33ab01086a0910f47bfaaa10d5cb1dd0d5e6120a061bee3a5045c09ff7eb5a798d477b3db7121ae6a2193d00a22c1d20a716d6fb8def52aaf549d2", 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000a80)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r4, &(0x7f00000005c0)="2700000014000707030e0000120f0a0011001100222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0xfffffffffffffcad) 2018/03/31 11:16:55 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_user\x00', 0x0, 0x0) r4 = syz_open_dev$sg(&(0x7f00000001c0)='/dev/sg#\x00', 0x1000, 0x80000) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000200)={r3, r4, 0x7}, 0x10) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(0xffffffffffffffff, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223"}) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a8aa852b8e27cc4bed332dce5509fd49b6bd003f5b909778d20c97eda3326371d0d383e1c5f6e3fc2f5e61c4ce6b047104b3f22820012533d5e52a704f1faa5bb4478a0c58345f1aa8bbf1e7fd008c4", 0xc4) [ 719.673158] device bridge0 left promiscuous mode [ 719.678147] device bridge0 left promiscuous mode [ 719.705446] FAULT_INJECTION: forcing a failure. [ 719.705446] name failslab, interval 1, probability 0, space 0, times 0 [ 719.711110] device bridge0 entered promiscuous mode [ 719.716757] CPU: 1 PID: 16868 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #8 [ 719.728886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 719.738234] Call Trace: [ 719.740824] dump_stack+0x194/0x24d [ 719.744451] ? arch_local_irq_restore+0x53/0x53 [ 719.749119] ? __unwind_start+0x169/0x330 [ 719.753266] ? __kernel_text_address+0xd/0x40 [ 719.757764] should_fail+0x8c0/0xa40 [ 719.761345] device bridge0 entered promiscuous mode [ 719.761473] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 719.771560] ? save_stack+0xa3/0xd0 [ 719.775181] ? save_stack+0x43/0xd0 [ 719.778803] ? kasan_kmalloc+0xad/0xe0 [ 719.782685] ? kasan_slab_alloc+0x12/0x20 [ 719.786827] ? kmem_cache_alloc+0x12e/0x760 [ 719.791144] ? __d_alloc+0xc1/0xbd0 [ 719.794761] ? d_alloc_pseudo+0x1d/0x30 [ 719.798726] ? __shmem_file_setup+0x1c1/0x6a0 [ 719.803221] ? find_held_lock+0x35/0x1d0 [ 719.803654] device bridge0 entered promiscuous mode [ 719.807288] ? check_same_owner+0x320/0x320 [ 719.807302] ? rcu_note_context_switch+0x710/0x710 [ 719.807317] should_failslab+0xec/0x120 [ 719.825478] kmem_cache_alloc+0x47/0x760 [ 719.829532] ? __raw_spin_lock_init+0x1c/0x100 [ 719.831082] device bridge0 entered promiscuous mode [ 719.834105] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 719.834118] ? shmem_destroy_callback+0xa0/0xa0 [ 719.834128] shmem_alloc_inode+0x1b/0x40 [ 719.834137] alloc_inode+0x65/0x180 [ 719.834147] new_inode_pseudo+0x69/0x190 [ 719.834154] ? prune_icache_sb+0x1a0/0x1a0 [ 719.834163] ? __d_alloc+0x705/0xbd0 [ 719.868393] ? shrink_dcache_for_umount+0x290/0x290 2018/03/31 11:16:55 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c284361"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:55 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c284361"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 719.873401] ? do_raw_spin_trylock+0x190/0x190 [ 719.877977] new_inode+0x1c/0x40 [ 719.879472] device bridge0 left promiscuous mode [ 719.881337] shmem_get_inode+0xe1/0x920 [ 719.881350] ? shmem_fh_to_dentry+0x150/0x150 [ 719.881359] ? __alloc_fd+0x29b/0x750 [ 719.881374] ? exit_files+0xb0/0xb0 [ 719.881384] ? __might_fault+0x110/0x1d0 [ 719.881395] ? lock_downgrade+0x980/0x980 [ 719.881409] __shmem_file_setup+0x494/0x6a0 [ 719.881418] ? __check_object_size+0x8b/0x530 [ 719.881429] ? shmem_fill_super+0xa10/0xa10 [ 719.881439] ? get_unused_fd_flags+0x121/0x190 [ 719.927829] ? __alloc_fd+0x750/0x750 [ 719.931630] ? kasan_check_write+0x14/0x20 [ 719.935860] ? _copy_from_user+0x99/0x110 [ 719.940004] SyS_memfd_create+0x3ba/0x4c0 [ 719.944146] ? memfd_fcntl+0x1240/0x1240 [ 719.948201] ? do_syscall_64+0xb7/0x940 [ 719.952172] ? memfd_fcntl+0x1240/0x1240 [ 719.956227] do_syscall_64+0x281/0x940 [ 719.960102] ? vmalloc_sync_all+0x30/0x30 [ 719.964227] ? _raw_spin_unlock_irq+0x27/0x70 [ 719.968871] ? finish_task_switch+0x1c1/0x7e0 [ 719.973341] ? syscall_return_slowpath+0x550/0x550 [ 719.978244] ? syscall_return_slowpath+0x2ac/0x550 [ 719.983148] ? prepare_exit_to_usermode+0x350/0x350 [ 719.988140] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 719.993495] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 719.998326] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 720.003489] RIP: 0033:0x454e79 [ 720.006658] RSP: 002b:00007f2fe9255bb8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 720.014359] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000454e79 [ 720.021614] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004b9c15 [ 720.028855] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 720.036101] R10: 0000000020000100 R11: 0000000000000246 R12: 0000000000000013 [ 720.043342] R13: 0000000000000668 R14: 00000000006fba60 R15: 0000000000000002 [ 720.053933] FAULT_INJECTION: forcing a failure. [ 720.053933] name failslab, interval 1, probability 0, space 0, times 0 [ 720.058322] device bridge0 left promiscuous mode [ 720.065218] CPU: 1 PID: 16875 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #8 [ 720.070533] device bridge0 left promiscuous mode [ 720.077053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 720.077058] Call Trace: [ 720.077074] dump_stack+0x194/0x24d [ 720.077088] ? arch_local_irq_restore+0x53/0x53 [ 720.082055] device bridge0 left promiscuous mode [ 720.091164] ? kernel_text_address+0xd1/0xe0 [ 720.091175] ? __unwind_start+0x169/0x330 [ 720.091194] should_fail+0x8c0/0xa40 [ 720.118874] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 720.123966] ? save_stack+0x43/0xd0 [ 720.127565] ? kasan_kmalloc+0xad/0xe0 [ 720.131422] ? __kmalloc+0x162/0x760 [ 720.135106] ? __list_lru_init+0xcf/0x750 [ 720.139228] ? find_held_lock+0x35/0x1d0 [ 720.143262] ? __lock_is_held+0xb6/0x140 [ 720.147302] ? check_same_owner+0x320/0x320 [ 720.151595] ? rcu_note_context_switch+0x710/0x710 [ 720.156499] should_failslab+0xec/0x120 [ 720.160444] kmem_cache_alloc_node_trace+0x5a/0x760 [ 720.165429] ? mark_held_locks+0xaf/0x100 [ 720.169545] ? __raw_spin_lock_init+0x1c/0x100 [ 720.174108] __kmalloc_node+0x33/0x70 [ 720.177883] kvmalloc_node+0x99/0xd0 [ 720.181565] __list_lru_init+0x5d5/0x750 [ 720.185599] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 720.191454] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 720.196442] ? lockdep_init_map+0x9/0x10 [ 720.200476] sget_userns+0x6b1/0xe40 [ 720.204160] ? kill_litter_super+0x90/0x90 [ 720.208372] ? ns_test_super+0x50/0x50 [ 720.212229] ? destroy_unused_super.part.6+0xd0/0xd0 [ 720.217302] ? do_raw_spin_trylock+0x190/0x190 [ 720.221859] ? kobject_put+0x6b/0x250 [ 720.225645] ? blkdev_get+0x3a1/0xb00 [ 720.229420] ? cap_capable+0x1b5/0x230 [ 720.233278] ? __blkdev_get+0x13b0/0x13b0 [ 720.237402] ? security_capable+0x8e/0xc0 [ 720.241520] ? kill_litter_super+0x90/0x90 [ 720.245732] ? ns_capable_common+0xcf/0x160 [ 720.250031] ? ns_test_super+0x50/0x50 [ 720.253890] ? kill_litter_super+0x90/0x90 [ 720.258212] sget+0xd2/0x120 [ 720.261202] mount_bdev+0x109/0x370 [ 720.264799] ? xfs_test_remount_options.isra.19+0x90/0x90 [ 720.270305] xfs_fs_mount+0x34/0x40 [ 720.273902] mount_fs+0x66/0x2d0 [ 720.277241] vfs_kern_mount.part.26+0xc6/0x4a0 [ 720.281797] ? may_umount+0xa0/0xa0 [ 720.285397] ? _raw_read_unlock+0x22/0x30 [ 720.289517] ? __get_fs_type+0x8a/0xc0 [ 720.293377] do_mount+0xea4/0x2bb0 [ 720.296888] ? __might_fault+0x110/0x1d0 [ 720.300921] ? copy_mount_string+0x40/0x40 [ 720.305125] ? check_same_owner+0x320/0x320 [ 720.309418] ? __check_object_size+0x8b/0x530 [ 720.313889] ? __might_sleep+0x95/0x190 [ 720.317846] ? kasan_check_write+0x14/0x20 [ 720.322061] ? _copy_from_user+0x99/0x110 [ 720.326185] ? memdup_user+0x5e/0x90 [ 720.329867] ? copy_mount_options+0x1f7/0x2e0 [ 720.334332] SyS_mount+0xab/0x120 [ 720.337757] ? copy_mnt_ns+0xb30/0xb30 [ 720.341617] do_syscall_64+0x281/0x940 [ 720.345482] ? vmalloc_sync_all+0x30/0x30 [ 720.349602] ? _raw_spin_unlock_irq+0x27/0x70 [ 720.354068] ? finish_task_switch+0x1c1/0x7e0 [ 720.358534] ? syscall_return_slowpath+0x550/0x550 [ 720.363433] ? syscall_return_slowpath+0x2ac/0x550 [ 720.368332] ? prepare_exit_to_usermode+0x350/0x350 [ 720.373320] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 720.378663] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 720.383486] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 720.388649] RIP: 0033:0x454e79 [ 720.391817] RSP: 002b:00007ff701201c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 720.399505] RAX: ffffffffffffffda RBX: 00007ff7012026d4 RCX: 0000000000454e79 [ 720.407019] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 00000000200007c0 [ 720.414262] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 720.421503] R10: 000000000080c400 R11: 0000000000000246 R12: 0000000000000014 [ 720.428740] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000014 2018/03/31 11:16:56 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:56 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000640)='/dev/dmmidi#\x00', 0xfffffffffffffff9, 0x40040) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000004c0)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000200), &(0x7f0000000280)=0x4) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'dummy0\x00', r1}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r3, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000000c0)={r3, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) r6 = semget$private(0x0, 0x0, 0x200) semctl$SEM_INFO(r6, 0x4, 0x13, &(0x7f00000002c0)=""/89) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000005f00)) r7 = accept4(r4, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r7, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) fcntl$setlease(r2, 0x400, 0x3) r8 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r8, 0x400448c8, &(0x7f0000000840)=ANY=[@ANYRES32=r7, @ANYRES32=r5, @ANYBLOB="52ff01000000a0d61607ba0e6ea8a90af5fffae3fe", @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYBLOB="e411b82d239f02360b33ab01086a0910f47bfaaa10d5cb1dd0d5e6120a061bee3a5045c09ff7eb5a798d477b3db7121ae6a2193d00a22c1d20a716d6fb8def52aaf549d2"], @ANYBLOB="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"]) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r8, 0x84, 0x77, &(0x7f0000000ac0)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r4, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:56 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) flistxattr(r2, &(0x7f0000000280)=""/139, 0x8b) syz_mount_image$bfs(&(0x7f0000000580)='bfs\x00', &(0x7f00000006c0)='./file0\x00', 0x10000, 0x5, &(0x7f0000000b00)=[{&(0x7f0000000700)="e43f0ea2271cf5c3d0764cbba4f9a5e319725b1631223599ec53c7af09a80f1e2d0263f8ab015b97444a2d6fac881cf5d837f93b87a2", 0x36, 0x2}, {&(0x7f0000000940)="df5c77f3089094511ca956b97d747a81e6c788f5dda61ab4fcf982e8bd11bdb0ad99bdbb81f015c52b05f006f68de6ae0ac3d0e3f3c1c0e546a5364d69bfe9d3a43b7dbf4f57db7efa4e64eadb727a5c5128215576718015ab421e3570d7ed533c5c20b6fd4c6abfb99684a9959226b6e5e356fda97484ed10e51cbbd59ed195ad3c5b27e80763c6d2033c97976e378803b0467bf7e195f757627d3cc03a10f2ee2e84fdda2fb2829314d6de26a8d43a2d159fda7c15433059221411594ce5bc02850eaacdbfcba9fe299eab9103ba38df9ed424918e99eec2e146f0bfa85a493ce2fce77453b90b3778a50d", 0xec, 0x10000}, {&(0x7f0000001240)="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", 0x1000, 0x8001}, {&(0x7f0000000a40)="ac2dcd", 0x3, 0x9}, {&(0x7f0000000a80)="52a3309bdda645c615823dd38a32b17b04b2a710676ffd702cc07097e75c290dd75626bd9e4dea96f83e945e86e0b9d9370a54ec091ff263400cb02208ecab5e5c8b7306d9bee398a3b8a00dbdab15", 0x4f, 0x5b}], 0x401, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r3, 0x40bc5311, &(0x7f0000000bc0)={0xfa9b, 0x2, 'client0\x00', 0x7, "e17034338eb17ed4", "7fec67ec72ea42dec4f16dda377d980c7d35effbfbc6cb1836f4b407bb9f6a25", 0xfff, 0x1}) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x101002, 0x0) setsockopt$bt_BT_SECURITY(r4, 0x112, 0x4, &(0x7f0000000340)={0x8, 0x80}, 0x2) recvfrom$unix(r4, &(0x7f00000004c0)=""/174, 0xae, 0x1, &(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e) r5 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r5, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r6 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r6, 0x400448c8, &(0x7f0000000840)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="52ff010000000000", @ANYPTR=&(0x7f0000000640)=ANY=[@ANYBLOB="c664a2b6e1e0f498acc21c1bb48a48cbe4b530396ad014fabd8d636799bf76776320b76f4999a5f1d7fbbf0dbbc355b5c7772f8f41db65f149334913b80d2af5bec2bd18caa6b301058899b53c4e3bce19f6700fb18d96827c110ab8d2"], @ANYBLOB="00070100470d000001000000000000008cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c284361"]) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e", 0x60) 2018/03/31 11:16:56 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() munlock(&(0x7f0000ffd000/0x2000)=nil, 0x2000) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r3 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r4 = accept4(0xffffffffffffffff, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) r5 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r5, 0x400448c8, &(0x7f0000000840)={r4, r3, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223"}) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a8aa852b8e27cc4bed332dce5509fd49b6bd003f5b909778d20c97eda3326371d0d383e1c5f6e3fc2f5e61c4ce6b047104b3f22820012533d5e52a704f1faa5bb4478a0c58345f1aa8bbf1e7fd008c4", 0xc4) 2018/03/31 11:16:56 executing program 0 (fault-call:22 fault-nth:0): r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r3 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r4 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r4, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r5 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r5, 0x400448c8, &(0x7f0000000840)={r4, r3, 0xffffffffffffff52, 0x1, &(0x7f00000006c0)="e411b82d239f02360b33ab01086a0910f47bfaaa10d5cb1dd0d5e6120a061bee3a5045c09ff7eb5a798d477b3db7121ae6a2193d00a22c1d20a716d6fb8def52aaf549d2", 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a8aa852b8e27cc4bed332dce5509fd49b6bd003f5b909778d20c97eda3326371d0d383e1c5f6e3fc2f5e61c4ce6b047104b3f22820012533d5e52a704f1faa5bb4478a0c58345f1aa8bbf1e7fd008c4bb82853615c5b545", 0xcc) 2018/03/31 11:16:56 executing program 3 (fault-call:2 fault-nth:21): open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f00000006c0), 0x33040, &(0x7f00000006c0)=ANY=[]) mount(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='xfs\x00', 0x80c400, 0x0) 2018/03/31 11:16:56 executing program 7 (fault-call:0 fault-nth:3): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000180)={[{@session={'session', 0x3d, [0x34, 0x0]}, 0x2c}]}) 2018/03/31 11:16:56 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f0000000280)={0x10000, 0x3, 0x2da000000000, 0x3, 0x4, 0x900}) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r0, 0x0) read(r2, &(0x7f0000a8bfff)=""/1, 0x805031ae) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000fd0ffc)) ioctl$TCXONC(r2, 0x540a, 0x3) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000180)) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x4000, 0x0) semget$private(0x0, 0x7, 0x0) syz_open_pts(r0, 0x0) dup3(r2, r0, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x3400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x34, r4, 0x0, 0x0, 0x25dfdbfb, {0x9}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x54}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x200}]}, 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x4040014) getsockopt$llc_int(r3, 0x10c, 0x0, &(0x7f0000000040), &(0x7f00000000c0)=0x4) [ 720.802595] device bridge0 entered promiscuous mode [ 720.807558] FAULT_INJECTION: forcing a failure. [ 720.807558] name failslab, interval 1, probability 0, space 0, times 0 [ 720.818889] CPU: 0 PID: 16919 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #8 [ 720.824417] device bridge0 entered promiscuous mode [ 720.826064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 720.826070] Call Trace: [ 720.826087] dump_stack+0x194/0x24d [ 720.826101] ? arch_local_irq_restore+0x53/0x53 [ 720.826115] ? lockdep_init_map+0x9/0x10 [ 720.826134] should_fail+0x8c0/0xa40 [ 720.859032] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 720.862828] FAULT_INJECTION: forcing a failure. [ 720.862828] name failslab, interval 1, probability 0, space 0, times 0 [ 720.864124] ? __raw_spin_lock_init+0x1c/0x100 [ 720.864140] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 720.864157] ? find_held_lock+0x35/0x1d0 [ 720.864169] ? find_held_lock+0x35/0x1d0 [ 720.864196] ? check_same_owner+0x320/0x320 [ 720.897728] ? rcu_note_context_switch+0x710/0x710 [ 720.902647] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 720.907652] should_failslab+0xec/0x120 [ 720.911606] kmem_cache_alloc+0x47/0x760 [ 720.915652] ? find_held_lock+0x35/0x1d0 [ 720.919695] get_empty_filp+0xfb/0x4f0 [ 720.923562] ? d_instantiate+0x79/0xa0 [ 720.927426] ? proc_nr_files+0x60/0x60 [ 720.931293] ? lock_downgrade+0x980/0x980 [ 720.935424] ? lock_release+0xa40/0xa40 [ 720.939375] ? __alloc_fd+0x29b/0x750 [ 720.943159] ? do_raw_spin_trylock+0x190/0x190 [ 720.947726] alloc_file+0x26/0x390 [ 720.951248] ? _raw_spin_unlock+0x22/0x30 [ 720.955381] __shmem_file_setup+0x54f/0x6a0 [ 720.959684] ? __check_object_size+0x8b/0x530 [ 720.964159] ? shmem_fill_super+0xa10/0xa10 [ 720.968476] ? get_unused_fd_flags+0x121/0x190 [ 720.973037] ? __alloc_fd+0x750/0x750 [ 720.976830] ? kasan_check_write+0x14/0x20 [ 720.981045] ? _copy_from_user+0x99/0x110 [ 720.985174] SyS_memfd_create+0x3ba/0x4c0 [ 720.989301] ? memfd_fcntl+0x1240/0x1240 [ 720.993341] ? do_syscall_64+0xb7/0x940 [ 720.997295] ? memfd_fcntl+0x1240/0x1240 [ 721.001335] do_syscall_64+0x281/0x940 [ 721.005204] ? vmalloc_sync_all+0x30/0x30 [ 721.009332] ? _raw_spin_unlock_irq+0x27/0x70 [ 721.013808] ? finish_task_switch+0x1c1/0x7e0 [ 721.018296] ? syscall_return_slowpath+0x550/0x550 [ 721.023203] ? syscall_return_slowpath+0x2ac/0x550 [ 721.028111] ? prepare_exit_to_usermode+0x350/0x350 [ 721.033107] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 721.038450] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 721.043274] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 721.048439] RIP: 0033:0x454e79 [ 721.051610] RSP: 002b:00007f2fe9255bb8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 721.059297] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000454e79 [ 721.066545] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004b9c15 [ 721.073794] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 721.081041] R10: 0000000020000100 R11: 0000000000000246 R12: 0000000000000013 [ 721.088288] R13: 0000000000000668 R14: 00000000006fba60 R15: 0000000000000003 [ 721.095553] CPU: 1 PID: 16911 Comm: syz-executor0 Not tainted 4.16.0-rc7+ #8 2018/03/31 11:16:56 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 721.102737] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 721.102810] device bridge0 entered promiscuous mode [ 721.112073] Call Trace: [ 721.112089] dump_stack+0x194/0x24d [ 721.112101] ? arch_local_irq_restore+0x53/0x53 [ 721.112111] ? release_sock+0x1d4/0x2a0 [ 721.112125] should_fail+0x8c0/0xa40 [ 721.112136] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 721.140682] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 721.145692] ? release_sock+0x1d4/0x2a0 [ 721.149655] ? trace_hardirqs_on+0xd/0x10 2018/03/31 11:16:56 executing program 7 (fault-call:0 fault-nth:4): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000180)={[{@session={'session', 0x3d, [0x34, 0x0]}, 0x2c}]}) [ 721.153800] ? __local_bh_enable_ip+0x121/0x230 [ 721.158465] ? find_held_lock+0x35/0x1d0 [ 721.162534] ? check_same_owner+0x320/0x320 [ 721.166854] ? rcu_note_context_switch+0x710/0x710 [ 721.171785] should_failslab+0xec/0x120 [ 721.175752] kmem_cache_alloc_node+0x56/0x760 [ 721.180245] ? netlink_getsockopt+0x660/0x660 [ 721.184733] __alloc_skb+0xf1/0x780 [ 721.188356] ? skb_copy_and_csum_dev+0x370/0x370 [ 721.192101] FAULT_INJECTION: forcing a failure. [ 721.192101] name failslab, interval 1, probability 0, space 0, times 0 [ 721.193106] ? find_held_lock+0x35/0x1d0 [ 721.193122] ? __fget+0x342/0x5b0 [ 721.193138] ? security_socket_getpeersec_dgram+0x91/0xc0 [ 721.193151] netlink_sendmsg+0xa86/0xe60 [ 721.193165] ? netlink_unicast+0x6b0/0x6b0 [ 721.193178] ? security_socket_sendmsg+0x89/0xb0 [ 721.193187] ? netlink_unicast+0x6b0/0x6b0 [ 721.193198] sock_sendmsg+0xca/0x110 [ 721.193213] sock_write_iter+0x31a/0x5d0 [ 721.193226] ? sock_sendmsg+0x110/0x110 [ 721.246199] ? iov_iter_init+0xaf/0x1d0 [ 721.250162] __vfs_write+0x684/0x970 [ 721.253861] ? kernel_read+0x120/0x120 [ 721.257728] ? wait_for_completion+0x770/0x770 [ 721.262303] ? rw_verify_area+0xe5/0x2b0 [ 721.266343] ? __fdget_raw+0x20/0x20 [ 721.270041] vfs_write+0x189/0x510 [ 721.273564] SyS_write+0xef/0x220 [ 721.276997] ? SyS_read+0x220/0x220 [ 721.280605] ? do_syscall_64+0xb7/0x940 [ 721.284559] ? SyS_read+0x220/0x220 [ 721.288164] do_syscall_64+0x281/0x940 [ 721.292033] ? vmalloc_sync_all+0x30/0x30 [ 721.296163] ? _raw_spin_unlock_irq+0x27/0x70 [ 721.300636] ? finish_task_switch+0x1c1/0x7e0 [ 721.305111] ? syscall_return_slowpath+0x550/0x550 [ 721.310024] ? syscall_return_slowpath+0x2ac/0x550 [ 721.314935] ? prepare_exit_to_usermode+0x350/0x350 [ 721.319932] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 721.325276] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 721.330104] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 721.335271] RIP: 0033:0x454e79 [ 721.338438] RSP: 002b:00007f8b0365bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 721.346130] RAX: ffffffffffffffda RBX: 00007f8b0365c6d4 RCX: 0000000000454e79 [ 721.353377] RDX: 00000000000000cc RSI: 00000000200005c0 RDI: 0000000000000014 [ 721.360625] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 721.367872] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 721.375120] R13: 00000000000006af R14: 00000000006fc108 R15: 0000000000000000 [ 721.382382] CPU: 0 PID: 16938 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #8 [ 721.387107] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=3fe40000) [ 721.389553] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 721.389558] Call Trace: [ 721.389573] dump_stack+0x194/0x24d [ 721.389585] ? arch_local_irq_restore+0x53/0x53 [ 721.389603] should_fail+0x8c0/0xa40 [ 721.389615] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 721.389625] ? trace_hardirqs_off+0x10/0x10 [ 721.389639] ? lock_release+0xa40/0xa40 [ 721.434544] ? setattr_copy+0x540/0x540 [ 721.438518] ? find_held_lock+0x35/0x1d0 [ 721.442587] ? check_same_owner+0x320/0x320 [ 721.446906] ? rcu_note_context_switch+0x710/0x710 2018/03/31 11:16:56 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:56 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d1"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 721.451837] should_failslab+0xec/0x120 [ 721.453538] device bridge0 left promiscuous mode [ 721.455800] kmem_cache_alloc+0x47/0x760 [ 721.455814] ? do_sys_ftruncate.constprop.14+0x3b8/0x5d0 [ 721.455827] getname_flags+0xcb/0x580 [ 721.455839] getname+0x19/0x20 [ 721.455848] do_sys_open+0x2e7/0x6d0 [ 721.455860] ? filp_open+0x70/0x70 [ 721.455872] ? do_sys_ftruncate.constprop.14+0x112/0x5d0 [ 721.455883] SyS_open+0x2d/0x40 [ 721.455891] ? do_sys_open+0x6d0/0x6d0 [ 721.455900] do_syscall_64+0x281/0x940 [ 721.455912] ? vmalloc_sync_all+0x30/0x30 2018/03/31 11:16:56 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d1"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:56 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d1"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="e3b40600ffffffff0400f0ff0000fafffb0e41da189c304034954b00a7172d5e6dc38f66721366162882a4b0446dab26cec9fe84f07c159cf49afd24cace5f89fb796dcf6b63f8c34f74923a544e4b9117efca7fcf0d58ef9782471fc22b1cd4d176eb466033081f5586965779409edd2110c47c593b483c5ced0bc800e7845f453818e2132c03ad73f4deb06e463de7bfeeaa6d5b35bb64800f5b11638eabab477af9deec6901ecddc340c4159fd55e378eec26aa4ad929b91e15017c9e7349a2d6a972cc7d757062c059dbbe5ca8ade65bb423aa45b1ba0f5c01a9997f104ae8b1530200b507d4c8db246a7375c203cd2961957b180236e6ee9ba5d55fae5a254bf7bbcd948f625d4bfd8a2231bf9b7c5f0000000000"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 721.504828] ? _raw_spin_unlock_irq+0x27/0x70 [ 721.509320] ? finish_task_switch+0x1c1/0x7e0 [ 721.513812] ? syscall_return_slowpath+0x550/0x550 [ 721.518737] ? syscall_return_slowpath+0x2ac/0x550 [ 721.523658] ? prepare_exit_to_usermode+0x350/0x350 [ 721.528685] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 721.534046] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 721.538888] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 721.544067] RIP: 0033:0x40f0d1 [ 721.547272] RSP: 002b:00007f2fe9255bb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 2018/03/31 11:16:56 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:56 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 721.554988] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 000000000040f0d1 [ 721.562257] RDX: 00007f2fe9255c0a RSI: 0000000000000002 RDI: 00007f2fe9255c00 [ 721.569520] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 721.576779] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000014 [ 721.584038] R13: 0000000000000668 R14: 00000000006fba60 R15: 0000000000000004 2018/03/31 11:16:56 executing program 0 (fault-call:22 fault-nth:1): r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r3 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r4 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r4, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r5 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r5, 0x400448c8, &(0x7f0000000840)={r4, r3, 0xffffffffffffff52, 0x1, &(0x7f00000006c0)="e411b82d239f02360b33ab01086a0910f47bfaaa10d5cb1dd0d5e6120a061bee3a5045c09ff7eb5a798d477b3db7121ae6a2193d00a22c1d20a716d6fb8def52aaf549d2", 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a8aa852b8e27cc4bed332dce5509fd49b6bd003f5b909778d20c97eda3326371d0d383e1c5f6e3fc2f5e61c4ce6b047104b3f22820012533d5e52a704f1faa5bb4478a0c58345f1aa8bbf1e7fd008c4bb82853615c5b545", 0xcc) 2018/03/31 11:16:56 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r3 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r4 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r4, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r5 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r5, 0x400448c8, &(0x7f0000000840)=ANY=[@ANYRES32=r4, @ANYRES32=r3, @ANYBLOB="52ff010000000000", @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYBLOB="e411b82d239f02360b33ab01086a0910f47bfaaa10d5cb1dd0d5e6120a061bee3a5045c09ff7eb5a798d477b3db7121ae6a2193d00a22c1d20a716d6fb8def52aaf549d2"], @ANYBLOB="00010100470d0000010000000600137f029c4b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae492800000000000000124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ad0eb18c9cefb35eeba34bbdebb872646105b73a2bac32b4a0d9c557183e54bd223cca36d7713a0c74fa0708172258c8ef89cf9cb1ed72fc2"]) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 721.604175] device bridge0 left promiscuous mode [ 721.612885] FAULT_INJECTION: forcing a failure. [ 721.612885] name failslab, interval 1, probability 0, space 0, times 0 [ 721.624130] CPU: 0 PID: 16920 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #8 [ 721.631306] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 721.639288] device bridge0 entered promiscuous mode [ 721.640640] Call Trace: [ 721.640658] dump_stack+0x194/0x24d [ 721.640678] ? arch_local_irq_restore+0x53/0x53 [ 721.640691] ? save_stack+0x43/0xd0 [ 721.640703] ? mutex_lock_io_nested+0x1900/0x1900 [ 721.640717] should_fail+0x8c0/0xa40 [ 721.650926] device bridge0 entered promiscuous mode [ 721.651895] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 721.651912] ? trace_hardirqs_off+0x10/0x10 [ 721.651925] ? lock_downgrade+0x980/0x980 [ 721.651937] ? trace_hardirqs_off+0x10/0x10 [ 721.651950] ? find_held_lock+0x35/0x1d0 [ 721.678133] FAULT_INJECTION: forcing a failure. [ 721.678133] name failslab, interval 1, probability 0, space 0, times 0 [ 721.678806] ? __lock_is_held+0xb6/0x140 [ 721.678825] ? check_same_owner+0x320/0x320 [ 721.715055] ? rcu_note_context_switch+0x710/0x710 [ 721.719965] ? rcu_note_context_switch+0x710/0x710 [ 721.724883] should_failslab+0xec/0x120 [ 721.728837] __kmalloc+0x63/0x760 [ 721.732274] ? __kmalloc_node+0x47/0x70 [ 721.736233] ? __list_lru_init+0xcf/0x750 [ 721.740362] __list_lru_init+0xcf/0x750 [ 721.744321] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 721.750185] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 721.755184] ? lockdep_init_map+0x9/0x10 [ 721.759228] sget_userns+0x6b1/0xe40 [ 721.762922] ? kill_litter_super+0x90/0x90 [ 721.767138] ? ns_test_super+0x50/0x50 [ 721.771014] ? destroy_unused_super.part.6+0xd0/0xd0 [ 721.776095] ? do_raw_spin_trylock+0x190/0x190 [ 721.780666] ? kobject_put+0x6b/0x250 [ 721.784453] ? blkdev_get+0x3a1/0xb00 [ 721.788235] ? cap_capable+0x1b5/0x230 [ 721.792110] ? __blkdev_get+0x13b0/0x13b0 [ 721.796239] ? security_capable+0x8e/0xc0 [ 721.800366] ? kill_litter_super+0x90/0x90 [ 721.804584] ? ns_capable_common+0xcf/0x160 [ 721.808893] ? ns_test_super+0x50/0x50 [ 721.812760] ? kill_litter_super+0x90/0x90 [ 721.816981] sget+0xd2/0x120 [ 721.819985] mount_bdev+0x109/0x370 [ 721.823591] ? xfs_test_remount_options.isra.19+0x90/0x90 [ 721.829131] xfs_fs_mount+0x34/0x40 [ 721.832739] mount_fs+0x66/0x2d0 [ 721.836096] vfs_kern_mount.part.26+0xc6/0x4a0 [ 721.840668] ? may_umount+0xa0/0xa0 [ 721.844274] ? _raw_read_unlock+0x22/0x30 [ 721.848401] ? __get_fs_type+0x8a/0xc0 [ 721.852273] do_mount+0xea4/0x2bb0 [ 721.855791] ? __might_fault+0x110/0x1d0 [ 721.859851] ? copy_mount_string+0x40/0x40 [ 721.864082] ? check_same_owner+0x320/0x320 [ 721.868400] ? __check_object_size+0x8b/0x530 [ 721.872883] ? __might_sleep+0x95/0x190 [ 721.876841] ? kasan_check_write+0x14/0x20 [ 721.881065] ? _copy_from_user+0x99/0x110 [ 721.885195] ? memdup_user+0x5e/0x90 [ 721.888890] ? copy_mount_options+0x1f7/0x2e0 [ 721.893365] SyS_mount+0xab/0x120 [ 721.896798] ? copy_mnt_ns+0xb30/0xb30 [ 721.900672] do_syscall_64+0x281/0x940 [ 721.904540] ? vmalloc_sync_all+0x30/0x30 [ 721.908673] ? _raw_spin_unlock_irq+0x27/0x70 [ 721.913148] ? finish_task_switch+0x1c1/0x7e0 [ 721.917632] ? syscall_return_slowpath+0x550/0x550 [ 721.922546] ? syscall_return_slowpath+0x2ac/0x550 [ 721.927457] ? prepare_exit_to_usermode+0x350/0x350 [ 721.932453] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 721.937801] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 721.942629] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 721.947800] RIP: 0033:0x454e79 [ 721.950983] RSP: 002b:00007ff701201c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 721.958672] RAX: ffffffffffffffda RBX: 00007ff7012026d4 RCX: 0000000000454e79 [ 721.965922] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 00000000200007c0 [ 721.973170] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 721.980420] R10: 000000000080c400 R11: 0000000000000246 R12: 0000000000000014 [ 721.987671] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000015 [ 721.994934] CPU: 1 PID: 16958 Comm: syz-executor0 Not tainted 4.16.0-rc7+ #8 [ 722.002116] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 722.011468] Call Trace: [ 722.014054] dump_stack+0x194/0x24d [ 722.017676] ? arch_local_irq_restore+0x53/0x53 [ 722.022345] ? is_bpf_text_address+0xa4/0x120 [ 722.026835] ? kernel_text_address+0xd1/0xe0 [ 722.031236] ? __unwind_start+0x169/0x330 [ 722.035383] should_fail+0x8c0/0xa40 [ 722.039093] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 722.044196] ? save_stack+0xa3/0xd0 [ 722.047820] ? save_stack+0x43/0xd0 [ 722.051440] ? kasan_kmalloc+0xad/0xe0 [ 722.055323] ? kasan_slab_alloc+0x12/0x20 [ 722.059468] ? find_held_lock+0x35/0x1d0 [ 722.063535] ? check_same_owner+0x320/0x320 [ 722.067853] ? rcu_note_context_switch+0x710/0x710 [ 722.072778] should_failslab+0xec/0x120 [ 722.076743] kmem_cache_alloc_node_trace+0x5a/0x760 [ 722.081765] __kmalloc_node_track_caller+0x33/0x70 [ 722.086693] __kmalloc_reserve.isra.39+0x41/0xd0 [ 722.091443] __alloc_skb+0x13b/0x780 [ 722.095153] ? skb_copy_and_csum_dev+0x370/0x370 [ 722.099904] ? find_held_lock+0x35/0x1d0 [ 722.103963] ? __fget+0x342/0x5b0 [ 722.107412] ? security_socket_getpeersec_dgram+0x91/0xc0 [ 722.112944] netlink_sendmsg+0xa86/0xe60 [ 722.117003] ? netlink_unicast+0x6b0/0x6b0 [ 722.121236] ? security_socket_sendmsg+0x89/0xb0 [ 722.125982] ? netlink_unicast+0x6b0/0x6b0 [ 722.130210] sock_sendmsg+0xca/0x110 [ 722.133915] sock_write_iter+0x31a/0x5d0 [ 722.137968] ? sock_sendmsg+0x110/0x110 [ 722.141943] ? iov_iter_init+0xaf/0x1d0 [ 722.145914] __vfs_write+0x684/0x970 [ 722.149620] ? kernel_read+0x120/0x120 [ 722.153511] ? wait_for_completion+0x770/0x770 [ 722.158091] ? rw_verify_area+0xe5/0x2b0 [ 722.162136] ? __fdget_raw+0x20/0x20 [ 722.165828] vfs_write+0x189/0x510 [ 722.169343] SyS_write+0xef/0x220 [ 722.172769] ? SyS_read+0x220/0x220 [ 722.176374] ? do_syscall_64+0xb7/0x940 [ 722.180323] ? SyS_read+0x220/0x220 [ 722.183927] do_syscall_64+0x281/0x940 [ 722.187800] ? vmalloc_sync_all+0x30/0x30 [ 722.191932] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 722.197443] ? syscall_return_slowpath+0x550/0x550 [ 722.202345] ? syscall_return_slowpath+0x2ac/0x550 [ 722.207252] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 722.212590] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 722.217408] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 722.222577] RIP: 0033:0x454e79 [ 722.225742] RSP: 002b:00007f8b0365bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 722.233422] RAX: ffffffffffffffda RBX: 00007f8b0365c6d4 RCX: 0000000000454e79 [ 722.240671] RDX: 00000000000000cc RSI: 00000000200005c0 RDI: 0000000000000014 [ 722.247923] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 722.255172] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 722.262426] R13: 00000000000006af R14: 00000000006fc108 R15: 0000000000000001 [ 722.281850] device bridge0 left promiscuous mode [ 722.290523] device bridge0 left promiscuous mode 2018/03/31 11:16:57 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r3 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r4 = accept4(0xffffffffffffffff, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) r5 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r5, 0x400448c8, &(0x7f0000000840)=ANY=[@ANYRES32=r4, @ANYRES32=r3, @ANYBLOB="52ff010000000000", @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYBLOB], @ANYBLOB="000101000000000001000000060000008cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c520f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223"]) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a8aa852b8e27cc4bed332dce5509fd49b6bd003f5b909778d20c97eda3326371d0d383e1c5f6e3fc2f5e61c4ce6b047104b3f22820012533d5e52a704f1faa5bb4478a0c58345f1aa8bbf1e7fd008c4", 0xc4) 2018/03/31 11:16:57 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:57 executing program 3 (fault-call:2 fault-nth:22): open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f00000006c0), 0x33040, &(0x7f00000006c0)=ANY=[]) mount(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='xfs\x00', 0x80c400, 0x0) 2018/03/31 11:16:57 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f0000a8bfff)=""/1, 0x805031ae) mlockall(0x2) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)) ioctl$TCXONC(r1, 0x540a, 0x3) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000180)) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x4000, 0x0) semget$private(0x0, 0x7, 0x0) syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x3400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x34, r3, 0x0, 0x0, 0x25dfdbfb, {0x9}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x54}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x200}]}, 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x4040014) getsockopt$llc_int(r2, 0x10c, 0x0, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 2018/03/31 11:16:57 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xffffffffffffff85) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000002c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r3 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r4 = accept4(r2, &(0x7f00000001c0)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r4, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r5 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f0000000040)=0x2, 0x4) ioctl$sock_bt_hidp_HIDPCONNADD(r5, 0x400448c8, &(0x7f0000000840)={0xffffffffffffffff, r3, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x0, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c284361"}) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e", 0x60) 2018/03/31 11:16:57 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000280)={{{@in=@local, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xe8) r4 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r5 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r5, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r6 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r6, 0x400448c8, &(0x7f0000000840)=ANY=[@ANYRES32=r5, @ANYRES32=r4, @ANYBLOB="52ff010000000000", @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYBLOB="e411b82d239f02360b33ab01086a0910f47bfaaa10d5cb1dd0d5e6120a061bee3a5045c09ff7eb5a798d477b3db7121ae6a2193d00a22c1d20a716d6fb8def52aaf549d2"], @ANYBLOB="00010100470d000001000000060000008cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42ad6961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"]) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r6, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="e3b40600ffffffff0400f0ff0000fafffb0e41da189c304034954b00a7172d5e6dc38f66721366162882a4b0446dab26cec9fe84f07c159cf49afd24cace5f89fb796dcf6b63f8c34f74923a544e4b9117efca7fcf0d58ef9782471fc22b1cd4d176eb466033081f5586965779409edd2110c47c593b483c5ced0bc800e7845f453818e2132c03ad73f4deb06e463de7bfeeaa6d5b35bb64800f5b11638eabab477af9deec6901ecddc340c4159fd55e378eec26aa4ad929b91e15017c9e7349a2d6a972cc7d757062c059dbbe5ca8ade65bb423aa45b1ba0f5c01a9997f104ae8b1530200b507d4c8db246a7375c203cd2961957b180236e6ee9ba5d55fae5a254bf7bbcd948f625d4bfd8a2231bf9b7c5f0000000000"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:57 executing program 7 (fault-call:0 fault-nth:5): syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000180)={[{@session={'session', 0x3d, [0x34, 0x0]}, 0x2c}]}) 2018/03/31 11:16:57 executing program 0 (fault-call:22 fault-nth:2): r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r3 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r4 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r4, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r5 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r5, 0x400448c8, &(0x7f0000000840)={r4, r3, 0xffffffffffffff52, 0x1, &(0x7f00000006c0)="e411b82d239f02360b33ab01086a0910f47bfaaa10d5cb1dd0d5e6120a061bee3a5045c09ff7eb5a798d477b3db7121ae6a2193d00a22c1d20a716d6fb8def52aaf549d2", 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a8aa852b8e27cc4bed332dce5509fd49b6bd003f5b909778d20c97eda3326371d0d383e1c5f6e3fc2f5e61c4ce6b047104b3f22820012533d5e52a704f1faa5bb4478a0c58345f1aa8bbf1e7fd008c4bb82853615c5b545", 0xcc) [ 722.317764] device bridge0 left promiscuous mode [ 722.344716] FAULT_INJECTION: forcing a failure. [ 722.344716] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 722.356541] CPU: 1 PID: 16979 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #8 [ 722.363718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 722.366868] device bridge0 entered promiscuous mode [ 722.373058] Call Trace: [ 722.373077] dump_stack+0x194/0x24d [ 722.373093] ? arch_local_irq_restore+0x53/0x53 [ 722.373116] should_fail+0x8c0/0xa40 [ 722.373130] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 722.382273] device bridge0 entered promiscuous mode [ 722.384320] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 722.384336] ? find_held_lock+0x35/0x1d0 [ 722.384350] ? trace_hardirqs_off+0x10/0x10 [ 722.384363] ? trace_hardirqs_off+0x10/0x10 [ 722.420613] ? trace_hardirqs_off+0x10/0x10 [ 722.424938] ? find_held_lock+0x35/0x1d0 [ 722.428997] ? should_fail+0x23b/0xa40 [ 722.432886] __alloc_pages_nodemask+0x327/0xdd0 [ 722.437551] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 722.442567] ? find_held_lock+0x35/0x1d0 [ 722.446635] ? check_same_owner+0x320/0x320 [ 722.450948] cache_grow_begin+0x72/0x640 [ 722.455002] kmem_cache_alloc+0x400/0x760 [ 722.459147] ? do_sys_ftruncate.constprop.14+0x3b8/0x5d0 [ 722.464592] getname_flags+0xcb/0x580 [ 722.465527] device bridge0 entered promiscuous mode [ 722.468383] getname+0x19/0x20 [ 722.468394] do_sys_open+0x2e7/0x6d0 [ 722.468405] ? filp_open+0x70/0x70 [ 722.468417] ? do_sys_ftruncate.constprop.14+0x112/0x5d0 [ 722.468428] SyS_open+0x2d/0x40 2018/03/31 11:16:57 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:57 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="e3b40600ffffffff0400f0ff0000fafffb0e41da189c304034954b00a7172d5e6dc38f66721366162882a4b0446dab26cec9fe84f07c159cf49afd24cace5f89fb796dcf6b63f8c34f74923a544e4b9117efca7fcf0d58ef9782471fc22b1cd4d176eb466033081f5586965779409edd2110c47c593b483c5ced0bc800e7845f453818e2132c03ad73f4deb06e463de7bfeeaa6d5b35bb64800f5b11638eabab477af9deec6901ecddc340c4159fd55e378eec26aa4ad929b91e15017c9e7349a2d6a972cc7d757062c059dbbe5ca8ade65bb423aa45b1ba0f5c01a9997f104ae8b1530200b507d4c8db246a7375c203cd2961957b180236e6ee9ba5d55fae5a254bf7bbcd948f625d4bfd8a2231bf9b7c5f0000000000"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:57 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 722.492496] ? do_sys_open+0x6d0/0x6d0 [ 722.496382] do_syscall_64+0x281/0x940 [ 722.500265] ? vmalloc_sync_all+0x30/0x30 [ 722.504410] ? _raw_spin_unlock_irq+0x27/0x70 [ 722.508902] ? finish_task_switch+0x1c1/0x7e0 [ 722.513392] ? syscall_return_slowpath+0x550/0x550 [ 722.518310] ? syscall_return_slowpath+0x2ac/0x550 [ 722.523238] ? prepare_exit_to_usermode+0x350/0x350 [ 722.528255] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 722.533611] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 722.538449] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 722.543631] RIP: 0033:0x40f0d1 [ 722.546812] RSP: 002b:00007f2fe9255bb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 722.554514] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 000000000040f0d1 [ 722.561774] RDX: 00007f2fe9255c0a RSI: 0000000000000002 RDI: 00007f2fe9255c00 [ 722.569031] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 722.569819] device bridge0 entered promiscuous mode [ 722.576282] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000014 [ 722.576288] R13: 0000000000000668 R14: 00000000006fba60 R15: 0000000000000005 2018/03/31 11:16:57 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 722.593250] ISOFS: Invalid session number or type of track [ 722.608007] FAULT_INJECTION: forcing a failure. [ 722.608007] name failslab, interval 1, probability 0, space 0, times 0 [ 722.608174] device bridge0 left promiscuous mode [ 722.619261] CPU: 1 PID: 16991 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #8 [ 722.624320] device bridge0 left promiscuous mode [ 722.631141] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 722.631145] Call Trace: [ 722.631162] dump_stack+0x194/0x24d [ 722.631177] ? arch_local_irq_restore+0x53/0x53 [ 722.636153] device bridge0 left promiscuous mode [ 722.645234] ? save_stack+0x43/0xd0 [ 722.645247] ? mutex_lock_io_nested+0x1900/0x1900 [ 722.645265] should_fail+0x8c0/0xa40 [ 722.672945] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 722.673880] ISOFS: Invalid session number [ 722.678042] ? trace_hardirqs_off+0x10/0x10 [ 722.678053] ? lock_downgrade+0x980/0x980 [ 722.678063] ? trace_hardirqs_off+0x10/0x10 [ 722.678073] ? find_held_lock+0x35/0x1d0 [ 722.678090] ? __lock_is_held+0xb6/0x140 [ 722.678106] ? check_same_owner+0x320/0x320 [ 722.678117] ? rcu_note_context_switch+0x710/0x710 [ 722.678125] ? rcu_note_context_switch+0x710/0x710 [ 722.678141] should_failslab+0xec/0x120 [ 722.678150] __kmalloc+0x63/0x760 [ 722.678163] ? __kmalloc_node+0x47/0x70 [ 722.687136] FAULT_INJECTION: forcing a failure. [ 722.687136] name failslab, interval 1, probability 0, space 0, times 0 [ 722.690719] ? __list_lru_init+0xcf/0x750 [ 722.690732] __list_lru_init+0xcf/0x750 [ 722.690745] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 722.690757] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 722.690771] ? lockdep_init_map+0x9/0x10 [ 722.690783] sget_userns+0x6b1/0xe40 [ 722.690790] ? kill_litter_super+0x90/0x90 [ 722.690801] ? ns_test_super+0x50/0x50 [ 722.774857] ? destroy_unused_super.part.6+0xd0/0xd0 [ 722.779940] ? do_raw_spin_trylock+0x190/0x190 [ 722.784507] ? kobject_put+0x6b/0x250 [ 722.788292] ? blkdev_get+0x3a1/0xb00 [ 722.792084] ? cap_capable+0x1b5/0x230 [ 722.795954] ? __blkdev_get+0x13b0/0x13b0 [ 722.800086] ? security_capable+0x8e/0xc0 [ 722.804218] ? kill_litter_super+0x90/0x90 [ 722.808436] ? ns_capable_common+0xcf/0x160 [ 722.812741] ? ns_test_super+0x50/0x50 [ 722.816608] ? kill_litter_super+0x90/0x90 [ 722.820822] sget+0xd2/0x120 [ 722.823827] mount_bdev+0x109/0x370 [ 722.827437] ? xfs_test_remount_options.isra.19+0x90/0x90 [ 722.832954] xfs_fs_mount+0x34/0x40 [ 722.836560] mount_fs+0x66/0x2d0 [ 722.839912] vfs_kern_mount.part.26+0xc6/0x4a0 [ 722.844475] ? may_umount+0xa0/0xa0 [ 722.848088] ? _raw_read_unlock+0x22/0x30 [ 722.852218] ? __get_fs_type+0x8a/0xc0 [ 722.856093] do_mount+0xea4/0x2bb0 [ 722.859614] ? __might_fault+0x110/0x1d0 [ 722.863661] ? copy_mount_string+0x40/0x40 [ 722.867875] ? check_same_owner+0x320/0x320 [ 722.872180] ? __check_object_size+0x8b/0x530 [ 722.876659] ? __might_sleep+0x95/0x190 [ 722.880617] ? kasan_check_write+0x14/0x20 [ 722.884831] ? _copy_from_user+0x99/0x110 [ 722.888970] ? memdup_user+0x5e/0x90 [ 722.892666] ? copy_mount_options+0x1f7/0x2e0 [ 722.897145] SyS_mount+0xab/0x120 [ 722.900579] ? copy_mnt_ns+0xb30/0xb30 [ 722.904452] do_syscall_64+0x281/0x940 [ 722.908322] ? vmalloc_sync_all+0x30/0x30 [ 722.912452] ? _raw_spin_unlock_irq+0x27/0x70 [ 722.916929] ? finish_task_switch+0x1c1/0x7e0 [ 722.921403] ? syscall_return_slowpath+0x550/0x550 [ 722.926312] ? syscall_return_slowpath+0x2ac/0x550 [ 722.931221] ? prepare_exit_to_usermode+0x350/0x350 [ 722.936219] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 722.941568] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 722.946398] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 722.951568] RIP: 0033:0x454e79 [ 722.954737] RSP: 002b:00007ff701201c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 722.962426] RAX: ffffffffffffffda RBX: 00007ff7012026d4 RCX: 0000000000454e79 [ 722.969675] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 00000000200007c0 [ 722.976925] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 722.984175] R10: 000000000080c400 R11: 0000000000000246 R12: 0000000000000014 [ 722.991431] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000016 [ 722.998697] CPU: 0 PID: 16998 Comm: syz-executor0 Not tainted 4.16.0-rc7+ #8 [ 723.005880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 723.015223] Call Trace: [ 723.017802] dump_stack+0x194/0x24d [ 723.021421] ? arch_local_irq_restore+0x53/0x53 [ 723.026078] should_fail+0x8c0/0xa40 [ 723.029783] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 723.034882] ? netlink_dump+0x96/0xcf0 [ 723.038766] ? lock_release+0xa40/0xa40 [ 723.039667] ISOFS: Unable to identify CD-ROM format. 2018/03/31 11:16:58 executing program 3 (fault-call:2 fault-nth:23): open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f00000006c0), 0x33040, &(0x7f00000006c0)=ANY=[]) mount(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='xfs\x00', 0x80c400, 0x0) [ 723.042727] ? check_same_owner+0x320/0x320 [ 723.042738] ? netlink_dump+0x96/0xcf0 [ 723.042752] ? find_held_lock+0x35/0x1d0 [ 723.042764] ? __lock_is_held+0xb6/0x140 [ 723.042781] ? check_same_owner+0x320/0x320 [ 723.042795] ? rcu_note_context_switch+0x710/0x710 [ 723.042811] should_failslab+0xec/0x120 [ 723.042821] kmem_cache_alloc_node+0x56/0x760 [ 723.081708] ? __netlink_dump_start+0x4e4/0x710 [ 723.086354] ? lock_downgrade+0x980/0x980 [ 723.090485] __alloc_skb+0xf1/0x780 [ 723.094094] ? skb_copy_and_csum_dev+0x370/0x370 [ 723.098839] ? __mutex_unlock_slowpath+0xe9/0xac0 [ 723.103672] ? sock_diag_rcv+0x1b/0x40 [ 723.107540] ? wait_for_completion+0x770/0x770 [ 723.112111] netlink_dump+0x545/0xcf0 [ 723.115885] ? find_held_lock+0x35/0x1d0 [ 723.119919] ? netlink_broadcast+0x50/0x50 [ 723.124130] __netlink_dump_start+0x4ec/0x710 [ 723.128605] packet_diag_handler_dump+0x243/0x310 [ 723.133427] ? pdiag_put_ring+0x530/0x530 [ 723.137559] ? packet_diag_handler_dump+0x310/0x310 [ 723.142553] ? netlink_deliver_tap+0x2e9/0xf90 [ 723.147114] sock_diag_rcv_msg+0x204/0x360 [ 723.151323] netlink_rcv_skb+0x14b/0x380 [ 723.155363] ? sock_diag_bind+0x70/0x70 [ 723.159316] ? netlink_ack+0xa10/0xa10 [ 723.163181] ? netlink_skb_destructor+0x1d0/0x1d0 [ 723.168001] sock_diag_rcv+0x2a/0x40 [ 723.171699] netlink_unicast+0x4c4/0x6b0 [ 723.175743] ? netlink_attachskb+0x8a0/0x8a0 [ 723.180130] ? security_netlink_send+0x81/0xb0 [ 723.184686] netlink_sendmsg+0xa4a/0xe60 [ 723.188735] ? netlink_unicast+0x6b0/0x6b0 [ 723.192955] ? security_socket_sendmsg+0x89/0xb0 [ 723.197693] ? netlink_unicast+0x6b0/0x6b0 [ 723.201911] sock_sendmsg+0xca/0x110 [ 723.205598] sock_write_iter+0x31a/0x5d0 [ 723.209641] ? sock_sendmsg+0x110/0x110 [ 723.213613] ? iov_iter_init+0xaf/0x1d0 [ 723.217574] __vfs_write+0x684/0x970 [ 723.221266] ? kernel_read+0x120/0x120 [ 723.225137] ? wait_for_completion+0x770/0x770 [ 723.229699] ? rw_verify_area+0xe5/0x2b0 [ 723.233737] ? __fdget_raw+0x20/0x20 [ 723.237438] vfs_write+0x189/0x510 [ 723.240961] SyS_write+0xef/0x220 [ 723.244389] ? SyS_read+0x220/0x220 [ 723.247999] ? do_syscall_64+0xb7/0x940 [ 723.251959] ? SyS_read+0x220/0x220 [ 723.255564] do_syscall_64+0x281/0x940 [ 723.259427] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 723.264937] ? syscall_return_slowpath+0x550/0x550 [ 723.269839] ? syscall_return_slowpath+0x2ac/0x550 [ 723.274746] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 723.280090] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 723.284909] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 723.290076] RIP: 0033:0x454e79 2018/03/31 11:16:58 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) r2 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0xe58, 0x2080) ioctl$sock_bt_cmtp_CMTPCONNDEL(r2, 0x400443c9, &(0x7f0000000200)={{0xfffffffeffffffff, 0x7, 0x4, 0x2a, 0x100, 0xffffffff}, 0x7}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000280)=0xffffffffffffffa4) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000029c0)) r4 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000005f00)) r5 = accept4(r3, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r6, &(0x7f0000065000)={&(0x7f0000da5000)={0x10}, 0xc, &(0x7f0000402ff2)={&(0x7f00009d0000)={0x30, 0xc, 0x6, 0xfffffffffffffffd, 0x0, 0x0, {}, [@nested={0x1c, 0x1, [@typed={0x18, 0x0, @ipv6=@mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x30}, 0x1}, 0x0) setsockopt$ipx_IPX_TYPE(r5, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r5, r4, 0xffffffffffffff52, 0x1, &(0x7f00000006c0)="e411b82d239f02360b33ab01086a0910f47bfaaa10d5cb1dd0d5e6120a061bee3a5045c09ff7eb5a798d477b3db7121ae6a2193d00a22c1d20a716d6fb8def52aaf549d2", 0x0, 0x1, 0x80, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r3, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:58 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x20, 0x100) execveat(r3, &(0x7f0000000200)='./file0\x00', &(0x7f0000000940)=[&(0x7f0000000280)='bridge0\x00', &(0x7f00000002c0)='bridge0\x00', &(0x7f0000000300)='bridge0\x00', &(0x7f0000000340)='wlan1)ppp1:[ppp1#\x00', &(0x7f00000004c0)='bridge0\x00', &(0x7f0000000500)='bridge0\x00', &(0x7f0000000540)='bridge0\x00', &(0x7f0000000580)='bridge0\x00', &(0x7f00000006c0)='bridge0\x00'], &(0x7f0000000a00)=[&(0x7f0000000700)='posix_acl_access]#security\x00', &(0x7f0000000800)='bridge0\x00', &(0x7f00000009c0)='#+eth0.]\x00'], 0x1000) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000001c0)) r4 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r5 = accept4(0xffffffffffffffff, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) r6 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r6, 0x400448c8, &(0x7f0000000840)={r5, r4, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223"}) rt_sigaction(0x21, &(0x7f0000000a40)={0xffffffff, {0x8}, 0x88000004, 0x4}, &(0x7f0000000a80), 0x8, &(0x7f0000000ac0)) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a8aa852b8e27cc4bed332dce5509fd49b6bd003f5b909778d20c97eda3326371d0d383e1c5f6e3fc2f5e61c4ce6b047104b3f22820012533d5e52a704f1faa5bb4478a0c58345f1aa8bbf1e7fd008c4", 0xc4) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000b00)={r3}) 2018/03/31 11:16:58 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r3 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r4 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) getsockopt$ipx_IPX_TYPE(r4, 0x100, 0x1, &(0x7f0000000040), &(0x7f0000000280)=0x4) setsockopt$ipx_IPX_TYPE(r4, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r5 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r4, 0xc05c5340, &(0x7f00000001c0)={0x2, 0xff, 0x3, {0x0, 0x989680}, 0x100, 0x40}) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x3, 0x0) write$eventfd(r6, &(0x7f00000004c0)=0x5, 0x8) ioctl$sock_bt_hidp_HIDPCONNADD(r5, 0x400448c8, &(0x7f0000000840)={0xffffffffffffffff, r3, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x0, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c284361"}) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000001240)={0x0, 0x1000, "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"}, &(0x7f00000002c0)=0x1008) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r4, 0x84, 0x7c, &(0x7f0000000300)={r7, 0x400000000000, 0x5}, 0x8) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e", 0x60) [ 723.293246] RSP: 002b:00007f8b0365bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 723.300934] RAX: ffffffffffffffda RBX: 00007f8b0365c6d4 RCX: 0000000000454e79 [ 723.308182] RDX: 00000000000000cc RSI: 00000000200005c0 RDI: 0000000000000014 [ 723.315431] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 723.322681] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 723.329926] R13: 00000000000006af R14: 00000000006fc108 R15: 0000000000000002 2018/03/31 11:16:58 executing program 7: syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000180)={[{@session={'session', 0x3d, [0x34, 0x0]}, 0x2c}]}) 2018/03/31 11:16:58 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYBLOB="e3b40600ffffffff0400f0ff0000fafffb0e41da189c304034954b00a7172d5e6dc38f66721366162882a4b0446dab26cec9fe84f07c159cf49afd24cace5f89fb796dcf6b63f8c34f74923a544e4b9117efca7fcf0d58ef9782471fc22b1cd4d176eb466033081f5586965779409edd2110c47c593b483c5ced0bc800e7845f453818e2132c03ad73f4deb06e463de7bfeeaa6d5b35bb64800f5b11638eabab477af9deec6901ecddc340c4159fd55e378eec26aa4ad929b91e15017c9e7349a2d6a972cc7d757062c059dbbe5ca8ade65bb423aa45b1ba0f5c01a9997f104ae8b1530200b507d4c8db246a7375c203cd2961957b180236e6ee9ba5d55fae5a254bf7bbcd948f625d4bfd8a2231bf9b7c5f0000000000"], 0x1) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 723.380432] device bridge0 entered promiscuous mode [ 723.391746] device bridge0 entered promiscuous mode [ 723.403475] FAULT_INJECTION: forcing a failure. [ 723.403475] name failslab, interval 1, probability 0, space 0, times 0 [ 723.414807] CPU: 0 PID: 17025 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #8 [ 723.421986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 723.431326] Call Trace: [ 723.433912] dump_stack+0x194/0x24d [ 723.437541] ? arch_local_irq_restore+0x53/0x53 [ 723.442205] ? kernel_text_address+0xd1/0xe0 [ 723.446607] ? __unwind_start+0x169/0x330 [ 723.449195] device bridge0 entered promiscuous mode [ 723.450753] should_fail+0x8c0/0xa40 [ 723.450768] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 723.450787] ? save_stack+0x43/0xd0 [ 723.450796] ? kasan_kmalloc+0xad/0xe0 [ 723.450805] ? __kmalloc+0x162/0x760 [ 723.459555] device bridge0 left promiscuous mode 2018/03/31 11:16:58 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 723.464581] ? __list_lru_init+0xcf/0x750 [ 723.464597] ? find_held_lock+0x35/0x1d0 [ 723.464611] ? __lock_is_held+0xb6/0x140 [ 723.464630] ? check_same_owner+0x320/0x320 [ 723.464642] ? rcu_note_context_switch+0x710/0x710 [ 723.502352] should_failslab+0xec/0x120 [ 723.502363] kmem_cache_alloc_node_trace+0x5a/0x760 [ 723.502373] ? mark_held_locks+0xaf/0x100 [ 723.502382] ? __raw_spin_lock_init+0x1c/0x100 [ 723.502393] __kmalloc_node+0x33/0x70 [ 723.502405] kvmalloc_node+0x99/0xd0 [ 723.502416] __list_lru_init+0x5d5/0x750 [ 723.502427] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 723.502437] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 723.502450] ? lockdep_init_map+0x9/0x10 [ 723.502460] sget_userns+0x6b1/0xe40 [ 723.502467] ? kill_litter_super+0x90/0x90 [ 723.502477] ? ns_test_super+0x50/0x50 [ 723.502486] ? destroy_unused_super.part.6+0xd0/0xd0 [ 723.502493] ? do_raw_spin_trylock+0x190/0x190 [ 723.502507] ? kobject_put+0x6b/0x250 2018/03/31 11:16:58 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f0000a8bfff)=""/1, 0x805031ae) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)) ioctl$TCXONC(r1, 0x540a, 0x3) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000100)) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x4000, 0x0) semget$private(0x0, 0x7, 0x0) syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x3400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x34, r3, 0x0, 0x0, 0x25dfdbfb, {0x9}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x54}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x200}]}, 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x4040014) getsockopt$llc_int(r2, 0x10c, 0x0, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 2018/03/31 11:16:58 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32], 0x1) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:58 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r3 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r4 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r4, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r5 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r5, 0x400448c8, &(0x7f0000000840)={r4, r3, 0xffffffffffffff52, 0x1, &(0x7f00000006c0)="e411b82d239f02360b33ab01086a0910f47bfaaa10d5cb1dd0d5e6120a061bee3a5045c09ff7eb5a798d477b3db7121ae6a2193d00a22c1d20a716d6fb8def52aaf549d2", 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a8aa852b8e27cc4bed332dce5509fd49b6bd003f5b909778d20c97eda3326371d0d383e1c5f6e3fc2f5e61c4ce6b047104b3f22820012533d5e52a704f1faa5bb4478a0c58345f1aa8bbf1e7fd008c4bb82853615c5b545", 0xcc) 2018/03/31 11:16:58 executing program 3 (fault-call:2 fault-nth:24): open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f00000006c0), 0x33040, &(0x7f00000006c0)=ANY=[]) mount(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='xfs\x00', 0x80c400, 0x0) 2018/03/31 11:16:58 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32], 0x1) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 723.502526] ? blkdev_get+0x3a1/0xb00 [ 723.502538] ? cap_capable+0x1b5/0x230 [ 723.502546] ? __blkdev_get+0x13b0/0x13b0 [ 723.502557] ? security_capable+0x8e/0xc0 [ 723.502566] ? kill_litter_super+0x90/0x90 [ 723.502575] ? ns_capable_common+0xcf/0x160 [ 723.502584] ? ns_test_super+0x50/0x50 [ 723.502590] ? kill_litter_super+0x90/0x90 [ 723.502598] sget+0xd2/0x120 [ 723.502609] mount_bdev+0x109/0x370 [ 723.502618] ? xfs_test_remount_options.isra.19+0x90/0x90 [ 723.502628] xfs_fs_mount+0x34/0x40 2018/03/31 11:16:59 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32], 0x1) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 723.502637] mount_fs+0x66/0x2d0 [ 723.502652] vfs_kern_mount.part.26+0xc6/0x4a0 [ 723.502664] ? may_umount+0xa0/0xa0 [ 723.502678] ? _raw_read_unlock+0x22/0x30 [ 723.502686] ? __get_fs_type+0x8a/0xc0 [ 723.502697] do_mount+0xea4/0x2bb0 [ 723.502703] ? __might_fault+0x110/0x1d0 [ 723.502714] ? copy_mount_string+0x40/0x40 [ 723.502722] ? check_same_owner+0x320/0x320 [ 723.502731] ? __check_object_size+0x8b/0x530 [ 723.502743] ? __might_sleep+0x95/0x190 [ 723.502754] ? kasan_check_write+0x14/0x20 [ 723.502763] ? _copy_from_user+0x99/0x110 [ 723.502773] ? memdup_user+0x5e/0x90 [ 723.502779] ? copy_mount_options+0x1f7/0x2e0 [ 723.502788] SyS_mount+0xab/0x120 [ 723.502794] ? copy_mnt_ns+0xb30/0xb30 [ 723.502805] do_syscall_64+0x281/0x940 [ 723.502815] ? vmalloc_sync_all+0x30/0x30 [ 723.502822] ? _raw_spin_unlock_irq+0x27/0x70 [ 723.502830] ? finish_task_switch+0x1c1/0x7e0 [ 723.502838] ? syscall_return_slowpath+0x550/0x550 [ 723.502847] ? syscall_return_slowpath+0x2ac/0x550 [ 723.502855] ? prepare_exit_to_usermode+0x350/0x350 [ 723.502865] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 723.502876] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 723.502888] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 723.502894] RIP: 0033:0x454e79 [ 723.502899] RSP: 002b:00007ff701201c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 723.502908] RAX: ffffffffffffffda RBX: 00007ff7012026d4 RCX: 0000000000454e79 [ 723.502913] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 00000000200007c0 [ 723.502917] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 723.502922] R10: 000000000080c400 R11: 0000000000000246 R12: 0000000000000014 [ 723.502926] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000017 [ 723.514285] device bridge0 left promiscuous mode [ 723.652770] ISOFS: Invalid session number or type of track [ 723.668953] netlink: 'syz-executor4': attribute type 1 has an invalid length. [ 723.672138] device bridge0 entered promiscuous mode [ 723.708363] ISOFS: Invalid session number [ 723.755509] device bridge0 left promiscuous mode 2018/03/31 11:16:59 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r3 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000180)) r4 = fcntl$dupfd(r0, 0x406, r2) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r4, &(0x7f0000000280)="aedb2b972dbd681eceb94d01f89fd4d0e87016631d802ce68fa765984263860d082a3e44bb104d20469a81a326124c45cad47fb3a576debfcca90fc77a7e3845df963cf383e748fdf8b63c750dda73dbcd4606576465b7e4f7a8dd8a2c4333b7f5cfac0648bafa200fb612b8ae46efba0b25aee61e841b48f980c966aa343d9e7675dcbb9c8d93e87f16842cd33fb8329327e5b668d78e42cbd63adaebd0bbc842c66a53ef75f487db05844043855a2d5126c18b940b8f85014ea86c93b67399457300b31a1d20bac1c05a795e", &(0x7f0000000040)=""/28}, 0x18) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r5 = accept4(0xffffffffffffffff, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) fsync(r0) r6 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r6, 0x400448c8, &(0x7f0000000840)=ANY=[@ANYRES32=r5, @ANYRES32=r3, @ANYBLOB="c67742ce4492f1c7", @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYBLOB], @ANYBLOB="000101000000000001000000060000008cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223"]) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a8aa852b8e27cc4bed332dce5509fd49b6bd003f5b909778d20c97eda3326371d0d383e1c5f6e3fc2f5e61c4ce6b047104b3f22820012533d5e52a704f1faa5bb4478a0c58345f1aa8bbf1e7fd008c4", 0xc4) 2018/03/31 11:16:59 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 723.829758] FAULT_INJECTION: forcing a failure. [ 723.829758] name failslab, interval 1, probability 0, space 0, times 0 [ 723.839150] ISOFS: Unable to identify CD-ROM format. [ 723.841150] CPU: 0 PID: 17061 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #8 [ 723.853300] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 723.862646] Call Trace: [ 723.865236] dump_stack+0x194/0x24d [ 723.868866] ? arch_local_irq_restore+0x53/0x53 [ 723.873542] should_fail+0x8c0/0xa40 [ 723.877260] ? is_bpf_text_address+0xa4/0x120 2018/03/31 11:16:59 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 723.881752] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 723.886851] ? __kernel_text_address+0xd/0x40 [ 723.891343] ? unwind_get_return_address+0x61/0xa0 [ 723.896278] ? find_held_lock+0x35/0x1d0 [ 723.900337] ? __lock_is_held+0xb6/0x140 [ 723.904403] ? check_same_owner+0x320/0x320 [ 723.908727] ? rcu_note_context_switch+0x710/0x710 [ 723.913661] should_failslab+0xec/0x120 [ 723.917629] kmem_cache_alloc_trace+0x4b/0x740 [ 723.922209] ? __kmalloc_node+0x33/0x70 [ 723.926177] ? __kmalloc_node+0x33/0x70 2018/03/31 11:16:59 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 723.930150] ? rcu_read_lock_sched_held+0x108/0x120 [ 723.935168] __memcg_init_list_lru_node+0x169/0x270 [ 723.938561] device bridge0 entered promiscuous mode [ 723.940176] ? list_lru_add+0x7c0/0x7c0 [ 723.940187] ? __kmalloc_node+0x47/0x70 [ 723.940203] __list_lru_init+0x544/0x750 [ 723.940219] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 723.940231] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 723.940244] ? lockdep_init_map+0x9/0x10 [ 723.940255] sget_userns+0x6b1/0xe40 [ 723.948489] netlink: 'syz-executor4': attribute type 1 has an invalid length. [ 723.949203] ? kill_litter_super+0x90/0x90 [ 723.949215] ? ns_test_super+0x50/0x50 [ 723.949226] ? destroy_unused_super.part.6+0xd0/0xd0 [ 723.996221] ? do_raw_spin_trylock+0x190/0x190 [ 724.000799] ? kobject_put+0x6b/0x250 [ 724.004593] ? blkdev_get+0x3a1/0xb00 [ 724.008392] ? cap_capable+0x1b5/0x230 [ 724.012274] ? __blkdev_get+0x13b0/0x13b0 [ 724.016415] ? security_capable+0x8e/0xc0 [ 724.020561] ? kill_litter_super+0x90/0x90 [ 724.024788] ? ns_capable_common+0xcf/0x160 [ 724.029106] ? ns_test_super+0x50/0x50 [ 724.032983] ? kill_litter_super+0x90/0x90 [ 724.037206] sget+0xd2/0x120 [ 724.040218] mount_bdev+0x109/0x370 [ 724.043838] ? xfs_test_remount_options.isra.19+0x90/0x90 [ 724.049374] xfs_fs_mount+0x34/0x40 [ 724.052990] mount_fs+0x66/0x2d0 [ 724.056353] vfs_kern_mount.part.26+0xc6/0x4a0 [ 724.060921] ? may_umount+0xa0/0xa0 [ 724.064532] ? _raw_read_unlock+0x22/0x30 [ 724.068659] ? __get_fs_type+0x8a/0xc0 [ 724.072526] do_mount+0xea4/0x2bb0 [ 724.076044] ? __might_fault+0x110/0x1d0 [ 724.080079] ? copy_mount_string+0x40/0x40 [ 724.084291] ? check_same_owner+0x320/0x320 [ 724.088598] ? __check_object_size+0x8b/0x530 [ 724.093080] ? __might_sleep+0x95/0x190 [ 724.097038] ? kasan_check_write+0x14/0x20 [ 724.101252] ? _copy_from_user+0x99/0x110 [ 724.105381] ? memdup_user+0x5e/0x90 [ 724.109073] ? copy_mount_options+0x1f7/0x2e0 [ 724.113544] SyS_mount+0xab/0x120 [ 724.116969] ? copy_mnt_ns+0xb30/0xb30 [ 724.120844] do_syscall_64+0x281/0x940 [ 724.124713] ? vmalloc_sync_all+0x30/0x30 [ 724.128838] ? _raw_spin_unlock_irq+0x27/0x70 [ 724.133310] ? finish_task_switch+0x1c1/0x7e0 [ 724.137777] ? syscall_return_slowpath+0x550/0x550 [ 724.142681] ? syscall_return_slowpath+0x2ac/0x550 [ 724.147592] ? prepare_exit_to_usermode+0x350/0x350 [ 724.152591] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 724.157947] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 724.162773] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 724.167943] RIP: 0033:0x454e79 [ 724.171117] RSP: 002b:00007ff701201c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 724.178809] RAX: ffffffffffffffda RBX: 00007ff7012026d4 RCX: 0000000000454e79 [ 724.186050] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 00000000200007c0 [ 724.193298] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 724.200550] R10: 000000000080c400 R11: 0000000000000246 R12: 0000000000000014 [ 724.207801] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000018 [ 724.218247] device bridge0 left promiscuous mode [ 724.231286] device bridge0 left promiscuous mode [ 724.240656] device bridge0 left promiscuous mode 2018/03/31 11:16:59 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r3 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r4 = accept4(0xffffffffffffffff, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) getsockopt$SO_COOKIE(r4, 0x1, 0x39, &(0x7f0000000040), &(0x7f00000001c0)=0x8) r5 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r5, 0x400448c8, &(0x7f0000000980)=ANY=[@ANYRES32=r4, @ANYRES32=r3, @ANYBLOB="52ff1600000000007ce786376bb075c36dde1f1d071dad6ae82d7455d1f254703b625f777849ea2662bae91be7765534b38cfe020093d81ff935d4cf25335abfb61d31411fa713050000", @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYBLOB], @ANYBLOB="000101000000000001000000060000008cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223"]) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a8aa852b8e27cc4bed332dce5509fd49b6bd003f5b909778d20c97eda3326371d0d383e1c5f6e3fc2f5e61c4ce6b047104b3f22820012533d5e52a704f1faa5bb4478a0c58345f1aa8bbf1e7fd008c4", 0xc4) 2018/03/31 11:16:59 executing program 7: syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000180)={[{@session={'session', 0x3d, [0x34, 0x0]}, 0x2c}]}) r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x556, 0x101000) bind(r0, &(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, r1, {0x2, 0x4e22, @loopback=0x7f000001}, 0x3, 0x3, 0x0, 0x4}}, 0x80) 2018/03/31 11:16:59 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0x6}) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f0000a8bfff)=""/1, 0x805031ae) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)) ioctl$TCXONC(r1, 0x540a, 0x3) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000180)) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x10000, 0x0) semget$private(0x0, 0x7, 0x0) syz_open_pts(r0, 0x0) munmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f000076c000)='pagemap\x00') sendfile(r3, r4, &(0x7f0000014000), 0xffff) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='net/if_inet6\x00') r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/dev\x00') sendfile(r6, r5, &(0x7f0000000140)=0x4000000, 0x400000ff) r7 = socket$packet(0x11, 0x2, 0x300) getpeername$packet(r7, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000001400)=0x14) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x1810000000001, 0x11, r7, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) setsockopt$inet6_tcp_buf(r8, 0x6, 0x3f, &(0x7f0000000400)="8218fe4b809c8edcc25d4a5aae0f513268292f70b82eb2c48742348bb3d183356e6beccab6c82afa23588a6b71192b2604d59bc43ade6df5a26d3fb19bc34cc6e15a7cec0445a8fec0f31a6a0dd54f59c0d77b8270e654e5a36500b9aea66eafe757ffb7965fe71ec0232e9ffddb4acd18b51192a36e29c1323fe4ef1d81ee787922ad0985d1363e52ca291f88b7122ce7674fe1cfb5471a1e0b04becd84131aed3841a245054d4837aa6fd034e208e9e0460ef2e2deae854623578e40e62973371e8666ca", 0xc5) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000240)) ioctl$DRM_IOCTL_CONTROL(0xffffffffffffffff, 0x40086414, &(0x7f0000000340)={0x3, 0xffff}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f0000000180)={&(0x7f0000000080)=[0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0], &(0x7f0000000100)=[0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0], 0x3, 0x1, 0x1, 0x3}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="b4512c0b0ac37500000710c42fc2b3029c9d00ff000003002be033ffffff7f00000000c30800004800ed5578"], 0x1}, 0x1, 0x0, 0x0, 0x20044014}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@remote={0xfe, 0x80, [], 0xbb}, 0x0, 0x1, 0x0, 0x400000000001, 0x0, 0x2}, 0x20) listen(r4, 0x8) 2018/03/31 11:16:59 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) userfaultfd(0x80800) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r3 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000180)) syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x646080) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r4 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r4, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r5 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r5, 0x400448c8, &(0x7f0000000840)=ANY=[@ANYRES32=r4, @ANYRES32=r3, @ANYBLOB="52ff010000000000", @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYBLOB="e411b82d239f02360b33ab01086a0910f47bfaaa10d5cb1dd0d5e6120a061bee3a5045c09ff7eb5a798d477b3db7121ae6a2193d00a22c1d20a716d6fb8def52aaf549d2"], @ANYBLOB="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"]) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a8aa852b8e27cc4bed332dce5509fd49b6bd003f5b909778d20c97eda3326371d0d383e1c5f6e3fc2f5e61c4ce6b047104b3f22820012533d5e52a704f1faa5bb4478a0c58345f1aa8bbf1e7fd008c4bb82853615c5b545", 0xcc) 2018/03/31 11:16:59 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r3 = socket$kcm(0x29, 0x0, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r4 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r4, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r5 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r5, 0x400448c8, &(0x7f0000000840)={r4, r3, 0xffffffffffffff52, 0x1, &(0x7f00000006c0)="e411b82d239f02360b33ab01086a0910f47bfaaa10d5cb1dd0d5e6120a061bee3a5045c09ff7eb5a798d477b3db7121ae6a2193d00a22c1d20a716d6fb8def52aaf549d2", 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:16:59 executing program 3 (fault-call:2 fault-nth:25): open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f00000006c0), 0x33040, &(0x7f00000006c0)=ANY=[]) mount(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='xfs\x00', 0x80c400, 0x0) 2018/03/31 11:16:59 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x1f) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r3 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r4 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r4, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r5 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r5, 0x400448c8, &(0x7f0000000840)={0xffffffffffffffff, r3, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x0, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c284361"}) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e", 0x60) 2018/03/31 11:16:59 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="e3b40600ffffffff0400f0ff0000fafffb0e41da189c304034954b00a7172d5e6dc38f66721366162882a4b0446dab26cec9fe84f07c159cf49afd24cace5f89fb796dcf6b63f8c34f74923a544e4b9117efca7fcf0d58ef9782471fc22b1cd4d176eb466033081f5586965779409edd2110c47c593b483c5ced0bc800e7845f453818e2132c03ad73f4deb0"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 724.629580] device bridge0 entered promiscuous mode [ 724.636652] device bridge0 entered promiscuous mode [ 724.642075] device bridge0 entered promiscuous mode [ 724.647888] device bridge0 entered promiscuous mode [ 724.650900] ISOFS: Invalid session number or type of track [ 724.663071] FAULT_INJECTION: forcing a failure. [ 724.663071] name failslab, interval 1, probability 0, space 0, times 0 [ 724.666609] ISOFS: Invalid session number [ 724.674354] CPU: 1 PID: 17109 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #8 [ 724.685634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 724.694976] Call Trace: [ 724.697566] dump_stack+0x194/0x24d [ 724.701190] ? arch_local_irq_restore+0x53/0x53 [ 724.705852] ? __save_stack_trace+0x7e/0xd0 [ 724.710178] should_fail+0x8c0/0xa40 [ 724.713888] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 724.719828] ? kasan_kmalloc+0xad/0xe0 [ 724.723722] ? kmem_cache_alloc_trace+0x136/0x740 [ 724.728556] ? __memcg_init_list_lru_node+0x169/0x270 [ 724.733743] ? __list_lru_init+0x544/0x750 [ 724.735556] ISOFS: Unable to identify CD-ROM format. [ 724.737964] ? sget_userns+0x6b1/0xe40 [ 724.737976] ? mount_fs+0x66/0x2d0 [ 724.737988] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 724.737996] ? do_mount+0xea4/0x2bb0 [ 724.738004] ? SyS_mount+0xab/0x120 [ 724.738015] ? do_syscall_64+0x281/0x940 [ 724.738026] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 724.738038] ? find_held_lock+0x35/0x1d0 [ 724.775972] ? __lock_is_held+0xb6/0x140 [ 724.780034] ? check_same_owner+0x320/0x320 [ 724.784355] ? rcu_note_context_switch+0x710/0x710 [ 724.789283] should_failslab+0xec/0x120 [ 724.793250] kmem_cache_alloc_trace+0x4b/0x740 [ 724.797823] ? __kmalloc_node+0x33/0x70 [ 724.801790] ? __kmalloc_node+0x33/0x70 [ 724.805759] ? rcu_read_lock_sched_held+0x108/0x120 [ 724.810771] __memcg_init_list_lru_node+0x169/0x270 [ 724.815785] ? list_lru_add+0x7c0/0x7c0 [ 724.819758] ? __kmalloc_node+0x47/0x70 [ 724.823737] __list_lru_init+0x544/0x750 2018/03/31 11:17:00 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="e3b40600ffffffff0400f0ff0000fafffb0e41da189c304034954b00a7172d5e6dc38f66721366162882a4b0446dab26cec9fe84f07c159cf49afd24cace5f89fb796dcf6b63f8c34f74923a544e4b9117efca7fcf0d58ef9782471fc22b1cd4d176eb466033081f5586965779409edd2110c47c593b483c5ced0bc800e7845f453818e2132c03ad73f4deb0"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:17:00 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="e3b40600ffffffff0400f0ff0000fafffb0e41da189c304034954b00a7172d5e6dc38f66721366162882a4b0446dab26cec9fe84f07c159cf49afd24cace5f89fb796dcf6b63f8c34f74923a544e4b9117efca7fcf0d58ef9782471fc22b1cd4d176eb466033081f5586965779409edd2110c47c593b483c5ced0bc800e7845f453818e2132c03ad73f4deb0"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:17:00 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="e3b40600ffffffff0400f0ff0000fafffb0e41da189c304034954b00a7172d5e6dc38f66721366162882a4b0446dab26cec9fe84f07c159cf49afd24cace5f89fb796dcf6b63f8c34f74923a544e4b9117efca7fcf0d58ef9782471fc22b1cd4d176eb466033081f5586965779409edd2110c47c593b483c5ced0bc800e7845f453818e2132c03ad73f4deb06e463de7bfeeaa6d5b35bb64800f5b11638eabab477af9deec6901ecddc340c4159fd55e378eec26aa4ad929b91e15017c9e7349a2d6a972cc7d757062c059dbbe5ca8ade65b"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 724.827793] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 724.833670] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 724.838683] ? lockdep_init_map+0x9/0x10 [ 724.842738] sget_userns+0x6b1/0xe40 [ 724.846447] ? kill_litter_super+0x90/0x90 [ 724.850677] ? ns_test_super+0x50/0x50 [ 724.854555] ? destroy_unused_super.part.6+0xd0/0xd0 [ 724.859657] ? do_raw_spin_trylock+0x190/0x190 [ 724.864244] ? kobject_put+0x6b/0x250 [ 724.868040] ? blkdev_get+0x3a1/0xb00 [ 724.871841] ? cap_capable+0x1b5/0x230 [ 724.875722] ? __blkdev_get+0x13b0/0x13b0 2018/03/31 11:17:00 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="e3b40600ffffffff0400f0ff0000fafffb0e41da189c304034954b00a7172d5e6dc38f66721366162882a4b0446dab26cec9fe84f07c159cf49afd24cace5f89fb796dcf6b63f8c34f74923a544e4b9117efca7fcf0d58ef9782471fc22b1cd4d176eb466033081f5586965779409edd2110c47c593b483c5ced0bc800e7845f453818e2132c03ad73f4deb06e463de7bfeeaa6d5b35bb64800f5b11638eabab477af9deec6901ecddc340c4159fd55e378eec26aa4ad929b91e15017c9e7349a2d6a972cc7d757062c059dbbe5ca8ade65b"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 724.879861] ? security_capable+0x8e/0xc0 [ 724.884001] ? kill_litter_super+0x90/0x90 [ 724.888227] ? ns_capable_common+0xcf/0x160 [ 724.892541] ? ns_test_super+0x50/0x50 [ 724.896418] ? kill_litter_super+0x90/0x90 [ 724.900645] sget+0xd2/0x120 [ 724.903656] mount_bdev+0x109/0x370 [ 724.907274] ? xfs_test_remount_options.isra.19+0x90/0x90 [ 724.912809] xfs_fs_mount+0x34/0x40 [ 724.916431] mount_fs+0x66/0x2d0 [ 724.919798] vfs_kern_mount.part.26+0xc6/0x4a0 [ 724.924377] ? may_umount+0xa0/0xa0 [ 724.927997] ? _raw_read_unlock+0x22/0x30 [ 724.932137] ? __get_fs_type+0x8a/0xc0 [ 724.936022] do_mount+0xea4/0x2bb0 [ 724.939568] ? __might_fault+0x110/0x1d0 [ 724.943623] ? copy_mount_string+0x40/0x40 [ 724.947853] ? check_same_owner+0x320/0x320 [ 724.952165] ? __check_object_size+0x8b/0x530 [ 724.956657] ? __might_sleep+0x95/0x190 [ 724.960628] ? kasan_check_write+0x14/0x20 [ 724.964853] ? _copy_from_user+0x99/0x110 [ 724.969001] ? memdup_user+0x5e/0x90 [ 724.972709] ? copy_mount_options+0x1f7/0x2e0 [ 724.977195] SyS_mount+0xab/0x120 [ 724.980639] ? copy_mnt_ns+0xb30/0xb30 [ 724.984517] do_syscall_64+0x281/0x940 [ 724.988398] ? vmalloc_sync_all+0x30/0x30 [ 724.992541] ? _raw_spin_unlock_irq+0x27/0x70 [ 724.997026] ? finish_task_switch+0x1c1/0x7e0 [ 725.001517] ? syscall_return_slowpath+0x550/0x550 [ 725.006440] ? syscall_return_slowpath+0x2ac/0x550 [ 725.011361] ? prepare_exit_to_usermode+0x350/0x350 [ 725.016370] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 725.021731] ? trace_hardirqs_off_thunk+0x1a/0x1c 2018/03/31 11:17:00 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="e3b40600ffffffff0400f0ff0000fafffb0e41da189c304034954b00a7172d5e6dc38f66721366162882a4b0446dab26cec9fe84f07c159cf49afd24cace5f89fb796dcf6b63f8c34f74923a544e4b9117efca7fcf0d58ef9782471fc22b1cd4d176eb466033081f5586965779409edd2110c47c593b483c5ced0bc800e7845f453818e2132c03ad73f4deb06e463de7bfeeaa6d5b35bb64800f5b11638eabab477af9deec6901ecddc340c4159fd55e378eec26aa4ad929b91e15017c9e7349a2d6a972cc7d757062c059dbbe5ca8ade65b"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:17:00 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="e3b40600ffffffff0400f0ff0000fafffb0e41da189c304034954b00a7172d5e6dc38f66721366162882a4b0446dab26cec9fe84f07c159cf49afd24cace5f89fb796dcf6b63f8c34f74923a544e4b9117efca7fcf0d58ef9782471fc22b1cd4d176eb466033081f5586965779409edd2110c47c593b483c5ced0bc800e7845f453818e2132c03ad73f4deb06e463de7bfeeaa6d5b35bb64800f5b11638eabab477af9deec6901ecddc340c4159fd55e378eec26aa4ad929b91e15017c9e7349a2d6a972cc7d757062c059dbbe5ca8ade65bb423aa45b1ba0f5c01a9997f104ae8b1530200b507d4c8db246a7375c203cd2961957b"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:17:00 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="e3b40600ffffffff0400f0ff0000fafffb0e41da189c304034954b00a7172d5e6dc38f66721366162882a4b0446dab26cec9fe84f07c159cf49afd24cace5f89fb796dcf6b63f8c34f74923a544e4b9117efca7fcf0d58ef9782471fc22b1cd4d176eb466033081f5586965779409edd2110c47c593b483c5ced0bc800e7845f453818e2132c03ad73f4deb06e463de7bfeeaa6d5b35bb64800f5b11638eabab477af9deec6901ecddc340c4159fd55e378eec26aa4ad929b91e15017c9e7349a2d6a972cc7d757062c059dbbe5ca8ade65bb423aa45b1ba0f5c01a9997f104ae8b1530200b507d4c8db246a7375c203cd2961957b"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:17:00 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="e3b40600ffffffff0400f0ff0000fafffb0e41da189c304034954b00a7172d5e6dc38f66721366162882a4b0446dab26cec9fe84f07c159cf49afd24cace5f89fb796dcf6b63f8c34f74923a544e4b9117efca7fcf0d58ef9782471fc22b1cd4d176eb466033081f5586965779409edd2110c47c593b483c5ced0bc800e7845f453818e2132c03ad73f4deb06e463de7bfeeaa6d5b35bb64800f5b11638eabab477af9deec6901ecddc340c4159fd55e378eec26aa4ad929b91e15017c9e7349a2d6a972cc7d757062c059dbbe5ca8ade65bb423aa45b1ba0f5c01a9997f104ae8b1530200b507d4c8db246a7375c203cd2961957b"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 725.026577] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 725.031757] RIP: 0033:0x454e79 [ 725.034935] RSP: 002b:00007ff701201c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 725.042636] RAX: ffffffffffffffda RBX: 00007ff7012026d4 RCX: 0000000000454e79 [ 725.049900] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 00000000200007c0 [ 725.057159] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 725.064420] R10: 000000000080c400 R11: 0000000000000246 R12: 0000000000000014 [ 725.071678] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000019 [ 725.087564] device bridge0 left promiscuous mode [ 725.095213] device bridge0 left promiscuous mode [ 725.100800] device bridge0 left promiscuous mode [ 725.110550] device bridge0 left promiscuous mode [ 725.145932] ISOFS: Invalid session number or type of track [ 725.158550] ISOFS: Invalid session number 2018/03/31 11:17:00 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000001c0)=0x8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r4 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000180)) fadvise64(r4, 0x0, 0x3044, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r5 = accept4(0xffffffffffffffff, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) r6 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r6, 0x400448c8, &(0x7f0000000840)={r5, r4, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223"}) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a8aa852b8e27cc4bed332dce5509fd49b6bd003f5b909778d20c97eda3326371d0d383e1c5f6e3fc2f5e61c4ce6b047104b3f22820012533d5e52a704f1faa5bb4478a0c58345f1aa8bbf1e7fd008c4", 0xc4) 2018/03/31 11:17:00 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)) r3 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r4 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r4, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r5 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r5, 0x400448c8, &(0x7f0000000a00)=ANY=[@ANYRES32, @ANYRES32=r3, @ANYBLOB="52ff010000000000e44ec5abbf620369043996630afaf048b9f1047068bd5fc4c233d063d3e03141079d30a82aa076fa8389920068f2da4202558b2f0eaebac772cbdc8821dd7fa1f24b98f22e3a65d3057681d695ea344e422c891c01d82d8018c464603c59d9bfc85adafc764420538b908584e44c0cd6160250961af167a83096fcf3366063ef799f1e7a72b599ff09f04e6a42e3297df6f22ff6f9a896f4157414e4af4b8bbd7d82b87031f83ee2feaf6bd736e3d12584b71c3082412e545a9f8ce4b167ab3c16cab7", @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYBLOB], @ANYBLOB="00010100470d000001000000000000008cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c284361"]) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e", 0x60) 2018/03/31 11:17:00 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f0000000240)=""/1, 0x600) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)) ioctl$TCXONC(r1, 0x540a, 0x3) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000180)) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x4000, 0x0) semget$private(0x0, 0x7, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r4, 0x5402, &(0x7f0000000100)={0x2, 0x8, 0x7, 0x8, 0x5, 0x3, 0x6, 0x8c, 0x3ff, 0x6c0, 0x3, 0x8}) ioctl$KVM_GET_CLOCK(r2, 0x8030ae7c, &(0x7f0000000140)) ioctl$KVM_SET_BOOT_CPU_ID(r3, 0xae78, &(0x7f0000000380)=0x10001) dup3(r1, r1, 0x7fffc) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x3400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="000000000000fbdbdf250900000008000500020000000800050054003613050000021c43729948b6e445092dfa294155de959ec25e91c2bba95ec11ddb150442c057a9cfb5edc5ed70b3fe6590a74877ed6db4b8f0a85306f178d3b63a43c1a1b51100a467901d673287f110c8559e76e47a33e7ed520f72ba46f3e09de890c59ea8570c8620"], 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x4040014) getsockopt$llc_int(r3, 0x10c, 0x0, &(0x7f00000002c0), &(0x7f00000000c0)=0xffffffffffffff4b) 2018/03/31 11:17:00 executing program 3 (fault-call:2 fault-nth:26): open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f00000006c0), 0x33040, &(0x7f00000006c0)=ANY=[]) mount(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='xfs\x00', 0x80c400, 0x0) 2018/03/31 11:17:00 executing program 7: syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000180)={[{@session={'session', 0x3d, [0x34, 0x0]}, 0x2c}]}) socketpair(0x9, 0x5, 0x460, &(0x7f0000000000)={0xffffffffffffffff}) syz_mount_image$bfs(&(0x7f0000000100)='bfs\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x9, &(0x7f0000000540)=[{&(0x7f00000001c0)="fac205555126b4cd2fd795056b90b277d40777a421e94d7e82437014bcc341e98b322634d14192bff988a3884d03ba5094efc2d3a6541094ddaac9a4849d9048eec788623735a13058c3dfbbd67387c6be3e6016b66226c1d96477ce0eb882fc35479a421d9610", 0x67, 0xffff}, {&(0x7f0000000240)="27bc06d182411f6086fc689f8d8e6a92feb42025b5b343758b21f05cc2789f8b1699c8c150c9b82e628939aa8ffcbab58da0ef2bb111428eaf4a393661ab487c19b63a6ea060caf40e07d21ccb89b419e0d6", 0x52}, {&(0x7f00000002c0)="0b2c021a551256f7c9c5c6610f890caebf24b50d7004f6369294e1ae", 0x1c, 0x1ff}, {&(0x7f0000000300)="0ef75211ad61c5303530b8327250bcbaaeca6fb4c9db5d130abf3057eff9b3", 0x1f, 0x3}, {&(0x7f0000000340)="f090264dbd0ff507848681ca5dcd2f1f0380", 0x12}, {&(0x7f0000000380)="81fb0901e003a4305132b81fb78c1030916c54d90729a6559389988a2664deb79206f266915f225888fb37a55a49741c886c6c68810d77bc814d30cde14fc6b18be1558b955888cecdf4ff24487a4e533ce5d37fcba8286cdc4954b6f53beb8be66830bf18ccceea34ada6fed6e726", 0x6f, 0x80000001}, {&(0x7f0000000400)="086c7f97c6fdfe064ef82de79cace707a41fbbe8790be7bea8d98c8270172a0865d64ff7833642a148e84b", 0x2b, 0x40}, {&(0x7f0000000440)="1c2e4bd4af9040b189781082ef59", 0xe, 0x200}, {&(0x7f0000000480)="0126ba2538b790edb8d3979d788f7af91ef311a89d8438d45bced2417f6635471fb1b4d9ae588dad95107baf8f3846a782ab915601259e7f2e3b15fd18ec10b0ebd754e8b62be01880e97b6a17cb501b607864b40074b04609f6fe5d9b635c0947a55f3a7255bc2fcdce117b7daaaf01fd094ae54b7cc71d1b8e5088cc0f16a4f41d71d8f834844cc3f8f251", 0x8c, 0x5}], 0x40004, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000640)='/dev/hwrng\x00', 0x2, 0x0) mknodat(r0, &(0x7f0000000040)='./file0\x00', 0x1000, 0x1000) 2018/03/31 11:17:00 executing program 4: socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000001240)={'filter\x00', 0x7, 0x4, 0x480, 0x0, 0x0, 0x140, 0x398, 0x398, 0x398, 0x4, &(0x7f0000000300), {[{{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @multicast1=0xe0000001, @multicast2=0xe0000002, 0x0, 0xffffffff}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac, @empty, @multicast2=0xe0000002, @multicast1=0xe0000001, 0xd, 0xffffffff}}}, {{@uncond, 0xf0, 0x118}, @unspec=@CLASSIFY={0x28, 'CLASSIFY\x00', 0x0, {0x1}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4d0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000040)={r2, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000000c0)={r2, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000002980)) socket$kcm(0x29, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000029c0)) accept4(r1, &(0x7f00000001c0)=@alg, &(0x7f0000000280)=0x80, 0x800) r4 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000005f00)) r5 = accept4(r3, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r5, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r6 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r6, 0x400448c8, &(0x7f0000000840)={r5, r4, 0xffffffffffffff52, 0x1, &(0x7f00000006c0)="e411b82d239f02360b33ab01086a0910f47bfaaa10d5cb1dd0d5e6120a061bee3a5045c09ff7eb5a798d477b3db7121ae6a2193d00a22c1d20a716d6fb8def52aaf549d2", 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r6, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r3, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:17:00 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:17:00 executing program 0: r0 = socket$packet(0x11, 0x7, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x13) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r3 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r4 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r4, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r5 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r5, 0x400448c8, &(0x7f0000000840)=ANY=[@ANYRES32=r4, @ANYRES32=r3, @ANYBLOB="060000000000", @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYBLOB="e411b82d239f02320b334f01086a0910f47bfaaa10d5cb1dd0d5e6120a061bee3a5045c09ff7eb5a7974477b9b117182e6a2193d00a22c1d28a716d6fb8def52aaf549d2"], @ANYBLOB="00010100470d000001000000060000008cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"]) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a8aa852b8e27cc4bed332dce5509fd49b6bd003f5b909778d20c97eda3326371d0d383e1c5f6e3fc2f5e61c4ce6b047104b3f22820012533d5e52a704f1faa5bb4478a0c58345f1aa8bbf1e7fd008c4bb82853615c5b545", 0xcc) [ 725.188903] ISOFS: Unable to identify CD-ROM format. [ 725.224301] device bridge0 entered promiscuous mode [ 725.234310] device bridge0 entered promiscuous mode [ 725.239570] device bridge0 entered promiscuous mode [ 725.265792] FAULT_INJECTION: forcing a failure. [ 725.265792] name failslab, interval 1, probability 0, space 0, times 0 [ 725.270494] ISOFS: Invalid session number or type of track [ 725.277159] CPU: 1 PID: 17169 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #8 [ 725.282717] ISOFS: Invalid session number [ 725.289834] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 725.289840] Call Trace: [ 725.289858] dump_stack+0x194/0x24d [ 725.289875] ? arch_local_irq_restore+0x53/0x53 [ 725.289887] ? __save_stack_trace+0x7e/0xd0 [ 725.289902] should_fail+0x8c0/0xa40 [ 725.303442] ISOFS: Unable to identify CD-ROM format. [ 725.305929] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 725.305941] ? kasan_kmalloc+0xad/0xe0 [ 725.305951] ? kmem_cache_alloc_trace+0x136/0x740 [ 725.305963] ? __memcg_init_list_lru_node+0x169/0x270 [ 725.346133] ? __list_lru_init+0x544/0x750 [ 725.350340] ? sget_userns+0x6b1/0xe40 [ 725.354204] ? mount_fs+0x66/0x2d0 [ 725.357721] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 725.362446] ? do_mount+0xea4/0x2bb0 [ 725.366130] ? SyS_mount+0xab/0x120 [ 725.369731] ? do_syscall_64+0x281/0x940 [ 725.373769] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 725.379109] ? find_held_lock+0x35/0x1d0 [ 725.383147] ? __lock_is_held+0xb6/0x140 [ 725.387188] ? check_same_owner+0x320/0x320 [ 725.391488] ? rcu_note_context_switch+0x710/0x710 [ 725.396395] should_failslab+0xec/0x120 [ 725.400343] kmem_cache_alloc_trace+0x4b/0x740 [ 725.404901] ? __kmalloc_node+0x33/0x70 [ 725.408847] ? __kmalloc_node+0x33/0x70 [ 725.412796] ? rcu_read_lock_sched_held+0x108/0x120 [ 725.417786] __memcg_init_list_lru_node+0x169/0x270 [ 725.422777] ? list_lru_add+0x7c0/0x7c0 [ 725.426725] ? __kmalloc_node+0x47/0x70 [ 725.430674] __list_lru_init+0x544/0x750 [ 725.434710] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 725.440567] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 725.445557] ? lockdep_init_map+0x9/0x10 [ 725.449593] sget_userns+0x6b1/0xe40 [ 725.453277] ? kill_litter_super+0x90/0x90 [ 725.457485] ? ns_test_super+0x50/0x50 [ 725.461347] ? destroy_unused_super.part.6+0xd0/0xd0 [ 725.466420] ? do_raw_spin_trylock+0x190/0x190 [ 725.470977] ? kobject_put+0x6b/0x250 [ 725.474752] ? blkdev_get+0x3a1/0xb00 [ 725.478532] ? cap_capable+0x1b5/0x230 [ 725.482393] ? __blkdev_get+0x13b0/0x13b0 [ 725.486515] ? security_capable+0x8e/0xc0 [ 725.490638] ? kill_litter_super+0x90/0x90 [ 725.494852] ? ns_capable_common+0xcf/0x160 [ 725.499147] ? ns_test_super+0x50/0x50 [ 725.503007] ? kill_litter_super+0x90/0x90 [ 725.507218] sget+0xd2/0x120 [ 725.510215] mount_bdev+0x109/0x370 [ 725.513816] ? xfs_test_remount_options.isra.19+0x90/0x90 [ 725.519328] xfs_fs_mount+0x34/0x40 [ 725.522929] mount_fs+0x66/0x2d0 [ 725.526273] vfs_kern_mount.part.26+0xc6/0x4a0 [ 725.530829] ? may_umount+0xa0/0xa0 [ 725.534433] ? _raw_read_unlock+0x22/0x30 [ 725.538555] ? __get_fs_type+0x8a/0xc0 [ 725.542416] do_mount+0xea4/0x2bb0 [ 725.545931] ? __might_fault+0x110/0x1d0 [ 725.549967] ? copy_mount_string+0x40/0x40 [ 725.554172] ? check_same_owner+0x320/0x320 [ 725.558469] ? __check_object_size+0x8b/0x530 [ 725.562938] ? __might_sleep+0x95/0x190 [ 725.566887] ? kasan_check_write+0x14/0x20 [ 725.571094] ? _copy_from_user+0x99/0x110 [ 725.575215] ? memdup_user+0x5e/0x90 [ 725.578902] ? copy_mount_options+0x1f7/0x2e0 [ 725.583375] SyS_mount+0xab/0x120 [ 725.586800] ? copy_mnt_ns+0xb30/0xb30 [ 725.590662] do_syscall_64+0x281/0x940 [ 725.594522] ? vmalloc_sync_all+0x30/0x30 [ 725.598642] ? _raw_spin_unlock_irq+0x27/0x70 [ 725.603112] ? finish_task_switch+0x1c1/0x7e0 [ 725.607579] ? syscall_return_slowpath+0x550/0x550 [ 725.612483] ? syscall_return_slowpath+0x2ac/0x550 [ 725.617387] ? prepare_exit_to_usermode+0x350/0x350 [ 725.622376] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 725.627712] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 725.632530] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 725.637694] RIP: 0033:0x454e79 [ 725.640858] RSP: 002b:00007ff701201c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 725.648539] RAX: ffffffffffffffda RBX: 00007ff7012026d4 RCX: 0000000000454e79 [ 725.655781] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 00000000200007c0 2018/03/31 11:17:01 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 725.663026] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 725.670269] R10: 000000000080c400 R11: 0000000000000246 R12: 0000000000000014 [ 725.677512] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001a 2018/03/31 11:17:01 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) r3 = dup2(r0, r2) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000940)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000200)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r4 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r5 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r5, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r6 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r6, 0x400448c8, &(0x7f0000000840)={r5, r4, 0xffffffffffffff52, 0x1, &(0x7f00000006c0)="e411b82d239f02360b33ab01086a0910f47bfaaa10d5cb1dd0d5e6120a061bee3a5045c09ff7eb5a798d477b3db7121ae6a2193d00a22c1d20a716d6fb8def52aaf549d2", 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_msfilter(r5, 0x0, 0x29, &(0x7f00000001c0)={@local={0xac, 0x14, 0x14, 0xaa}, @empty, 0x1, 0x6, [@dev={0xac, 0x14, 0x14, 0x14}, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x15}, @local={0xac, 0x14, 0x14, 0xaa}, @local={0xac, 0x14, 0x14, 0xaa}, @empty]}, 0x28) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a8aa852b8e27cc4bed332dce5509fd49b6bd003f5b909778d20c97eda3326371d0d383e1c5f6e3fc2f5e61c4ce6b047104b3f22820012533d5e52a704f1faa5bb4478a0c58345f1aa8bbf1e7fd008c4bb82853615c5b545", 0xcc) 2018/03/31 11:17:01 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() r5 = getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900)={0x0, 0x0, 0x0}, &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)=0x0) r10 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r10, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r11 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r11, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) setsockopt$inet6_udp_encap(r11, 0x11, 0x64, &(0x7f0000000040)=0x2, 0x4) r12 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) sendmsg$unix(r12, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000340)=[{&(0x7f0000000280)="b520d0ad0bdaefde74eda8d2b263e8d2e483a9af9793b5a1aad1992b84fe824d0d111a680bf5c4c987cc36be3d4538d7ee844fba55514bae884f2c2f827c380ac18ac622db94a2c9820c64da4f108f31e96829b006e505d5dc6ce2e9c125e845a0a724c582b1825b33abade8a681b9e3b43ceb078380b033c254cbe704d88e85ac", 0x81}], 0x1, &(0x7f00000004c0)=[@cred={0x20, 0x1, 0x2, r5, r3, r8}, @cred={0x20, 0x1, 0x2, r7, r4, r8}, @cred={0x20, 0x1, 0x2, r9, r3, r8}, @rights={0x18, 0x1, 0x1, [r10, r0]}, @cred={0x20, 0x1, 0x2, r7, r6, r8}, @cred={0x20, 0x1, 0x2, r7, r6, r8}], 0xb8, 0x4040081}, 0x4000) ioctl$sock_bt_hidp_HIDPCONNADD(r12, 0x400448c8, &(0x7f0000000840)={0xffffffffffffffff, r10, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x0, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c284361"}) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e", 0x60) [ 725.729388] device bridge0 left promiscuous mode [ 725.748318] device bridge0 left promiscuous mode [ 725.756576] device bridge0 left promiscuous mode [ 725.789704] device bridge0 entered promiscuous mode [ 725.795085] device bridge0 entered promiscuous mode [ 725.855246] ISOFS: Invalid session number or type of track [ 725.861136] ISOFS: Invalid session number [ 725.882228] device bridge0 left promiscuous mode [ 725.883285] ISOFS: Unable to identify CD-ROM format. [ 725.887386] device bridge0 left promiscuous mode 2018/03/31 11:17:01 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r3 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r4 = accept4(0xffffffffffffffff, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) r5 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r5, 0x400448c8, &(0x7f0000000840)={r4, r3, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223"}) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a8aa852b8e27cc4bed332dce5509fd49b6bd003f5b909778d20c97eda3326371d0d383e1c5f6e3fc2f5e61c4ce6b047104b3f22820012533d5e52a704f1faa5bb4478a0c58345f1aa8bbf1e7fd008c4", 0xc4) 2018/03/31 11:17:01 executing program 3 (fault-call:2 fault-nth:27): open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f00000006c0), 0x33040, &(0x7f00000006c0)=ANY=[]) mount(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='xfs\x00', 0x80c400, 0x0) 2018/03/31 11:17:01 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:17:01 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) fcntl$setlease(r2, 0x400, 0x2) r3 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r4 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r4, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r5 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r5, 0x400448c8, &(0x7f0000000840)={r4, r3, 0xffffffffffffff52, 0x1, &(0x7f00000006c0)="e411b82d239f02360b33ab01086a0910f47bfaaa10d5cb1dd0d5e6120a061bee3a5045c09ff7eb5a798d477b3db7121ae6a2193d00a22c1d20a716d6fb8def52aaf549d2", 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:17:01 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r3, 0x80045300, &(0x7f0000000200)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r4 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r5 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r5, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r6 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r6, 0x400448c8, &(0x7f0000000280)=ANY=[@ANYRES32=r5, @ANYRES32=r4, @ANYBLOB="527e9cff01e3f70abf00790000", @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYBLOB="e411b82d239f02360b33ab01086a0910f47bfaaa10d5cb1dd0d5e6120a061bee3a5045c09ff7eb5a798d477b3db7121ae6a2193d00a22c1d20a716d6fb8def52aaf549d2"], @ANYBLOB="00010100470d000001000000060000008cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"]) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a8aa852b8e27cc4bed332dce5509fd49b6bd003f5b909778d20c97eda3326371d0d383e1c5f6e3fc2f5e61c4ce6b047104b3f22820012533d5e52a704f1faa5bb4478a0c58345f1aa8bbf1e7fd008c4bb82853615c5b545", 0xcc) 2018/03/31 11:17:01 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r4 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r5 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r5, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r6 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r6, 0x400448c8, &(0x7f0000000840)={0xffffffffffffffff, r4, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x0, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c284361"}) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e", 0x60) 2018/03/31 11:17:01 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f0000a8bfff)=""/1, 0x805031ae) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)) ioctl$TCXONC(r1, 0x540a, 0x3) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000180)) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x400, 0x4000) bind$ipx(r2, &(0x7f0000000140)={0x4, 0x400, 0xfff, "d7e4f2cd536b", 0xffff}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x4000, 0x0) semget$private(0x0, 0x7, 0x0) syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x3400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x34, r4, 0x0, 0x0, 0x25dfdbfb, {0x9}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x54}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x200}]}, 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x4040014) getsockopt$llc_int(r3, 0x10c, 0x0, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 2018/03/31 11:17:01 executing program 7: [ 726.489653] device bridge0 entered promiscuous mode [ 726.495162] device bridge0 entered promiscuous mode [ 726.500452] device bridge0 entered promiscuous mode [ 726.509155] device bridge0 entered promiscuous mode [ 726.517942] FAULT_INJECTION: forcing a failure. [ 726.517942] name failslab, interval 1, probability 0, space 0, times 0 [ 726.529199] CPU: 1 PID: 17246 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #8 2018/03/31 11:17:01 executing program 7: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2000, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000040)={0x8, 0x8, 0x1ff, 0x73b0, 0x0}, &(0x7f0000000080)=0x10) ioctl$VT_DISALLOCATE(r0, 0x5608) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140), 0x10) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000000c0)={r1, 0x100}, &(0x7f0000000100)=0x8) 2018/03/31 11:17:01 executing program 7: syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='~ession=4\x00,\x00']) [ 726.536377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 726.545721] Call Trace: [ 726.548309] dump_stack+0x194/0x24d [ 726.551938] ? arch_local_irq_restore+0x53/0x53 [ 726.556601] ? __save_stack_trace+0x7e/0xd0 [ 726.560923] should_fail+0x8c0/0xa40 [ 726.564641] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 726.569740] ? kasan_kmalloc+0xad/0xe0 [ 726.573627] ? kmem_cache_alloc_trace+0x136/0x740 [ 726.578464] ? __memcg_init_list_lru_node+0x169/0x270 [ 726.583651] ? __list_lru_init+0x544/0x750 2018/03/31 11:17:01 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:17:01 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="e3b40600ffffffff0400f0ff0000fafffb0e41da189c304034954b00a7172d5e6dc38f66721366162882a4b0446dab26cec9fe84f07c159cf49afd24cace5f89fb796dcf6b63f8c34f74923a544e4b9117efca7fcf0d58ef9782471fc22b1cd4d176eb466033081f5586965779409edd2110c47c593b483c5ced0bc800e7845f453818e2132c03ad73f4deb06e463de7bfeeaa6d5b35bb64800f5b11638eabab477af9deec6901ecddc340c4159fd55e378eec26aa4ad929b91e15017c9e7349a2d6a972cc7d757062c059dbbe5ca8ade65bb423aa45b1ba0f5c01a9997f104ae8b1530200b507d4c8db246a7375c203cd2961957b180236e6ee9ba5d55fae5a254bf7bbcd948f625d4bfd8a2231bf"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 726.587883] ? sget_userns+0x6b1/0xe40 [ 726.591770] ? mount_fs+0x66/0x2d0 [ 726.595310] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 726.600061] ? do_mount+0xea4/0x2bb0 [ 726.603767] ? SyS_mount+0xab/0x120 [ 726.607389] ? do_syscall_64+0x281/0x940 [ 726.611445] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 726.616806] ? find_held_lock+0x35/0x1d0 [ 726.620866] ? __lock_is_held+0xb6/0x140 [ 726.624933] ? check_same_owner+0x320/0x320 [ 726.629253] ? rcu_note_context_switch+0x710/0x710 [ 726.634183] should_failslab+0xec/0x120 2018/03/31 11:17:02 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 726.638153] kmem_cache_alloc_trace+0x4b/0x740 [ 726.642730] ? __kmalloc_node+0x33/0x70 [ 726.646700] ? __kmalloc_node+0x33/0x70 [ 726.650673] ? rcu_read_lock_sched_held+0x108/0x120 [ 726.655688] __memcg_init_list_lru_node+0x169/0x270 [ 726.660701] ? list_lru_add+0x7c0/0x7c0 [ 726.664673] ? __kmalloc_node+0x47/0x70 [ 726.668645] __list_lru_init+0x544/0x750 [ 726.672703] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 726.678582] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 726.683599] ? lockdep_init_map+0x9/0x10 2018/03/31 11:17:02 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 726.687661] sget_userns+0x6b1/0xe40 [ 726.691366] ? kill_litter_super+0x90/0x90 [ 726.695595] ? ns_test_super+0x50/0x50 [ 726.699474] ? destroy_unused_super.part.6+0xd0/0xd0 [ 726.704566] ? do_raw_spin_trylock+0x190/0x190 [ 726.709145] ? kobject_put+0x6b/0x250 [ 726.712940] ? blkdev_get+0x3a1/0xb00 [ 726.716742] ? cap_capable+0x1b5/0x230 [ 726.721001] ? __blkdev_get+0x13b0/0x13b0 [ 726.725144] ? security_capable+0x8e/0xc0 [ 726.729287] ? kill_litter_super+0x90/0x90 [ 726.733518] ? ns_capable_common+0xcf/0x160 2018/03/31 11:17:02 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 726.737831] ? ns_test_super+0x50/0x50 [ 726.741706] ? kill_litter_super+0x90/0x90 [ 726.745931] sget+0xd2/0x120 [ 726.748940] mount_bdev+0x109/0x370 [ 726.752561] ? xfs_test_remount_options.isra.19+0x90/0x90 [ 726.758091] xfs_fs_mount+0x34/0x40 [ 726.761711] mount_fs+0x66/0x2d0 [ 726.765080] vfs_kern_mount.part.26+0xc6/0x4a0 [ 726.769656] ? may_umount+0xa0/0xa0 [ 726.773274] ? _raw_read_unlock+0x22/0x30 [ 726.777413] ? __get_fs_type+0x8a/0xc0 [ 726.781294] do_mount+0xea4/0x2bb0 [ 726.784826] ? __might_fault+0x110/0x1d0 [ 726.788882] ? copy_mount_string+0x40/0x40 [ 726.793106] ? check_same_owner+0x320/0x320 [ 726.797426] ? __check_object_size+0x8b/0x530 [ 726.801920] ? __might_sleep+0x95/0x190 [ 726.805896] ? kasan_check_write+0x14/0x20 [ 726.810123] ? _copy_from_user+0x99/0x110 [ 726.814271] ? memdup_user+0x5e/0x90 [ 726.817969] ? copy_mount_options+0x1f7/0x2e0 [ 726.822439] SyS_mount+0xab/0x120 [ 726.825864] ? copy_mnt_ns+0xb30/0xb30 [ 726.829726] do_syscall_64+0x281/0x940 [ 726.833614] ? vmalloc_sync_all+0x30/0x30 [ 726.837741] ? _raw_spin_unlock_irq+0x27/0x70 [ 726.842209] ? finish_task_switch+0x1c1/0x7e0 [ 726.846680] ? syscall_return_slowpath+0x550/0x550 [ 726.851585] ? syscall_return_slowpath+0x2ac/0x550 [ 726.856491] ? prepare_exit_to_usermode+0x350/0x350 [ 726.861483] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 726.866822] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 726.871650] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 726.876815] RIP: 0033:0x454e79 [ 726.879975] RSP: 002b:00007ff701201c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/31 11:17:02 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 726.887666] RAX: ffffffffffffffda RBX: 00007ff7012026d4 RCX: 0000000000454e79 [ 726.894918] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 00000000200007c0 [ 726.902161] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 726.909402] R10: 000000000080c400 R11: 0000000000000246 R12: 0000000000000014 [ 726.916646] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001b [ 726.933092] device bridge0 left promiscuous mode 2018/03/31 11:17:02 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) r2 = accept4(r0, &(0x7f00000004c0)=@l2, &(0x7f0000000540)=0x80, 0x80800) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f0000000580)=0x400, 0x8) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$netlink(0x10, 0x3, 0x4) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x40) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x8}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000280)={0x50d2, 0x229, 0x8, 0x723, 0x8, 0x3, 0x8000, 0x5f, r5}, 0x20) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000029c0)) r6 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000005f00)) r7 = accept4(0xffffffffffffffff, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) r8 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r8, 0x400448c8, &(0x7f0000000840)={r7, r6, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223"}) write(r3, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a8aa852b8e27cc4bed332dce5509fd49b6bd003f5b909778d20c97eda3326371d0d383e1c5f6e3fc2f5e61c4ce6b047104b3f22820012533d5e52a704f1faa5bb4478a0c58345f1aa8bbf1e7fd008c4", 0xc4) ioctl$GIO_UNISCRNMAP(r4, 0x4b69, &(0x7f00000002c0)=""/152) 2018/03/31 11:17:02 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="e3b40600ffffffff0400f0ff0000fafffb0e41da189c304034954b00a7172d5e6dc38f66721366162882a4b0446dab26cec9fe84f07c159cf49afd24cace5f89fb796dcf6b63f8c34f74923a544e4b9117efca7fcf0d58ef9782471fc22b1cd4d176eb466033081f5586965779409edd2110c47c593b483c5ced0bc800e7845f453818e2132c03ad73f4deb06e463de7bfeeaa6d5b35bb64800f5b11638eabab477af9deec6901ecddc340c4159fd55e378eec26aa4ad929b91e15017c9e7349a2d6a972cc7d757062c059dbbe5ca8ade65bb423aa45b1ba0f5c01a9997f104ae8b1530200b507d4c8db246a7375c203cd2961957b180236e6ee9ba5d55fae5a254bf7bbcd948f625d4bfd8a2231bf9b7c5f000000"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:17:02 executing program 3 (fault-call:2 fault-nth:28): open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f00000006c0), 0x33040, &(0x7f00000006c0)=ANY=[]) mount(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='xfs\x00', 0x80c400, 0x0) [ 726.938103] device bridge0 left promiscuous mode [ 726.943104] device bridge0 left promiscuous mode [ 726.952828] device bridge0 left promiscuous mode [ 726.981375] device bridge0 entered promiscuous mode [ 727.036718] FAULT_INJECTION: forcing a failure. [ 727.036718] name failslab, interval 1, probability 0, space 0, times 0 [ 727.048126] CPU: 0 PID: 17295 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #8 [ 727.055314] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 727.064660] Call Trace: [ 727.067246] dump_stack+0x194/0x24d [ 727.070872] ? arch_local_irq_restore+0x53/0x53 [ 727.075536] ? __save_stack_trace+0x7e/0xd0 [ 727.079863] should_fail+0x8c0/0xa40 [ 727.083572] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 727.088674] ? kasan_kmalloc+0xad/0xe0 [ 727.092557] ? kmem_cache_alloc_trace+0x136/0x740 [ 727.097395] ? __memcg_init_list_lru_node+0x169/0x270 [ 727.102569] ? __list_lru_init+0x544/0x750 [ 727.106778] ? sget_userns+0x6b1/0xe40 [ 727.110643] ? mount_fs+0x66/0x2d0 [ 727.114156] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 727.118882] ? do_mount+0xea4/0x2bb0 [ 727.122568] ? SyS_mount+0xab/0x120 [ 727.126168] ? do_syscall_64+0x281/0x940 [ 727.130210] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 727.135550] ? find_held_lock+0x35/0x1d0 [ 727.139587] ? __lock_is_held+0xb6/0x140 [ 727.143633] ? check_same_owner+0x320/0x320 [ 727.147938] ? rcu_note_context_switch+0x710/0x710 [ 727.152855] should_failslab+0xec/0x120 [ 727.156812] kmem_cache_alloc_trace+0x4b/0x740 [ 727.161374] ? __kmalloc_node+0x33/0x70 [ 727.165322] ? __kmalloc_node+0x33/0x70 [ 727.169274] ? rcu_read_lock_sched_held+0x108/0x120 [ 727.174269] __memcg_init_list_lru_node+0x169/0x270 [ 727.179269] ? list_lru_add+0x7c0/0x7c0 [ 727.183227] ? __kmalloc_node+0x47/0x70 [ 727.187178] __list_lru_init+0x544/0x750 [ 727.191230] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 727.197091] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 727.202093] ? lockdep_init_map+0x9/0x10 [ 727.206128] sget_userns+0x6b1/0xe40 [ 727.209813] ? kill_litter_super+0x90/0x90 [ 727.214030] ? ns_test_super+0x50/0x50 [ 727.217905] ? destroy_unused_super.part.6+0xd0/0xd0 [ 727.222988] ? do_raw_spin_trylock+0x190/0x190 [ 727.227547] ? kobject_put+0x6b/0x250 [ 727.231362] ? blkdev_get+0x3a1/0xb00 [ 727.235146] ? cap_capable+0x1b5/0x230 [ 727.239012] ? __blkdev_get+0x13b0/0x13b0 [ 727.243149] ? security_capable+0x8e/0xc0 [ 727.247284] ? kill_litter_super+0x90/0x90 [ 727.251506] ? ns_capable_common+0xcf/0x160 [ 727.255820] ? ns_test_super+0x50/0x50 [ 727.259680] ? kill_litter_super+0x90/0x90 [ 727.263895] sget+0xd2/0x120 [ 727.266889] mount_bdev+0x109/0x370 [ 727.270504] ? xfs_test_remount_options.isra.19+0x90/0x90 [ 727.276020] xfs_fs_mount+0x34/0x40 [ 727.279624] mount_fs+0x66/0x2d0 [ 727.282967] vfs_kern_mount.part.26+0xc6/0x4a0 [ 727.287528] ? may_umount+0xa0/0xa0 [ 727.291141] ? _raw_read_unlock+0x22/0x30 [ 727.295261] ? __get_fs_type+0x8a/0xc0 [ 727.299136] do_mount+0xea4/0x2bb0 [ 727.302653] ? __might_fault+0x110/0x1d0 [ 727.306699] ? copy_mount_string+0x40/0x40 [ 727.310916] ? check_same_owner+0x320/0x320 [ 727.315212] ? __check_object_size+0x8b/0x530 [ 727.319684] ? __might_sleep+0x95/0x190 [ 727.323635] ? kasan_check_write+0x14/0x20 [ 727.327844] ? _copy_from_user+0x99/0x110 [ 727.331972] ? memdup_user+0x5e/0x90 [ 727.335662] ? copy_mount_options+0x1f7/0x2e0 [ 727.340132] SyS_mount+0xab/0x120 [ 727.343557] ? copy_mnt_ns+0xb30/0xb30 [ 727.347418] do_syscall_64+0x281/0x940 [ 727.351279] ? vmalloc_sync_all+0x30/0x30 [ 727.355402] ? _raw_spin_unlock_irq+0x27/0x70 [ 727.359875] ? finish_task_switch+0x1c1/0x7e0 [ 727.364353] ? syscall_return_slowpath+0x550/0x550 [ 727.369256] ? syscall_return_slowpath+0x2ac/0x550 [ 727.374156] ? prepare_exit_to_usermode+0x350/0x350 [ 727.379147] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 727.384493] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 727.389318] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 727.394480] RIP: 0033:0x454e79 [ 727.397642] RSP: 002b:00007ff701201c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 727.405324] RAX: ffffffffffffffda RBX: 00007ff7012026d4 RCX: 0000000000454e79 [ 727.412573] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 00000000200007c0 [ 727.419817] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 727.427057] R10: 000000000080c400 R11: 0000000000000246 R12: 0000000000000014 2018/03/31 11:17:02 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x7fff, 0x2) r2 = syz_open_pts(r0, 0x0) read(r2, &(0x7f0000a8bfff)=""/1, 0x805031ae) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000fd0ffc)) ioctl$TCXONC(r2, 0x540a, 0x3) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000180)) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) ioctl$void(r0, 0x5451) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x8000, 0x0) semget$private(0x0, 0x7, 0x0) syz_open_pts(r0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x40, r4, 0x204, 0x70bd29, 0x25dfdbff, {0x2}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x3c}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e21}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e20}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4, 0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) r5 = dup3(r2, r0, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x3400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x34, r6, 0x0, 0x0, 0x25dfdbfb, {0x9}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x54}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x200}]}, 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x4040014) ioctl$VT_WAITACTIVE(r2, 0x5607) getsockopt$llc_int(r3, 0x10c, 0x0, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 2018/03/31 11:17:02 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) creat(&(0x7f0000000040)='./file0\x00', 0x114) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r3 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r4 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r4, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r5 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r5, 0x400448c8, &(0x7f0000000840)={0xffffffffffffffff, r3, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x0, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c284361"}) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e", 0x60) 2018/03/31 11:17:02 executing program 7: setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'user.', 'session'}, &(0x7f0000000100)='session', 0x7, 0x2) 2018/03/31 11:17:02 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:17:02 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r3 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r4 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r4, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r5 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r5, 0x400448c8, &(0x7f0000000840)={r4, r3, 0xffffffffffffff52, 0x1, &(0x7f00000006c0)="e411b82d239f02360b33ab01086a0910f47bfaaa10d5cb1dd0d5e6120a061bee3a5045c09ff7eb5a798d477b3db7121ae6a2193d00a22c1d20a716d6fb8def52aaf549d2", 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:17:02 executing program 3 (fault-call:2 fault-nth:29): open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f00000006c0), 0x33040, &(0x7f00000006c0)=ANY=[]) mount(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='xfs\x00', 0x80c400, 0x0) [ 727.434300] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001c [ 727.446073] device bridge0 left promiscuous mode 2018/03/31 11:17:02 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000001200)) perf_event_open(&(0x7f000025c000)={0x2, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffffffffffbfd, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) sched_setattr(0x0, &(0x7f0000000040)={0x0, 0x1, 0x0, 0x0, 0x3e}, 0x0) mknod(&(0x7f0000b75ff8)='./file0\x00', 0x2001001, 0x0) r3 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$TCSETSW(r2, 0x5402, &(0x7f00009dc000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}) r5 = syz_open_pts(r2, 0x200000000) readv(r5, &(0x7f00001aa000)=[{&(0x7f00006aaf01)=""/255, 0xff}], 0x1) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x2) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffffa) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000140)) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000000c0)={0xffffffffffffffe1, 0x0, 0x6, 0x0, 0xcbbe}) ioctl$KVM_GET_DIRTY_LOG(r4, 0x4010ae42, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000ffa000/0x1000)=nil}) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) ioctl$TCSETS(r5, 0x5402, &(0x7f0000000000)={0x6, 0x10000000, 0x4, 0x9, 0x0, 0x1, 0x0, 0x800, 0x8, 0x40, 0x1, 0x1}) r6 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r6) ioctl$TCSETAW(r2, 0x5407, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7636}) 2018/03/31 11:17:02 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r3 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r4 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r4, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r5 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f00000001c0)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r5, 0x400448c8, &(0x7f0000000840)={r4, r3, 0xffffffffffffff52, 0x1, &(0x7f00000006c0)="e411b82d239f02360b33ab01086a0910f47bfaaa10d5cb1dd0d5e6120a061bee3a5045c09ff7eb5a798d477b3db7121ae6a2193d00a22c1d20a716d6fb8def52aaf549d2", 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a8aa852b8e27cc4bed332dce5509fd49b6bd003f5b909778d20c97eda3326371d0d383e1c5f6e3fc2f5e61c4ce6b047104b3f22820012533d5e52a704f1faa5bb4478a0c58345f1aa8bbf1e7fd008c4bb82853615c5b545", 0xcc) [ 727.504182] device bridge0 entered promiscuous mode [ 727.509354] device bridge0 entered promiscuous mode [ 727.514523] device bridge0 entered promiscuous mode [ 727.522279] device bridge0 entered promiscuous mode [ 727.522473] FAULT_INJECTION: forcing a failure. [ 727.522473] name failslab, interval 1, probability 0, space 0, times 0 [ 727.538583] CPU: 0 PID: 17312 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #8 [ 727.545759] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 727.555114] Call Trace: [ 727.557719] dump_stack+0x194/0x24d [ 727.561350] ? arch_local_irq_restore+0x53/0x53 [ 727.566017] ? __save_stack_trace+0x7e/0xd0 [ 727.570342] should_fail+0x8c0/0xa40 [ 727.574057] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 727.579171] ? kasan_kmalloc+0xad/0xe0 [ 727.583068] ? kmem_cache_alloc_trace+0x136/0x740 [ 727.587905] ? __memcg_init_list_lru_node+0x169/0x270 [ 727.593080] ? __list_lru_init+0x544/0x750 [ 727.597308] ? sget_userns+0x6b1/0xe40 [ 727.601198] ? mount_fs+0x66/0x2d0 [ 727.604738] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 727.609488] ? do_mount+0xea4/0x2bb0 [ 727.613192] ? SyS_mount+0xab/0x120 [ 727.616815] ? do_syscall_64+0x281/0x940 [ 727.620877] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 727.626240] ? find_held_lock+0x35/0x1d0 [ 727.630299] ? __lock_is_held+0xb6/0x140 [ 727.634363] ? check_same_owner+0x320/0x320 [ 727.638690] ? rcu_note_context_switch+0x710/0x710 [ 727.643609] should_failslab+0xec/0x120 [ 727.647568] kmem_cache_alloc_trace+0x4b/0x740 [ 727.652133] ? __kmalloc_node+0x33/0x70 [ 727.656080] ? __kmalloc_node+0x33/0x70 [ 727.660031] ? rcu_read_lock_sched_held+0x108/0x120 [ 727.665031] __memcg_init_list_lru_node+0x169/0x270 [ 727.670035] ? list_lru_add+0x7c0/0x7c0 [ 727.673990] ? __kmalloc_node+0x47/0x70 [ 727.677947] __list_lru_init+0x544/0x750 [ 727.681982] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 727.687841] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 727.692832] ? lockdep_init_map+0x9/0x10 [ 727.696866] sget_userns+0x6b1/0xe40 [ 727.700550] ? kill_litter_super+0x90/0x90 [ 727.704767] ? ns_test_super+0x50/0x50 [ 727.708640] ? destroy_unused_super.part.6+0xd0/0xd0 [ 727.713723] ? do_raw_spin_trylock+0x190/0x190 [ 727.718280] ? kobject_put+0x6b/0x250 [ 727.722056] ? blkdev_get+0x3a1/0xb00 [ 727.726007] ? cap_capable+0x1b5/0x230 [ 727.729891] ? __blkdev_get+0x13b0/0x13b0 [ 727.734022] ? security_capable+0x8e/0xc0 [ 727.738154] ? kill_litter_super+0x90/0x90 [ 727.742364] ? ns_capable_common+0xcf/0x160 [ 727.746669] ? ns_test_super+0x50/0x50 [ 727.750539] ? kill_litter_super+0x90/0x90 [ 727.754749] sget+0xd2/0x120 [ 727.757746] mount_bdev+0x109/0x370 [ 727.761349] ? xfs_test_remount_options.isra.19+0x90/0x90 [ 727.766873] xfs_fs_mount+0x34/0x40 [ 727.770479] mount_fs+0x66/0x2d0 [ 727.773820] vfs_kern_mount.part.26+0xc6/0x4a0 [ 727.778382] ? may_umount+0xa0/0xa0 [ 727.782001] ? _raw_read_unlock+0x22/0x30 [ 727.786128] ? __get_fs_type+0x8a/0xc0 [ 727.789994] do_mount+0xea4/0x2bb0 [ 727.793510] ? __might_fault+0x110/0x1d0 [ 727.797546] ? copy_mount_string+0x40/0x40 [ 727.801758] ? check_same_owner+0x320/0x320 [ 727.806066] ? __check_object_size+0x8b/0x530 [ 727.810540] ? __might_sleep+0x95/0x190 [ 727.814507] ? kasan_check_write+0x14/0x20 [ 727.818719] ? _copy_from_user+0x99/0x110 [ 727.822960] ? memdup_user+0x5e/0x90 [ 727.826644] ? copy_mount_options+0x1f7/0x2e0 [ 727.831113] SyS_mount+0xab/0x120 [ 727.834540] ? copy_mnt_ns+0xb30/0xb30 [ 727.838406] do_syscall_64+0x281/0x940 [ 727.842269] ? vmalloc_sync_all+0x30/0x30 [ 727.846398] ? _raw_spin_unlock_irq+0x27/0x70 [ 727.850875] ? finish_task_switch+0x1c1/0x7e0 [ 727.855350] ? syscall_return_slowpath+0x550/0x550 [ 727.860253] ? syscall_return_slowpath+0x2ac/0x550 [ 727.865165] ? prepare_exit_to_usermode+0x350/0x350 [ 727.870162] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 727.875503] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 727.880320] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 727.885480] RIP: 0033:0x454e79 [ 727.888644] RSP: 002b:00007ff701201c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 727.896336] RAX: ffffffffffffffda RBX: 00007ff7012026d4 RCX: 0000000000454e79 [ 727.903586] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 00000000200007c0 [ 727.910828] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 727.918073] R10: 000000000080c400 R11: 0000000000000246 R12: 0000000000000014 [ 727.925313] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001d [ 727.936856] device bridge0 left promiscuous mode [ 727.943122] device bridge0 left promiscuous mode [ 727.948774] device bridge0 left promiscuous mode 2018/03/31 11:17:03 executing program 7: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x42, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f0000000100)={{0x3, 0x0, 0x20, 0x3, 0x266a}, 0x8001, 0x8, 0x6}) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000180)={[{@session={'session', 0x3d, [0x34, 0x0]}, 0x2c}]}) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000040)=0x7, 0x4) 2018/03/31 11:17:03 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:17:03 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r3 = socket$kcm(0x29, 0x0, 0x0) clock_adjtime(0x2, &(0x7f0000000280)={0x778, 0x8, 0x8000, 0x0, 0xff, 0x7, 0x6, 0x7f, 0xffffffffffffffa3, 0x3, 0x4, 0x79, 0x41e, 0x39, 0x2, 0xffff, 0x64, 0x1ff, 0x9, 0x1, 0x80000001, 0xffffffff, 0x2, 0x2, 0x2, 0xf8f}) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r4 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r4, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r5 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r5, 0x400448c8, &(0x7f0000000840)={r4, r3, 0xffffffffffffff52, 0x1, &(0x7f00000006c0)="e411b82d239f02360b33ab01086a0910f47bfaaa10d5cb1dd0d5e6120a061bee3a5045c09ff7eb5a798d477b3db7121ae6a2193d00a22c1d20a716d6fb8def52aaf549d2", 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="e3b40600ffffffff0400f0ff0000fafffb0e41da189c304034954b00a7172d5e6dc38f66721366162882a4b0446dab26cec9fe84f07c159cf49afd24cace5f89fb796dcf6b63f8c34f74923a544e4b9117efca7fcf0d58ef9782471fc22b1cd4d176eb466033081f5586965779409edd2110c47c593b483c5ced0bc800e7845f453818e2132c03ad73f4deb06e463de7bfeeaa6d5b35bb64800f5b11638eabab477af9deec6901ecddc340c4159fd55e378eec26aa4ad929b91e15017c9e7349a2d6a972cc7d757062c059dbbe5ca8ade65bb423aa45b1ba0f5c01a9997f104ae8b1530200b507d4c8db246a7375c203cd2961957b180236e6ee9ba5d55fae5a254bf7bbcd948f625d4bfd8a2231bf9b7c5f0000000000"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:17:03 executing program 3 (fault-call:2 fault-nth:30): open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f00000006c0), 0x33040, &(0x7f00000006c0)=ANY=[]) mount(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='xfs\x00', 0x80c400, 0x0) 2018/03/31 11:17:03 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) signalfd(r2, &(0x7f0000000040)={0x3f}, 0x8) r3 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r4 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r4, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r5 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r5, 0x400448c8, &(0x7f0000000980)=ANY=[@ANYRES32, @ANYRES32=r3, @ANYBLOB="52ff0104e1ffffffeaaa78700af7a5b4f389f86354d8891d7b3d6c463c54f95ec3b3884e84d996bf9f01518836a3d6f6c7636a6a1fec0bccfe962394e072f912d0", @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB="ef8db4a4643384de8b91d641fd4d6a129f3fdbd521403432cfacf305000000000000003ecc9cbc9c0000010000000000433ae716b5abc587d8148ed8ce3d13473c6d1d620050785655669c70c44d839d2552854960ecd6ee293dda382c"], @ANYBLOB="00010100470d000001000000000000008cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c284361"]) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e", 0x60) 2018/03/31 11:17:03 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r3 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r4 = accept4(0xffffffffffffffff, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) r5 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x0) connect$llc(r5, &(0x7f0000000040)={0x1a, 0x339, 0x14c9, 0xfffffffffffffffb, 0x4c, 0x5}, 0x10) ioctl$sock_bt_hidp_HIDPCONNADD(r5, 0x400448c8, &(0x7f0000000840)={r4, r3, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223"}) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a8aa852b8e27cc4bed332dce5509fd49b6bd003f5b909778d20c97eda3326371d0d383e1c5f6e3fc2f5e61c4ce6b047104b3f22820012533d5e52a704f1faa5bb4478a0c58345f1aa8bbf1e7fd008c4", 0xc4) 2018/03/31 11:17:03 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xfffffd34) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) r3 = socket(0x3, 0x0, 0x2) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r3, 0x29, 0x41, &(0x7f0000000300)={'mangle\x00', 0x2, [{}, {}]}, 0x48) ioctl$sock_SIOCINQ(r3, 0x541b, &(0x7f0000000200)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900)={0x0}, &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) r7 = syz_open_procfs(r4, &(0x7f00000001c0)='mountstats\x00') getdents(r7, &(0x7f00000004c0)=""/84, 0x45) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a8aa852b8e27cc4bed332dce5509fd49b6bd003f5b909778d20c97eda3326371d0d383e1c5f6e3fc2f5e61c4ce6b047104b3f22820012533d5e52a704f1faa5bb4478a0c58345f1aa8bbf1e7fd008c4bb82853615c5b545", 0xcc) 2018/03/31 11:17:03 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f0000a8bfff)=""/1, 0x805031ae) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)) ioctl$TCXONC(r1, 0x540a, 0x3) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000180)) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x4000, 0x0) semget$private(0x0, 0x7, 0x0) syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x3400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x34, r3, 0x0, 0x0, 0x25dfdbfb, {0x9}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x54}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x200}]}, 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x4040014) getsockopt$llc_int(r2, 0x10c, 0x0, &(0x7f0000000040), &(0x7f00000000c0)=0x4) [ 728.520271] device bridge0 left promiscuous mode [ 728.557770] device bridge0 entered promiscuous mode [ 728.563173] device bridge0 entered promiscuous mode [ 728.568799] device bridge0 entered promiscuous mode [ 728.583765] ISOFS: Invalid session number or type of track [ 728.586857] device bridge0 entered promiscuous mode [ 728.590496] FAULT_INJECTION: forcing a failure. [ 728.590496] name failslab, interval 1, probability 0, space 0, times 0 [ 728.605753] CPU: 0 PID: 17355 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #8 [ 728.612934] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 728.622278] Call Trace: [ 728.624865] dump_stack+0x194/0x24d [ 728.628489] ? arch_local_irq_restore+0x53/0x53 [ 728.633161] ? __save_stack_trace+0x7e/0xd0 [ 728.637484] should_fail+0x8c0/0xa40 [ 728.641203] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 728.646307] ? kasan_kmalloc+0xad/0xe0 [ 728.650199] ? kmem_cache_alloc_trace+0x136/0x740 2018/03/31 11:17:03 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:17:04 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 728.655038] ? __memcg_init_list_lru_node+0x169/0x270 [ 728.660225] ? __list_lru_init+0x544/0x750 [ 728.664453] ? sget_userns+0x6b1/0xe40 [ 728.668344] ? mount_fs+0x66/0x2d0 [ 728.671887] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 728.676638] ? do_mount+0xea4/0x2bb0 [ 728.680344] ? SyS_mount+0xab/0x120 [ 728.683960] ? do_syscall_64+0x281/0x940 [ 728.688016] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 728.693376] ? find_held_lock+0x35/0x1d0 [ 728.697449] ? __lock_is_held+0xb6/0x140 [ 728.701514] ? check_same_owner+0x320/0x320 2018/03/31 11:17:04 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 728.704839] ISOFS: Invalid session number [ 728.705829] ? rcu_note_context_switch+0x710/0x710 [ 728.705849] should_failslab+0xec/0x120 [ 728.705861] kmem_cache_alloc_trace+0x4b/0x740 [ 728.705870] ? __kmalloc_node+0x33/0x70 [ 728.705879] ? __kmalloc_node+0x33/0x70 [ 728.705891] ? rcu_read_lock_sched_held+0x108/0x120 [ 728.736370] __memcg_init_list_lru_node+0x169/0x270 [ 728.741384] ? list_lru_add+0x7c0/0x7c0 [ 728.745351] ? __kmalloc_node+0x47/0x70 [ 728.746552] ISOFS: Unable to identify CD-ROM format. [ 728.749321] __list_lru_init+0x544/0x750 [ 728.749335] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 728.749348] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 728.749362] ? lockdep_init_map+0x9/0x10 [ 728.749374] sget_userns+0x6b1/0xe40 [ 728.749382] ? kill_litter_super+0x90/0x90 [ 728.749394] ? ns_test_super+0x50/0x50 [ 728.749404] ? destroy_unused_super.part.6+0xd0/0xd0 [ 728.749411] ? do_raw_spin_trylock+0x190/0x190 [ 728.749424] ? kobject_put+0x6b/0x250 [ 728.798656] ? blkdev_get+0x3a1/0xb00 [ 728.802457] ? cap_capable+0x1b5/0x230 [ 728.806339] ? __blkdev_get+0x13b0/0x13b0 [ 728.810483] ? security_capable+0x8e/0xc0 [ 728.814625] ? kill_litter_super+0x90/0x90 [ 728.818854] ? ns_capable_common+0xcf/0x160 [ 728.823170] ? ns_test_super+0x50/0x50 [ 728.827050] ? kill_litter_super+0x90/0x90 [ 728.831282] sget+0xd2/0x120 [ 728.834295] mount_bdev+0x109/0x370 [ 728.837914] ? xfs_test_remount_options.isra.19+0x90/0x90 [ 728.843448] xfs_fs_mount+0x34/0x40 [ 728.847070] mount_fs+0x66/0x2d0 [ 728.850414] vfs_kern_mount.part.26+0xc6/0x4a0 [ 728.854970] ? may_umount+0xa0/0xa0 [ 728.858577] ? _raw_read_unlock+0x22/0x30 [ 728.862699] ? __get_fs_type+0x8a/0xc0 [ 728.866569] do_mount+0xea4/0x2bb0 [ 728.870099] ? __might_fault+0x110/0x1d0 [ 728.874158] ? copy_mount_string+0x40/0x40 [ 728.878377] ? check_same_owner+0x320/0x320 [ 728.882673] ? __check_object_size+0x8b/0x530 [ 728.887460] ? __might_sleep+0x95/0x190 [ 728.891418] ? kasan_check_write+0x14/0x20 [ 728.895629] ? _copy_from_user+0x99/0x110 [ 728.899756] ? memdup_user+0x5e/0x90 [ 728.903446] ? copy_mount_options+0x1f7/0x2e0 [ 728.907914] SyS_mount+0xab/0x120 [ 728.911342] ? copy_mnt_ns+0xb30/0xb30 [ 728.915210] do_syscall_64+0x281/0x940 [ 728.919095] ? vmalloc_sync_all+0x30/0x30 [ 728.923226] ? _raw_spin_unlock_irq+0x27/0x70 [ 728.927710] ? finish_task_switch+0x1c1/0x7e0 [ 728.932190] ? syscall_return_slowpath+0x550/0x550 [ 728.937118] ? syscall_return_slowpath+0x2ac/0x550 [ 728.942031] ? prepare_exit_to_usermode+0x350/0x350 [ 728.947047] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 728.952397] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 728.957230] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 728.962398] RIP: 0033:0x454e79 [ 728.965563] RSP: 002b:00007ff701201c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 728.973259] RAX: ffffffffffffffda RBX: 00007ff7012026d4 RCX: 0000000000454e79 [ 728.980508] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 00000000200007c0 [ 728.987760] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 728.995014] R10: 000000000080c400 R11: 0000000000000246 R12: 0000000000000014 [ 729.002266] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001e [ 729.018493] device bridge0 left promiscuous mode [ 729.023531] device bridge0 left promiscuous mode [ 729.028376] device bridge0 left promiscuous mode [ 729.033345] device bridge0 left promiscuous mode [ 729.055453] ISOFS: Invalid session number or type of track [ 729.087118] ISOFS: Invalid session number [ 729.109270] ISOFS: Unable to identify CD-ROM format. 2018/03/31 11:17:04 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(0xffffffffffffffff, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:17:04 executing program 3 (fault-call:2 fault-nth:31): open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f00000006c0), 0x33040, &(0x7f00000006c0)=ANY=[]) mount(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='xfs\x00', 0x80c400, 0x0) 2018/03/31 11:17:04 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r3 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r4 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) setsockopt$ipx_IPX_TYPE(r4, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r5 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r5, 0x400448c8, &(0x7f0000000840)={0xffffffffffffffff, r3, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x0, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c284361"}) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e", 0x60) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f00000001c0)={0x2, 'sit0\x00', 0x3}, 0x18) 2018/03/31 11:17:04 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() r3 = getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r4 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) sched_setparam(r3, &(0x7f00000001c0)=0x7fffffff) r5 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r5, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r6 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r6, 0x400448c8, &(0x7f0000000840)=ANY=[@ANYRES32=r5, @ANYRES32=r4, @ANYBLOB="52ff010000000000", @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYBLOB="e411b82d239f02360b33ab01086a0910f47bfaaa10d5cb1dd0d5e6120a061bee3a5045c09ff7eb5a798d477b3db7121ae6a2193d00a22c1d20a716d6fb8def52aaf549d2"], @ANYBLOB="00010100470d000001000000060000008cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320c98fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"]) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a8aa852b8e27cc4bed332dce5509fd49b6bd003f5b909778d20c97eda3326371d0d383e1c5f6e3fc2f5e61c4ce6b047104b3f22820012533d5e52a704f1faa5bb4478a0c58345f1aa8bbf1e7fd008c4bb82853615c5b545", 0xcc) 2018/03/31 11:17:04 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x4d8b, 0x101000) r2 = syz_open_pts(r0, 0x0) read(r2, &(0x7f0000a8bfff)=""/1, 0x805031ae) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000fd0ffc)) ioctl$TCXONC(r2, 0x540a, 0x3) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000180)) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x4000, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000140)=0x0) syz_open_procfs(r5, &(0x7f0000000240)='ns/mnt\x00') semget$private(0x0, 0x7, 0x0) syz_open_pts(r0, 0x0) dup3(r2, r0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x3400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="3400000003aca7645b154626449c47add1e261eda588345123786a47dbba77e1cdbde858bd3c7bbe19468785a0596241332cb51586298ddb5084955f1b6becb2684424aff9a75bfb84044b86368db83c0200000000000000557529549b3c07c40bb26704737dd129f17b4060ce15f0395d6fdd343cb6e5ff1cdd3ce30e513fcca0d9310f60d915488862c064f09752b7098ae713a45e54eb8b0ac2a6aa73865bf20aa495080fd5de693554bf349e07e523d69107f808743e9486110a91cd43e071b167bfda8d25cb57d928c147cb897b2893c2826fee29f9aaa63b6bc89824fba3015000b7ac887e334b54e28f50fe928c14c503876cb5cc90f0ec6408948d942a6e9870d961abd9b7196eb2eb10c68b8c4f203b3a6c8ecf3d6034d83e3004af5bceb1f7d3d2a69674f6635f1176a6368dddcfc2f55ad8a2a2f85c6abbe10be0a1668b9d9a4ecdcb309ccf93782065b964c0", @ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64, @ANYRES64, @ANYBLOB="fbf511ee0d579365e642ee04f78c19e3a1ef121bab82c33976d3c7471d80c013e8cf5059c179d71d3b918689", @ANYRES16=r1, @ANYRES64=r0, @ANYRES16=r3, @ANYRES32], @ANYRES64], 0x3}, 0x1, 0x0, 0x0, 0x800}, 0x4040014) getsockopt$llc_int(r4, 0x10c, 0x0, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 2018/03/31 11:17:04 executing program 7: syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="73657373696f6e3d34002c009b2b75e7cea5275488ccd67a8c21429e4e43fefdd616f3069246b912e05d750acab52fb9754a2adc8c46f4294260e9be62cf29169d147f019db8e9626a27a893a1ea6ad73bc32956a937779a78"]) 2018/03/31 11:17:04 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) sendmsg(r2, &(0x7f0000000e40)={&(0x7f00000004c0)=@ethernet={0x307, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000a80)="a42e4f4ae9ebc6159909320ca27eeaac7eb914c322ee7287455ef1dd092011259b297e591acbf6fe62685478303d141a82a52dab69a42ddc89b3ad962cca19bee2faf382e78e17fb6f95f198274da024fab4b4b504d3b2adc2a7b59bb4f1e34739074025682345e121bf38be3c02e95abbf401ebfd95c3b5328a8761b60aa5c356467e5f5bac2763495de1ccba53fb3e15660d88bfa6a487cd7ec7250f234d3e9296a1074f4ff9f7da9b98b75226302e0cb9c67644ebf30df3cac23d9e6c32090ce8c6fe447a5a142f22b68acc3508a9970d10516c60cc54930ff8530e6d0d5c72c6ad02d1062095", 0xe8}, {&(0x7f0000000340)="40d1d2", 0x3}, {&(0x7f0000001240)="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", 0x1000}, {&(0x7f0000000540)="a847", 0x2}, {&(0x7f0000000640)="6e2ef3a8e402c3a4a8d6f2c1d53c43e0369f2013abd4edeb056a6e6b2dea2ce0f5481a6cb66c03f2fb8621af6393debe3ee1168b957ea71ad7ae5d973497649f4ee2c2", 0x43}, {&(0x7f0000000580)="8951d6d8ab798cf5fce92eaa6d96cba0356376094ae0ba25b77adbf834991c71a25db1aeb6da847d2e", 0x29}, {&(0x7f0000000b80)="18884360", 0x4}], 0x7, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x1d0, 0x1}, 0x40000) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() set_robust_list(&(0x7f0000000300)={&(0x7f0000000200)={&(0x7f00000001c0)}, 0xf800000000, &(0x7f00000002c0)={&(0x7f0000000280)}}, 0x18) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r3 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000180)) syz_mount_image$msdos(&(0x7f0000000f80)='msdos\x00', &(0x7f0000000fc0)='./file0\x00', 0xe67, 0x5, &(0x7f0000002400)=[{&(0x7f0000001000)="4911e26d4932100db7366e739efbfe7d68e39e687814ffae5e3f5d4a03cfd0fe9610cdb89f3d79aba21ff4ccafe950b1c846e575e5714867974d37f30b704668ebb8d660cf157fe14496f82e8d0afad232ce9660ddfe73db61f1fd849358af6d449ace19f00cc3f6e3c3e3b8792771af0e782fed34f1de21144fb26011", 0x7d, 0xfff}, {&(0x7f0000001080)="110185cbe8ccf5df7f5ff921848ece0fb72cb192c8635099bb9690", 0x1b, 0xffff}, {&(0x7f0000002240)="13da7a196ef0a94ac0ed7e4d495a7c5fec7a580bf1ff1b81675f8300d904a61ce6539cda569d001267d9cf15ad6060f0e835100993cb98a448f2b587cba28eea35016f66f3da454e5997caa39c72b482ce2883670858eee21e20c3408c75073d62a8315b432155ab34a7b547bf8a7ccb320a7ff7c8ba45ce4684548874fb6d3b6b00586e193efacdc909682598486cf1f048da190b5d87be5b075b4a30fd99cc7ce66288a7fba7f1c15d2bcee1683d52c26eef187f08ca965557d87c6ce378b075084df661d01983f71c046d7288040efdc36d639abfc2cd68a368581b2fd2bf55145e9c85ca9acb24b8", 0xea, 0x8}, {&(0x7f0000002340)="d5e09e28931b7e962ae113aa7fe9ef955d3f8210867a09347586", 0x1a, 0x101}, {&(0x7f0000002380)="4a58aa63d96a00d2293b924efc29b49bddb4d89a970e992f620cbefddeeb7d0df7d18508599910799e5c654aea10d7a5e8b41ede547dc8df1e7985313cf85ba9d4b0e4a57d1ab86fdb02fa6a283b8c6d92a87b2f22", 0x55, 0x5}], 0x8000, &(0x7f0000002480)={[{@errors_remount='errors=remount-ro', 0x2c}, {@debug='debug', 0x2c}, {@showexec='showexec', 0x2c}]}) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r4 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r4, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r5 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r5, 0x400448c8, &(0x7f0000000840)={r4, r3, 0xffffffffffffff52, 0x1, &(0x7f00000006c0)="e411b82d239f02360b33ab01086a0910f47bfaaa10d5cb1dd0d5e6120a061bee3a5045c09ff7eb5a798d477b3db7121ae6a2193d00a22c1d20a716d6fb8def52aaf549d2", 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f00000024c0)={0x3, 0x1, 0x0, 0x98b}) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:17:04 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) r3 = openat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x480, 0x1) getsockopt$inet6_dccp_buf(r3, 0x21, 0xf, &(0x7f0000000500)=""/11, &(0x7f0000000540)=0xb) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r4 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r5 = accept4(0xffffffffffffffff, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f0000000280)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000000000000000c70000008ada13c0df877ea412bb71a9acba143f335ddb3fa1e861be5b710e76d6cf8e403fce1d099e2d5299ef7ddc3164d01a77637bee0715800d9516182a1d394d6debc0d55c295fedffd62117ccf16db92b88a8f91f88e166aabe5f4e6d58d0022779a60fa05af7f363991c3f7a6f4c807b09770659a797cb126b6cc2ffae97970e6fb2b09e71e4fb897297ac5f1bddd4c109e5be29b698f08b21e246aed2a9148865b45fdbf626eee3eedfbac0b06b547f110c8a6562148eb784e38a81"], &(0x7f0000000040)=0xeb) ioctl$PPPOEIOCDFWD(r5, 0xb101, 0x0) r6 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r6, 0x400448c8, &(0x7f0000000840)=ANY=[@ANYRES32=r5, @ANYRES32=r4, @ANYBLOB="52ff010000000000", @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB="7bf8ee938776bc2b2ca67cd1fc3466606651120d6bc22996a10f427c5e3d0dcf4b327745dfdc615fa8f9488bc1f6acb980ab9481249075db113e89663d1e4f0e88ffd294cb7b2a92d0d842c8fa8731f4f7fdddbc0f46d7ba128bddc16fb100000000000000000000000000000000"], @ANYBLOB="000101000000000001000000060000008cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223"]) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a8aa852b8e27cc4bed332dce5509fd49b6bd003f5b909778d20c97eda3326371d0d383e1c5f6e3fc2f5e61c4ce6b047104b3f22820012533d5e52a704f1faa5bb4478a0c58345f1aa8bbf1e7fd008c4", 0xc4) [ 729.535313] ISOFS: Invalid session number or type of track [ 729.540276] device bridge0 entered promiscuous mode [ 729.544612] ISOFS: Invalid session number [ 729.547303] device bridge0 entered promiscuous mode [ 729.556006] device bridge0 entered promiscuous mode [ 729.561393] device bridge0 entered promiscuous mode [ 729.574179] FAULT_INJECTION: forcing a failure. [ 729.574179] name failslab, interval 1, probability 0, space 0, times 0 [ 729.585428] CPU: 1 PID: 17414 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #8 [ 729.592605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 729.601793] ISOFS: Unable to identify CD-ROM format. [ 729.601943] Call Trace: [ 729.609604] dump_stack+0x194/0x24d [ 729.613236] ? arch_local_irq_restore+0x53/0x53 [ 729.617911] ? __save_stack_trace+0x7e/0xd0 [ 729.622232] should_fail+0x8c0/0xa40 [ 729.625945] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 729.631048] ? kasan_kmalloc+0xad/0xe0 2018/03/31 11:17:05 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0), 0x0) [ 729.634929] ? kmem_cache_alloc_trace+0x136/0x740 [ 729.639768] ? __memcg_init_list_lru_node+0x169/0x270 [ 729.644953] ? __list_lru_init+0x544/0x750 [ 729.649182] ? sget_userns+0x6b1/0xe40 [ 729.653067] ? mount_fs+0x66/0x2d0 [ 729.656604] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 729.661356] ? do_mount+0xea4/0x2bb0 [ 729.665063] ? SyS_mount+0xab/0x120 [ 729.668686] ? do_syscall_64+0x281/0x940 [ 729.672745] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 729.678107] ? find_held_lock+0x35/0x1d0 2018/03/31 11:17:05 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0), 0x0) [ 729.682170] ? __lock_is_held+0xb6/0x140 [ 729.686238] ? check_same_owner+0x320/0x320 [ 729.690558] ? rcu_note_context_switch+0x710/0x710 [ 729.695492] should_failslab+0xec/0x120 [ 729.699464] kmem_cache_alloc_trace+0x4b/0x740 [ 729.704046] ? __kmalloc_node+0x33/0x70 [ 729.708011] ? __kmalloc_node+0x33/0x70 [ 729.711979] ? rcu_read_lock_sched_held+0x108/0x120 [ 729.716988] __memcg_init_list_lru_node+0x169/0x270 [ 729.721993] ? list_lru_add+0x7c0/0x7c0 [ 729.725965] ? __kmalloc_node+0x47/0x70 [ 729.729938] __list_lru_init+0x544/0x750 2018/03/31 11:17:05 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="e3b40600ffffffff0400f0ff0000fafffb0e41da189c304034954b00a7172d5e6dc38f66721366162882a4b0446dab26cec9fe84f07c159cf49afd24cace5f89fb796dcf6b63f8c34f74923a544e4b9117efca7fcf0d58ef9782471fc22b1cd4d176eb466033081f5586965779409edd2110c47c593b483c5ced0bc800e7845f453818e2132c03ad73f4deb06e463de7bfeeaa6d5b35bb64800f5b11638eabab477af9deec6901ecddc340c4159fd55e378eec26aa4ad929b91e15017c9e7349a2d6a972cc7d757062c059dbbe5ca8ade65bb423aa45b1ba0f5c01a9997f104ae8b1530200b507d4c8db246a7375c203cd2961957b180236e6ee9ba5d55fae5a254bf7bbcd948f625d4bfd8a2231bf9b7c5f0000000000"], 0x2) write(r2, &(0x7f00000005c0), 0x0) [ 729.733996] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 729.739877] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 729.744895] ? lockdep_init_map+0x9/0x10 [ 729.748949] sget_userns+0x6b1/0xe40 [ 729.752653] ? kill_litter_super+0x90/0x90 [ 729.756881] ? ns_test_super+0x50/0x50 [ 729.760761] ? destroy_unused_super.part.6+0xd0/0xd0 [ 729.765855] ? do_raw_spin_trylock+0x190/0x190 [ 729.770435] ? kobject_put+0x6b/0x250 [ 729.774234] ? blkdev_get+0x3a1/0xb00 [ 729.778036] ? cap_capable+0x1b5/0x230 [ 729.781919] ? __blkdev_get+0x13b0/0x13b0 2018/03/31 11:17:05 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712", 0x3b) 2018/03/31 11:17:05 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="e3b40600ffffffff0400f0ff0000fafffb0e41da189c304034954b00a7172d5e6dc38f66721366162882a4b0446dab26cec9fe84f07c159cf49afd24cace5f89fb796dcf6b63f8c34f74923a544e4b9117efca7fcf0d58ef9782471fc22b1cd4d176eb466033081f5586965779409edd2110c47c593b483c5ced0bc800e7845f453818e2132c03ad73f4deb06e463de7bfeeaa6d5b35bb64800f5b11638eabab477af9deec6901ecddc340c4159fd55e378eec26aa4ad929b91e15017c9e7349a2d6a972cc7d757062c059dbbe5ca8ade65bb423aa45b1ba0f5c01a9997f104ae8b1530200b507d4c8db246a7375c203cd2961957b180236e6ee9ba5d55fae5a254bf7bbcd948f625d4bfd8a2231bf9b7c5f0000000000"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712", 0x3b) [ 729.786063] ? security_capable+0x8e/0xc0 [ 729.790206] ? kill_litter_super+0x90/0x90 [ 729.794436] ? ns_capable_common+0xcf/0x160 [ 729.798748] ? ns_test_super+0x50/0x50 [ 729.802629] ? kill_litter_super+0x90/0x90 [ 729.806859] sget+0xd2/0x120 [ 729.809876] mount_bdev+0x109/0x370 [ 729.813501] ? xfs_test_remount_options.isra.19+0x90/0x90 [ 729.819037] xfs_fs_mount+0x34/0x40 [ 729.822655] mount_fs+0x66/0x2d0 [ 729.826022] vfs_kern_mount.part.26+0xc6/0x4a0 [ 729.830598] ? may_umount+0xa0/0xa0 [ 729.834216] ? _raw_read_unlock+0x22/0x30 [ 729.838354] ? __get_fs_type+0x8a/0xc0 [ 729.842239] do_mount+0xea4/0x2bb0 [ 729.845768] ? __might_fault+0x110/0x1d0 [ 729.849825] ? copy_mount_string+0x40/0x40 [ 729.854055] ? check_same_owner+0x320/0x320 [ 729.858370] ? __check_object_size+0x8b/0x530 [ 729.862864] ? __might_sleep+0x95/0x190 [ 729.866847] ? kasan_check_write+0x14/0x20 [ 729.871080] ? _copy_from_user+0x99/0x110 [ 729.875225] ? memdup_user+0x5e/0x90 [ 729.878928] ? copy_mount_options+0x1f7/0x2e0 [ 729.883416] SyS_mount+0xab/0x120 [ 729.886860] ? copy_mnt_ns+0xb30/0xb30 [ 729.890739] do_syscall_64+0x281/0x940 [ 729.894625] ? vmalloc_sync_all+0x30/0x30 [ 729.898765] ? _raw_spin_unlock_irq+0x27/0x70 [ 729.903251] ? finish_task_switch+0x1c1/0x7e0 [ 729.907731] ? syscall_return_slowpath+0x550/0x550 [ 729.912651] ? syscall_return_slowpath+0x2ac/0x550 [ 729.917575] ? prepare_exit_to_usermode+0x350/0x350 [ 729.922591] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 729.927947] ? trace_hardirqs_off_thunk+0x1a/0x1c 2018/03/31 11:17:05 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="e3b40600ffffffff0400f0ff0000fafffb0e41da189c304034954b00a7172d5e6dc38f66721366162882a4b0446dab26cec9fe84f07c159cf49afd24cace5f89fb796dcf6b63f8c34f74923a544e4b9117efca7fcf0d58ef9782471fc22b1cd4d176eb466033081f5586965779409edd2110c47c593b483c5ced0bc800e7845f453818e2132c03ad73f4deb06e463de7bfeeaa6d5b35bb64800f5b11638eabab477af9deec6901ecddc340c4159fd55e378eec26aa4ad929b91e15017c9e7349a2d6a972cc7d757062c059dbbe5ca8ade65bb423aa45b1ba0f5c01a9997f104ae8b1530200b507d4c8db246a7375c203cd2961957b180236e6ee9ba5d55fae5a254bf7bbcd948f625d4bfd8a2231bf9b7c5f0000000000"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712", 0x3b) 2018/03/31 11:17:05 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e13", 0x58) 2018/03/31 11:17:05 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e13", 0x58) [ 729.932789] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 729.937969] RIP: 0033:0x454e79 [ 729.941143] RSP: 002b:00007ff701201c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 729.948836] RAX: ffffffffffffffda RBX: 00007ff7012026d4 RCX: 0000000000454e79 [ 729.956081] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 00000000200007c0 [ 729.963329] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 729.970578] R10: 000000000080c400 R11: 0000000000000246 R12: 0000000000000014 [ 729.977829] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001f [ 729.995391] device bridge0 left promiscuous mode [ 730.000240] device bridge0 left promiscuous mode [ 730.005098] device bridge0 left promiscuous mode [ 730.027537] ISOFS: Invalid session number or type of track [ 730.038982] ISOFS: Invalid session number [ 730.075316] device bridge0 left promiscuous mode [ 730.104624] ISOFS: Unable to identify CD-ROM format. 2018/03/31 11:17:05 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="e3b40600ffffffff0400f0ff0000fafffb0e41da189c304034954b00a7172d5e6dc38f66721366162882a4b0446dab26cec9fe84f07c159cf49afd24cace5f89fb796dcf6b63f8c34f74923a544e4b9117efca7fcf0d58ef9782471fc22b1cd4d176eb466033081f5586965779409edd2110c47c593b483c5ced0bc800e7845f453818e2132c03ad73f4deb06e463de7bfeeaa6d5b35bb64800f5b11638eabab477af9deec6901ecddc340c4159fd55e378eec26aa4ad929b91e15017c9e7349a2d6a972cc7d757062c059dbbe5ca8ade65bb423aa45b1ba0f5c01a9997f104ae8b1530200b507d4c8db246a7375c203cd2961957b180236e6ee9ba5d55fae5a254bf7bbcd948f625d4bfd8a2231bf9b7c5f0000000000"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e13", 0x58) 2018/03/31 11:17:05 executing program 5: syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x100, 0x4000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f0000a8bfff)=""/1, 0x805031ae) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)) ioctl$TCXONC(r1, 0x540a, 0x3) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000180)) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x4000, 0x0) semget$private(0x0, 0x7, 0x0) syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x3400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x34, r3, 0x0, 0x0, 0x25dfdbfb, {0x9}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x54}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x200}]}, 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x4040014) getsockopt$llc_int(r2, 0x10c, 0x0, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 2018/03/31 11:17:05 executing program 3 (fault-call:2 fault-nth:32): open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f00000006c0), 0x33040, &(0x7f00000006c0)=ANY=[]) mount(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='xfs\x00', 0x80c400, 0x0) 2018/03/31 11:17:05 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000340)={r2}) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f00000004c0)=0xe8) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r4 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r5 = dup2(r0, 0xffffffffffffff9c) ioctl$KVM_PPC_ALLOCATE_HTAB(r5, 0xc004aea7, &(0x7f00000002c0)=0x40000000000) inotify_add_watch(r5, &(0x7f0000000280)='./file0\x00', 0x800000a0) r6 = openat$cgroup_ro(r4, &(0x7f00000001c0)='io.stat\x00', 0x0, 0x0) ioctl$KVM_GET_DIRTY_LOG(r6, 0x4010ae42, &(0x7f0000000200)={0x103ff, 0x0, &(0x7f0000ffd000/0x1000)=nil}) r7 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r7, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r8 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r8, 0x400448c8, &(0x7f0000000940)=ANY=[@ANYRES32=r7, @ANYRES32=r4, @ANYBLOB="52ff010000000000", @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYBLOB="e411b82d239f02360b33ab01086a0910f47bfaaa10d5cb1dd0d5e6120a061bee3a5045c09ff7eb5a798d477b3db7121ae6a2193d00a22c1d20a716d6fb8def52aaf549d2"], @ANYBLOB="00010100470d000001000000060000e38cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff736edeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bcd8d60c37"]) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a8aa852b8e27cc4bed332dce5509fd49b6bd003f5b909778d20c97eda3326371d0d383e1c5f6e3fc2f5e61c4ce6b047104b3f22820012533d5e52a704f1faa5bb4478a0c58345f1aa8bbf1e7fd008c4bb82853615c5b545", 0xcc) 2018/03/31 11:17:05 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0xfffffffffffffe57, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r3 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r4 = accept4(0xffffffffffffffff, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) r5 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r5, 0x400448c8, &(0x7f0000000b40)=ANY=[@ANYRES32=r4, @ANYRES32=r3, @ANYBLOB="52ff010000000000fe5a137aa5b5ac4bacad8ea25b0643acf24a0e52a6bfd13f5bf9b232766bca3c3491de90787797b80b25206c10dffdd31045e8348b3e9d", @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYBLOB], @ANYBLOB="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"]) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a8aa852b8e27cc4bed332dce5509fd49b6bd003f5b909778d20c97eda3326371d0d383e1c5f6e3fc2f5e61c4ce6b047104b3f22820012533d5e52a704f1faa5bb4478a0c58345f1aa8bbf1e7fd008c4", 0xc4) 2018/03/31 11:17:05 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x5ae, 0x20000) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r3 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r4 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r4, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r5 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r5, 0x400448c8, &(0x7f0000000840)={0xffffffffffffffff, r3, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x0, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c284361"}) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e", 0x60) 2018/03/31 11:17:05 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r3 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r4 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r4, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r5 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r5, 0x84, 0x21, &(0x7f00000001c0), &(0x7f0000000200)=0x4) socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r5, 0x400448c8, &(0x7f0000000840)=ANY=[@ANYRES32=r4, @ANYRES32=r3, @ANYBLOB="52ff010000000000", @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYBLOB="e411b8bf8c9f02360b33ab01086a0910f47bfaaa10d5cb1dd0d5e6120a061bee3a5045c09ff7eb5a798d477b3db7121ae6a2193d00a22c1d20a716d6fb8def52aaf549d2"], @ANYBLOB="00010100470d000001000000060000008cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"]) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:17:05 executing program 7: socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x7f, 0x2, &(0x7f0000000140)=[{&(0x7f00000001c0)="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", 0x1000, 0x3}, {&(0x7f00000011c0)="2401b574c38b00b8c5cba6bf267413131c41efd0e35d33656c4c6a959d7a167b6109e6cd262029acdefea6f339a6c1f76f552a2c58014fc8507ae036e3d171cd2840ea44fb414e4716762631a4522d7d91374c8e8d9cbb4a976cd96dee60cc42a7a7e57920164fdff97165f72a34e11b6c5610302d420e38c9e59c4849a2ad3bd4cd25423501d8f455506fe9818d2e2644", 0x91, 0x9}], 0x20a8002, &(0x7f0000001280)={[{@check_strict='check=strict', 0x2c}, {@nocompress='nocompress', 0x2c}, {@check_strict='check=strict', 0x2c}, {@map_off='map=off', 0x2c}, {@check_strict='check=strict', 0x2c}, {@uid={'uid', 0x3d, [0x36, 0x31, 0x33]}, 0x2c}, {@check_strict='check=strict', 0x2c}, {@cruft='cruft', 0x2c}]}) fdatasync(r0) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000180)={[{@session={'session', 0x3d, [0x34, 0x0]}, 0x2c}]}) socketpair(0x10, 0x3, 0x7, &(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000001340)=0x1, 0x2) [ 730.582447] device bridge0 entered promiscuous mode [ 730.595707] device bridge0 entered promiscuous mode [ 730.600861] device bridge0 entered promiscuous mode [ 730.609505] FAULT_INJECTION: forcing a failure. [ 730.609505] name failslab, interval 1, probability 0, space 0, times 0 [ 730.620747] CPU: 1 PID: 17482 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #8 [ 730.627927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 730.637268] Call Trace: [ 730.639849] dump_stack+0x194/0x24d [ 730.643477] ? arch_local_irq_restore+0x53/0x53 [ 730.648141] ? __save_stack_trace+0x7e/0xd0 [ 730.652464] should_fail+0x8c0/0xa40 [ 730.656174] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 730.661272] ? kasan_kmalloc+0xad/0xe0 [ 730.665157] ? kmem_cache_alloc_trace+0x136/0x740 [ 730.669999] ? __memcg_init_list_lru_node+0x169/0x270 [ 730.675181] ? __list_lru_init+0x544/0x750 2018/03/31 11:17:06 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="e3b40600ffffffff0400f0ff0000fafffb0e41da189c304034954b00a7172d5e6dc38f66721366162882a4b0446dab26cec9fe84f07c159cf49afd24cace5f89fb796dcf6b63f8c34f74923a544e4b9117efca7fcf0d58ef9782471fc22b1cd4d176eb466033081f5586965779409edd2110c47c593b483c5ced0bc800e7845f453818e2132c03ad73f4deb06e463de7bfeeaa6d5b35bb64800f5b11638eabab477af9deec6901ecddc340c4159fd55e378eec26aa4ad929b91e15017c9e7349a2d6a972cc7d757062c059dbbe5ca8ade65bb423aa45b1ba0f5c01a9997f104ae8b1530200b507d4c8db246a7375c203cd2961957b180236e6ee9ba5d55fae5a254bf7bbcd948f625d4bfd8a2231bf9b7c5f0000000000"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f36", 0x67) 2018/03/31 11:17:06 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f36", 0x67) [ 730.679413] ? sget_userns+0x6b1/0xe40 [ 730.683291] ? mount_fs+0x66/0x2d0 [ 730.686829] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 730.691575] ? do_mount+0xea4/0x2bb0 [ 730.695280] ? SyS_mount+0xab/0x120 [ 730.698899] ? do_syscall_64+0x281/0x940 [ 730.702955] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 730.708317] ? find_held_lock+0x35/0x1d0 [ 730.712377] ? __lock_is_held+0xb6/0x140 [ 730.716444] ? check_same_owner+0x320/0x320 [ 730.721156] ? rcu_note_context_switch+0x710/0x710 [ 730.726090] should_failslab+0xec/0x120 2018/03/31 11:17:06 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f36", 0x67) [ 730.730065] kmem_cache_alloc_trace+0x4b/0x740 [ 730.734641] ? __kmalloc_node+0x33/0x70 [ 730.738610] ? __kmalloc_node+0x33/0x70 [ 730.742582] ? rcu_read_lock_sched_held+0x108/0x120 [ 730.747598] __memcg_init_list_lru_node+0x169/0x270 [ 730.752613] ? list_lru_add+0x7c0/0x7c0 [ 730.756584] ? __kmalloc_node+0x47/0x70 [ 730.760558] __list_lru_init+0x544/0x750 [ 730.764621] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 730.770503] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 730.775519] ? lockdep_init_map+0x9/0x10 [ 730.779580] sget_userns+0x6b1/0xe40 2018/03/31 11:17:06 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167b", 0x6e) [ 730.783285] ? kill_litter_super+0x90/0x90 [ 730.787517] ? ns_test_super+0x50/0x50 [ 730.791402] ? destroy_unused_super.part.6+0xd0/0xd0 [ 730.796497] ? do_raw_spin_trylock+0x190/0x190 [ 730.801079] ? kobject_put+0x6b/0x250 [ 730.804874] ? blkdev_get+0x3a1/0xb00 [ 730.808666] ? cap_capable+0x1b5/0x230 [ 730.812543] ? __blkdev_get+0x13b0/0x13b0 [ 730.816685] ? security_capable+0x8e/0xc0 [ 730.820822] ? kill_litter_super+0x90/0x90 [ 730.825053] ? ns_capable_common+0xcf/0x160 [ 730.829370] ? ns_test_super+0x50/0x50 2018/03/31 11:17:06 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="e3b40600ffffffff0400f0ff0000fafffb0e41da189c304034954b00a7172d5e6dc38f66721366162882a4b0446dab26cec9fe84f07c159cf49afd24cace5f89fb796dcf6b63f8c34f74923a544e4b9117efca7fcf0d58ef9782471fc22b1cd4d176eb466033081f5586965779409edd2110c47c593b483c5ced0bc800e7845f453818e2132c03ad73f4deb06e463de7bfeeaa6d5b35bb64800f5b11638eabab477af9deec6901ecddc340c4159fd55e378eec26aa4ad929b91e15017c9e7349a2d6a972cc7d757062c059dbbe5ca8ade65bb423aa45b1ba0f5c01a9997f104ae8b1530200b507d4c8db246a7375c203cd2961957b180236e6ee9ba5d55fae5a254bf7bbcd948f625d4bfd8a2231bf9b7c5f0000000000"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167b", 0x6e) 2018/03/31 11:17:06 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167b", 0x6e) [ 730.833253] ? kill_litter_super+0x90/0x90 [ 730.837478] sget+0xd2/0x120 [ 730.840490] mount_bdev+0x109/0x370 [ 730.844111] ? xfs_test_remount_options.isra.19+0x90/0x90 [ 730.849643] xfs_fs_mount+0x34/0x40 [ 730.853265] mount_fs+0x66/0x2d0 [ 730.856626] vfs_kern_mount.part.26+0xc6/0x4a0 [ 730.861205] ? may_umount+0xa0/0xa0 [ 730.864825] ? _raw_read_unlock+0x22/0x30 [ 730.868964] ? __get_fs_type+0x8a/0xc0 [ 730.872854] do_mount+0xea4/0x2bb0 [ 730.876392] ? __might_fault+0x110/0x1d0 [ 730.880446] ? copy_mount_string+0x40/0x40 [ 730.884670] ? check_same_owner+0x320/0x320 [ 730.888982] ? __check_object_size+0x8b/0x530 [ 730.893475] ? __might_sleep+0x95/0x190 [ 730.897448] ? kasan_check_write+0x14/0x20 [ 730.901674] ? _copy_from_user+0x99/0x110 [ 730.905816] ? memdup_user+0x5e/0x90 [ 730.909517] ? copy_mount_options+0x1f7/0x2e0 [ 730.914009] SyS_mount+0xab/0x120 [ 730.917452] ? copy_mnt_ns+0xb30/0xb30 [ 730.921333] do_syscall_64+0x281/0x940 [ 730.925215] ? vmalloc_sync_all+0x30/0x30 [ 730.929358] ? _raw_spin_unlock_irq+0x27/0x70 [ 730.933847] ? finish_task_switch+0x1c1/0x7e0 [ 730.938334] ? syscall_return_slowpath+0x550/0x550 [ 730.943255] ? syscall_return_slowpath+0x2ac/0x550 [ 730.948186] ? prepare_exit_to_usermode+0x350/0x350 [ 730.953197] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 730.958558] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 730.963405] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 730.968582] RIP: 0033:0x454e79 [ 730.971757] RSP: 002b:00007ff701201c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/31 11:17:06 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="e3b40600ffffffff0400f0ff0000fafffb0e41da189c304034954b00a7172d5e6dc38f66721366162882a4b0446dab26cec9fe84f07c159cf49afd24cace5f89fb796dcf6b63f8c34f74923a544e4b9117efca7fcf0d58ef9782471fc22b1cd4d176eb466033081f5586965779409edd2110c47c593b483c5ced0bc800e7845f453818e2132c03ad73f4deb06e463de7bfeeaa6d5b35bb64800f5b11638eabab477af9deec6901ecddc340c4159fd55e378eec26aa4ad929b91e15017c9e7349a2d6a972cc7d757062c059dbbe5ca8ade65bb423aa45b1ba0f5c01a9997f104ae8b1530200b507d4c8db246a7375c203cd2961957b180236e6ee9ba5d55fae5a254bf7bbcd948f625d4bfd8a2231bf9b7c5f0000000000"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91", 0x72) 2018/03/31 11:17:06 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91", 0x72) [ 730.979460] RAX: ffffffffffffffda RBX: 00007ff7012026d4 RCX: 0000000000454e79 [ 730.986712] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 00000000200007c0 [ 730.993954] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 731.001201] R10: 000000000080c400 R11: 0000000000000246 R12: 0000000000000014 [ 731.008450] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000020 [ 731.023339] device bridge0 left promiscuous mode [ 731.028379] device bridge0 left promiscuous mode [ 731.033448] device bridge0 left promiscuous mode [ 731.046915] ISOFS: Invalid session number or type of track [ 731.070759] ISOFS: Invalid session number [ 731.107500] ISOFS: Unable to identify CD-ROM format. 2018/03/31 11:17:06 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91", 0x72) 2018/03/31 11:17:06 executing program 7: syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0000000000000000000000003817d3dce5def3111182a441addc615ab50a62aff2d595677b3d228d4506120e2600b6dd7f82e89787da8156b6f7fcbdc54791857f91ea008b0f2286405565f24339f89d2e8468f17320daa11accd10d24a327fd1f290406338a0976ece81096799e8869ecfec7bd84e9a330298802f3d3b0a306da2c8d234716caf39f76e051bf1e8b31df0ed1d61b2d5224fa14e3592b9710b1bc7200127a98622c6505f8d2243dc7f2f97ac6ae36d7c04ee5875ff7a837ebfe633aaeda757a6a836a4d0d33"]) 2018/03/31 11:17:06 executing program 3 (fault-call:2 fault-nth:33): open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f00000006c0), 0x33040, &(0x7f00000006c0)=ANY=[]) mount(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='xfs\x00', 0x80c400, 0x0) 2018/03/31 11:17:06 executing program 4: memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x3) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r3 = socket$kcm(0x29, 0x7, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000200)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r4 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r4, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r5 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r5, 0x400448c8, &(0x7f0000000840)={r4, r3, 0xffffffffffffff52, 0x1, &(0x7f00000006c0)="e411b82d239f02360b33ab01086a0910f47bfaaa10d5cb1dd0d5e6120a061bee3a5045c09ff7eb5a798d477b3db7121ae6a2193d00a22c1d20a716d6fb8def52aaf549d2", 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:17:06 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r3 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r4 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r4, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r5 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) getsockopt$inet_sctp6_SCTP_RTOINFO(r4, 0x84, 0x0, &(0x7f00000001c0)={0x0, 0x0, 0xd3, 0x5a6}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f0000000280)={r6, 0x2}, &(0x7f00000002c0)=0x8) ioctl$sock_bt_hidp_HIDPCONNADD(r5, 0x400448c8, &(0x7f0000000840)={r4, r3, 0xffffffffffffff52, 0x1, &(0x7f00000006c0)="e411b82d239f02360b33ab01086a0910f47bfaaa10d5cb1dd0d5e6120a061bee3a5045c09ff7eb5a798d477b3db7121ae6a2193d00a22c1d20a716d6fb8def52aaf549d2", 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a8aa852b8e27cc4bed332dce5509fd49b6bd003f5b909778d20c97eda3326371d0d383e1c5f6e3fc2f5e61c4ce6b047104b3f22820012533d5e52a704f1faa5bb4478a0c58345f1aa8bbf1e7fd008c4bb82853615c5b545", 0xcc) 2018/03/31 11:17:06 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r3 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r4 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r4, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r5 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r5, 0x400448c8, &(0x7f0000000840)=ANY=[@ANYRES32, @ANYRES32=r3, @ANYBLOB="52ff010000000000", @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYBLOB], @ANYBLOB="000101b0060d000001000000000000008cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb183990f1df9dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c284361"]) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a68206090000008e131674a4e9d01ca06e", 0x16) 2018/03/31 11:17:06 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x20000, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000200)={0x0, &(0x7f0000000280)}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000000c0)={r2, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r3 = socket$netlink(0x10, 0x3, 0x1002) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000029c0)) r4 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000005f00)) r5 = accept4(0xffffffffffffffff, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) r6 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r6, 0x400448c8, &(0x7f0000000840)={r5, r4, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223"}) write(r3, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a8aa852b8e27cc4bed332dce5509fd49b6bd003f5b909778d20c97eda3326371d0d383e1c5f6e3fc2f5e61c4ce6b047104b3f22820012533d5e52a704f1faa5bb4478a0c58345f1aa8bbf1e7fd008c4", 0xc4) 2018/03/31 11:17:06 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f0000a8bfff)=""/1, 0x805031ae) r2 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0x7, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0a0029bd7000fbdbdf25080000000800040000004a00380001000800010000000000080008000100000014000300fe80000000000000000000000000000c080001000a000000080001000a0000004d4fd99e649062edc5e43cff39832da6510a97810ebe6897eaae22e3199a2d06679d775ac06fc47208"], 0x54}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000380)={r2, r2}) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)) ioctl$TCXONC(r1, 0x540a, 0x81) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000180)) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x4000, 0x0) semget$private(0x0, 0x7, 0x0) syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x3400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x34, r5, 0x0, 0x0, 0x25dfdbfb, {0x9}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x54}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x200}]}, 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x4040014) getsockopt$llc_int(r4, 0x10c, 0x0, &(0x7f0000000040), &(0x7f00000000c0)=0x4) [ 731.651470] device bridge0 entered promiscuous mode [ 731.674456] device bridge0 entered promiscuous mode [ 731.681349] FAULT_INJECTION: forcing a failure. [ 731.681349] name failslab, interval 1, probability 0, space 0, times 0 [ 731.681371] device bridge0 entered promiscuous mode [ 731.692599] CPU: 1 PID: 17560 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #8 [ 731.697918] device bridge0 entered promiscuous mode [ 731.704746] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 731.704751] Call Trace: [ 731.704768] dump_stack+0x194/0x24d [ 731.704783] ? arch_local_irq_restore+0x53/0x53 [ 731.704795] ? __save_stack_trace+0x7e/0xd0 [ 731.704812] should_fail+0x8c0/0xa40 [ 731.704826] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 731.704840] ? kasan_kmalloc+0xad/0xe0 [ 731.746939] ? kmem_cache_alloc_trace+0x136/0x740 [ 731.751774] ? __memcg_init_list_lru_node+0x169/0x270 [ 731.756963] ? __list_lru_init+0x544/0x750 [ 731.761195] ? sget_userns+0x6b1/0xe40 [ 731.765079] ? mount_fs+0x66/0x2d0 [ 731.768617] ? vfs_kern_mount.part.26+0xc6/0x4a0 2018/03/31 11:17:07 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc", 0x74) [ 731.773362] ? do_mount+0xea4/0x2bb0 [ 731.777065] ? SyS_mount+0xab/0x120 [ 731.780684] ? do_syscall_64+0x281/0x940 [ 731.783152] ISOFS: Unable to identify CD-ROM format. [ 731.784821] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 731.784837] ? find_held_lock+0x35/0x1d0 [ 731.784850] ? __lock_is_held+0xb6/0x140 [ 731.784868] ? check_same_owner+0x320/0x320 [ 731.784882] ? rcu_note_context_switch+0x710/0x710 [ 731.784898] should_failslab+0xec/0x120 [ 731.784908] kmem_cache_alloc_trace+0x4b/0x740 [ 731.784918] ? __kmalloc_node+0x33/0x70 2018/03/31 11:17:07 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc", 0x74) [ 731.825096] ? __kmalloc_node+0x33/0x70 [ 731.829063] ? rcu_read_lock_sched_held+0x108/0x120 [ 731.834073] __memcg_init_list_lru_node+0x169/0x270 [ 731.839084] ? list_lru_add+0x7c0/0x7c0 [ 731.843052] ? __kmalloc_node+0x47/0x70 [ 731.847025] __list_lru_init+0x544/0x750 [ 731.851083] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 731.856964] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 731.861975] ? lockdep_init_map+0x9/0x10 [ 731.866029] sget_userns+0x6b1/0xe40 [ 731.869730] ? kill_litter_super+0x90/0x90 2018/03/31 11:17:07 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) r3 = memfd_create(&(0x7f00000001c0)='bridge0\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x84) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc", 0x74) [ 731.873959] ? ns_test_super+0x50/0x50 [ 731.877840] ? destroy_unused_super.part.6+0xd0/0xd0 [ 731.882935] ? do_raw_spin_trylock+0x190/0x190 [ 731.887515] ? kobject_put+0x6b/0x250 [ 731.891319] ? blkdev_get+0x3a1/0xb00 [ 731.895119] ? cap_capable+0x1b5/0x230 [ 731.899003] ? __blkdev_get+0x13b0/0x13b0 [ 731.903147] ? security_capable+0x8e/0xc0 [ 731.907287] ? kill_litter_super+0x90/0x90 [ 731.911520] ? ns_capable_common+0xcf/0x160 [ 731.915838] ? ns_test_super+0x50/0x50 [ 731.919718] ? kill_litter_super+0x90/0x90 [ 731.923943] sget+0xd2/0x120 [ 731.926953] mount_bdev+0x109/0x370 [ 731.930569] ? xfs_test_remount_options.isra.19+0x90/0x90 [ 731.936097] xfs_fs_mount+0x34/0x40 [ 731.939713] mount_fs+0x66/0x2d0 [ 731.943076] vfs_kern_mount.part.26+0xc6/0x4a0 [ 731.947651] ? may_umount+0xa0/0xa0 [ 731.951272] ? _raw_read_unlock+0x22/0x30 [ 731.955413] ? __get_fs_type+0x8a/0xc0 [ 731.959298] do_mount+0xea4/0x2bb0 [ 731.962833] ? __might_fault+0x110/0x1d0 [ 731.966888] ? copy_mount_string+0x40/0x40 [ 731.971110] ? check_same_owner+0x320/0x320 [ 731.975409] ? __check_object_size+0x8b/0x530 [ 731.979879] ? __might_sleep+0x95/0x190 [ 731.983827] ? kasan_check_write+0x14/0x20 [ 731.988036] ? _copy_from_user+0x99/0x110 [ 731.992162] ? memdup_user+0x5e/0x90 [ 731.995849] ? copy_mount_options+0x1f7/0x2e0 [ 732.000325] SyS_mount+0xab/0x120 [ 732.003762] ? copy_mnt_ns+0xb30/0xb30 [ 732.007631] do_syscall_64+0x281/0x940 [ 732.011496] ? vmalloc_sync_all+0x30/0x30 [ 732.015619] ? _raw_spin_unlock_irq+0x27/0x70 [ 732.020085] ? finish_task_switch+0x1c1/0x7e0 [ 732.024570] ? syscall_return_slowpath+0x550/0x550 [ 732.029479] ? syscall_return_slowpath+0x2ac/0x550 [ 732.034384] ? prepare_exit_to_usermode+0x350/0x350 [ 732.039389] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 732.044733] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 732.049557] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 732.054726] RIP: 0033:0x454e79 [ 732.057888] RSP: 002b:00007ff701201c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 732.065572] RAX: ffffffffffffffda RBX: 00007ff7012026d4 RCX: 0000000000454e79 2018/03/31 11:17:07 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) sendmsg(r2, &(0x7f0000000e40)={&(0x7f00000004c0)=@ethernet={0x307, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000a80)="a42e4f4ae9ebc6159909320ca27eeaac7eb914c322ee7287455ef1dd092011259b297e591acbf6fe62685478303d141a82a52dab69a42ddc89b3ad962cca19bee2faf382e78e17fb6f95f198274da024fab4b4b504d3b2adc2a7b59bb4f1e34739074025682345e121bf38be3c02e95abbf401ebfd95c3b5328a8761b60aa5c356467e5f5bac2763495de1ccba53fb3e15660d88bfa6a487cd7ec7250f234d3e9296a1074f4ff9f7da9b98b75226302e0cb9c67644ebf30df3cac23d9e6c32090ce8c6fe447a5a142f22b68acc3508a9970d10516c60cc54930ff8530e6d0d5c72c6ad02d1062095", 0xe8}, {&(0x7f0000000340)="40d1d2", 0x3}, {&(0x7f0000001240)="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", 0x1000}, {&(0x7f0000000540)="a847", 0x2}, {&(0x7f0000000640)="6e2ef3a8e402c3a4a8d6f2c1d53c43e0369f2013abd4edeb056a6e6b2dea2ce0f5481a6cb66c03f2fb8621af6393debe3ee1168b957ea71ad7ae5d973497649f4ee2c2", 0x43}, {&(0x7f0000000580)="8951d6d8ab798cf5fce92eaa6d96cba0356376094ae0ba25b77adbf834991c71a25db1aeb6da847d2e", 0x29}, {&(0x7f0000000b80)="18884360", 0x4}], 0x7, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x1d0, 0x1}, 0x40000) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() set_robust_list(&(0x7f0000000300)={&(0x7f0000000200)={&(0x7f00000001c0)}, 0xf800000000, &(0x7f00000002c0)={&(0x7f0000000280)}}, 0x18) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r3 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000180)) syz_mount_image$msdos(&(0x7f0000000f80)='msdos\x00', &(0x7f0000000fc0)='./file0\x00', 0xe67, 0x5, &(0x7f0000002400)=[{&(0x7f0000001000)="4911e26d4932100db7366e739efbfe7d68e39e687814ffae5e3f5d4a03cfd0fe9610cdb89f3d79aba21ff4ccafe950b1c846e575e5714867974d37f30b704668ebb8d660cf157fe14496f82e8d0afad232ce9660ddfe73db61f1fd849358af6d449ace19f00cc3f6e3c3e3b8792771af0e782fed34f1de21144fb26011", 0x7d, 0xfff}, {&(0x7f0000001080)="110185cbe8ccf5df7f5ff921848ece0fb72cb192c8635099bb9690", 0x1b, 0xffff}, {&(0x7f0000002240)="13da7a196ef0a94ac0ed7e4d495a7c5fec7a580bf1ff1b81675f8300d904a61ce6539cda569d001267d9cf15ad6060f0e835100993cb98a448f2b587cba28eea35016f66f3da454e5997caa39c72b482ce2883670858eee21e20c3408c75073d62a8315b432155ab34a7b547bf8a7ccb320a7ff7c8ba45ce4684548874fb6d3b6b00586e193efacdc909682598486cf1f048da190b5d87be5b075b4a30fd99cc7ce66288a7fba7f1c15d2bcee1683d52c26eef187f08ca965557d87c6ce378b075084df661d01983f71c046d7288040efdc36d639abfc2cd68a368581b2fd2bf55145e9c85ca9acb24b8", 0xea, 0x8}, {&(0x7f0000002340)="d5e09e28931b7e962ae113aa7fe9ef955d3f8210867a09347586", 0x1a, 0x101}, {&(0x7f0000002380)="4a58aa63d96a00d2293b924efc29b49bddb4d89a970e992f620cbefddeeb7d0df7d18508599910799e5c654aea10d7a5e8b41ede547dc8df1e7985313cf85ba9d4b0e4a57d1ab86fdb02fa6a283b8c6d92a87b2f22", 0x55, 0x5}], 0x8000, &(0x7f0000002480)={[{@errors_remount='errors=remount-ro', 0x2c}, {@debug='debug', 0x2c}, {@showexec='showexec', 0x2c}]}) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r4 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r4, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r5 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r5, 0x400448c8, &(0x7f0000000840)={r4, r3, 0xffffffffffffff52, 0x1, &(0x7f00000006c0)="e411b82d239f02360b33ab01086a0910f47bfaaa10d5cb1dd0d5e6120a061bee3a5045c09ff7eb5a798d477b3db7121ae6a2193d00a22c1d20a716d6fb8def52aaf549d2", 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f00000024c0)={0x3, 0x1, 0x0, 0x98b}) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) [ 732.072824] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 00000000200007c0 [ 732.080071] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 732.087322] R10: 000000000080c400 R11: 0000000000000246 R12: 0000000000000014 [ 732.094566] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000021 [ 732.115955] device bridge0 left promiscuous mode [ 732.121706] device bridge0 left promiscuous mode 2018/03/31 11:17:07 executing program 3 (fault-call:2 fault-nth:34): open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f00000006c0), 0x33040, &(0x7f00000006c0)=ANY=[]) mount(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='xfs\x00', 0x80c400, 0x0) 2018/03/31 11:17:07 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0x2b3) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r3, 0x0, 0x2a, &(0x7f0000000000)={0x0, {{0x2, 0x0, @loopback=0x7f000001}}}, 0x84) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) r4 = openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0xff, 0x80) remap_file_pages(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000000, 0x3, 0x26110) ioctl$KVM_GET_SUPPORTED_CPUID(r4, 0xc008ae05, &(0x7f0000000280)=""/243) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r5 = socket$kcm(0x29, 0x4000000000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) ioctl$KVM_SET_CPUID2(r4, 0x4008ae90, &(0x7f00000004c0)={0x2, 0x0, [{0x80000007, 0x7, 0x1, 0x73, 0x3e, 0x6b08, 0x7}, {0xc0000007, 0x1, 0x4, 0x80000001, 0x9, 0x87, 0xfffffffffffffff7}]}) r6 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r6, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000840)={r6, r5, 0xffffffffffffff52, 0x1, &(0x7f00000006c0)="e411b82d239f02360b33ab01086a0910f47bfaaa10d5cb1dd0d5e6120a061bee3a5045c09ff7eb5a798d477b3db7121ae6a2193d00a22c1d20a716d6fb8def52aaf549d2", 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a", 0x75) 2018/03/31 11:17:07 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="f49657a503ca"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) r3 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x2, 0x400) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@loopback, @in=@loopback}}, {{@in=@multicast2}}}, &(0x7f0000000200)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r4 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r5 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r5, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r6 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r6, 0x400448c8, &(0x7f0000000840)={r5, r4, 0xffffffffffffff52, 0x1, &(0x7f00000006c0)="e411b82d239f02360b33ab01086a0910f47bfaaa10d5cb1dd0d5e6120a061bee3a5045c09ff7eb5a798d477b3db7121ae6a2193d00a22c1d20a716d6fb8def52aaf549d2", 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223fee8d10e53bc"}) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a8aa852b8e27cc4bed332dce5509fd49b6bd003f5b909778d20c97eda3326371d0d383e1c5f6e3fc2f5e61c4ce6b047104b3f22820012533d5e52a704f1faa5bb4478a0c58345f1aa8bbf1e7fd008c4bb82853615c5b545", 0xcc) 2018/03/31 11:17:07 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) r3 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r4 = accept4(0xffffffffffffffff, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) r5 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x0) ioctl$sock_inet_udp_SIOCINQ(r5, 0x541b, &(0x7f0000000040)) ioctl$sock_bt_hidp_HIDPCONNADD(r5, 0x400448c8, &(0x7f0000000840)={r4, r3, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x6, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c2843617385f722a223"}) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e1a18991ca08f3667361e85b4167bcbf6ee91b9dc0a8aa852b8e27cc4bed332dce5509fd49b6bd003f5b909778d20c97eda3326371d0d383e1c5f6e3fc2f5e61c4ce6b047104b3f22820012533d5e52a704f1faa5bb4478a0c58345f1aa8bbf1e7fd008c4", 0xc4) 2018/03/31 11:17:07 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0x24) getuid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000027c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000029c0)) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000040)) r3 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000005f00)) r4 = accept4(r2, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80, 0x0) setsockopt$ipx_IPX_TYPE(r4, 0x100, 0x1, &(0x7f0000000800)=0x5, 0x4) r5 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r5, 0x400448c8, &(0x7f0000000840)={0xffffffffffffffff, r3, 0xffffffffffffff52, 0x1, &(0x7f00000006c0), 0x0, 0x1, 0x1, 0xd47, 0x0, 0x1, 0x0, "8cf24b7fd8b0ddc12ac89815965997f04ab65965e7b1826827edb42a04961923bddf320398fbca63e24c12e49fa9cbc6fa3c9668eb3c5a0ed91d825000f39113f019864869fa54192c2855935cffd02b9c5271ffe1fad8464cae490f314b0287337f02124fa263977d3a3572334bdfb27039b0ff737adeccbd7bb84f3a84859a91e824ec045ae0eb18399009e09dce827054c9cefb35eeba34bbdebb872646105b7323cca313a0c74fa0708172258c3ef77340f0423fd10c284361"}) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000001c0)=0x100000001, 0x2) write(r2, &(0x7f00000005c0)="2700000014000707030e0000120f0a00110011002d45222027bbb57a3e0e49d6a90600d6ec000013d310d3d451ba370b250a1fd95762917c28f712291db33d7dd5a3b08c34da1acae06b57c4efd509a682c89ec1da9c8e131674a4e9d01ca06e", 0x60) [ 732.126889] device bridge0 left promiscuous mode [ 732.133604] device bridge0 left promiscuous mode [ 732.143360] device bridge0 entered promiscuous mode [ 732.197976] device bridge0 entered promiscuous mode [ 732.218726] ISOFS: Unable to identify CD-ROM format. [ 732.229304] device bridge0 entered promiscuous mode [ 732.234680] device bridge0 entered promiscuous mode [ 732.242608] device bridge0 entered promiscuous mode [ 732.245221] FAULT_INJECTION: forcing a failure. [ 732.245221] name failslab, interval 1, probability 0, space 0, times 0 [ 732.259271] CPU: 0 PID: 17599 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #8 [ 732.266452] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 732.268718] device bridge0 left promiscuous mode [ 732.275789] Call Trace: [ 732.275807] dump_stack+0x194/0x24d [ 732.275821] ? arch_local_irq_restore+0x53/0x53 [ 732.275834] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 732.275846] ? find_held_lock+0x35/0x1d0 [ 732.275862] should_fail+0x8c0/0xa40 [ 732.275870] ? __list_lru_init+0x352/0x750 [ 732.275881] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 732.313637] ? trace_hardirqs_off+0x10/0x10 [ 732.317989] ? print_irqtrace_events+0x270/0x270 [ 732.322734] ? find_held_lock+0x35/0x1d0 [ 732.326788] ? __lock_is_held+0xb6/0x140 [ 732.330840] ? check_same_owner+0x320/0x320 [ 732.335143] ? rcu_note_context_switch+0x710/0x710 [ 732.340047] ? find_held_lock+0x35/0x1d0 [ 732.344091] should_failslab+0xec/0x120 [ 732.348050] __kmalloc+0x63/0x760 [ 732.351479] ? lock_downgrade+0x980/0x980 [ 732.355602] ? register_shrinker+0x10e/0x2d0 [ 732.359984] ? trace_event_raw_event_module_request+0x320/0x320 [ 732.366023] register_shrinker+0x10e/0x2d0 [ 732.370233] ? prepare_kswapd_sleep+0x1f0/0x1f0 [ 732.374877] ? memcpy+0x45/0x50 [ 732.378132] sget_userns+0xbbf/0xe40 [ 732.381821] ? kill_litter_super+0x90/0x90 [ 732.386033] ? ns_test_super+0x50/0x50 [ 732.389903] ? destroy_unused_super.part.6+0xd0/0xd0 [ 732.394980] ? do_raw_spin_trylock+0x190/0x190 [ 732.399539] ? kobject_put+0x6b/0x250 [ 732.403315] ? blkdev_get+0x3a1/0xb00 [ 732.407092] ? cap_capable+0x1b5/0x230 [ 732.410953] ? __blkdev_get+0x13b0/0x13b0 [ 732.415078] ? security_capable+0x8e/0xc0 [ 732.419198] ? kill_litter_super+0x90/0x90 [ 732.423412] ? ns_capable_common+0xcf/0x160 [ 732.427705] ? ns_test_super+0x50/0x50 [ 732.431562] ? kill_litter_super+0x90/0x90 [ 732.435769] sget+0xd2/0x120 [ 732.438769] mount_bdev+0x109/0x370 [ 732.442369] ? xfs_test_remount_options.isra.19+0x90/0x90 [ 732.447880] xfs_fs_mount+0x34/0x40 [ 732.451481] mount_fs+0x66/0x2d0 [ 732.454825] vfs_kern_mount.part.26+0xc6/0x4a0 [ 732.459379] ? may_umount+0xa0/0xa0 [ 732.462980] ? _raw_read_unlock+0x22/0x30 [ 732.467103] ? __get_fs_type+0x8a/0xc0 [ 732.470965] do_mount+0xea4/0x2bb0 [ 732.474479] ? __might_fault+0x110/0x1d0 [ 732.478514] ? copy_mount_string+0x40/0x40 [ 732.482721] ? check_same_owner+0x320/0x320 [ 732.487021] ? __check_object_size+0x8b/0x530 [ 732.491496] ? __might_sleep+0x95/0x190 [ 732.495450] ? kasan_check_write+0x14/0x20 [ 732.499656] ? _copy_from_user+0x99/0x110 [ 732.503777] ? memdup_user+0x5e/0x90 [ 732.507464] ? copy_mount_options+0x1f7/0x2e0 [ 732.511934] SyS_mount+0xab/0x120 [ 732.515361] ? copy_mnt_ns+0xb30/0xb30 [ 732.519223] do_syscall_64+0x281/0x940 [ 732.523082] ? vmalloc_sync_all+0x30/0x30 [ 732.527203] ? _raw_spin_unlock_irq+0x27/0x70 [ 732.531670] ? finish_task_switch+0x1c1/0x7e0 [ 732.536139] ? syscall_return_slowpath+0x550/0x550 [ 732.541044] ? syscall_return_slowpath+0x2ac/0x550 [ 732.545947] ? prepare_exit_to_usermode+0x350/0x350 [ 732.550941] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 732.556280] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 732.561098] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 732.566260] RIP: 0033:0x454e79 [ 732.569422] RSP: 002b:00007ff701201c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 732.577103] RAX: ffffffffffffffda RBX: 00007ff7012026d4 RCX: 0000000000454e79 [ 732.584353] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 00000000200007c0 [ 732.591594] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 732.598837] R10: 000000000080c400 R11: 0000000000000246 R12: 0000000000000014 [ 732.606080] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000022