ting program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000d80)={r5, 0x13c, 0x7, 0xaa5, 0x1, 0x8001}, 0x14) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000dc0)={0xaa, 0x20}) pwrite64(r1, &(0x7f0000000e00)="7437032bd6e223b3a59d10357fc245a11551c76207ed30241886ce0ea1326aeac569322a47e5909770909834b26bf6b04af3b30656cbc3e07c3eed14ee7c472c2d276872498ef33618509e2049213b9664560dc77dd302976456a0392edd116b9816cbca183c77f192c4c3260a385cc483327645104ab9987888488ff6b8e163c2eddc4fc33b9f9ba13abbb021303c8d438d96b2da7c190f9cdc9f2242c2df22ccc63b779747bc9b54e299a407b4150450352ce672efd9fd7565ffb5f410dd66a2061984a92c2ca847eb65e95168372a9e92cc53f27151c36569714d1b2b2b2d26b0e9668aa5042a767ab88ad81f2850cef1", 0xf2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) 2018/03/30 10:21:02 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x44}) sched_setaffinity(0x0, 0x8, &(0x7f000080b000)=0x51b2) perf_event_open(&(0x7f0000223000)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000180)={{0x2, 0x4e20, @broadcast=0xffffffff}, {0x307}, 0x60, {0x2, 0x4e21, @rand_addr=0x2}, 'nr0\x00'}) r2 = syz_open_dev$sndctrl(&(0x7f0000001000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r2, 0xc008551b, &(0x7f0000000140)=ANY=[@ANYBLOB="7d000000a0030000"]) r3 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x100, 0x100) ioctl$sock_ipx_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000080)={'sit0\x00', {0x4, 0x2dd, 0x6, "e0654ebcabe8", 0x3f}}) ioctl$KVM_SMI(r3, 0xaeb7) fcntl$getown(r2, 0x9) r4 = dup(r0) readv(r0, &(0x7f0000d32fc0)=[{&(0x7f000039a000)=""/185, 0xb9}], 0x1) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000003000/0x4000)=nil, 0x4000}, 0x1}) ioctl$LOOP_CLR_FD(r4, 0x4c01) mremap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000005000/0x4000)=nil) 2018/03/30 10:21:02 executing program 7: clone(0x200, &(0x7f0000000100)="f0f7d70fc52207334efb558c957ea5882b23d85fa1659dc13aa7603b45aa407f02117308b1a8697bcf6617a98d145ec63b3cffa3123c2b94a42831af8d9bdb4b03d2954fdaa7e037f2c459a27e42921a924df6c5899ef4dbdb44bffbadd515d6024b7e3450b4ea54c55a229f4d694a292b270018a408b9ed54a0bc1929156ff004c1cf0b1728065c1ae04f4eeb552ff2420005e5ccb9400909127922c4a8e69ffbb96ca5bc95786113ae475b94c2c9a6a235276e2f1b7f01010000000000007a", &(0x7f0000000000), &(0x7f0000f8b000), &(0x7f00000d5000)) mknod(&(0x7f0000cd7000)='./file0\x00', 0x103a, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000340), &(0x7f000027a000)) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000080)={0x4, 0xffffffffffffff9c, 0x1}) bind$unix(r0, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) r1 = syz_open_procfs(0x0, &(0x7f000042cff4)='personality\x00') read(0xffffffffffffffff, &(0x7f0000f1bf7e)=""/130, 0xfffffdd8) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000240)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x9, 0x18}, 0xc) open$dir(&(0x7f000050bff8)='./file0\x00', 0x2, 0x0) 2018/03/30 10:21:02 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="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", 0xfc}], 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x200900, 0x103) connect$vsock_stream(r1, &(0x7f0000000600)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) r2 = socket$alg(0x26, 0x5, 0x0) rt_sigtimedwait(&(0x7f0000000140)={0xffffffff}, 0x0, &(0x7f0000000180), 0x8) bind$alg(r2, &(0x7f000073e000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(cbc-twofish-avx)\x00'}, 0x58) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000500)={&(0x7f00000005c0)=[0x0, 0x0, 0x0], 0x3}) nanosleep(&(0x7f0000d1e000)={0x0, 0x1c9c380}, &(0x7f0000000000)) r3 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r3, 0x118, 0x0, &(0x7f0000000100)=0x7, 0x4) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000000c0)={0x1, 0x1, 0x1, 0x1, 0x0, 0x6}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000280)={r4, @in={{0x2, 0x4e23, @multicast2=0xe0000002}}, [0x8000, 0x9, 0x80000000, 0x3, 0x80, 0x8001, 0x800, 0x100, 0xe0db, 0x0, 0x2000000000, 0x200, 0x68, 0x0, 0x8]}, &(0x7f0000000380)=0x100) r5 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0xfffffffffffffdfa) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r5, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port1\x00', 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r5, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r6 = gettid() r7 = syz_open_procfs(r6, &(0x7f00000002c0)='maps\x00') readv(r7, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/28, 0x65}], 0x1) exit(0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r7, &(0x7f000004ffe0)=[{&(0x7f0000000000)=""/128, 0xe6}], 0x222) r8 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) connect$ax25(r3, &(0x7f00000006c0)={0x3, {"fc5da504005009"}, 0x7fff}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) getsockopt$netrom_NETROM_T1(r8, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r5, 0x80045301, &(0x7f0000000700)) 2018/03/30 10:21:02 executing program 1: clone(0x200, &(0x7f0000fbf000), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f00000d5000)) mknod(&(0x7f0000cd7000)='./file0\x00', 0x103a, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000340), &(0x7f000027a000)) r0 = shmget(0x0, 0x4000, 0x54000100, &(0x7f0000ffa000/0x4000)=nil) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x5000) r1 = syz_open_procfs(0x0, &(0x7f000042cff4)='personality\x00') read(r1, &(0x7f0000f1bf7e)=""/130, 0xfffffdd8) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000240)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x9, 0x18}, 0xc) open$dir(&(0x7f000050bff8)='./file0\x00', 0x2, 0x0) 2018/03/30 10:21:02 executing program 6 (fault-call:3 fault-nth:5): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r0, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r0, &(0x7f0000000100)=""/65, 0x41) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) linkat(r0, &(0x7f0000000480)='./file1\x00', r1, &(0x7f00000004c0)='./file0\x00', 0x1000) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') unlink(&(0x7f00000000c0)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r0, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x12021) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000340)={0x8, 0x9, 0x4, 0x10000, 0x1, 0x7, 0x7fffffff, 0x0, 0x29, 0x0, 0x20}, 0xb) 2018/03/30 10:21:03 executing program 3: r0 = perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x78, 0x1e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000180)=0xd, 0x11c) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x8000, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e23, 0x3, @empty, 0xffffffff}}, [0x9, 0x802, 0x6, 0x1, 0x0, 0x2, 0x0, 0x8, 0x4164, 0x3ff, 0x8, 0x4, 0x3, 0x5, 0x8]}, &(0x7f0000000340)=0x100) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x19, &(0x7f0000000380)={r3, 0x1ff}, 0x8) open$dir(&(0x7f00000001c0)='./file0\x00', 0xc0002, 0x48) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f00000003c0)) r4 = dup2(r0, r1) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000040)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "6fbe4d6d91fea477d39826fa220528fa6fc936bef76766397155f85b917276a65295fa9b24f1baf7f2967e1f8b6d2cc0d7e4018868979b79fb513908a8f6d29f66e50523ea771047d83edb5e4eed3a22"}, 0xffffffd4) fchmodat(r2, &(0x7f0000000400)='./file0/file0\x00', 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x8, 0x1, 0x1ff, 0x6, 0x8, r4, 0xf3c}, 0x2c) [ 190.299787] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 190.304952] RIP: 0033:0x4548b9 [ 190.308119] RSP: 002b:00007f21129fdc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 190.315803] RAX: ffffffffffffffda RBX: 00007f21129fe6d4 RCX: 00000000004548b9 [ 190.323047] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 190.330296] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 190.337544] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 190.344792] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000004 2018/03/30 10:21:03 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, &(0x7f0000000040)={0x7, 0x7, 0x2, 0x8000, "06bbaabd6a58da1e482efc34341f69f94bacdd7bf61b51cce562ba8465afbede5c166b8f9792253b012f9e7d", 0x8}) r1 = getpid() perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0xdd, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xc8, 0x0, 0xb07, 0x0, 0x0, 0x0, 0x0, 0xffffffffffff8b72, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x4804, 0x0, 0x0, 0x0, 0x0, 0x4}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r2, 0xc0605345, &(0x7f0000000140)) 2018/03/30 10:21:03 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000000)=0x2, 0x4) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) setsockopt$llc_int(r1, 0x10c, 0x7, &(0x7f0000000080)=0x6f5, 0x4) sendto$inet(r0, &(0x7f0000865000), 0x0, 0x4, &(0x7f0000fd9ff0)={0x2, 0x4e20, @rand_addr}, 0x167) setns(r0, 0x8000000) 2018/03/30 10:21:03 executing program 6 (fault-call:3 fault-nth:6): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r0, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r0, &(0x7f0000000100)=""/65, 0x41) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) linkat(r0, &(0x7f0000000480)='./file1\x00', r1, &(0x7f00000004c0)='./file0\x00', 0x1000) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') unlink(&(0x7f00000000c0)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r0, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x12021) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000340)={0x8, 0x9, 0x4, 0x10000, 0x1, 0x7, 0x7fffffff, 0x0, 0x29, 0x0, 0x20}, 0xb) 2018/03/30 10:21:03 executing program 3: socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000018000)={&(0x7f000001a000)={0x10}, 0xc, &(0x7f000000e000)={&(0x7f0000d35ff9)={0x1c, 0x1d, 0xffffffffffffffff, 0x0, 0x0, {0x1}, [@nested={0x8, 0x3, [@generic="da"]}]}, 0x1c}, 0x1}, 0x0) [ 190.594220] bond0 (unregistering): Released all slaves [ 191.269302] IPVS: ftp: loaded support on port[0] = 21 [ 191.555081] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 191.972164] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 191.978265] 8021q: adding VLAN 0 to HW filter on device bond0 [ 192.023005] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 192.066382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 192.087318] FAULT_INJECTION: forcing a failure. [ 192.087318] name failslab, interval 1, probability 0, space 0, times 0 [ 192.098808] CPU: 0 PID: 24212 Comm: syz-executor6 Not tainted 4.16.0-rc7+ #371 [ 192.106156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 192.115488] Call Trace: [ 192.118056] dump_stack+0x194/0x24d [ 192.121666] ? arch_local_irq_restore+0x53/0x53 [ 192.126331] should_fail+0x8c0/0xa40 [ 192.130033] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 192.135136] ? trace_hardirqs_off+0x10/0x10 [ 192.139437] ? __lock_acquire+0x664/0x3e00 [ 192.143658] ? trace_hardirqs_off+0x10/0x10 [ 192.147959] ? lock_acquire+0x1d5/0x580 [ 192.151915] ? find_held_lock+0x35/0x1d0 [ 192.155960] ? find_held_lock+0x35/0x1d0 [ 192.159999] ? trace_hardirqs_off+0x10/0x10 [ 192.164393] ? __is_insn_slot_addr+0x1fc/0x330 [ 192.168950] ? print_irqtrace_events+0x270/0x270 [ 192.173693] should_failslab+0xec/0x120 [ 192.177645] kmem_cache_alloc+0x47/0x760 [ 192.181692] ? is_bpf_text_address+0x7b/0x120 [ 192.186174] radix_tree_node_alloc.constprop.19+0x1b4/0x2d0 [ 192.191867] idr_get_free+0x9d0/0xfd0 [ 192.195659] ? radix_tree_clear_tags+0xb0/0xb0 [ 192.200222] ? unwind_get_return_address+0x61/0xa0 [ 192.205219] ? __save_stack_trace+0x7e/0xd0 [ 192.209531] ? save_stack+0xa3/0xd0 [ 192.213136] ? save_stack+0x43/0xd0 [ 192.216738] ? kasan_kmalloc+0xad/0xe0 [ 192.220598] ? kasan_slab_alloc+0x12/0x20 [ 192.224720] ? kmem_cache_alloc+0x12e/0x760 [ 192.229020] ? __kernfs_new_node+0xe2/0x570 [ 192.233317] ? kernfs_new_node+0x80/0xe0 [ 192.237354] ? kernfs_create_dir_ns+0x41/0x140 [ 192.241909] ? cgroup_mkdir+0x43b/0xfc0 [ 192.245858] ? kernfs_iop_mkdir+0x153/0x1e0 [ 192.250155] ? vfs_mkdir+0x390/0x600 [ 192.253847] ? do_syscall_64+0x281/0x940 [ 192.257885] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 192.263236] ? find_held_lock+0x35/0x1d0 [ 192.267275] ? print_irqtrace_events+0x270/0x270 [ 192.272011] ? trace_hardirqs_off+0x10/0x10 [ 192.276317] idr_alloc_u32+0x1b2/0x390 [ 192.280186] ? __fprop_inc_percpu_max+0x2a0/0x2a0 [ 192.285006] ? __kernfs_new_node+0x109/0x570 [ 192.289395] ? __lock_is_held+0xb6/0x140 [ 192.293448] idr_alloc_cyclic+0x15a/0x320 [ 192.297576] ? idr_alloc+0x180/0x180 [ 192.301275] ? __radix_tree_preload+0x133/0x1c0 [ 192.305929] __kernfs_new_node+0x199/0x570 [ 192.310142] ? kernfs_dop_revalidate+0x380/0x380 [ 192.314883] ? css_next_descendant_pre+0x5c/0x150 [ 192.319704] ? cgroup_propagate_control+0x3cb/0x570 [ 192.324702] kernfs_new_node+0x80/0xe0 [ 192.328570] kernfs_create_dir_ns+0x41/0x140 [ 192.332958] cgroup_mkdir+0x43b/0xfc0 [ 192.336732] ? __lock_is_held+0xb6/0x140 [ 192.340779] ? cgroup_destroy_locked+0x750/0x750 [ 192.345512] ? rcu_read_lock_sched_held+0x108/0x120 [ 192.350504] ? kmem_cache_free+0x258/0x2a0 [ 192.354716] ? set_nlink+0xc1/0x160 [ 192.358322] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 192.363233] ? generic_permission+0x105/0x3c0 [ 192.367710] ? cgroup_destroy_locked+0x750/0x750 [ 192.372442] kernfs_iop_mkdir+0x153/0x1e0 [ 192.376569] vfs_mkdir+0x390/0x600 [ 192.380093] SyS_mkdirat+0x22b/0x2b0 [ 192.383789] ? SyS_mknod+0x480/0x480 [ 192.387474] ? trace_hardirqs_on+0xd/0x10 [ 192.391601] ? do_syscall_64+0xb7/0x940 [ 192.395553] ? SyS_mknod+0x480/0x480 [ 192.399249] do_syscall_64+0x281/0x940 [ 192.403111] ? __do_page_fault+0xc90/0xc90 [ 192.407321] ? _raw_spin_unlock_irq+0x27/0x70 [ 192.411793] ? finish_task_switch+0x1c1/0x7e0 [ 192.416265] ? syscall_return_slowpath+0x550/0x550 [ 192.421170] ? syscall_return_slowpath+0x2ac/0x550 [ 192.426077] ? prepare_exit_to_usermode+0x350/0x350 [ 192.431072] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 192.436418] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 192.441248] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 192.446413] RIP: 0033:0x4548b9 [ 192.449579] RSP: 002b:00007fced7b6dc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 192.457264] RAX: ffffffffffffffda RBX: 00007fced7b6e6d4 RCX: 00000000004548b9 2018/03/30 10:21:05 executing program 5: r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0xb, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000140)=""/173, &(0x7f00000000c0)=0xad) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 'ip6_vti0\x00'}}, 0x1e) syz_emit_ethernet(0x14, &(0x7f0000000080)={@dev={[0xaa, 0xaa, 0xaa, 0xaa]}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@generic={0x8864, "42a703000000"}}}, &(0x7f0000000100)) 2018/03/30 10:21:05 executing program 7: clone(0x200, &(0x7f0000000100)="f0f7d70fc52207334efb558c957ea5882b23d85fa1659dc13aa7603b45aa407f02117308b1a8697bcf6617a98d145ec63b3cffa3123c2b94a42831af8d9bdb4b03d2954fdaa7e037f2c459a27e42921a924df6c5899ef4dbdb44bffbadd515d6024b7e3450b4ea54c55a229f4d694a292b270018a408b9ed54a0bc1929156ff004c1cf0b1728065c1ae04f4eeb552ff2420005e5ccb9400909127922c4a8e69ffbb96ca5bc95786113ae475b94c2c9a6a235276e2f1b7f01010000000000007a", &(0x7f0000000000), &(0x7f0000f8b000), &(0x7f00000d5000)) mknod(&(0x7f0000cd7000)='./file0\x00', 0x103a, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000340), &(0x7f000027a000)) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000080)={0x4, 0xffffffffffffff9c, 0x1}) bind$unix(r0, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) r1 = syz_open_procfs(0x0, &(0x7f000042cff4)='personality\x00') read(0xffffffffffffffff, &(0x7f0000f1bf7e)=""/130, 0xfffffdd8) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000240)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x9, 0x18}, 0xc) open$dir(&(0x7f000050bff8)='./file0\x00', 0x2, 0x0) 2018/03/30 10:21:05 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000d80)={r5, 0x13c, 0x7, 0xaa5, 0x1, 0x8001}, 0x14) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000dc0)={0xaa, 0x20}) pwrite64(r1, &(0x7f0000000e00)="7437032bd6e223b3a59d10357fc245a11551c76207ed30241886ce0ea1326aeac569322a47e5909770909834b26bf6b04af3b30656cbc3e07c3eed14ee7c472c2d276872498ef33618509e2049213b9664560dc77dd302976456a0392edd116b9816cbca183c77f192c4c3260a385cc483327645104ab9987888488ff6b8e163c2eddc4fc33b9f9ba13abbb021303c8d438d96b2da7c190f9cdc9f2242c2df22ccc63b779747bc9b54e299a407b4150450352ce672efd9fd7565ffb5f410dd66a2061984a92c2ca847eb65e95168372a9e92cc53f27151c36569714d1b2b2b2d26b0e9668aa5042a767ab88ad81f2850cef1", 0xf2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) 2018/03/30 10:21:05 executing program 1: clone(0x200, &(0x7f0000fbf000), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f00000d5000)) mknod(&(0x7f0000cd7000)='./file0\x00', 0x103a, 0x0) execve(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)=[&(0x7f0000000080)="6367726f75702dd2656d31292d866d696d655f7479706500", &(0x7f0000000100)='/)md5sumeth1systemppp0md5sumnodev\x00', &(0x7f0000000140)='personality\x00', &(0x7f0000000180)='\x00', &(0x7f00000001c0)='personality\x00'], &(0x7f000027a000)) r0 = syz_open_procfs(0x0, &(0x7f000042cff4)='personality\x00') read(r0, &(0x7f0000f1bf7e)=""/130, 0xfffffdd8) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000240)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x9, 0x18}, 0xc) open$dir(&(0x7f000050bff8)='./file0\x00', 0x2, 0x0) 2018/03/30 10:21:05 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="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", 0xfc}], 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x200900, 0x103) connect$vsock_stream(r1, &(0x7f0000000600)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) r2 = socket$alg(0x26, 0x5, 0x0) rt_sigtimedwait(&(0x7f0000000140)={0xffffffff}, 0x0, &(0x7f0000000180), 0x8) bind$alg(r2, &(0x7f000073e000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(cbc-twofish-avx)\x00'}, 0x58) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000500)={&(0x7f00000005c0)=[0x0, 0x0, 0x0], 0x3}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r3, 0x118, 0x0, &(0x7f0000000100)=0x7, 0x4) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000000c0)={0x1, 0x1, 0x1, 0x1, 0x0, 0x6}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000280)={r4, @in={{0x2, 0x4e23, @multicast2=0xe0000002}}, [0x8000, 0x9, 0x80000000, 0x3, 0x80, 0x8001, 0x800, 0x100, 0xe0db, 0x0, 0x2000000000, 0x200, 0x68, 0x0, 0x8]}, &(0x7f0000000380)=0x100) r5 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0xfffffffffffffdfa) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r5, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port1\x00', 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r5, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r6 = gettid() r7 = syz_open_procfs(r6, &(0x7f00000002c0)='maps\x00') readv(r7, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/28, 0x65}], 0x1) exit(0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r7, &(0x7f000004ffe0)=[{&(0x7f0000000000)=""/128, 0xe6}], 0x222) r8 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) connect$ax25(r3, &(0x7f00000006c0)={0x3, {"fc5da504005009"}, 0x7fff}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) getsockopt$netrom_NETROM_T1(r8, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r5, 0x80045301, &(0x7f0000000700)) 2018/03/30 10:21:05 executing program 6 (fault-call:3 fault-nth:7): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r0, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r0, &(0x7f0000000100)=""/65, 0x41) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) linkat(r0, &(0x7f0000000480)='./file1\x00', r1, &(0x7f00000004c0)='./file0\x00', 0x1000) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') unlink(&(0x7f00000000c0)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r0, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x12021) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000340)={0x8, 0x9, 0x4, 0x10000, 0x1, 0x7, 0x7fffffff, 0x0, 0x29, 0x0, 0x20}, 0xb) 2018/03/30 10:21:05 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xc) r1 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r1, 0xc1105511, &(0x7f0000000100)={{0x2, 0x0, 0x0, 0x0, "386aea20273dc03c3d18dd0dbd4a0ca15f9f580393cc4ec3b8ee256b9aa630224ba64c6ff43ee01d2996c914"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "eda422cd37591b3a5a7a683380f7e0b9e790c6b72cd0a4f3342f7431c1699a305ca3091bb2320e8df4e298a2cca26637866a68c1426ffbd8a6c7da1d8ea77d9d", &(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x13}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x400000, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$SIOCGIFMTU(0xffffffffffffffff, 0x8921, &(0x7f0000000140)) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r4, 0x4010ae68, &(0x7f0000000000)={0x3, 0x5000}) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) r6 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x40, 0x0) connect$vsock_stream(r6, &(0x7f0000000080)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) dup2(r3, r5) dup3(r3, r4, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') getsockopt$inet6_mtu(r7, 0x29, 0x17, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$sock_inet_tcp_SIOCINQ(r7, 0x541b, &(0x7f0000000100)) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="1f0000000203193b000007000000068100023b050900020000000000feff58", 0x1f}], 0x1) 2018/03/30 10:21:05 executing program 3: r0 = socket$inet(0x2, 0x6, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000008c0)=@broute={'broute\x00', 0x20, 0x2, 0x3e8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000280], 0x0, &(0x7f0000000240), &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'ip6gretap0\x00', 'syz_tun\x00', 'ip6tnl0\x00', 'syz_tun\x00', @link_local={0x1, 0x80, 0xc2}, [0x0, 0x1000, 0x0, 0x0, 0xff], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0x108, 0x158}, [@common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x10000, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0xd, 0x0, 0x86dd, 'syzkaller0\x00', 'tunl0\x00', 'sit0\x00', 'ifb0\x00', @empty, [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x130, 0x1b0, 0x200, [@ip6={'ip6\x00', 0x50, {{@empty, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}}}, @limit={'limit\x00', 0x20, {{0x0, 0xec}}}]}, [@common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x81, 'syz1\x00'}}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}}]}]}, 0x460) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000000)={0x0, 0x7}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x2, 0xa2b, 0x4, 0x7, 0x2, 0x20, 0x10000, 0x8a82, r1}, &(0x7f0000000180)=0x20) r2 = socket(0x1d, 0xb, 0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$inet_group_source_req(r2, 0x0, 0xfe0d64ad1c6cb9f1, &(0x7f0000000680)={0x1000, {{0x2, 0x4e23, @multicast1=0xe0000001}}, {{0x2, 0x4e22, @broadcast=0xffffffff}}}, 0x108) ioctl$DRM_IOCTL_AGP_ENABLE(r2, 0x40086432, &(0x7f0000000100)) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000940)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$TIOCGSOFTCAR(r3, 0x5419, &(0x7f00000007c0)) ioctl$TIOCGSID(r3, 0x5429, &(0x7f00000000c0)) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000240)=@nl=@kern={0x10}, 0x80, &(0x7f0000000040)=[{&(0x7f00000001c0)="5500000018007f04002d1cb2a4a280930a0600007da843cf19d0f869390009402f002100040000001900050000fc1700000000dc1338d54400009b84136ef75afb83de448daa7227c43ab8220000060cec4fab91d4", 0x55}], 0x1, &(0x7f00000000c0)}, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000001640)=@broute={'broute\x00', 0x20, 0x1, 0x1e8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001700], 0x0, &(0x7f0000001980), &(0x7f0000001700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'vcan0\x00', 'ifb0\x00', 'syzkaller0\x00', 'vcan0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @link_local={0x1, 0x80, 0xc2}, [], 0x70, 0xf8, 0x128}, [@common=@dnat={'dnat\x00', 0x10, {{@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, 0xffffffffffffffff}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x4, 'syz0\x00'}}}]}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffbffffffffffe}]}, 0x260) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000840)=@nat={'nat\x00', 0x19, 0x1, 0x200, [0x20000940, 0x0, 0x0, 0x20000970, 0x200009a0], 0x0, &(0x7f0000000800), &(0x7f0000000b80)=ANY=[@ANYBLOB="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"]}, 0x27e) setsockopt$inet_sctp6_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000980)={0x8, 0xffffffff, 0x0, 0xffffffffffffff02}, 0x8) [ 192.464509] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 192.471756] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 192.479006] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 192.486253] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000006 2018/03/30 10:21:05 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/sockstat6\x00') name_to_handle_at(r1, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)={0x1008, 0x2, "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"}, &(0x7f00000000c0), 0x1400) sendmsg$nl_generic(r0, &(0x7f0000000000)={&(0x7f0000a4c000)={0x10}, 0xc, &(0x7f0000ff5000)={&(0x7f0000000200)={0x1c, 0x1d, 0x1, 0x0, 0x0, {0x1}, [@nested={0x8, 0x3, [@generic='\n']}]}, 0x1c}, 0x1}, 0x0) 2018/03/30 10:21:05 executing program 7: clone(0x200, &(0x7f0000000100)="f0f7d70fc52207334efb558c957ea5882b23d85fa1659dc13aa7603b45aa407f02117308b1a8697bcf6617a98d145ec63b3cffa3123c2b94a42831af8d9bdb4b03d2954fdaa7e037f2c459a27e42921a924df6c5899ef4dbdb44bffbadd515d6024b7e3450b4ea54c55a229f4d694a292b270018a408b9ed54a0bc1929156ff004c1cf0b1728065c1ae04f4eeb552ff2420005e5ccb9400909127922c4a8e69ffbb96ca5bc95786113ae475b94c2c9a6a235276e2f1b7f01010000000000007a", &(0x7f0000000000), &(0x7f0000f8b000), &(0x7f00000d5000)) mknod(&(0x7f0000cd7000)='./file0\x00', 0x103a, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000340), &(0x7f000027a000)) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000080)={0x4, 0xffffffffffffff9c, 0x1}) bind$unix(r0, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) r1 = syz_open_procfs(0x0, &(0x7f000042cff4)='personality\x00') read(0xffffffffffffffff, &(0x7f0000f1bf7e)=""/130, 0xfffffdd8) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000240)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x9, 0x18}, 0xc) open$dir(&(0x7f000050bff8)='./file0\x00', 0x2, 0x0) 2018/03/30 10:21:05 executing program 5: capset(&(0x7f0000594ff8)={0x19980330}, &(0x7f0000000000)) unshare(0x20000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000280)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000140)='net/rpc\x00') ioctl$DRM_IOCTL_IRQ_BUSID(r1, 0xc0106403, &(0x7f0000000180)={0x2ab49ff6, 0x6, 0x2, 0xd361}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x2, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000001c0)) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080)={0x8000, 0x5, 0x5be7, 0x9, 0x0}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000100)={r3, 0x80000001}, 0x8) 2018/03/30 10:21:05 executing program 6 (fault-call:3 fault-nth:8): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r0, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r0, &(0x7f0000000100)=""/65, 0x41) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) linkat(r0, &(0x7f0000000480)='./file1\x00', r1, &(0x7f00000004c0)='./file0\x00', 0x1000) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') unlink(&(0x7f00000000c0)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r0, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x12021) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000340)={0x8, 0x9, 0x4, 0x10000, 0x1, 0x7, 0x7fffffff, 0x0, 0x29, 0x0, 0x20}, 0xb) 2018/03/30 10:21:05 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000, 0x0, 0x4}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000d80)={r5, 0x13c, 0x7, 0xaa5, 0x1, 0x8001}, 0x14) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000dc0)={0xaa, 0x20}) pwrite64(r1, &(0x7f0000000e00)="7437032bd6e223b3a59d10357fc245a11551c76207ed30241886ce0ea1326aeac569322a47e5909770909834b26bf6b04af3b30656cbc3e07c3eed14ee7c472c2d276872498ef33618509e2049213b9664560dc77dd302976456a0392edd116b9816cbca183c77f192c4c3260a385cc483327645104ab9987888488ff6b8e163c2eddc4fc33b9f9ba13abbb021303c8d438d96b2da7c190f9cdc9f2242c2df22ccc63b779747bc9b54e299a407b4150450352ce672efd9fd7565ffb5f410dd66a2061984a92c2ca847eb65e95168372a9e92cc53f27151c36569714d1b2b2b2d26b0e9668aa5042a767ab88ad81f2850cef1", 0xf2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) 2018/03/30 10:21:05 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000fafff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000000000000000000000300000000000000000000"]) 2018/03/30 10:21:05 executing program 5: listxattr(&(0x7f0000005b40)='./file0\x00', &(0x7f0000005b80)=""/72, 0x48) r0 = memfd_create(&(0x7f0000000100)=']\x00', 0x0) clone(0x0, &(0x7f0000000200)="17dd6280de3693223b6fdbc70650db5722605e7d4cfec7dee9e7ca3a83bd750a10fca3bdd2c2fde305012a95b619af30af684bba6e9e2031b1eec7e667e9c22c674d6eb942b78258369909dc14f2f5bd60202d6a38d497b47baf3e89fbca89a91e4706f3efdb55b9e9857fa2e05fdd62de157a7f60228f2c807e86ce264193d1206f5402c6f095c94a510e0c705386635a3f1a5970fd087434c0bf52f98bc0c951a8c18f7b8221c007a7f1c8d5", &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000300)) getpid() gettid() clock_gettime(0x0, &(0x7f00000004c0)={0x0, 0x0}) utimes(&(0x7f0000000000)='./file0\x00', &(0x7f0000000580)={{r1, r2/1000+10000}, {0x0, 0x7530}}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom(r3, &(0x7f0000000280)=""/191, 0xbf, 0x40000040, &(0x7f0000000340)=@can={0x1d}, 0x80) r4 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r5 = memfd_create(&(0x7f00000000c0)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r5, 0x4c06, r4) pwritev(r5, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/loop-control\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000640)={0x0, @in={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}}, &(0x7f0000000700)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r6, 0x84, 0x22, &(0x7f0000000100)={0x8, 0x0, 0x2, 0x2, r7}, &(0x7f0000000140)=0x51) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r5, 0x84, 0x73, &(0x7f0000000180)={r8, 0x0, 0x0, 0x101, 0x4}, &(0x7f00000001c0)=0x18) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000500)={0xc000000, 0x3ff, 0x2c}) fcntl$F_SET_RW_HINT(r5, 0x40c, &(0x7f0000000600)) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x100, 0x0) sendfile(r4, r4, &(0x7f0000000080)=0x5f, 0x102000004) ioctl$LOOP_CLR_FD(r4, 0x4c01) sync() ftruncate(r4, 0x2) r9 = dup2(r5, r4) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f0000000480)=0x8, 0xfffffffffffffd9e) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r5, 0x28, 0x0, &(0x7f00000005c0)=0x3, 0x8) setsockopt$IP_VS_SO_SET_EDIT(r9, 0x0, 0x483, &(0x7f0000000540)={0x84, @multicast2=0xe0000002, 0x4e20, 0x0, 'dh\x00', 0x28, 0xfff, 0x13}, 0x2c) ioctl$sock_netdev_private(r5, 0x89fe, &(0x7f00000003c0)="0aab95906cbf78d0113b9b11c035ec1b838e455485a0ae0c1dc7ead287ca35d95f330970a765dba3809e348d3d739c34fcbb996a276d6eae518354b310b63d5e6d4f02c584c900b9eed1ccd8c2d601c345a16a9770811f407c4232bb44f3f941d8cfe9138c1c2a09b466a541396572c076d8f96f042779cc2bdc8794dff7d80969b0a082393a735bb99d9c59fd538646854b79ccff7fdd4025a5c58b1e2acca8fd4f9a") 2018/03/30 10:21:05 executing program 7: clone(0x200, &(0x7f0000000100)="f0f7d70fc52207334efb558c957ea5882b23d85fa1659dc13aa7603b45aa407f02117308b1a8697bcf6617a98d145ec63b3cffa3123c2b94a42831af8d9bdb4b03d2954fdaa7e037f2c459a27e42921a924df6c5899ef4dbdb44bffbadd515d6024b7e3450b4ea54c55a229f4d694a292b270018a408b9ed54a0bc1929156ff004c1cf0b1728065c1ae04f4eeb552ff2420005e5ccb9400909127922c4a8e69ffbb96ca5bc95786113ae475b94c2c9a6a235276e2f1b7f01010000000000007a", &(0x7f0000000000), &(0x7f0000f8b000), &(0x7f00000d5000)) mknod(&(0x7f0000cd7000)='./file0\x00', 0x103a, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000340), &(0x7f000027a000)) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000080)={0x4, 0xffffffffffffff9c, 0x1}) bind$unix(r0, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) r1 = syz_open_procfs(0x0, &(0x7f000042cff4)='personality\x00') read(r1, &(0x7f0000f1bf7e)=""/130, 0xfffffdd8) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000240)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x0, 0x18}, 0xc) open$dir(&(0x7f000050bff8)='./file0\x00', 0x2, 0x0) 2018/03/30 10:21:05 executing program 1: clone(0x200, &(0x7f0000fbf000), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f00000d5000)) mknod(&(0x7f0000cd7000)='./file0\x00', 0x103a, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000340), &(0x7f000027a000)) r0 = syz_open_procfs(0x0, &(0x7f000042cff4)='personality\x00') read(r0, &(0x7f0000f1bf7e)=""/130, 0xfffffdd8) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000240)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x9, 0x18}, 0xc) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000000000)) open$dir(&(0x7f000050bff8)='./file0\x00', 0x2, 0x0) ioctl$KDENABIO(r0, 0x4b36) 2018/03/30 10:21:05 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000564000)=@abs, 0x6e, &(0x7f0000451ff0)=[{&(0x7f0000007000)="002a932f01000000cf960802e02348f800000000001c0003f2a576", 0x1b}], 0x1, &(0x7f00001f9fe0)}, 0x0) r0 = syz_open_dev$sg(&(0x7f00000c5ff7)='/dev/sg#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000007000)={0x0, 0x0, 0x80da14, 0x8001, 0x20000000}) ioctl(r0, 0x2285, &(0x7f0000007000)='S') socket$nl_crypto(0x10, 0x3, 0x15) 2018/03/30 10:21:05 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000, 0x0, 0x4}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000d80)={r5, 0x13c, 0x7, 0xaa5, 0x1, 0x8001}, 0x14) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000dc0)={0xaa, 0x20}) pwrite64(r1, &(0x7f0000000e00)="7437032bd6e223b3a59d10357fc245a11551c76207ed30241886ce0ea1326aeac569322a47e5909770909834b26bf6b04af3b30656cbc3e07c3eed14ee7c472c2d276872498ef33618509e2049213b9664560dc77dd302976456a0392edd116b9816cbca183c77f192c4c3260a385cc483327645104ab9987888488ff6b8e163c2eddc4fc33b9f9ba13abbb021303c8d438d96b2da7c190f9cdc9f2242c2df22ccc63b779747bc9b54e299a407b4150450352ce672efd9fd7565ffb5f410dd66a2061984a92c2ca847eb65e95168372a9e92cc53f27151c36569714d1b2b2b2d26b0e9668aa5042a767ab88ad81f2850cef1", 0xf2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) [ 192.835244] bond0 (unregistering): Released all slaves [ 193.580788] IPVS: ftp: loaded support on port[0] = 21 [ 193.870973] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 194.287317] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 194.293441] 8021q: adding VLAN 0 to HW filter on device bond0 [ 194.338178] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 194.382872] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 194.404397] FAULT_INJECTION: forcing a failure. [ 194.404397] name failslab, interval 1, probability 0, space 0, times 0 [ 194.415985] CPU: 1 PID: 24454 Comm: syz-executor6 Not tainted 4.16.0-rc7+ #371 [ 194.423329] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 194.432664] Call Trace: [ 194.435235] dump_stack+0x194/0x24d [ 194.438842] ? arch_local_irq_restore+0x53/0x53 [ 194.443497] should_fail+0x8c0/0xa40 [ 194.447186] ? kstrdup+0x39/0x70 [ 194.450537] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 194.455614] ? cgroup_mkdir+0x553/0xfc0 [ 194.459564] ? vfs_mkdir+0x390/0x600 [ 194.463251] ? SyS_mkdirat+0x22b/0x2b0 [ 194.467115] ? do_syscall_64+0x281/0x940 [ 194.471153] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 194.476499] ? find_held_lock+0x35/0x1d0 [ 194.480543] ? find_held_lock+0x35/0x1d0 [ 194.484588] ? __lock_is_held+0xb6/0x140 [ 194.488641] ? check_same_owner+0x320/0x320 [ 194.492946] ? rcu_note_context_switch+0x710/0x710 [ 194.497851] ? rcu_read_lock_sched_held+0x108/0x120 [ 194.502853] should_failslab+0xec/0x120 [ 194.506807] kmem_cache_alloc+0x47/0x760 [ 194.510845] ? memcpy+0x45/0x50 [ 194.514105] ? kstrdup+0x59/0x70 [ 194.517456] __kernfs_new_node+0xe2/0x570 [ 194.521584] ? kernfs_dop_revalidate+0x380/0x380 [ 194.526317] ? find_held_lock+0x35/0x1d0 [ 194.530358] ? kasan_check_read+0x11/0x20 [ 194.534484] ? read_word_at_a_time+0x12/0x20 [ 194.538876] ? strscpy+0x186/0x500 [ 194.542389] ? kernfs_add_one+0x278/0x450 [ 194.546524] kernfs_new_node+0x80/0xe0 [ 194.550392] __kernfs_create_file+0x4b/0x320 [ 194.554784] cgroup_addrm_files+0x3c5/0xa70 [ 194.559096] ? cgroup_file_write+0x710/0x710 [ 194.563481] ? __getnstimeofday64+0x317/0x470 [ 194.567954] ? getrawmonotonic64+0x460/0x460 [ 194.572343] ? kernfs_active+0x92/0x160 [ 194.576302] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 194.581206] ? cgroup_kn_set_ugid+0x2c7/0x370 [ 194.585677] ? cgroup_file_name+0x1d0/0x1d0 [ 194.589984] css_populate_dir+0x340/0x420 [ 194.594117] cgroup_mkdir+0x553/0xfc0 [ 194.597893] ? __lock_is_held+0xb6/0x140 [ 194.601950] ? cgroup_destroy_locked+0x750/0x750 [ 194.606684] ? rcu_read_lock_sched_held+0x108/0x120 [ 194.611676] ? kmem_cache_free+0x258/0x2a0 [ 194.615893] ? set_nlink+0xc1/0x160 [ 194.619498] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 194.624403] ? generic_permission+0x105/0x3c0 [ 194.628975] ? cgroup_destroy_locked+0x750/0x750 [ 194.633707] kernfs_iop_mkdir+0x153/0x1e0 [ 194.637835] vfs_mkdir+0x390/0x600 [ 194.641357] SyS_mkdirat+0x22b/0x2b0 [ 194.645051] ? SyS_mknod+0x480/0x480 [ 194.648740] ? trace_hardirqs_on+0xd/0x10 [ 194.652864] ? do_syscall_64+0xb7/0x940 [ 194.656816] ? SyS_mknod+0x480/0x480 [ 194.660509] do_syscall_64+0x281/0x940 [ 194.664371] ? __do_page_fault+0xc90/0xc90 [ 194.668581] ? _raw_spin_unlock_irq+0x27/0x70 [ 194.673054] ? finish_task_switch+0x1c1/0x7e0 [ 194.677529] ? syscall_return_slowpath+0x550/0x550 [ 194.682436] ? syscall_return_slowpath+0x2ac/0x550 [ 194.687343] ? prepare_exit_to_usermode+0x350/0x350 [ 194.692347] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 194.697694] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 194.702520] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 194.707687] RIP: 0033:0x4548b9 [ 194.710850] RSP: 002b:00007f1fb7843c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 194.718533] RAX: ffffffffffffffda RBX: 00007f1fb78446d4 RCX: 00000000004548b9 [ 194.725777] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 2018/03/30 10:21:07 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) tgkill(0x0, 0x0, 0x0) r0 = syz_open_dev$usbmon(&(0x7f000004cff3)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0x9208, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000040)={0x1, 'syzkaller0\x00', 0x2}, 0x18) 2018/03/30 10:21:07 executing program 7: clone(0x200, &(0x7f0000000100)="f0f7d70fc52207334efb558c957ea5882b23d85fa1659dc13aa7603b45aa407f02117308b1a8697bcf6617a98d145ec63b3cffa3123c2b94a42831af8d9bdb4b03d2954fdaa7e037f2c459a27e42921a924df6c5899ef4dbdb44bffbadd515d6024b7e3450b4ea54c55a229f4d694a292b270018a408b9ed54a0bc1929156ff004c1cf0b1728065c1ae04f4eeb552ff2420005e5ccb9400909127922c4a8e69ffbb96ca5bc95786113ae475b94c2c9a6a235276e2f1b7f01010000000000007a", &(0x7f0000000000), &(0x7f0000f8b000), &(0x7f00000d5000)) mknod(&(0x7f0000cd7000)='./file0\x00', 0x103a, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000340), &(0x7f000027a000)) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000080)={0x4, 0xffffffffffffff9c, 0x1}) bind$unix(r0, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) r1 = syz_open_procfs(0x0, &(0x7f000042cff4)='personality\x00') read(r1, &(0x7f0000f1bf7e)=""/130, 0xfffffdd8) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000240)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x0, 0x18}, 0xc) open$dir(&(0x7f000050bff8)='./file0\x00', 0x2, 0x0) 2018/03/30 10:21:07 executing program 1: clone(0x200, &(0x7f0000fbf000), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f00000d5000)) mknod(&(0x7f00000001c0)='./file0\x00', 0x103a, 0x0) r0 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@alg, &(0x7f0000000000)=0x80, 0x800) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000080)={0x0, 0xff, 0x2, [0x6, 0xda1]}, &(0x7f0000000180)=0xc) chmod(&(0x7f0000001700)='./file0\x00', 0x0) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000001600)={r1, 0x9}, 0x8) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000001800)={'syzkaller0\x00', {0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}}) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000440)={r1, @in6={{0xa, 0x4e21, 0x2, @mcast2={0xff, 0x2, [], 0x1}, 0x10000}}, 0xe0, 0x1}, 0x90) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000001680)={0x200, {0x2, 0x4e21}, {0x2, 0x4e23, @broadcast=0xffffffff}, {0x2, 0x4e21}, 0x101, 0x7, 0x1ff, 0x8, 0x3, &(0x7f0000001640)='ip6gre0\x00', 0x5, 0x3, 0x9}) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000280)='\x00', &(0x7f00000002c0)='personality\x00', &(0x7f0000000300)='system$md5sum%.\x00', &(0x7f0000000340)='*trusted,self:}#md5sum\x00', &(0x7f0000000380)='personality\x00', &(0x7f00000003c0)='GPLtrusted!md5sumeth1\x00'], &(0x7f000027a000)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) r3 = syz_open_procfs(r2, &(0x7f000042cff4)='personality\x00') read(r0, &(0x7f0000000500)=""/130, 0xfffffffffffffc93) setsockopt$inet_MCAST_JOIN_GROUP(r3, 0x0, 0x2a, &(0x7f0000001740)={0x100, {{0x2, 0x4e24}}}, 0x88) readlinkat(r3, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)=""/4096, 0x1000) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000240)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x9, 0x18}, 0xc) open$dir(&(0x7f000050bff8)='./file0\x00', 0x2, 0x0) 2018/03/30 10:21:07 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f0000000100)={{0x2, 0x0, 0x0, 0x0, "386aea20273dc03c3d18dd0dbd4a0ca15f9f580393cc4ec3b8ee256b9aa630224ba64c6ff43ee01d2996c914"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "eda422cd37591b3a5a7a683380f7e0b9e790c6b72cd0a4f3342f7431c1699a305ca3091bb2320e8df4e298a2cca26637866a68c1426ffbd8a6c7da1d8ea77d9d", &(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x13}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x800, 0x0) fchmod(r0, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) ioctl(r0, 0x4000000002283, &(0x7f0000139000)='4') readv(0xffffffffffffffff, &(0x7f0000000100), 0x1000000000000004) write$evdev(r2, &(0x7f0000b5df88)=[{}, {}, {}, {{0x77359400}}], 0x60) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000480)) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000400)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000440)={@empty, 0x0, r4}) r5 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt(r5, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f", 0x3) bind$can_raw(r5, &(0x7f0000000080)={0x1d}, 0x10) bind$can_raw(r5, &(0x7f0000002ff0)={0x1d}, 0x10) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000500)={{0xa, 0x4e21, 0x7, @loopback={0x0, 0x1}}, {0xa, 0x4e22, 0xe7, @local={0xfe, 0x80, [], 0xaa}, 0x8}, 0x10001, [0xffffffff, 0xffffffffffff9af8, 0xff, 0x57e, 0x0, 0x65, 0x2, 0x1]}, 0x5c) r6 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) dup3(0xffffffffffffffff, r3, 0x80000) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r6, 0x4010ae68, &(0x7f0000000000)) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000280)='tls\x00', 0x4) r8 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x40, 0x0) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000240)) connect$vsock_stream(r8, &(0x7f0000000080)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) dup2(r3, r7) dup3(r3, r6, 0x0) 2018/03/30 10:21:07 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00002ac000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000000040)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000080)=""/142, &(0x7f00000003c0)=""/69, &(0x7f0000000140)=""/14}) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000640)=0x200000000) write$vnet(r0, &(0x7f0000000340)={0x1, {&(0x7f00000002c0)=""/89, 0x59, &(0x7f0000000680)=""/191, 0x0, 0x2}}, 0x68) write$vnet(r0, &(0x7f0000000580)={0x1, {&(0x7f00000001c0)=""/219, 0x34c, &(0x7f0000000480)=""/98, 0xfffffffffffffffd, 0x2}}, 0xfffffffffffffe90) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)={0x0, r1}) 2018/03/30 10:21:07 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000, 0x0, 0x4}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000d80)={r5, 0x13c, 0x7, 0xaa5, 0x1, 0x8001}, 0x14) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000dc0)={0xaa, 0x20}) pwrite64(r1, &(0x7f0000000e00)="7437032bd6e223b3a59d10357fc245a11551c76207ed30241886ce0ea1326aeac569322a47e5909770909834b26bf6b04af3b30656cbc3e07c3eed14ee7c472c2d276872498ef33618509e2049213b9664560dc77dd302976456a0392edd116b9816cbca183c77f192c4c3260a385cc483327645104ab9987888488ff6b8e163c2eddc4fc33b9f9ba13abbb021303c8d438d96b2da7c190f9cdc9f2242c2df22ccc63b779747bc9b54e299a407b4150450352ce672efd9fd7565ffb5f410dd66a2061984a92c2ca847eb65e95168372a9e92cc53f27151c36569714d1b2b2b2d26b0e9668aa5042a767ab88ad81f2850cef1", 0xf2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) 2018/03/30 10:21:07 executing program 6 (fault-call:3 fault-nth:9): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r0, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r0, &(0x7f0000000100)=""/65, 0x41) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) linkat(r0, &(0x7f0000000480)='./file1\x00', r1, &(0x7f00000004c0)='./file0\x00', 0x1000) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') unlink(&(0x7f00000000c0)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r0, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x12021) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000340)={0x8, 0x9, 0x4, 0x10000, 0x1, 0x7, 0x7fffffff, 0x0, 0x29, 0x0, 0x20}, 0xb) 2018/03/30 10:21:07 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="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", 0xfc}], 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x200900, 0x103) connect$vsock_stream(r1, &(0x7f0000000600)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) r2 = socket$alg(0x26, 0x5, 0x0) rt_sigtimedwait(&(0x7f0000000140)={0xffffffff}, 0x0, &(0x7f0000000180), 0x8) bind$alg(r2, &(0x7f000073e000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(cbc-twofish-avx)\x00'}, 0x58) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000500)={&(0x7f00000005c0)=[0x0, 0x0, 0x0], 0x3}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r3, 0x118, 0x0, &(0x7f0000000100)=0x7, 0x4) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000000c0)={0x1, 0x1, 0x1, 0x1, 0x0, 0x6}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000280)={r4, @in={{0x2, 0x4e23, @multicast2=0xe0000002}}, [0x8000, 0x9, 0x80000000, 0x3, 0x80, 0x8001, 0x800, 0x100, 0xe0db, 0x0, 0x2000000000, 0x200, 0x68, 0x0, 0x8]}, &(0x7f0000000380)=0x100) r5 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0xfffffffffffffdfa) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r5, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port1\x00', 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r5, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r6 = gettid() r7 = syz_open_procfs(r6, &(0x7f00000002c0)='maps\x00') readv(r7, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/28, 0x65}], 0x1) exit(0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r7, &(0x7f000004ffe0)=[{&(0x7f0000000000)=""/128, 0xe6}], 0x222) r8 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) connect$ax25(r3, &(0x7f00000006c0)={0x3, {"fc5da504005009"}, 0x7fff}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) getsockopt$netrom_NETROM_T1(r8, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r5, 0x80045301, &(0x7f0000000700)) [ 194.733027] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 194.740279] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 194.747526] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000008 [ 194.755200] cgroup: cgroup_addrm_files: failed to add cgroup.type, err=-12 2018/03/30 10:21:07 executing program 3: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000f40)) fcntl$getown(0xffffffffffffff9c, 0x9) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001040)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000001340)="6e6574016669625f7472699cd0a4c169657374617400f9e2301c2b2f6fe9a294f3c73511b2230c345f8968d5ba62ea8e4612f0acc89f48ba071d1aa68523004cab99bc1611d3862b125545c47cd858c77ee3b4c421e5620d6ee5a2f4cb2311ab10cad66c5f50e129015b3ca0e70bfbb6679f6feeb48ae2f053e900f6e70ab9629e009888138b7f79dc2cadd6c15ca6fe7d7503c17cee86e7638f2fab2b151d3013f1115804c14ad111") r2 = eventfd2(0xffffffffffffffff, 0x80001) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0xffffffffffffff4e) sendfile(r2, r1, &(0x7f0000000080), 0x10ed5b) r3 = add_key(&(0x7f00007f8000)='user\x00', &(0x7f0000cf7ffb)={0x73, 0x79, 0x7a}, &(0x7f0000fc3f94)="f5", 0x1, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r3) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x40400, 0x0) r4 = perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000180)={0x7, r4, 0x1}) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000100), &(0x7f0000000340)=0xb) futimesat(r5, &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)={{r6, r7/1000+10000}, {r8, r9/1000+10000}}) unshare(0x8000000) ppoll(&(0x7f0000000780), 0x2, &(0x7f00000007c0)={0x77359400}, &(0x7f0000000800)={0x9}, 0xc2) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000280)={0x0, 0x0, 0x9}, 0x10) r10 = semget$private(0x0, 0x4, 0x0) semtimedop(0x0, &(0x7f0000000040)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000080)={0x0, 0x1c9c380}) unshare(0xc000000) pipe2(&(0x7f00000000c0), 0x4000) getpid() semctl$IPC_RMID(r10, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000600)='/dev/snd/controlC#\x00', 0x0, 0x0) r11 = syz_open_dev$midi(&(0x7f00000011c0)='/dev/midi#\x00', 0x0, 0xa4100) r12 = openat$vcs(0xffffffffffffff9c, &(0x7f0000001200)='/dev/vcs\x00', 0x0, 0x0) ioctl$VHOST_NET_SET_BACKEND(r11, 0x4008af30, &(0x7f0000001240)={0x2, r12}) 2018/03/30 10:21:07 executing program 6 (fault-call:3 fault-nth:10): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r0, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r0, &(0x7f0000000100)=""/65, 0x41) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) linkat(r0, &(0x7f0000000480)='./file1\x00', r1, &(0x7f00000004c0)='./file0\x00', 0x1000) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') unlink(&(0x7f00000000c0)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r0, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x12021) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000340)={0x8, 0x9, 0x4, 0x10000, 0x1, 0x7, 0x7fffffff, 0x0, 0x29, 0x0, 0x20}, 0xb) 2018/03/30 10:21:07 executing program 5: r0 = memfd_create(&(0x7f0000000540)='\x00', 0x1) r1 = perf_event_open(&(0x7f00000005c0)={0x7, 0x70, 0x8, 0x9, 0x81f6, 0x8, 0x0, 0xfffffffffffffe01, 0x142, 0x1, 0xff, 0x3, 0x6, 0x9, 0x4, 0x5, 0x100000000, 0x8, 0x6, 0x9, 0x1, 0x8, 0x3, 0x800, 0x74, 0xfff, 0x9, 0xf4ca, 0x7, 0x4, 0x1, 0x800, 0x3ff, 0x0, 0x0, 0x1ff, 0x80000000, 0xffffffff00000001, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000580), 0x1}, 0x10000, 0xfd, 0xb6, 0x0, 0x6, 0xf21, 0x976}, 0x0, 0x5, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = epoll_create1(0x80000) r4 = fcntl$dupfd(r3, 0x0, r3) r5 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r4, &(0x7f000086fff4)) r6 = getpgrp(0xffffffffffffffff) r7 = getpid() epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(r6, r7, 0x7, r5, &(0x7f0000000000)={r5, r4}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0xcc, &(0x7f00000002c0)=0xa3, 0x4) r8 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) clone(0x0, &(0x7f00000003c0)="2ac83eba9bb0edc45370f1087189fbd8239898bde890a0d5ab300da1757a46319a4f9cdb9d9693f71cbb8fb49bd3ab48b4", &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000480)) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname(r2, &(0x7f0000000640)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000006c0)=0x80) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000400)={{0xa, 0x4e24, 0x2, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x0, [0xcf, 0x0, 0x80000001, 0x0, 0x0, 0x852]}, 0xfffffffffffffd61) r9 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r9, 0xaf01, &(0x7f0000307000)=&(0x7f0000000180)) ioctl$VHOST_SET_MEM_TABLE(r9, 0x4008af03, &(0x7f0000000000)=ANY=[]) bind$netlink(r8, &(0x7f0000000500)={0x10, 0x0, 0x25dfdbfe}, 0xc) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r9, 0x40bc5311, &(0x7f0000000300)={0x784b, 0x3, 'client1\x00', 0x1, "6dea700b8d591e55", "08f1496fa810039fdc1fc424a6c5849c7ec6764d0f37c177947bcb618e55c868", 0x7}) syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x301000) r10 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r9, 0x4004af07, &(0x7f0000000000)=r10) r11 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$VHOST_SET_VRING_ADDR(r9, 0x4028af11, &(0x7f0000df5fd8)={0x0, 0x1, &(0x7f0000000200)=""/105, &(0x7f0000bf6000)=""/228, &(0x7f0000000080)=""/199}) ioctl$VHOST_SET_VRING_KICK(r9, 0x4008af20, &(0x7f0000000040)={0x0, r10}) fcntl$getown(r11, 0x9) 2018/03/30 10:21:07 executing program 7: clone(0x200, &(0x7f0000000100)="f0f7d70fc52207334efb558c957ea5882b23d85fa1659dc13aa7603b45aa407f02117308b1a8697bcf6617a98d145ec63b3cffa3123c2b94a42831af8d9bdb4b03d2954fdaa7e037f2c459a27e42921a924df6c5899ef4dbdb44bffbadd515d6024b7e3450b4ea54c55a229f4d694a292b270018a408b9ed54a0bc1929156ff004c1cf0b1728065c1ae04f4eeb552ff2420005e5ccb9400909127922c4a8e69ffbb96ca5bc95786113ae475b94c2c9a6a235276e2f1b7f01010000000000007a", &(0x7f0000000000), &(0x7f0000f8b000), &(0x7f00000d5000)) mknod(&(0x7f0000cd7000)='./file0\x00', 0x103a, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000340), &(0x7f000027a000)) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000080)={0x4, 0xffffffffffffff9c, 0x1}) bind$unix(r0, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) r1 = syz_open_procfs(0x0, &(0x7f000042cff4)='personality\x00') read(r1, &(0x7f0000f1bf7e)=""/130, 0xfffffdd8) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000240)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x0, 0x18}, 0xc) open$dir(&(0x7f000050bff8)='./file0\x00', 0x2, 0x0) 2018/03/30 10:21:07 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000, 0x0, 0x4}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000d80)={0x0, 0x13c, 0x7, 0xaa5, 0x1, 0x8001}, 0x14) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000dc0)={0xaa, 0x20}) pwrite64(r1, &(0x7f0000000e00)="7437032bd6e223b3a59d10357fc245a11551c76207ed30241886ce0ea1326aeac569322a47e5909770909834b26bf6b04af3b30656cbc3e07c3eed14ee7c472c2d276872498ef33618509e2049213b9664560dc77dd302976456a0392edd116b9816cbca183c77f192c4c3260a385cc483327645104ab9987888488ff6b8e163c2eddc4fc33b9f9ba13abbb021303c8d438d96b2da7c190f9cdc9f2242c2df22ccc63b779747bc9b54e299a407b4150450352ce672efd9fd7565ffb5f410dd66a2061984a92c2ca847eb65e95168372a9e92cc53f27151c36569714d1b2b2b2d26b0e9668aa5042a767ab88ad81f2850cef1", 0xf2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) 2018/03/30 10:21:07 executing program 1: clone(0x200, &(0x7f0000fbf000), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f00000d5000)) mknod(&(0x7f0000cd7000)='./file0\x00', 0x103a, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000340), &(0x7f000027a000)) r0 = syz_open_procfs(0x0, &(0x7f000042cff4)='personality\x00') setxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='com.apple.system.Security\x00', &(0x7f00000001c0)='personality\x00', 0xc, 0x2) read(r0, &(0x7f0000f1bf7e)=""/130, 0xfffffdd8) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000240)) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000000)={0x0, 0xffff, 0x30, 0x401}, &(0x7f0000000080)=0x18) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000100)={r1, 0x37}, 0x8) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x9, 0x18}, 0xc) open$dir(&(0x7f000050bff8)='./file0\x00', 0x2, 0x0) 2018/03/30 10:21:07 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x101001, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r0, 0xc0405519, &(0x7f0000000140)={0x201, 0x0, 0x0, 0x0, "2887c1e48fad7bb259e6cc4846a76cac2b6b0fc55cabb8259e3c0804f63b7c267f75dace24530581ee944e8f"}) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r0, 0xc0405519, &(0x7f0000000040)={0x8, 0x1, 0x1, 0x5, "8eac0ad28d3a4fe40b06f9ae6820a8559be2cced756cb3dea5e2f7f9062247c55e803cdb25dc9c28f75f76d7", 0x3}) 2018/03/30 10:21:07 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000, 0x0, 0x4}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000d80)={0x0, 0x13c, 0x7, 0xaa5, 0x1, 0x8001}, 0x14) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000dc0)={0xaa, 0x20}) pwrite64(r1, &(0x7f0000000e00)="7437032bd6e223b3a59d10357fc245a11551c76207ed30241886ce0ea1326aeac569322a47e5909770909834b26bf6b04af3b30656cbc3e07c3eed14ee7c472c2d276872498ef33618509e2049213b9664560dc77dd302976456a0392edd116b9816cbca183c77f192c4c3260a385cc483327645104ab9987888488ff6b8e163c2eddc4fc33b9f9ba13abbb021303c8d438d96b2da7c190f9cdc9f2242c2df22ccc63b779747bc9b54e299a407b4150450352ce672efd9fd7565ffb5f410dd66a2061984a92c2ca847eb65e95168372a9e92cc53f27151c36569714d1b2b2b2d26b0e9668aa5042a767ab88ad81f2850cef1", 0xf2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) 2018/03/30 10:21:07 executing program 1: clone(0x200, &(0x7f0000fbf000), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f00000d5000)) mknod(&(0x7f0000cd7000)='./file0\x00', 0x103a, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000340), &(0x7f000027a000)) r0 = syz_open_procfs(0x0, &(0x7f000042cff4)='personality\x00') read(r0, &(0x7f0000f1bf7e)=""/130, 0xfffffdd8) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000240)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x9, 0x18}, 0xc) open$dir(&(0x7f000050bff8)='./file0\x00', 0x2, 0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x3814, 0x1) [ 195.000399] bond0 (unregistering): Released all slaves 2018/03/30 10:21:07 executing program 0: recvfrom(0xffffffffffffffff, &(0x7f0000000280)=""/191, 0xbf, 0x40000040, &(0x7f0000000340)=@can={0x1d}, 0x80) r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f00000000c0)="74086e750000000000000000008c00", 0x2) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000400)=@assoc_id=0x0, &(0x7f0000000440)=0x4) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000740)={0x101ff, 0x0, &(0x7f0000fff000/0x1000)=nil}) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000540)={r2, 0x3ff, 0x80000000, 0xab, 0x1000, 0x9}, 0x14) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/loop-control\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000640)={0x0, @in={{0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}}}, &(0x7f0000000700)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000100)={0x8, 0x0, 0x2, 0x2, r4}, &(0x7f0000000140)=0x51) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000180)={r5, 0x0, 0x0, 0x0, 0x4}, &(0x7f00000001c0)=0x18) ioctl$DRM_IOCTL_WAIT_VBLANK(r1, 0xc018643a, &(0x7f0000000500)={0xc000000, 0x3ff, 0x2c}) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000600)) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x100, 0x0) sendfile(r0, r0, &(0x7f0000000080)=0x5f, 0x102000004) ioctl$LOOP_CLR_FD(r0, 0x4c01) sync() ftruncate(r0, 0x2) syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x3, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000780)='/dev/cuse\x00', 0x82400, 0x0) r6 = dup2(r1, r0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f0000000000)=0x9, 0x8) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f00000005c0)=0x3, 0x8) getsockopt$inet6_mreq(r6, 0x29, 0x14, &(0x7f0000000480), &(0x7f00000004c0)=0x14) 2018/03/30 10:21:07 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000000)='/dev/ptmx\x00', 0x3) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000000c0)=0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000180)=[@in6={0xa, 0x4e22, 0x62, @remote={0xfe, 0x80, [], 0xbb}, 0x151}], 0x1c) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000100), &(0x7f0000000140)=0x30) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000040)) 2018/03/30 10:21:07 executing program 7: clone(0x200, &(0x7f0000000100)="f0f7d70fc52207334efb558c957ea5882b23d85fa1659dc13aa7603b45aa407f02117308b1a8697bcf6617a98d145ec63b3cffa3123c2b94a42831af8d9bdb4b03d2954fdaa7e037f2c459a27e42921a924df6c5899ef4dbdb44bffbadd515d6024b7e3450b4ea54c55a229f4d694a292b270018a408b9ed54a0bc1929156ff004c1cf0b1728065c1ae04f4eeb552ff2420005e5ccb9400909127922c4a8e69ffbb96ca5bc95786113ae475b94c2c9a6a235276e2f1b7f01010000000000007a", &(0x7f0000000000), &(0x7f0000f8b000), &(0x7f00000d5000)) mknod(&(0x7f0000cd7000)='./file0\x00', 0x103a, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000340), &(0x7f000027a000)) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000080)={0x4, 0xffffffffffffff9c, 0x1}) bind$unix(r0, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) r1 = syz_open_procfs(0x0, &(0x7f000042cff4)='personality\x00') read(r1, &(0x7f0000f1bf7e)=""/130, 0xfffffdd8) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000240)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x9}, 0xc) open$dir(&(0x7f000050bff8)='./file0\x00', 0x2, 0x0) 2018/03/30 10:21:07 executing program 1: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x49, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000006ffc), 0x4) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000fafff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f000019afe0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000a5f000/0x1000)=nil}) pipe2(&(0x7f0000000080), 0x4000) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000fb4000)=ANY=[@ANYBLOB="0118000000000000014d564b0000000101"]) syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x8001, 0x100) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 195.273249] print_req_error: I/O error, dev loop0, sector 0 [ 195.273979] print_req_error: I/O error, dev loop0, sector 8 [ 195.279068] Buffer I/O error on dev loop0, logical block 0, lost async page write [ 195.284947] Buffer I/O error on dev loop0, logical block 1, lost async page write [ 195.893970] IPVS: ftp: loaded support on port[0] = 21 [ 196.180088] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 196.597444] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 196.603558] 8021q: adding VLAN 0 to HW filter on device bond0 [ 196.649312] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 196.695445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 196.717282] FAULT_INJECTION: forcing a failure. [ 196.717282] name failslab, interval 1, probability 0, space 0, times 0 [ 196.728733] CPU: 1 PID: 24706 Comm: syz-executor6 Not tainted 4.16.0-rc7+ #371 [ 196.736071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 196.745406] Call Trace: [ 196.747976] dump_stack+0x194/0x24d [ 196.751588] ? arch_local_irq_restore+0x53/0x53 [ 196.756239] ? lock_release+0xa40/0xa40 [ 196.760204] should_fail+0x8c0/0xa40 [ 196.763917] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 196.769002] ? kernfs_add_one+0x50/0x450 [ 196.773043] ? rb_first_postorder+0xa0/0xa0 [ 196.777338] ? kernfs_add_one+0x50/0x450 [ 196.781387] ? save_stack+0x43/0xd0 [ 196.784986] ? kasan_kmalloc+0xad/0xe0 [ 196.788854] ? trace_hardirqs_off+0x10/0x10 [ 196.793158] ? find_held_lock+0x35/0x1d0 [ 196.797202] ? __lock_is_held+0xb6/0x140 [ 196.801254] ? check_same_owner+0x320/0x320 [ 196.805548] ? lock_downgrade+0x980/0x980 [ 196.809678] ? rcu_note_context_switch+0x710/0x710 [ 196.814593] should_failslab+0xec/0x120 [ 196.818547] __kmalloc_track_caller+0x5f/0x760 [ 196.823109] ? idr_alloc_cyclic+0x1d6/0x320 [ 196.827409] ? kstrdup_const+0x39/0x50 [ 196.831274] ? __mutex_unlock_slowpath+0xe9/0xac0 [ 196.836096] kstrdup+0x39/0x70 [ 196.839266] kstrdup_const+0x39/0x50 [ 196.842957] __kernfs_new_node+0xa2/0x570 [ 196.847084] ? kernfs_dop_revalidate+0x380/0x380 [ 196.851817] ? find_held_lock+0x35/0x1d0 [ 196.855856] ? kasan_check_read+0x11/0x20 [ 196.859980] ? read_word_at_a_time+0x12/0x20 [ 196.864362] ? strscpy+0x186/0x500 [ 196.867892] kernfs_new_node+0x80/0xe0 [ 196.871757] __kernfs_create_file+0x4b/0x320 [ 196.876148] cgroup_addrm_files+0x3c5/0xa70 [ 196.880457] ? cgroup_file_write+0x710/0x710 [ 196.884843] ? __getnstimeofday64+0x317/0x470 [ 196.889327] ? getrawmonotonic64+0x460/0x460 [ 196.893715] ? kernfs_active+0x92/0x160 [ 196.897673] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 196.902587] ? cgroup_kn_set_ugid+0x2c7/0x370 [ 196.907060] ? cgroup_file_name+0x1d0/0x1d0 [ 196.911369] css_populate_dir+0x340/0x420 [ 196.915500] cgroup_mkdir+0x553/0xfc0 [ 196.919277] ? __lock_is_held+0xb6/0x140 [ 196.923323] ? cgroup_destroy_locked+0x750/0x750 [ 196.928075] ? rcu_read_lock_sched_held+0x108/0x120 [ 196.933070] ? kmem_cache_free+0x258/0x2a0 [ 196.937285] ? set_nlink+0xc1/0x160 [ 196.940890] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 196.945794] ? generic_permission+0x105/0x3c0 [ 196.950270] ? cgroup_destroy_locked+0x750/0x750 [ 196.955005] kernfs_iop_mkdir+0x153/0x1e0 [ 196.959138] vfs_mkdir+0x390/0x600 [ 196.962672] SyS_mkdirat+0x22b/0x2b0 [ 196.966370] ? SyS_mknod+0x480/0x480 [ 196.970059] ? trace_hardirqs_on+0xd/0x10 [ 196.974188] ? do_syscall_64+0xb7/0x940 [ 196.978141] ? SyS_mknod+0x480/0x480 [ 196.981830] do_syscall_64+0x281/0x940 [ 196.985701] ? __do_page_fault+0xc90/0xc90 [ 196.989910] ? _raw_spin_unlock_irq+0x27/0x70 [ 196.994383] ? finish_task_switch+0x1c1/0x7e0 [ 196.998853] ? syscall_return_slowpath+0x550/0x550 [ 197.003760] ? syscall_return_slowpath+0x2ac/0x550 [ 197.008668] ? prepare_exit_to_usermode+0x350/0x350 [ 197.013670] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 197.019029] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 197.023855] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 197.029022] RIP: 0033:0x4548b9 [ 197.032188] RSP: 002b:00007f256f82ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 197.039870] RAX: ffffffffffffffda RBX: 00007f256f82b6d4 RCX: 00000000004548b9 2018/03/30 10:21:09 executing program 5: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) unlink(&(0x7f0000000000)='./file0\x00') r0 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x100, 0x8000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f0000000080)) 2018/03/30 10:21:09 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000, 0x0, 0x4}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000d80)={0x0, 0x13c, 0x7, 0xaa5, 0x1, 0x8001}, 0x14) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000dc0)={0xaa, 0x20}) pwrite64(r1, &(0x7f0000000e00)="7437032bd6e223b3a59d10357fc245a11551c76207ed30241886ce0ea1326aeac569322a47e5909770909834b26bf6b04af3b30656cbc3e07c3eed14ee7c472c2d276872498ef33618509e2049213b9664560dc77dd302976456a0392edd116b9816cbca183c77f192c4c3260a385cc483327645104ab9987888488ff6b8e163c2eddc4fc33b9f9ba13abbb021303c8d438d96b2da7c190f9cdc9f2242c2df22ccc63b779747bc9b54e299a407b4150450352ce672efd9fd7565ffb5f410dd66a2061984a92c2ca847eb65e95168372a9e92cc53f27151c36569714d1b2b2b2d26b0e9668aa5042a767ab88ad81f2850cef1", 0xf2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) 2018/03/30 10:21:09 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="84d5aef1603cb020c5b219faa757913ec85ee74a155e1d635566777b78600bc65bf01ce33de9a6bc3a2041890df0926f2cfc2a7d63690f6b55610593773041755f61b034e3a62a770855b2c0481df219efbfa8ffd0c665434a1de026bcfb654d597ef77a7b231aa9efe45c53811c7591d56f69e9c6231e6da993bbd2a6133805be0c18ba114cfe865e693024a56c3331b93c03e25927a504d27acebf7eecd33d7c69359e3ca37dc546c4fc5bc62596a94cdc00f9b973616a9d2ebad2d9b3e60261ae73b8397694e1f0851475b4236fb47989e6bfd1ad926a01523df3f689dc2603a76b5fc5e023d5449d066d424d1001fee5d653c21fdb751e95ff2b", 0xfc}], 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x200900, 0x103) connect$vsock_stream(r1, &(0x7f0000000600)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) r2 = socket$alg(0x26, 0x5, 0x0) rt_sigtimedwait(&(0x7f0000000140)={0xffffffff}, 0x0, &(0x7f0000000180), 0x8) bind$alg(r2, &(0x7f000073e000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(cbc-twofish-avx)\x00'}, 0x58) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000500)={&(0x7f00000005c0)=[0x0, 0x0, 0x0], 0x3}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r3, 0x118, 0x0, &(0x7f0000000100)=0x7, 0x4) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000000c0)={0x1, 0x1, 0x1, 0x1, 0x0, 0x6}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000280)={r4, @in={{0x2, 0x4e23, @multicast2=0xe0000002}}, [0x8000, 0x9, 0x80000000, 0x3, 0x80, 0x8001, 0x800, 0x100, 0xe0db, 0x0, 0x2000000000, 0x200, 0x68, 0x0, 0x8]}, &(0x7f0000000380)=0x100) r5 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0xfffffffffffffdfa) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r5, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port1\x00', 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r5, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r6 = gettid() r7 = syz_open_procfs(r6, &(0x7f00000002c0)='maps\x00') readv(r7, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/28, 0x65}], 0x1) exit(0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r7, &(0x7f000004ffe0)=[{&(0x7f0000000000)=""/128, 0xe6}], 0x222) r8 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) connect$ax25(r3, &(0x7f00000006c0)={0x3, {"fc5da504005009"}, 0x7fff}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) getsockopt$netrom_NETROM_T1(r8, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r5, 0x80045301, &(0x7f0000000700)) 2018/03/30 10:21:09 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000600)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x9, 0xc0080) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fsetxattr(r1, &(0x7f0000000100)=@known='system.sockprotoname\x00', &(0x7f0000000140)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a", 0x3c, 0x0) setsockopt$inet_buf(r2, 0x0, 0x2f, &(0x7f0000000240)="1a420f1697e2b0216d65694cf6da78f3c2a5c0f79dc53604bd7fa5a383a1b73ac3189dd3bf8d34824057a7462ec7540a94139bdc2544ae0d55c7c50751f87c7c9c39796081eab3bef8a4da", 0x4b) fcntl$setstatus(r3, 0x4, 0x44009) socket$key(0xf, 0x3, 0x2) read$eventfd(r3, &(0x7f0000000200), 0x83b5) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000300)=0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000400)=r4) fsetxattr(r3, &(0x7f0000000080)=@random={'user.', '*cgroup[[(!!\x00'}, &(0x7f00000000c0)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a", 0x3c, 0x3) ioctl$KDGKBMODE(r1, 0x4b44, &(0x7f0000000340)) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x8, 0x440400) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) eventfd(0x7) ioctl$KVM_SET_GSI_ROUTING(r5, 0x4008ae6a, &(0x7f0000001140)=ANY=[]) keyctl$set_reqkey_keyring(0xe, 0x3) ftruncate(0xffffffffffffffff, 0xfffffffeffffffff) sendmmsg(r5, &(0x7f0000001180)=[{{&(0x7f00000010c0)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f0000001140), 0x0, &(0x7f0000001440)=[{0x40, 0x10f, 0xffff, "b5a9748dbf5b8186aa2d82ff825736409c96a3b8be0d1ea538e1475f8e0ae065ab0103942bce0699d6af41"}], 0x40, 0x10}, 0x6}], 0x1, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000080)=0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000003c0)=ANY=[@ANYBLOB="d0228ac419d1fc4baaa5c1541f109b00", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000380)=0x10) r7 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000fc0)='/selinux/enforce\x00', 0x16907a, 0x0) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000f80)=@assoc_value, 0x8) r8 = dup(0xffffffffffffffff) read(r8, &(0x7f0000000040)=""/172, 0xac) ioctl$EVIOCSABS0(r0, 0x401845c0, &(0x7f0000000180)={0x100000000, 0x9cc8, 0x7f, 0x9, 0x7}) syz_open_procfs(r6, &(0x7f00000001c0)='loginuid\x00') ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r8, 0x40085400, &(0x7f0000000000)={0x7}) setns(r7, 0x44000000) 2018/03/30 10:21:09 executing program 7: clone(0x200, &(0x7f0000000100)="f0f7d70fc52207334efb558c957ea5882b23d85fa1659dc13aa7603b45aa407f02117308b1a8697bcf6617a98d145ec63b3cffa3123c2b94a42831af8d9bdb4b03d2954fdaa7e037f2c459a27e42921a924df6c5899ef4dbdb44bffbadd515d6024b7e3450b4ea54c55a229f4d694a292b270018a408b9ed54a0bc1929156ff004c1cf0b1728065c1ae04f4eeb552ff2420005e5ccb9400909127922c4a8e69ffbb96ca5bc95786113ae475b94c2c9a6a235276e2f1b7f01010000000000007a", &(0x7f0000000000), &(0x7f0000f8b000), &(0x7f00000d5000)) mknod(&(0x7f0000cd7000)='./file0\x00', 0x103a, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000340), &(0x7f000027a000)) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000080)={0x4, 0xffffffffffffff9c, 0x1}) bind$unix(r0, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) r1 = syz_open_procfs(0x0, &(0x7f000042cff4)='personality\x00') read(r1, &(0x7f0000f1bf7e)=""/130, 0xfffffdd8) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000240)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x9}, 0xc) open$dir(&(0x7f000050bff8)='./file0\x00', 0x2, 0x0) 2018/03/30 10:21:09 executing program 6 (fault-call:3 fault-nth:11): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r0, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r0, &(0x7f0000000100)=""/65, 0x41) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) linkat(r0, &(0x7f0000000480)='./file1\x00', r1, &(0x7f00000004c0)='./file0\x00', 0x1000) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') unlink(&(0x7f00000000c0)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r0, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x12021) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000340)={0x8, 0x9, 0x4, 0x10000, 0x1, 0x7, 0x7fffffff, 0x0, 0x29, 0x0, 0x20}, 0xb) 2018/03/30 10:21:09 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) unshare(0x0) r1 = add_key(&(0x7f0000000040)='id_legacy\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000001c0)="dae767e1d6a67462915a5371721e57896df63856816451c52dcd68a99fc6ea34b5b54e5cdf80347b6ca4d8a7223493bd0999cd84b20ff4a91d0bfb77c18c07ad0bced88b0956a16961522ee13a5453a14fa714b6b96ce1a22a6e9477956c844b14a4112ad083b5cd5d892c4f9b14f47ab9ecc6507ed2aa960790ba7a1ee0ad3510e95430ec2d3271fe9c780b21a618afb8c33e4043053f2a820b632c2b86e74c4306fd68", 0xa4, 0x0) r2 = request_key(&(0x7f0000000100)='big_key\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x3}, &(0x7f00000002c0)='Hmime_type:nodev(\x00', 0x0) r3 = add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000440)="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", 0x1000, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000380)={r1, r2, r3}, &(0x7f0000001440)=""/200, 0xc8, &(0x7f0000001600)={&(0x7f00000003c0)={'sm3\x00'}, &(0x7f0000001540)="65eb75c3aac7023771a3f136be69a0a6d6cdd5eafba7d64a46f69ef51507cb04cd9c88959d68f5ce97b0f18b77ad9535d66cb955a40ae6699058936bd86701ae2f6de24743a6f8e63c13db12599e9f828f99793e2ee7a13dfa4e1faa01d2631492d0b42ce65af9e9526d95e8261091db7066468883403bdcdf533c36b5532b91ddabd0daafde52c9b605139e67c3788aff6f2dfcb1e5f16f003feefd818a00b5", 0xa0}) r4 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) read(r4, &(0x7f0000000000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "706f727431000200000000000000000000000000000000000000eb000000b2a587e2000000000000000000000000000101008e15e7af00", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r4, 0x4040534e, &(0x7f000019ffe9)={0xc1, @time={0x0, 0x989680}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0xc0505350, &(0x7f0000000140)={{}, {}, 0x100000000}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000400)='/dev/sequencer2\x00', 0x0, 0x0) unshare(0x20020000) unshare(0x20000) 2018/03/30 10:21:09 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_REINJECT_CONTROL(r1, 0xae71, &(0x7f0000000000)={0x7}) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x20011, 0xffffffffffffffff, 0x0) utimes(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={{0x0, 0x2710}, {0x77359400}}) epoll_create1(0x0) r2 = dup3(r1, 0xffffffffffffffff, 0x0) gettid() r3 = add_key(&(0x7f0000000040)='encrypted\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000001040)="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", 0xfbe, 0xffffffffffffffff) r4 = gettid() perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x5, 0x100000001, 0x3, 0x4, 0x0, 0x5, 0x40, 0x8, 0x1, 0x3, 0xdcfd, 0xfffffffffffffeff, 0x0, 0x1, 0x0, 0xffff, 0x9, 0x3, 0x8, 0xd6c, 0x9, 0x1ff, 0x25d8, 0x7, 0x20, 0x3ff, 0x380000, 0x6, 0x8, 0x62, 0x0, 0x100000000, 0x5, 0x6, 0x3ff, 0xaf17, 0x0, 0x1f, 0x3, @perf_config_ext={0xc, 0xff2f}, 0xa000, 0x0, 0x5, 0x7, 0x0, 0xff, 0x2}, r4, 0x0, r2, 0x2) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000001c0)=0x5, 0x4) keyctl$get_keyring_id(0x0, r3, 0x80000001) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000200)={0x5, 0x1000}) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f00009ecff8), 0x2, 0x3) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000600)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}) [ 197.047116] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 197.054362] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 197.061607] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 197.068850] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 000000000000000a [ 197.076263] cgroup: cgroup_addrm_files: failed to add cgroup.procs, err=-12 2018/03/30 10:21:09 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@remote, @in6=@mcast1}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000001240)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000012c0)='./file0\x00', &(0x7f0000001300)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r1, r0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000001380)='sessionid\x00') ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000001400)={0x1, &(0x7f00000013c0)=[{}]}) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net/ip6_mr_vif\x00') readv(r3, &(0x7f0000002240)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)) r4 = syz_open_dev$binder(&(0x7f000000cff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000004000)={0x4, 0x0, &(0x7f000000cf90)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0, 0x0, &(0x7f0000005000)}) ioctl$BINDER_SET_CONTEXT_MGR(r4, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f000000ffd0)={0x0, 0x0, &(0x7f000000f000), 0x1, 0x0, &(0x7f00000000c0)='b'}) mmap$binder(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x0, 0x12, r4, 0x0) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000040)={0x14, 0x0, &(0x7f0000000000)=[@acquire_done={0x40486311}], 0x0, 0x0, &(0x7f0000011f9d)}) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000340)={0x60, 0x0, &(0x7f0000000440)=[@free_buffer={0x40086303}, @reply_sg={0x40486312, {{0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000280)=[@fd={0x66642a85}], &(0x7f00000002c0)=[0x0]}, 0xfffffffffffffffb}}, @increfs={0x40046304}], 0x0, 0x0, &(0x7f0000000500)}) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, &(0x7f0000000580)=""/4096, &(0x7f0000000200)=0x1000) sendfile(r3, r3, &(0x7f0000000040)=0x400000, 0x400000ff) [ 197.132129] encrypted_key: master key parameter 'VÄýî!ÀÍÜèzŸÏÚŠØÏ{N|‰f²Ó¯žsæîAG*r6Íx` [ 197.132129] æ¼pè¢-F¬@¹,1ÝrTwâÆàO³Í'ÅĘPÇ…4' is invalid 2018/03/30 10:21:09 executing program 3: r0 = socket$inet(0x2, 0x3, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20000120, 0x1, 0x280, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000140], 0x2, &(0x7f0000000100), &(0x7f0000000140)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffdfffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'sit0\x00', 'vcan0\x00', 'ip6gretap0\x00', 'gretap0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0xf8, 0x178, 0x1c0, [@limit={'limit\x00', 0x20, {{0x0, 0x101}}}, @statistic={'statistic\x00', 0x18}]}, [@common=@mark={'mark\x00', 0x10, {{0x0, 0xffffffffffffffff}}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00'}}}}]}]}, 0x2f8) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc\x00', 0x200000, 0x0) r2 = getpid() getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@ipv4={[], [], @local}, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@ipv4}}, &(0x7f0000000580)=0xe8) ioctl$DRM_IOCTL_GET_CLIENT(r1, 0xc0286405, &(0x7f00000005c0)={0x1, 0x8, r2, 0xfff, r3, 0xffffffffffffff5a, 0x3, 0x434}) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer2\x00', 0x400, 0x0) ioctl$RNDGETENTCNT(r4, 0x80045200, &(0x7f0000000400)) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000080)={{0x0, @loopback=0x7f000001, 0x4e20, 0x0, 'none\x00'}, {@loopback=0x7f000001, 0x0, 0xffffffffffffffff}}, 0x44) [ 197.200171] encrypted_key: master key parameter 'VÄýî!ÀÍÜèzŸÏÚŠØÏ{N|‰f²Ó¯žsæîAG*r6Íx` [ 197.200171] æ¼pè¢-F¬@¹,1ÝrTwâÆàO³Í'ÅĘPÇ…4' is invalid [ 197.243452] binder: 24742:24743 unknown command 0 [ 197.266881] binder: 24742:24743 ioctl c0306201 20004000 returned -22 [ 197.316871] binder: 24742:24747 BC_FREE_BUFFER u0000000000000000 no match [ 197.323924] binder: 24742:24747 got reply transaction with bad transaction stack, transaction 40 has target 24742:0 [ 197.334713] binder: 24742:24747 transaction failed 29201/-71, size 24-8 line 2778 [ 197.369414] binder: 24742:24750 ioctl c0306201 20004000 returned -14 [ 197.374486] bond0 (unregistering): Released all slaves [ 197.377335] binder: BINDER_SET_CONTEXT_MGR already set [ 197.386913] binder: 24742:24747 ioctl 40046207 0 returned -16 [ 197.399681] binder_alloc: 24742: binder_alloc_buf, no vma [ 197.399747] binder_alloc: binder_alloc_mmap_handler: 24742 2000c000-2000e000 already mapped failed -16 2018/03/30 10:21:10 executing program 6 (fault-call:3 fault-nth:12): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r0, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r0, &(0x7f0000000100)=""/65, 0x41) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) linkat(r0, &(0x7f0000000480)='./file1\x00', r1, &(0x7f00000004c0)='./file0\x00', 0x1000) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') unlink(&(0x7f00000000c0)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r0, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x12021) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000340)={0x8, 0x9, 0x4, 0x10000, 0x1, 0x7, 0x7fffffff, 0x0, 0x29, 0x0, 0x20}, 0xb) 2018/03/30 10:21:10 executing program 0: r0 = socket(0x1e, 0x2, 0x0) bind(r0, &(0x7f00008a1f80)=@generic={0x42001e, "01030000000000b9000000004700000000a979f321b30c7bc8790405c7bad62e0a63a632ed4938d36d64fb8f8401a3ff59829a2b0afe7ce43a5b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31510000500000000000bdb9c8ea31000077aeb81c90001d6f7c980400000000f70dc136cb184a"}, 0x80) r1 = socket(0x1e, 0x1, 0x0) close(r0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) add_key$user(&(0x7f0000c24ffb)='user\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000200)="600001e3a255ec4a8d9d652d0527abdffd0587e50ec159997396abc344a7d9f542a3e3af2d90a5df424d68996f51a7b3f20108f152bfd57ac5a50be84a106249abbfc5b3f2e96bf3039474801001807fbf00000000000000000000000000000000", 0x61, r3) r4 = add_key$user(&(0x7f0000ef5000)='user\x00', &(0x7f00008fa000)={0x73, 0x79, 0x7a}, &(0x7f0000537ffd)="0003", 0x2, r3) r5 = add_key$user(&(0x7f0000688000)='user\x00', &(0x7f00008d9ffb)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000f19edc)="b33ab76079ebe0d14f729cd653e520d29ad7ef0000000000000044c249b544230b9387fb8bd6ed266ccf59ef70995bf2e8e0ecd3fff32853747eda22d2818d08ca27e0ec821620e365a0e6b9485f2d925493f62113e33e5f8c7eba67fc19a9497f5b07e5849d2e875b066cd6401d36616fe0f3c3002801b4627ee7597689525e8e81f750a86eb580fb4690ea52246bd3", 0x90, r3) request_key(&(0x7f0000a98ffb)='user\x00', &(0x7f0000626000)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)="2f6465612f7675746f66730719", r2) keyctl$dh_compute(0x17, &(0x7f00004c8ff4)={r4, r5}, &(0x7f00005cd000), 0x0, &(0x7f000010c000)={&(0x7f0000bf4ff3)={'ghash-generic\x00'}, &(0x7f0000000000)}) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000180)=0x1, 0x4) socket$inet_udp(0x2, 0x2, 0x0) r6 = syz_open_dev$midi(&(0x7f0000000380)='/dev/midi#\x00', 0x20000000cdfb, 0x20020) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000035c0)={'teql0\x00'}) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = syz_open_dev$tun(&(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) r8 = socket(0x0, 0x3, 0x0) recvmsg$netrom(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) write(r8, &(0x7f0000000080)="240000005a005f191415f507125a00000903210308001000fff708", 0x1b) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x106}) r9 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x80000001) r10 = dup2(r9, r7) ioctl$TUNSETQUEUE(r10, 0x400454d9, &(0x7f0000000000)={'vlan0\x00', 0x400}) ioctl$KVM_SET_DEVICE_ATTR(r6, 0x4018aee1, &(0x7f0000000300)={0x0, 0x0, 0x4, &(0x7f00000001c0)}) getsockopt$inet_mreqsrc(r1, 0x0, 0x2f, &(0x7f0000000240)={@empty, @multicast1, @remote}, &(0x7f0000000280)=0x4) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 2018/03/30 10:21:10 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000, 0x0, 0x4}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000d80)={r5, 0x0, 0x7, 0xaa5, 0x1, 0x8001}, 0x14) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000dc0)={0xaa, 0x20}) pwrite64(r1, &(0x7f0000000e00)="7437032bd6e223b3a59d10357fc245a11551c76207ed30241886ce0ea1326aeac569322a47e5909770909834b26bf6b04af3b30656cbc3e07c3eed14ee7c472c2d276872498ef33618509e2049213b9664560dc77dd302976456a0392edd116b9816cbca183c77f192c4c3260a385cc483327645104ab9987888488ff6b8e163c2eddc4fc33b9f9ba13abbb021303c8d438d96b2da7c190f9cdc9f2242c2df22ccc63b779747bc9b54e299a407b4150450352ce672efd9fd7565ffb5f410dd66a2061984a92c2ca847eb65e95168372a9e92cc53f27151c36569714d1b2b2b2d26b0e9668aa5042a767ab88ad81f2850cef1", 0xf2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) 2018/03/30 10:21:10 executing program 7: clone(0x200, &(0x7f0000000100)="f0f7d70fc52207334efb558c957ea5882b23d85fa1659dc13aa7603b45aa407f02117308b1a8697bcf6617a98d145ec63b3cffa3123c2b94a42831af8d9bdb4b03d2954fdaa7e037f2c459a27e42921a924df6c5899ef4dbdb44bffbadd515d6024b7e3450b4ea54c55a229f4d694a292b270018a408b9ed54a0bc1929156ff004c1cf0b1728065c1ae04f4eeb552ff2420005e5ccb9400909127922c4a8e69ffbb96ca5bc95786113ae475b94c2c9a6a235276e2f1b7f01010000000000007a", &(0x7f0000000000), &(0x7f0000f8b000), &(0x7f00000d5000)) mknod(&(0x7f0000cd7000)='./file0\x00', 0x103a, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000340), &(0x7f000027a000)) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000080)={0x4, 0xffffffffffffff9c, 0x1}) bind$unix(r0, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) r1 = syz_open_procfs(0x0, &(0x7f000042cff4)='personality\x00') read(r1, &(0x7f0000f1bf7e)=""/130, 0xfffffdd8) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000240)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x9}, 0xc) open$dir(&(0x7f000050bff8)='./file0\x00', 0x2, 0x0) 2018/03/30 10:21:10 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000005}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x42, 0x1) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000240)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x25, 0x129, 0x0, 0x0, {0x12}}, 0x14}, 0x1}, 0x0) 2018/03/30 10:21:10 executing program 1: r0 = socket(0x1e, 0x1, 0x0) listen(r0, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000454ff0)={0x0, 0x2710}, 0x10) setsockopt$inet6_dccp_buf(r0, 0x21, 0x0, &(0x7f0000000000)="280b4e43c8466ce42e36734146891f02f566ed0a455a80a6d16e5987db6ae2580cb93ec9", 0x24) recvfrom(r0, &(0x7f0000001140)=""/4096, 0x1000, 0x10000000100, &(0x7f0000002140)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x80) 2018/03/30 10:21:10 executing program 5: perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x78, 0x1e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r0, &(0x7f00000021c0)=ANY=[@ANYBLOB="00000000180000fa0000000000000000", @ANYPTR=&(0x7f0000002180)=ANY=[@ANYRES32=0xffffffff], @ANYBLOB="40d37c0600000000"], 0x20) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x100, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r2, 0xc008ae67, &(0x7f0000000140)={0x6, 0x8a}) write$rdma_cm(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="03000000400000fa0a0000000000000000000000000000000000000000000001000000002a000000000000000000000000000000000000000000000100000000", @ANYRES32=r1, @ANYRES64=r2], 0x4c) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) 2018/03/30 10:21:10 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="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", 0xfc}], 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x200900, 0x103) connect$vsock_stream(r1, &(0x7f0000000600)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) r2 = socket$alg(0x26, 0x5, 0x0) rt_sigtimedwait(&(0x7f0000000140)={0xffffffff}, 0x0, &(0x7f0000000180), 0x8) bind$alg(r2, &(0x7f000073e000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(cbc-twofish-avx)\x00'}, 0x58) nanosleep(&(0x7f0000d1e000)={0x0, 0x1c9c380}, &(0x7f0000000000)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r3, 0x118, 0x0, &(0x7f0000000100)=0x7, 0x4) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000000c0)={0x1, 0x1, 0x1, 0x1, 0x0, 0x6}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000280)={r4, @in={{0x2, 0x4e23, @multicast2=0xe0000002}}, [0x8000, 0x9, 0x80000000, 0x3, 0x80, 0x8001, 0x800, 0x100, 0xe0db, 0x0, 0x2000000000, 0x200, 0x68, 0x0, 0x8]}, &(0x7f0000000380)=0x100) r5 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0xfffffffffffffdfa) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r5, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port1\x00', 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r5, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r6 = gettid() r7 = syz_open_procfs(r6, &(0x7f00000002c0)='maps\x00') readv(r7, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/28, 0x65}], 0x1) exit(0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r7, &(0x7f000004ffe0)=[{&(0x7f0000000000)=""/128, 0xe6}], 0x222) r8 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) connect$ax25(r3, &(0x7f00000006c0)={0x3, {"fc5da504005009"}, 0x7fff}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) getsockopt$netrom_NETROM_T1(r8, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r5, 0x80045301, &(0x7f0000000700)) [ 197.405327] binder: 24742:24751 transaction failed 29189/-3, size 0-0 line 2963 [ 197.437727] binder: release 24742:24747 transaction 40 out, still active [ 197.444772] binder: undelivered TRANSACTION_COMPLETE [ 197.449921] binder: undelivered TRANSACTION_ERROR: 29201 [ 197.455411] binder: undelivered TRANSACTION_ERROR: 29189 [ 197.460906] binder: send failed reply for transaction 40, target dead 2018/03/30 10:21:10 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000fcbff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket(0x40000000018, 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000300)=[@text32={0x20, &(0x7f0000000340)="0f01ca0f21913664660f382990e1e883e0672ef3650f070f350fc719b8ac00c0fe0f23c80f21f8350c0060000f23f8c4c17a2dd50fc7580fb9800000c00f3235001000000f30", 0x46}], 0x1, 0x0, &(0x7f0000000340), 0x0) gettid() getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e23, @multicast2=0xe0000002}}, 0x5, 0x1}, &(0x7f00000000c0)=0x90) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000100)={r4, 0xffffffff}, 0x8) 2018/03/30 10:21:10 executing program 1: r0 = socket(0x10, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000001c0)={0x1fffffffffffffc4, &(0x7f0000000000)=[{0x5, 0x7, 0x6, 0x8000}, {0x9, 0x5, 0x800081, 0xded2}]}, 0xfcbe) sendmsg$nl_route(r0, &(0x7f00000004c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c0000001a20010000000000000000000a0000000000000000000000"], 0x1c}, 0x1}, 0x0) 2018/03/30 10:21:10 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[]}, 0x1}, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000140)={'ipvs\x00'}, &(0x7f0000000200)=0x1e) perf_event_open(&(0x7f0000d2af88)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000653fee)='/dev/snd/midiC#D#\x00', 0x200, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ppoll(&(0x7f0000000040)=[{}, {r0}], 0x2, &(0x7f00000000c0), &(0x7f0000000100), 0x8) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x2, 0x0) pipe2(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r5 = userfaultfd(0x0) ioctl$UFFDIO_API(r5, 0xc018aa3f, &(0x7f0000e5afe8)={0xaa}) ioctl$UFFDIO_REGISTER(r5, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x1c) read(r3, &(0x7f0000000440)=""/74, 0x1cb) ioctl$sock_netrom_TIOCINQ(r4, 0x541b, &(0x7f0000000200)) ioctl$RNDGETENTCNT(r1, 0x80045200, &(0x7f0000000300)) dup2(r3, r5) sendmsg$nfc_llcp(r2, &(0x7f0000000640)={&(0x7f0000000280)={0x27, 0x0, 0x4, 0x7, 0x0, 0x2, "22dd483f69cbb2f9ad614d307bde52bad1d1c11381cf5253d6cabfb29f3dffd4c28439e22c562434c708fcd1e045d4348cd982f6ceff6f05ae5c932f9d9c41"}, 0x60, &(0x7f0000000540), 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x120, 0x20004000}, 0x80) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20202, 0x0) ioctl$TCGETA(r1, 0x5405, &(0x7f0000000340)) 2018/03/30 10:21:10 executing program 7: clone(0x200, &(0x7f0000000100)="f0f7d70fc52207334efb558c957ea5882b23d85fa1659dc13aa7603b45aa407f02117308b1a8697bcf6617a98d145ec63b3cffa3123c2b94a42831af8d9bdb4b03d2954fdaa7e037f2c459a27e42921a924df6c5899ef4dbdb44bffbadd515d6024b7e3450b4ea54c55a229f4d694a292b270018a408b9ed54a0bc1929156ff004c1cf0b1728065c1ae04f4eeb552ff2420005e5ccb9400909127922c4a8e69ffbb96ca5bc95786113ae475b94c2c9a6a235276e2f1b7f01010000000000007a", &(0x7f0000000000), &(0x7f0000f8b000), &(0x7f00000d5000)) mknod(&(0x7f0000cd7000)='./file0\x00', 0x103a, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000340), &(0x7f000027a000)) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000080)={0x4, 0xffffffffffffff9c, 0x1}) bind$unix(r0, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) r1 = syz_open_procfs(0x0, &(0x7f000042cff4)='personality\x00') read(r1, &(0x7f0000f1bf7e)=""/130, 0xfffffdd8) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000240)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x9, 0x18}, 0xc) open$dir(&(0x7f000050bff8)='./file0\x00', 0x0, 0x0) 2018/03/30 10:21:10 executing program 5: connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2000000, 0x32, r0, 0xffffffffffffffff) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) io_setup(0x6, &(0x7f0000000240)) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000100)={[{0x1000, 0x4, 0x9, 0x5, 0x4, 0x5, 0x66, 0x9, 0x4, 0x9, 0x4, 0x7fffffff, 0x4}, {0x9, 0x80000001, 0x9, 0x0, 0x1c64, 0x7ff, 0xf093, 0x2, 0x2, 0x6f3, 0x19675, 0xfffffffffffffff8, 0x9}, {0xfff, 0x6da, 0x6, 0x1, 0x1f, 0x7, 0xd1a8, 0xfe20, 0x8001, 0x9, 0x0, 0x5, 0x3}], 0x9f}) getegid() r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000000080)=ANY=[@ANYRES32=r2, @ANYBLOB="7f00000000002daff6e60417d4c226a4cd57afaeaa4cf894c4ddfca59ac30b8d2c3acc0175925b8a66cbcb1a143a65f7ef7576b19b2932b77a68da7f9e3825fe36727604b032c4c52b54cbc6356cfa7014b3e233d38ace5ca4eb0fddd4cf6bf856b228addef5b1c9a9"]) sendto$inet(r2, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) 2018/03/30 10:21:10 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000, 0x0, 0x4}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000d80)={r5, 0x0, 0x7, 0xaa5, 0x1, 0x8001}, 0x14) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000dc0)={0xaa, 0x20}) pwrite64(r1, &(0x7f0000000e00)="7437032bd6e223b3a59d10357fc245a11551c76207ed30241886ce0ea1326aeac569322a47e5909770909834b26bf6b04af3b30656cbc3e07c3eed14ee7c472c2d276872498ef33618509e2049213b9664560dc77dd302976456a0392edd116b9816cbca183c77f192c4c3260a385cc483327645104ab9987888488ff6b8e163c2eddc4fc33b9f9ba13abbb021303c8d438d96b2da7c190f9cdc9f2242c2df22ccc63b779747bc9b54e299a407b4150450352ce672efd9fd7565ffb5f410dd66a2061984a92c2ca847eb65e95168372a9e92cc53f27151c36569714d1b2b2b2d26b0e9668aa5042a767ab88ad81f2850cef1", 0xf2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) 2018/03/30 10:21:10 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x5, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000140)={0x0, 0x8000}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000200)={r2, 0x3}, 0x8) r3 = syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x98ab, 0x1103) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) connect$can_bcm(r3, &(0x7f0000000100)={0x1d}, 0x10) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x5}, 0xc, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015000000000029000000"], 0x4}, 0x1, 0x0, 0x0, 0xfffffffffffffffc}, 0x400000000003) [ 197.657192] QAT: Invalid ioctl [ 197.666798] QAT: Invalid ioctl 2018/03/30 10:21:10 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000280)='/dev/snd/pcmC#D#c\x00', 0x5, 0x800) accept4$netrom(r1, &(0x7f0000000080)=@full, &(0x7f0000000100)=0x48, 0x800) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000005fec)={0x0, 0x0, 0x0, 0x100000008}) pkey_mprotect(&(0x7f0000005000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000005fe0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000008000/0x2000)=nil}) socket$packet(0x11, 0x3, 0x300) [ 197.714112] QAT: Invalid ioctl [ 197.722478] QAT: Invalid ioctl [ 198.392276] IPVS: ftp: loaded support on port[0] = 21 [ 198.681334] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 199.095918] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 199.102032] 8021q: adding VLAN 0 to HW filter on device bond0 [ 199.147862] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 199.193092] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 199.199248] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 199.206317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 199.222816] FAULT_INJECTION: forcing a failure. [ 199.222816] name failslab, interval 1, probability 0, space 0, times 0 [ 199.234052] CPU: 1 PID: 24980 Comm: syz-executor6 Not tainted 4.16.0-rc7+ #371 [ 199.241394] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.250728] Call Trace: [ 199.253298] dump_stack+0x194/0x24d [ 199.256907] ? arch_local_irq_restore+0x53/0x53 [ 199.261578] should_fail+0x8c0/0xa40 [ 199.265285] ? kstrdup+0x39/0x70 [ 199.268634] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 199.273712] ? cgroup_mkdir+0x553/0xfc0 [ 199.277664] ? vfs_mkdir+0x390/0x600 [ 199.281353] ? SyS_mkdirat+0x22b/0x2b0 [ 199.285229] ? do_syscall_64+0x281/0x940 [ 199.289266] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 199.294612] ? find_held_lock+0x35/0x1d0 [ 199.298657] ? find_held_lock+0x35/0x1d0 [ 199.302709] ? __lock_is_held+0xb6/0x140 [ 199.306764] ? check_same_owner+0x320/0x320 [ 199.311073] ? rcu_note_context_switch+0x710/0x710 [ 199.315986] ? rcu_read_lock_sched_held+0x108/0x120 [ 199.320988] should_failslab+0xec/0x120 [ 199.324940] kmem_cache_alloc+0x47/0x760 [ 199.329148] ? memcpy+0x45/0x50 [ 199.332405] ? kstrdup+0x59/0x70 [ 199.335752] __kernfs_new_node+0xe2/0x570 [ 199.339877] ? kernfs_dop_revalidate+0x380/0x380 [ 199.344612] ? kasan_check_read+0x11/0x20 [ 199.348735] ? read_word_at_a_time+0x12/0x20 [ 199.353120] ? strscpy+0x186/0x500 [ 199.356648] kernfs_new_node+0x80/0xe0 [ 199.360513] __kernfs_create_file+0x4b/0x320 [ 199.364900] cgroup_addrm_files+0x3c5/0xa70 [ 199.369207] ? cgroup_file_write+0x710/0x710 [ 199.373592] ? __getnstimeofday64+0x317/0x470 [ 199.378066] ? getrawmonotonic64+0x460/0x460 [ 199.382453] ? kernfs_active+0x92/0x160 [ 199.386410] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 199.391313] ? cgroup_kn_set_ugid+0x2c7/0x370 [ 199.395781] ? cgroup_file_name+0x1d0/0x1d0 [ 199.400087] css_populate_dir+0x340/0x420 [ 199.404218] cgroup_mkdir+0x553/0xfc0 [ 199.407992] ? __lock_is_held+0xb6/0x140 [ 199.412042] ? cgroup_destroy_locked+0x750/0x750 [ 199.416772] ? rcu_read_lock_sched_held+0x108/0x120 [ 199.422543] ? kmem_cache_free+0x258/0x2a0 [ 199.426757] ? set_nlink+0xc1/0x160 [ 199.430364] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 199.435268] ? generic_permission+0x105/0x3c0 [ 199.439740] ? cgroup_destroy_locked+0x750/0x750 [ 199.444476] kernfs_iop_mkdir+0x153/0x1e0 [ 199.448602] vfs_mkdir+0x390/0x600 [ 199.452122] SyS_mkdirat+0x22b/0x2b0 [ 199.455814] ? SyS_mknod+0x480/0x480 [ 199.459500] ? trace_hardirqs_on+0xd/0x10 [ 199.463625] ? do_syscall_64+0xb7/0x940 [ 199.467576] ? SyS_mknod+0x480/0x480 [ 199.471265] do_syscall_64+0x281/0x940 [ 199.475125] ? __do_page_fault+0xc90/0xc90 [ 199.479335] ? _raw_spin_unlock_irq+0x27/0x70 [ 199.483807] ? finish_task_switch+0x1c1/0x7e0 [ 199.488278] ? syscall_return_slowpath+0x550/0x550 [ 199.493185] ? syscall_return_slowpath+0x2ac/0x550 [ 199.498090] ? prepare_exit_to_usermode+0x350/0x350 [ 199.503084] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 199.508429] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 199.513253] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 199.518417] RIP: 0033:0x4548b9 [ 199.521994] RSP: 002b:00007f1367e16c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 199.529693] RAX: ffffffffffffffda RBX: 00007f1367e176d4 RCX: 00000000004548b9 [ 199.536935] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 2018/03/30 10:21:12 executing program 7: clone(0x200, &(0x7f0000000100)="f0f7d70fc52207334efb558c957ea5882b23d85fa1659dc13aa7603b45aa407f02117308b1a8697bcf6617a98d145ec63b3cffa3123c2b94a42831af8d9bdb4b03d2954fdaa7e037f2c459a27e42921a924df6c5899ef4dbdb44bffbadd515d6024b7e3450b4ea54c55a229f4d694a292b270018a408b9ed54a0bc1929156ff004c1cf0b1728065c1ae04f4eeb552ff2420005e5ccb9400909127922c4a8e69ffbb96ca5bc95786113ae475b94c2c9a6a235276e2f1b7f01010000000000007a", &(0x7f0000000000), &(0x7f0000f8b000), &(0x7f00000d5000)) mknod(&(0x7f0000cd7000)='./file0\x00', 0x103a, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000340), &(0x7f000027a000)) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000080)={0x4, 0xffffffffffffff9c, 0x1}) bind$unix(r0, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) r1 = syz_open_procfs(0x0, &(0x7f000042cff4)='personality\x00') read(r1, &(0x7f0000f1bf7e)=""/130, 0xfffffdd8) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000240)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x9, 0x18}, 0xc) open$dir(&(0x7f000050bff8)='./file0\x00', 0x0, 0x0) 2018/03/30 10:21:12 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x8000000) r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1, 0x2}) mq_timedreceive(r0, &(0x7f0000000080)=""/10, 0xa, 0x0, 0x0) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r2, 0x5452, &(0x7f0000000280)=0x2) fcntl$setsig(r2, 0xa, 0x12) fcntl$setownex(r2, 0xf, &(0x7f0000704000)={0x0, r1}) recvmsg(r3, &(0x7f0000000040)={&(0x7f0000893ff8)=ANY=[], 0x0, &(0x7f0000000080), 0x0, &(0x7f0000b30000)}, 0x0) prlimit64(r1, 0x2, &(0x7f00000000c0)={0x5, 0x8}, &(0x7f0000000100)) dup2(r2, r3) r4 = gettid() tkill(r4, 0x16) mq_timedsend(r0, &(0x7f000003a000), 0x0, 0x0, &(0x7f000066cff0)={0x0, 0x1c9c380}) 2018/03/30 10:21:12 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000, 0x0, 0x4}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000d80)={r5, 0x0, 0x7, 0xaa5, 0x1, 0x8001}, 0x14) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000dc0)={0xaa, 0x20}) pwrite64(r1, &(0x7f0000000e00)="7437032bd6e223b3a59d10357fc245a11551c76207ed30241886ce0ea1326aeac569322a47e5909770909834b26bf6b04af3b30656cbc3e07c3eed14ee7c472c2d276872498ef33618509e2049213b9664560dc77dd302976456a0392edd116b9816cbca183c77f192c4c3260a385cc483327645104ab9987888488ff6b8e163c2eddc4fc33b9f9ba13abbb021303c8d438d96b2da7c190f9cdc9f2242c2df22ccc63b779747bc9b54e299a407b4150450352ce672efd9fd7565ffb5f410dd66a2061984a92c2ca847eb65e95168372a9e92cc53f27151c36569714d1b2b2b2d26b0e9668aa5042a767ab88ad81f2850cef1", 0xf2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) 2018/03/30 10:21:12 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000040)=""/114, 0x72}, {&(0x7f00000000c0)=""/3, 0x3}, {&(0x7f0000000100)=""/184, 0xb8}, {&(0x7f00000001c0)=""/22, 0x16}], 0x4, 0x0) r1 = syz_open_dev$dspn(&(0x7f000000bff6)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r1, 0x800000c0045006, &(0x7f0000595ff8)=0x3) writev(r1, &(0x7f0000001140)=[{&(0x7f0000001040)='2', 0x1}], 0x1) mmap$binder(&(0x7f00004be000/0x1000)=nil, 0x1000, 0x100000f, 0x52, r1, 0x0) close(r1) 2018/03/30 10:21:12 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0xaf01, &(0x7f0000307000)=&(0x7f0000989fff)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000002c0)=ANY=[]) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f00000002c0)=r1) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000df5fd8)={0x0, 0x1, &(0x7f0000000200)=""/105, &(0x7f0000bf6000)=""/228, &(0x7f0000000080)=""/199}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000cef000)={0x1, 0x0, &(0x7f000062a000)=""/167, &(0x7f0000aac000)=""/21, &(0x7f00002fdf52)=""/174}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000f82ffc)=0x4001) setuid(0x0) 2018/03/30 10:21:12 executing program 6 (fault-call:3 fault-nth:13): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r0, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r0, &(0x7f0000000100)=""/65, 0x41) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) linkat(r0, &(0x7f0000000480)='./file1\x00', r1, &(0x7f00000004c0)='./file0\x00', 0x1000) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') unlink(&(0x7f00000000c0)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r0, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x12021) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000340)={0x8, 0x9, 0x4, 0x10000, 0x1, 0x7, 0x7fffffff, 0x0, 0x29, 0x0, 0x20}, 0xb) 2018/03/30 10:21:12 executing program 3: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x8, 0xc0080) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r1, 0xc008ae05, &(0x7f0000000200)=""/233) eventfd2(0xffffffffffffffa6, 0x80001) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000536ff7)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = eventfd2(0x0, 0x0) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000000c0)={0x0, &(0x7f000002d000), 0x0, r4}) dup3(r2, r3, 0x0) 2018/03/30 10:21:12 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="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", 0xfc}], 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x200900, 0x103) connect$vsock_stream(r1, &(0x7f0000000600)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) r2 = socket$alg(0x26, 0x5, 0x0) rt_sigtimedwait(&(0x7f0000000140)={0xffffffff}, 0x0, &(0x7f0000000180), 0x8) bind$alg(r2, &(0x7f000073e000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(cbc-twofish-avx)\x00'}, 0x58) nanosleep(&(0x7f0000d1e000)={0x0, 0x1c9c380}, &(0x7f0000000000)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r3, 0x118, 0x0, &(0x7f0000000100)=0x7, 0x4) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000000c0)={0x1, 0x1, 0x1, 0x1, 0x0, 0x6}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000280)={r4, @in={{0x2, 0x4e23, @multicast2=0xe0000002}}, [0x8000, 0x9, 0x80000000, 0x3, 0x80, 0x8001, 0x800, 0x100, 0xe0db, 0x0, 0x2000000000, 0x200, 0x68, 0x0, 0x8]}, &(0x7f0000000380)=0x100) r5 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0xfffffffffffffdfa) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r5, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port1\x00', 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r5, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r6 = gettid() r7 = syz_open_procfs(r6, &(0x7f00000002c0)='maps\x00') readv(r7, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/28, 0x65}], 0x1) exit(0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r7, &(0x7f000004ffe0)=[{&(0x7f0000000000)=""/128, 0xe6}], 0x222) r8 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) connect$ax25(r3, &(0x7f00000006c0)={0x3, {"fc5da504005009"}, 0x7fff}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) getsockopt$netrom_NETROM_T1(r8, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r5, 0x80045301, &(0x7f0000000700)) [ 199.544188] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 199.551431] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 199.558674] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 000000000000000c [ 199.566095] cgroup: cgroup_addrm_files: failed to add cgroup.threads, err=-12 2018/03/30 10:21:12 executing program 6 (fault-call:3 fault-nth:14): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r0, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r0, &(0x7f0000000100)=""/65, 0x41) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) linkat(r0, &(0x7f0000000480)='./file1\x00', r1, &(0x7f00000004c0)='./file0\x00', 0x1000) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') unlink(&(0x7f00000000c0)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r0, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x12021) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000340)={0x8, 0x9, 0x4, 0x10000, 0x1, 0x7, 0x7fffffff, 0x0, 0x29, 0x0, 0x20}, 0xb) 2018/03/30 10:21:12 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000, 0x0, 0x4}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000d80)={r5, 0x13c, 0x0, 0xaa5, 0x1, 0x8001}, 0x14) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000dc0)={0xaa, 0x20}) pwrite64(r1, &(0x7f0000000e00)="7437032bd6e223b3a59d10357fc245a11551c76207ed30241886ce0ea1326aeac569322a47e5909770909834b26bf6b04af3b30656cbc3e07c3eed14ee7c472c2d276872498ef33618509e2049213b9664560dc77dd302976456a0392edd116b9816cbca183c77f192c4c3260a385cc483327645104ab9987888488ff6b8e163c2eddc4fc33b9f9ba13abbb021303c8d438d96b2da7c190f9cdc9f2242c2df22ccc63b779747bc9b54e299a407b4150450352ce672efd9fd7565ffb5f410dd66a2061984a92c2ca847eb65e95168372a9e92cc53f27151c36569714d1b2b2b2d26b0e9668aa5042a767ab88ad81f2850cef1", 0xf2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) 2018/03/30 10:21:12 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000f6bfe8)={0xaa}) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x24001, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000080)={0x1ff, 0x9, 0x200, 0x0, 0x0, [], [], [], 0x3, 0x7fff}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f000072f000)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x800000}, 0x8000}) [ 199.690852] mmap: syz-executor5 (24986): VmData 18841600 exceed data ulimit 5. Update limits or use boot option ignore_rlimit_data. 2018/03/30 10:21:12 executing program 7: clone(0x200, &(0x7f0000000100)="f0f7d70fc52207334efb558c957ea5882b23d85fa1659dc13aa7603b45aa407f02117308b1a8697bcf6617a98d145ec63b3cffa3123c2b94a42831af8d9bdb4b03d2954fdaa7e037f2c459a27e42921a924df6c5899ef4dbdb44bffbadd515d6024b7e3450b4ea54c55a229f4d694a292b270018a408b9ed54a0bc1929156ff004c1cf0b1728065c1ae04f4eeb552ff2420005e5ccb9400909127922c4a8e69ffbb96ca5bc95786113ae475b94c2c9a6a235276e2f1b7f01010000000000007a", &(0x7f0000000000), &(0x7f0000f8b000), &(0x7f00000d5000)) mknod(&(0x7f0000cd7000)='./file0\x00', 0x103a, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000340), &(0x7f000027a000)) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000080)={0x4, 0xffffffffffffff9c, 0x1}) bind$unix(r0, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) r1 = syz_open_procfs(0x0, &(0x7f000042cff4)='personality\x00') read(r1, &(0x7f0000f1bf7e)=""/130, 0xfffffdd8) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000240)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x9, 0x18}, 0xc) open$dir(&(0x7f000050bff8)='./file0\x00', 0x0, 0x0) 2018/03/30 10:21:12 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x60900, 0x0) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f00000000c0)={0xfe, 0x1, 0x8}) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000180)=0x2, 0x400000085, 0x0, &(0x7f0000004000), &(0x7f0000000100), 0xfffffffffffffffc) modify_ldt$write2(0x11, &(0x7f0000000040)={0x4, 0x20001000, 0xffffffff, 0x2, 0x8, 0x0, 0x20, 0x9, 0xfffffffffffff801, 0x80}, 0x10) 2018/03/30 10:21:12 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer\x00', 0x88001, 0x0) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000280)) bind$inet6(0xffffffffffffffff, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) ioctl$TIOCSCTTY(r0, 0x540e, 0x6) listen(0xffffffffffffffff, 0x40401) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f000078dffc), 0x4) accept4(0xffffffffffffffff, &(0x7f0000c71ff0)=ANY=[], &(0x7f0000f5effc), 0x0) write(r1, &(0x7f0000001780)="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", 0xb31) r2 = eventfd2(0x80000002, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x1) connect$unix(r0, &(0x7f0000000d00)=@abs={0x1, 0x0, 0x4e23}, 0x6e) write$eventfd(r2, &(0x7f0000000000)=0xfffffffffffffffd, 0x8) readv(r2, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/78, 0x4e}], 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc4c85513, &(0x7f00000002c0)={{0x25f9, 0x0, 0x841, 0x0, "e6ef60e57779a91d82096d4720e62810ebd743ca01466ef153e0da1e969c1be82429744d3c91e753eb2ec157"}, 0x2, [0x9668, 0x7, 0x0, 0x50, 0x7, 0x0, 0x0, 0x3f, 0x80, 0x10001, 0x80000000, 0x0, 0xffffffffffffa55f, 0x20, 0x2, 0x0, 0x800, 0x0, 0x0, 0x2, 0x6, 0x6, 0x0, 0x200, 0x0, 0x3, 0x800, 0x100000000, 0x2fe2, 0x8001, 0x7ff, 0x400, 0x306b, 0x3, 0x8, 0x2, 0xffffffffffffffff, 0x5, 0x9614, 0x2, 0x0, 0x7, 0x5, 0x5, 0x1, 0x1, 0xfb3, 0x0, 0x4, 0x80000001, 0x1, 0x4, 0x7, 0x20, 0x2, 0x8, 0x3f, 0x7ff, 0x200, 0x7, 0xc2f5, 0x8001, 0x7fff, 0x10001, 0xfffffffffffffffc, 0x8001, 0x200, 0x9, 0x3, 0x3f, 0xff, 0x1f, 0xb7f0, 0x3, 0x400, 0x4, 0x5, 0x4, 0x7fffffff, 0x20, 0x8, 0x0, 0x8, 0x4, 0xeb, 0x9, 0x20, 0x40, 0x7ff, 0x4, 0x80, 0x4, 0x3, 0x0, 0xffffffffffffffe1, 0x7, 0x7f, 0x2, 0x2, 0x3be, 0x0, 0x4, 0x7a98, 0x9, 0x3, 0x6, 0x80000000, 0x9, 0xfff, 0x8, 0x1000, 0x7f, 0x1ff, 0x0, 0x5, 0x0, 0x5, 0xdab3, 0x80000000, 0x1, 0x7, 0x0, 0x8001, 0x9, 0x8001, 0x5b2f, 0x1, 0x7]}) socket$inet_tcp(0x2, 0x1, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x80000, 0x20) sysfs$3(0x3) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x40000, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@text64={0x40, &(0x7f0000000100)="acb94a060000b800800000ba000000000f30430f092e640f3566baf80cb8761d818eef66bafc0cb064eec7442400b8000000c744240210500000c7442406000000000f011c240f4f3b0fba7780a8c4217e16b800380000660f388157b7", 0x5d}], 0x1, 0x28, &(0x7f0000000200), 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x1fffc, 0x0) r5 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000decfe0)={0x10007, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SMI(r6, 0xaeb7) ioctl$KVM_RUN(r6, 0xae80, 0x0) 2018/03/30 10:21:12 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x24000, 0x0) ioctl$KVM_SET_XCRS(r0, 0x4188aea7, &(0x7f0000000040)={0x1, 0x8, [{0x10000, 0x0, 0x5}]}) ioctl$KVM_SET_XCRS(r0, 0x4188aea7, &(0x7f0000000080)={0x4, 0xa243, [{0x37aa, 0x0, 0x9}, {0x3f, 0x0, 0x5}, {0x67, 0x0, 0xffffffffffffffff}, {0x3, 0x0, 0x7}]}) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000100)='sit0\x00') ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r0, 0xc0405519, &(0x7f0000000140)={0xffff, 0x4, 0x0, 0xa5cd, "f1fd7cdb2ac0d87c76a7d9d520a66089286973ca812a569cc2c9e3e1810d8759f720a2dc649bc7071ef60499", 0xfff}) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000180)=@assoc_value={0x0}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000200)={r1, 0x2}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000280)={r2, 0x1ad}, 0x8) getcwd(&(0x7f00000002c0)=""/42, 0x2a) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000300)=0x0) setpriority(0x0, r3, 0xffffffffffff0001) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000340)={0x0, 0x1, 0x28}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000380)=0xfffffffffffffeff, 0x4) openat$vsock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000400), &(0x7f0000000440)=0x4) r4 = socket$l2tp(0x18, 0x1, 0x1) ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, 0x2061) getsockname$netlink(r0, &(0x7f0000000480), &(0x7f00000004c0)=0xc) ioctl$sock_SIOCSPGRP(r4, 0x8902, &(0x7f0000000500)=r3) ioctl$KVM_SET_VCPU_EVENTS(r0, 0x4040aea0, &(0x7f0000000540)={0x7, 0x23, 0x5, 0x0, 0xfffffffffffffff8, 0x3, 0x557, 0x4, 0x2, 0x800, 0x2, 0x1ff, 0x0, 0x1, 0xfffffffffffffff7, 0x80000000, 0x8000, 0x4fa3, 0x3ff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000580)) r5 = openat(r0, &(0x7f00000005c0)='./file0\x00', 0x2080, 0x1) openat(r0, &(0x7f0000000600)='./file0\x00', 0x40840, 0x2) getsockopt$EBT_SO_GET_INFO(r5, 0x0, 0x80, &(0x7f0000000640)={'filter\x00'}, &(0x7f00000006c0)=0x78) prctl$setfpexc(0xc, 0x1) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r3, 0xffffffffffffffc1, &(0x7f0000000700)=""/83) setsockopt$IP_VS_SO_SET_DELDEST(r5, 0x0, 0x488, &(0x7f0000000780)={{0x0, @rand_addr=0x6, 0x4e20, 0x0, 'ovf\x00', 0x30, 0x2, 0x2a}, {@local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x1, 0x9, 0x40, 0xae3}}, 0x44) ioctl$ASHMEM_GET_SIZE(r0, 0x7704, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000800), &(0x7f0000000840)=0x30) 2018/03/30 10:21:12 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000, 0x0, 0x4}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000d80)={r5, 0x13c, 0x0, 0xaa5, 0x1, 0x8001}, 0x14) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000dc0)={0xaa, 0x20}) pwrite64(r1, &(0x7f0000000e00)="7437032bd6e223b3a59d10357fc245a11551c76207ed30241886ce0ea1326aeac569322a47e5909770909834b26bf6b04af3b30656cbc3e07c3eed14ee7c472c2d276872498ef33618509e2049213b9664560dc77dd302976456a0392edd116b9816cbca183c77f192c4c3260a385cc483327645104ab9987888488ff6b8e163c2eddc4fc33b9f9ba13abbb021303c8d438d96b2da7c190f9cdc9f2242c2df22ccc63b779747bc9b54e299a407b4150450352ce672efd9fd7565ffb5f410dd66a2061984a92c2ca847eb65e95168372a9e92cc53f27151c36569714d1b2b2b2d26b0e9668aa5042a767ab88ad81f2850cef1", 0xf2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) 2018/03/30 10:21:12 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="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", 0xfc}], 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x200900, 0x103) connect$vsock_stream(r1, &(0x7f0000000600)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) r2 = socket$alg(0x26, 0x5, 0x0) rt_sigtimedwait(&(0x7f0000000140)={0xffffffff}, 0x0, &(0x7f0000000180), 0x8) bind$alg(r2, &(0x7f000073e000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(cbc-twofish-avx)\x00'}, 0x58) nanosleep(&(0x7f0000d1e000)={0x0, 0x1c9c380}, &(0x7f0000000000)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r3, 0x118, 0x0, &(0x7f0000000100)=0x7, 0x4) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000000c0)={0x1, 0x1, 0x1, 0x1, 0x0, 0x6}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000280)={r4, @in={{0x2, 0x4e23, @multicast2=0xe0000002}}, [0x8000, 0x9, 0x80000000, 0x3, 0x80, 0x8001, 0x800, 0x100, 0xe0db, 0x0, 0x2000000000, 0x200, 0x68, 0x0, 0x8]}, &(0x7f0000000380)=0x100) r5 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0xfffffffffffffdfa) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r5, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port1\x00', 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r5, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r6 = gettid() r7 = syz_open_procfs(r6, &(0x7f00000002c0)='maps\x00') readv(r7, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/28, 0x65}], 0x1) exit(0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r7, &(0x7f000004ffe0)=[{&(0x7f0000000000)=""/128, 0xe6}], 0x222) r8 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) connect$ax25(r3, &(0x7f00000006c0)={0x3, {"fc5da504005009"}, 0x7fff}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) getsockopt$netrom_NETROM_T1(r8, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r5, 0x80045301, &(0x7f0000000700)) [ 199.816610] futex_wake_op: syz-executor3 tries to shift op by -1; fix this program 2018/03/30 10:21:12 executing program 0: unshare(0x20000) r0 = syz_open_procfs(0x0, &(0x7f0000044000)='ns/mnt\x00') set_mempolicy(0x8003, &(0x7f00000000c0)=0x81, 0x93c) setns(r0, 0x80000000) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0xfff) openat$cgroup_type(r0, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) unshare(0x20000400) clone(0x30020100, &(0x7f00002c9000), &(0x7f0000d70ffc), &(0x7f00001cc000), &(0x7f0000154000)) 2018/03/30 10:21:12 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000005480)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000340)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f00000054c0)) close(r1) mkdir(&(0x7f000082f000)='./control\x00', 0x0) r2 = creat(&(0x7f0000000080)='./control/file0\x00', 0x1) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000001fc0)={0xaa, 0x21}) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000000140)={0xaa}) creat(&(0x7f00000000c0)='./file1\x00', 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f000078dff8)='./file0\x00', 0x0) write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000001e80)=ANY=[@ANYBLOB="00000000a7430fce3881f9378bf38a194a4bd8db8c80941255e9431148aeea6a83f5daad934d6a739321fc3781dbc0ef3624840eafc02dd0b8dc9f3d2246f619de79df4c0e9fdf102151a846943ec5013fe22740c19e3393df5547f9062cbed6d0807c83534c93b861772871ac23feab146bf4aad67408d7708e874973f1b77ab1ce86c09d218b2a7100963fc16aa9e7ac1e65ef7227ba0a1203fd609955b647befde5d85240b9a7bae2541ae0bc9aa7c8f8e6b8d5723cf66384f0a0c040c73cfaa8", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000001480)=0x18) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000014c0)={0x2, 0x7f, 0x4, 0x4, 0x8001, 0x3, 0x6, 0x800, r5}, &(0x7f0000001500)=0x20) rename(&(0x7f0000000040)='./control/file0\x00', &(0x7f0000000000)='./file0\x00') rename(&(0x7f0000000200)='./file1\x00', &(0x7f00000001c0)='./file0\x00') stat(&(0x7f0000000180)='./control\x00', &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_fuse_mount(&(0x7f0000000100)='./file1\x00', 0xa000, 0x0, r6, 0x10000, 0x2020) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000005440)) recvmmsg(0xffffffffffffffff, &(0x7f0000005340)=[{{&(0x7f00000001c0)=@can, 0x80, &(0x7f0000000280), 0x0, &(0x7f0000000380)=""/4096, 0x1000}, 0x4}, {{&(0x7f00000002c0)=@ethernet, 0x80, &(0x7f0000001700)=[{&(0x7f0000001380)=""/188, 0xbc}, {&(0x7f0000001580)=""/233, 0xe9}, {&(0x7f0000001680)=""/102, 0x66}, {&(0x7f0000002000)=""/4096, 0x1000}], 0x4, &(0x7f0000001740)=""/238, 0xee}, 0x1f}, {{&(0x7f0000001840)=@rc, 0x80, &(0x7f0000001940)=[{&(0x7f00000018c0)=""/6, 0x6}, {&(0x7f0000001900)=""/50, 0x32}], 0x2, &(0x7f0000001980)=""/113, 0x71, 0xe000000}, 0x1}, {{&(0x7f0000001a00)=@pppoe={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000001ac0), 0x0, &(0x7f0000001b00)=""/95, 0x5f}, 0x7f}, {{&(0x7f0000001b80)=@ipx, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000001c00)=""/151, 0x97}], 0x1, &(0x7f0000003000)=""/4096, 0x1000, 0x1}, 0x6}, {{0x0, 0x0, &(0x7f0000005240)=[{&(0x7f0000001d00)=""/250, 0xfa}, {&(0x7f0000001e00)=""/69, 0x45}, {&(0x7f0000004000)=""/94, 0x5e}, {&(0x7f0000004080)=""/115, 0x73}, {&(0x7f0000001f80)=""/26, 0x1a}, {&(0x7f0000004140)=""/4096, 0x1000}, {&(0x7f00000051c0)=""/104, 0x68}], 0x7, &(0x7f00000052c0)=""/71, 0x47}}], 0x6, 0x2, &(0x7f0000005400)={0x77359400}) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000b0a000)='/dev/kvm\x00', 0x0, 0x0) r8 = ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r8, 0x4010ae67, &(0x7f00000001c0)={0x7000, 0x104000}) r9 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/qat_adf_ctl\x00', 0x18000, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r9, 0xc008551a, &(0x7f0000001540)=ANY=[@ANYBLOB="090000000500000006000000740000000800000009000000faffffff6e971761"]) getsockopt$bt_BT_POWER(r9, 0x112, 0x9, &(0x7f0000000240)=0x8, &(0x7f0000000280)=0x1) 2018/03/30 10:21:12 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000, 0x0, 0x4}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000d80)={r5, 0x13c, 0x0, 0xaa5, 0x1, 0x8001}, 0x14) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000dc0)={0xaa, 0x20}) pwrite64(r1, &(0x7f0000000e00)="7437032bd6e223b3a59d10357fc245a11551c76207ed30241886ce0ea1326aeac569322a47e5909770909834b26bf6b04af3b30656cbc3e07c3eed14ee7c472c2d276872498ef33618509e2049213b9664560dc77dd302976456a0392edd116b9816cbca183c77f192c4c3260a385cc483327645104ab9987888488ff6b8e163c2eddc4fc33b9f9ba13abbb021303c8d438d96b2da7c190f9cdc9f2242c2df22ccc63b779747bc9b54e299a407b4150450352ce672efd9fd7565ffb5f410dd66a2061984a92c2ca847eb65e95168372a9e92cc53f27151c36569714d1b2b2b2d26b0e9668aa5042a767ab88ad81f2850cef1", 0xf2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) [ 199.875197] futex_wake_op: syz-executor3 tries to shift op by -1; fix this program [ 199.903209] bond0 (unregistering): Released all slaves [ 200.659822] IPVS: ftp: loaded support on port[0] = 21 [ 200.950880] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 201.380800] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 201.386904] 8021q: adding VLAN 0 to HW filter on device bond0 [ 201.432114] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 201.475918] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 201.482105] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 201.489532] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 201.506116] FAULT_INJECTION: forcing a failure. [ 201.506116] name failslab, interval 1, probability 0, space 0, times 0 [ 201.517364] CPU: 0 PID: 25219 Comm: syz-executor6 Not tainted 4.16.0-rc7+ #371 [ 201.524726] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.534064] Call Trace: [ 201.536640] dump_stack+0x194/0x24d [ 201.540256] ? arch_local_irq_restore+0x53/0x53 [ 201.544913] should_fail+0x8c0/0xa40 [ 201.548611] ? kstrdup+0x39/0x70 [ 201.551961] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 201.557041] ? cgroup_mkdir+0x553/0xfc0 [ 201.560988] ? vfs_mkdir+0x390/0x600 [ 201.564676] ? SyS_mkdirat+0x22b/0x2b0 [ 201.568538] ? do_syscall_64+0x281/0x940 [ 201.572572] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 201.577917] ? find_held_lock+0x35/0x1d0 [ 201.581960] ? find_held_lock+0x35/0x1d0 [ 201.586005] ? __lock_is_held+0xb6/0x140 [ 201.590059] ? check_same_owner+0x320/0x320 [ 201.594357] ? rcu_note_context_switch+0x710/0x710 [ 201.599260] ? rcu_read_lock_sched_held+0x108/0x120 [ 201.604346] should_failslab+0xec/0x120 [ 201.608299] kmem_cache_alloc+0x47/0x760 [ 201.612334] ? memcpy+0x45/0x50 [ 201.615591] ? kstrdup+0x59/0x70 [ 201.618941] __kernfs_new_node+0xe2/0x570 [ 201.623064] ? kernfs_dop_revalidate+0x380/0x380 [ 201.627797] ? kasan_check_read+0x11/0x20 [ 201.631922] ? read_word_at_a_time+0x12/0x20 [ 201.636305] ? strscpy+0x186/0x500 [ 201.639832] kernfs_new_node+0x80/0xe0 [ 201.643697] __kernfs_create_file+0x4b/0x320 [ 201.648087] cgroup_addrm_files+0x3c5/0xa70 [ 201.652397] ? cgroup_file_write+0x710/0x710 [ 201.656791] ? getrawmonotonic64+0x460/0x460 [ 201.661180] ? kernfs_active+0x92/0x160 [ 201.665137] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 201.670127] ? cgroup_kn_set_ugid+0x2c7/0x370 [ 201.674599] ? cgroup_file_name+0x1d0/0x1d0 [ 201.678908] css_populate_dir+0x340/0x420 [ 201.683042] cgroup_mkdir+0x553/0xfc0 [ 201.686821] ? __lock_is_held+0xb6/0x140 [ 201.691552] ? cgroup_destroy_locked+0x750/0x750 [ 201.696291] ? rcu_read_lock_sched_held+0x108/0x120 [ 201.701290] ? kmem_cache_free+0x258/0x2a0 [ 201.705507] ? set_nlink+0xc1/0x160 [ 201.709116] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 201.714031] ? generic_permission+0x105/0x3c0 [ 201.718521] ? cgroup_destroy_locked+0x750/0x750 [ 201.723263] kernfs_iop_mkdir+0x153/0x1e0 [ 201.727399] vfs_mkdir+0x390/0x600 [ 201.730926] SyS_mkdirat+0x22b/0x2b0 [ 201.734624] ? SyS_mknod+0x480/0x480 [ 201.738316] ? trace_hardirqs_on+0xd/0x10 [ 201.742451] ? do_syscall_64+0xb7/0x940 [ 201.746412] ? SyS_mknod+0x480/0x480 [ 201.750104] do_syscall_64+0x281/0x940 [ 201.754178] ? __do_page_fault+0xc90/0xc90 [ 201.758395] ? _raw_spin_unlock_irq+0x27/0x70 [ 201.762880] ? finish_task_switch+0x1c1/0x7e0 [ 201.767378] ? syscall_return_slowpath+0x550/0x550 [ 201.772292] ? syscall_return_slowpath+0x2ac/0x550 [ 201.777204] ? prepare_exit_to_usermode+0x350/0x350 [ 201.782237] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 201.787596] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 201.792427] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 201.797591] RIP: 0033:0x4548b9 [ 201.800757] RSP: 002b:00007f50d37d5c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 201.808440] RAX: ffffffffffffffda RBX: 00007f50d37d66d4 RCX: 00000000004548b9 [ 201.815684] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 2018/03/30 10:21:14 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="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", 0xfc}], 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x200900, 0x103) connect$vsock_stream(r1, &(0x7f0000000600)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) socket$alg(0x26, 0x5, 0x0) rt_sigtimedwait(&(0x7f0000000140)={0xffffffff}, 0x0, &(0x7f0000000180), 0x8) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000500)={&(0x7f00000005c0)=[0x0, 0x0, 0x0], 0x3}) nanosleep(&(0x7f0000d1e000)={0x0, 0x1c9c380}, &(0x7f0000000000)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r2, 0x118, 0x0, &(0x7f0000000100)=0x7, 0x4) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000000c0)={0x1, 0x1, 0x1, 0x1, 0x0, 0x6}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000280)={r3, @in={{0x2, 0x4e23, @multicast2=0xe0000002}}, [0x8000, 0x9, 0x80000000, 0x3, 0x80, 0x8001, 0x800, 0x100, 0xe0db, 0x0, 0x2000000000, 0x200, 0x68, 0x0, 0x8]}, &(0x7f0000000380)=0x100) r4 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0xfffffffffffffdfa) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port1\x00', 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r4, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r5 = gettid() r6 = syz_open_procfs(r5, &(0x7f00000002c0)='maps\x00') readv(r6, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/28, 0x65}], 0x1) exit(0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r6, &(0x7f000004ffe0)=[{&(0x7f0000000000)=""/128, 0xe6}], 0x222) r7 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) connect$ax25(r2, &(0x7f00000006c0)={0x3, {"fc5da504005009"}, 0x7fff}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) getsockopt$netrom_NETROM_T1(r7, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r4, 0x80045301, &(0x7f0000000700)) 2018/03/30 10:21:14 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000, 0x0, 0x4}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000d80)={r5, 0x13c, 0x7, 0x0, 0x1, 0x8001}, 0x14) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000dc0)={0xaa, 0x20}) pwrite64(r1, &(0x7f0000000e00)="7437032bd6e223b3a59d10357fc245a11551c76207ed30241886ce0ea1326aeac569322a47e5909770909834b26bf6b04af3b30656cbc3e07c3eed14ee7c472c2d276872498ef33618509e2049213b9664560dc77dd302976456a0392edd116b9816cbca183c77f192c4c3260a385cc483327645104ab9987888488ff6b8e163c2eddc4fc33b9f9ba13abbb021303c8d438d96b2da7c190f9cdc9f2242c2df22ccc63b779747bc9b54e299a407b4150450352ce672efd9fd7565ffb5f410dd66a2061984a92c2ca847eb65e95168372a9e92cc53f27151c36569714d1b2b2b2d26b0e9668aa5042a767ab88ad81f2850cef1", 0xf2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) 2018/03/30 10:21:14 executing program 0: msgget$private(0x0, 0x0) msgget(0x0, 0x400) msgget(0x3, 0x286) msgget$private(0x0, 0x101) msgget$private(0x0, 0x508) msgget$private(0x0, 0x80) msgget(0x2, 0x1) r0 = getpgid(0x0) ptrace$peek(0x1, r0, &(0x7f0000000000)) r1 = msgget(0x0, 0x40) msgctl$IPC_RMID(r1, 0x4) 2018/03/30 10:21:14 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000017000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd2(0x0, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000080)={r2}) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x10000, 0x0) ioctl$TCSBRKP(r3, 0x5425, 0xfffffffffffffffa) ioctl$sock_inet_SIOCSIFPFLAGS(r3, 0x8934, &(0x7f0000000000)={'vlan0\x00', 0x2}) setsockopt$inet6_dccp_buf(r3, 0x21, 0x0, &(0x7f0000001480)="dfabb57eb1a7d42ec5a8026d862cd3516999f825c5ad5535c3596645bd810ecb6b5129778ecb530c4ef42d1d96ad402ac246b0504f106a8979f934e90952c45bf7751fb1295787a961917b285a47162c775d6873d876614f16a71b3338b044f667b75ce73a271cfcfdc55649877ef90f2200d3ec9f664599c2d2b265ec955d2fb6d3cfdd6672f96571a8d80e053437cb605ea1e2d2da5c8e", 0x98) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$llc_int(r3, 0x10c, 0x7, &(0x7f0000001540), &(0x7f0000001580)=0x4) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x81, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x800, 0x0) ioctl$KVM_GET_IRQCHIP(r3, 0xc208ae62, &(0x7f0000001340)=@ioapic) ioctl$VHOST_SET_VRING_CALL(r5, 0x4008af21, &(0x7f0000000040)={0x69e4dea11cfd8fb2}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000358fe0)={r2, 0x0, 0x2, r2}) mkdirat$cgroup(r5, &(0x7f00000000c0)='syz1\x00', 0x1ff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000001280)=0x2) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f00000012c0)={0x3, 0x337e, 0x2, 0x9, 0x3, 0x2, 0x4, 0x7fff, r6}, &(0x7f0000001300)=0x20) ppoll(&(0x7f0000000100)=[{r0, 0x2}, {r2, 0x20}, {r0, 0x1}, {r0, 0x8002}], 0x4, &(0x7f0000000140)={0x0, 0x1c9c380}, &(0x7f0000000180)={0x7f}, 0x8) 2018/03/30 10:21:14 executing program 6 (fault-call:3 fault-nth:15): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r0, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r0, &(0x7f0000000100)=""/65, 0x41) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) linkat(r0, &(0x7f0000000480)='./file1\x00', r1, &(0x7f00000004c0)='./file0\x00', 0x1000) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') unlink(&(0x7f00000000c0)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r0, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x12021) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000340)={0x8, 0x9, 0x4, 0x10000, 0x1, 0x7, 0x7fffffff, 0x0, 0x29, 0x0, 0x20}, 0xb) 2018/03/30 10:21:14 executing program 7 (fault-call:7 fault-nth:0): clone(0x200, &(0x7f0000000100)="f0f7d70fc52207334efb558c957ea5882b23d85fa1659dc13aa7603b45aa407f02117308b1a8697bcf6617a98d145ec63b3cffa3123c2b94a42831af8d9bdb4b03d2954fdaa7e037f2c459a27e42921a924df6c5899ef4dbdb44bffbadd515d6024b7e3450b4ea54c55a229f4d694a292b270018a408b9ed54a0bc1929156ff004c1cf0b1728065c1ae04f4eeb552ff2420005e5ccb9400909127922c4a8e69ffbb96ca5bc95786113ae475b94c2c9a6a235276e2f1b7f01010000000000007a", &(0x7f0000000000), &(0x7f0000f8b000), &(0x7f00000d5000)) mknod(&(0x7f0000cd7000)='./file0\x00', 0x103a, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000340), &(0x7f000027a000)) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000080)={0x4, 0xffffffffffffff9c, 0x1}) bind$unix(r0, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) r1 = syz_open_procfs(0x0, &(0x7f000042cff4)='personality\x00') read(r1, &(0x7f0000f1bf7e)=""/130, 0xfffffdd8) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000240)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x9, 0x18}, 0xc) open$dir(&(0x7f000050bff8)='./file0\x00', 0x2, 0x0) 2018/03/30 10:21:14 executing program 3: mkdir(&(0x7f0000cb3ff8)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chroot(&(0x7f000009a000)='./file0\x00') mount(&(0x7f00005b9ff8)='./file0\x00', &(0x7f0000edaff8)='./file0\x00', &(0x7f0000d9fffa)='msdos\x00', 0x1002, 0x0) pipe(&(0x7f00000000c0)) chdir(&(0x7f0000cd2ff8)='./file0\x00') umount2(&(0x7f0000000140)='..', 0x2) symlink(&(0x7f0000ed6ffe)='..', &(0x7f0000000040)='../file0\x00') umount2(&(0x7f0000000080)='../file0\x00', 0x0) 2018/03/30 10:21:14 executing program 1: socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f00000004c0)=""/4096, &(0x7f0000000100)=0x1000) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/arp\x00') r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x2004) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000140)={'syzkaller0\x00', 0xb}) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @broadcast=0xffffffff}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x8, {0x2, 0x0, @rand_addr}, 'syzkaller0\x00'}) pread64(r1, &(0x7f0000000040)=""/8, 0x8, 0x1ffff) r4 = semget(0x0, 0x3, 0xc8) semctl$GETNCNT(r4, 0x4, 0xe, &(0x7f0000000180)=""/67) writev(0xffffffffffffffff, &(0x7f0000000400), 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, &(0x7f0000000440), &(0x7f0000000480)=0x4) [ 201.822926] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 201.830168] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 201.837420] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 000000000000000e [ 201.845183] cgroup: cgroup_addrm_files: failed to add cgroup.controllers, err=-12 2018/03/30 10:21:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xc) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)=0x0) r3 = add_key(&(0x7f0000000200)='cifs.idmap\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000280)="b17ecf4ea33c2fb33162175c2a2906150948a6604e73bb20f3619a6b34a6e4e085a3ba4c3096674c9e672d38eb7840e54c1f27652c9e98de28ff847a2462cb3085f35077bac43be69a18c5b34c5c869a7342f75ac607db1ed86f081525a6cf7d528812404b85c95cad66c1fa18b2b43a9791da721379e07d77cfc4e9bcaca1e0f0a2540f85db3f712f900a3a34e019ecf4d68a20520b63698b2e681257cc22b031e56c5234a6ade62cffd3f0b3186c97be9c55f858eb2dfa861cd8b5492ee00cced04cca30c124edce40dc962fff39e3be48e27cc009e5b641be5f44fc23d2736ee5fd66b60a81d79e88b45a13caf209ba4a", 0xf2, 0x0) keyctl$describe(0x6, r3, &(0x7f0000000380)=""/84, 0x54) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x8001, 0x80000001, 0x5, 0x2, 0x0, 0x7, 0x90000, 0x4, 0x80, 0x7, 0x4, 0x5, 0xff7, 0x0, 0x3ff, 0x4, 0x4, 0x6c7, 0x2, 0xfff, 0x0, 0x7ff, 0x4f, 0x0, 0x400, 0x7c, 0x5, 0x1, 0x7, 0xfbb8, 0xfffffffffffffff7, 0x8247, 0x101, 0x80000000, 0x3, 0x1, 0x0, 0x100, 0x2, @perf_config_ext={0x81, 0x100000001}, 0x0, 0x2, 0x7c, 0x1, 0x4, 0x3f}, r2, 0xf, r1, 0x8) write(r0, &(0x7f0000000080)="1f00000010000900040000000000e7fb0300000408000200000004ad06ffef", 0x1f) syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x5bfd, 0xa00) r4 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r4, 0xc0105303, &(0x7f0000000180)={0x0, 0x0, 0x2}) 2018/03/30 10:21:14 executing program 7: clone(0x200, &(0x7f0000000100)="f0f7d70fc52207334efb558c957ea5882b23d85fa1659dc13aa7603b45aa407f02117308b1a8697bcf6617a98d145ec63b3cffa3123c2b94a42831af8d9bdb4b03d2954fdaa7e037f2c459a27e42921a924df6c5899ef4dbdb44bffbadd515d6024b7e3450b4ea54c55a229f4d694a292b270018a408b9ed54a0bc1929156ff004c1cf0b1728065c1ae04f4eeb552ff2420005e5ccb9400909127922c4a8e69ffbb96ca5bc95786113ae475b94c2c9a6a235276e2f1b7f01010000000000007a", &(0x7f0000000000), &(0x7f0000f8b000), &(0x7f00000d5000)) mknod(&(0x7f0000cd7000)='./file0\x00', 0x103a, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000340), &(0x7f000027a000)) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000080)={0x4, 0xffffffffffffff9c, 0x1}) bind$unix(r0, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) r1 = syz_open_procfs(0x0, &(0x7f000042cff4)='personality\x00') read(r1, &(0x7f0000f1bf7e)=""/130, 0xfffffdd8) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000240)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x9, 0x18}, 0xc) open$dir(&(0x7f000050bff8)='./file0\x00', 0x2, 0x0) [ 201.918943] irq bypass consumer (token 0000000067508bf4) registration fails: -16 [ 202.012370] netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. [ 202.037936] netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. 2018/03/30 10:21:14 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1000000000001, 0x100000021, 0x8400000000003, 0xffffffff00000005, 0x5}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000000100)}, 0x20) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x440000, 0x20) fchmodat(r1, &(0x7f0000000180)='./file0\x00', 0x51) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x101400, 0x0) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0)=0x8, 0x4) 2018/03/30 10:21:14 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000140)={0x0, 0x1}, &(0x7f0000000180)=0x8) openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x484, 0x0) unshare(0x0) r0 = accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x800) ioctl(r0, 0x8, &(0x7f0000000600)="fe6f93e117a02359f30d4e962398d1417a4c7c4716bee2bfcd737e498c2cee76e126be23fcbfe6ae49b12a1bfaca121c6209896e61aba656a031863c9f4074fb1ac2262f19b9789244390cecfee0ec043d476d760f7934542dd49dc37d5dd2719b3475a2e8fc63437056830f5a4f79cebad2da021debfebffb8c174cef") getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000564000)=@abs, 0x6e, &(0x7f0000451ff0)=[{&(0x7f0000007000)="002a932f01000000cf960802e02348f800000000001c0003f2a576", 0x1b}], 0x1, &(0x7f00001f9fe0)}, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000440)='/dev/sg#\x00', 0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000300)={r1}) ioctl(r1, 0x2285, &(0x7f0000007000)='S') sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000340)={0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)=ANY=[@ANYBLOB='H\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x20008800}, 0xc0c0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000200)=0x1c, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000240), &(0x7f0000000280)=0xfffffffffffffd8a) r2 = socket(0x10, 0x3, 0x0) getsockopt$inet_mreqn(r2, 0x0, 0x24, &(0x7f0000000380)={@broadcast, @multicast2, 0x0}, &(0x7f00000003c0)=0xc) r4 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000500)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in6=@loopback={0x0, 0x1}, 0x4e22, 0x4, 0x4e21, 0x0, 0x2, 0x80, 0x20, 0x3f, r3, r4}, {0x8, 0xfffffffffffffc01, 0x800000000000, 0x1, 0x5, 0x8, 0x1fffc, 0x9}, {0x3bc, 0xe45, 0x4, 0xfffffffffffff801}, 0xffff, 0x6e6bb2, 0x0, 0x1, 0x1}, {{@in6=@dev={0xfe, 0x80, [], 0x11}, 0x4d4, 0x2b}, 0x2, @in=@broadcast=0xffffffff, 0x0, 0x3, 0x1, 0xae, 0x2, 0x401, 0x2}}, 0xe8) write(r2, &(0x7f000033e000)="170000001a001bed0000132100f404fffffffffffffff7", 0x17) clock_gettime(0x6, &(0x7f00000002c0)={0x0, 0x0}) recvmmsg(r2, &(0x7f0000f7bfc0), 0xd948aa, 0x40010000, &(0x7f0000000000)={0x0, r5+10000000}) 2018/03/30 10:21:14 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000, 0x0, 0x4}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000d80)={r5, 0x13c, 0x7, 0x0, 0x1, 0x8001}, 0x14) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000dc0)={0xaa, 0x20}) pwrite64(r1, &(0x7f0000000e00)="7437032bd6e223b3a59d10357fc245a11551c76207ed30241886ce0ea1326aeac569322a47e5909770909834b26bf6b04af3b30656cbc3e07c3eed14ee7c472c2d276872498ef33618509e2049213b9664560dc77dd302976456a0392edd116b9816cbca183c77f192c4c3260a385cc483327645104ab9987888488ff6b8e163c2eddc4fc33b9f9ba13abbb021303c8d438d96b2da7c190f9cdc9f2242c2df22ccc63b779747bc9b54e299a407b4150450352ce672efd9fd7565ffb5f410dd66a2061984a92c2ca847eb65e95168372a9e92cc53f27151c36569714d1b2b2b2d26b0e9668aa5042a767ab88ad81f2850cef1", 0xf2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) 2018/03/30 10:21:14 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f0000000080)=""/255, 0xff}], 0x259) read(r0, &(0x7f0000000700)=""/188, 0xbc) ioctl$KVM_SET_TSS_ADDR(0xffffffffffffffff, 0xae47, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) socket$inet6_sctp(0xa, 0x5, 0x84) r1 = syz_open_pts(r0, 0x2) r2 = dup3(r1, r0, 0x0) io_setup(0x20, &(0x7f0000000180)=0x0) syz_open_dev$midi(&(0x7f0000000440)='/dev/midi#\x00', 0xfffffffffffffff9, 0x400040) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r2, 0x54a3) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000240)={@remote={0xfe, 0x80, [], 0xbb}, 0x7, 0x3, 0xff, 0x1, 0x8, 0x6, 0x5}, &(0x7f0000000280)=0x20) io_cancel(r3, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x9, r1, &(0x7f0000001000)="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", 0xfac, 0x8}, &(0x7f0000000200)) write(r0, &(0x7f0000c34fff), 0xffffff0b) 2018/03/30 10:21:14 executing program 5: clone(0x200, &(0x7f0000151000), &(0x7f0000000080), &(0x7f0000f8b000), &(0x7f0000000100)) mknod(&(0x7f0000b75ff8)='./file0\x00', 0x2001001, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000240), &(0x7f0000002000)=[&(0x7f0000002040)='/dev/audio#\x00', &(0x7f00000013c0)='/dev/audio#\x00', &(0x7f0000001b80)='-\x00', &(0x7f0000001c80)='!##\x00', &(0x7f0000001f00)='*vmnet1nodevmd5sum#.\x00', &(0x7f0000001f40)='cpuacct.usage_percpu_sys\x00', &(0x7f0000001f80)='*vmnet1nodevmd5sum#.\x00', &(0x7f0000001fc0)='*vmnet1nodevmd5sum#.\x00']) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='syscall\x00') signalfd4(0xffffffffffffffff, &(0x7f0000001380), 0x8, 0x80800) socket$can_bcm(0x1d, 0x2, 0x2) ioctl$EVIOCGABS2F(r0, 0x8018456f, &(0x7f0000001cc0)=""/23) sched_setaffinity(0x0, 0x0, &(0x7f00000020c0)=0xe5) getsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f00000000c0), &(0x7f0000000100)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001340)=0x0) getgid() r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) getpriority(0x0, r1) preadv(r0, &(0x7f0000000040)=[{&(0x7f00006f0000)=""/154, 0x9a}], 0x1, 0x0) lseek(r0, 0x1d, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f0000000300)={0x0, 0x0, 0x10000000000, 0x0, 0x2, 0xef71}) finit_module(r0, &(0x7f0000000000)='*vmnet1nodevmd5sum#.\x00', 0x3) pread64(r0, &(0x7f0000001b00)=""/53, 0x35, 0x8000000000) process_vm_readv(0x0, &(0x7f0000001800)=[{&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001400)=""/142, 0x8e}, {&(0x7f00000014c0)=""/220, 0xdc}, {&(0x7f00000015c0)=""/176, 0xb0}, {&(0x7f0000000200)=""/66, 0x42}, {&(0x7f0000001680)=""/123, 0x7b}, {&(0x7f00000002c0)=""/11, 0xb}], 0x7, &(0x7f0000001c40)=[{&(0x7f00000019c0)=""/53, 0x35}, {&(0x7f0000001bc0)=""/94, 0x5e}], 0x2, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000001d00)={0x0, @in6={{0xa, 0x0, 0xffffffffffffff80, @loopback={0x0, 0x1}, 0x2}}, 0x8}, &(0x7f0000001dc0)=0x90) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000001e00)={r3, 0x6ecd, 0x10}, 0xc) creat(&(0x7f0000b7a000)='./file0\x00', 0x0) 2018/03/30 10:21:14 executing program 6 (fault-call:3 fault-nth:16): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r0, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r0, &(0x7f0000000100)=""/65, 0x41) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) linkat(r0, &(0x7f0000000480)='./file1\x00', r1, &(0x7f00000004c0)='./file0\x00', 0x1000) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') unlink(&(0x7f00000000c0)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r0, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x12021) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000340)={0x8, 0x9, 0x4, 0x10000, 0x1, 0x7, 0x7fffffff, 0x0, 0x29, 0x0, 0x20}, 0xb) 2018/03/30 10:21:14 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="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", 0xfc}], 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x200900, 0x103) connect$vsock_stream(r1, &(0x7f0000000600)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) socket$alg(0x26, 0x5, 0x0) rt_sigtimedwait(&(0x7f0000000140)={0xffffffff}, 0x0, &(0x7f0000000180), 0x8) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000500)={&(0x7f00000005c0)=[0x0, 0x0, 0x0], 0x3}) nanosleep(&(0x7f0000d1e000)={0x0, 0x1c9c380}, &(0x7f0000000000)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r2, 0x118, 0x0, &(0x7f0000000100)=0x7, 0x4) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000000c0)={0x1, 0x1, 0x1, 0x1, 0x0, 0x6}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000280)={r3, @in={{0x2, 0x4e23, @multicast2=0xe0000002}}, [0x8000, 0x9, 0x80000000, 0x3, 0x80, 0x8001, 0x800, 0x100, 0xe0db, 0x0, 0x2000000000, 0x200, 0x68, 0x0, 0x8]}, &(0x7f0000000380)=0x100) r4 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0xfffffffffffffdfa) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port1\x00', 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r4, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r5 = gettid() r6 = syz_open_procfs(r5, &(0x7f00000002c0)='maps\x00') readv(r6, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/28, 0x65}], 0x1) exit(0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r6, &(0x7f000004ffe0)=[{&(0x7f0000000000)=""/128, 0xe6}], 0x222) r7 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) connect$ax25(r2, &(0x7f00000006c0)={0x3, {"fc5da504005009"}, 0x7fff}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) getsockopt$netrom_NETROM_T1(r7, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r4, 0x80045301, &(0x7f0000000700)) 2018/03/30 10:21:14 executing program 7: clone(0x200, &(0x7f0000000100)="f0f7d70fc52207334efb558c957ea5882b23d85fa1659dc13aa7603b45aa407f02117308b1a8697bcf6617a98d145ec63b3cffa3123c2b94a42831af8d9bdb4b03d2954fdaa7e037f2c459a27e42921a924df6c5899ef4dbdb44bffbadd515d6024b7e3450b4ea54c55a229f4d694a292b270018a408b9ed54a0bc1929156ff004c1cf0b1728065c1ae04f4eeb552ff2420005e5ccb9400909127922c4a8e69ffbb96ca5bc95786113ae475b94c2c9a6a235276e2f1b7f01010000000000007a", &(0x7f0000000000), &(0x7f0000f8b000), &(0x7f00000d5000)) mknod(&(0x7f0000cd7000)='./file0\x00', 0x103a, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000340), &(0x7f000027a000)) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000080)={0x4, 0xffffffffffffff9c, 0x1}) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000400)={0x0, 0x1}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000480)={r1, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x10}}}, [0x6, 0x6, 0x6, 0x0, 0x0, 0x5, 0x7, 0x9, 0x3, 0x5, 0xffffffff, 0x7, 0x8, 0x7, 0x2]}, &(0x7f0000000580)=0x100) bind$unix(r0, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) r2 = syz_open_procfs(0x0, &(0x7f000042cff4)='personality\x00') fcntl$getownex(r0, 0x10, &(0x7f0000000240)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f00000002c0)={{0x1f, 0x7, 0x4, 0x3, "c039adb7b9d1984213c888a8e64296c18350d8e96dd5c91f397b6bd8902cafcf950765652253d196199b7661", 0x6945d80a}, 0x0, 0x0, 0x9, r3, 0x3, 0x10001, "d5cbeb579d3dd1d5607c7b12de02be4de87dc929b80bf2ca7f76c211790eaa1dd11b85b10d4888deb8806a6d43a81756d5fc0926ab24cc719231585ff6d71358", &(0x7f0000000280)='%\x00', 0x2, [], [0x5, 0x0, 0x26a6, 0xffff]}) read(r2, &(0x7f0000f1bf7e)=""/130, 0xfffffdd8) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000240)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x9, 0x18}, 0xc) open$dir(&(0x7f000050bff8)='./file0\x00', 0x2, 0x0) [ 202.101428] bond0 (unregistering): Released all slaves 2018/03/30 10:21:14 executing program 7: clone(0x200, &(0x7f0000000100)="f0f7d70fc52207334efb558c957ea5882b23d85fa1659dc13aa7603b45aa407f02117308b1a8697bcf6617a98d145ec63b3cffa3123c2b94a42831af8d9bdb4b03d2954fdaa7e037f2c459a27e42921a924df6c5899ef4dbdb44bffbadd515d6024b7e3450b4ea54c55a229f4d694a292b270018a408b9ed54a0bc1929156ff004c1cf0b1728065c1ae04f4eeb552ff2420005e5ccb9400909127922c4a8e69ffbb96ca5bc95786113ae475b94c2c9a6a235276e2f1b7f01010000000000007a", &(0x7f0000000000), &(0x7f0000f8b000), &(0x7f00000d5000)) mknod(&(0x7f0000cd7000)='./file0\x00', 0x103a, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000340), &(0x7f000027a000)) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000080)={0x4, 0xffffffffffffff9c, 0x1}) bind$unix(r0, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) r1 = syz_open_procfs(0x0, &(0x7f000042cff4)='personality\x00') read(r1, &(0x7f0000f1bf7e)=""/130, 0xfffffdd8) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000240)) open$dir(&(0x7f000050bff8)='./file0\x00', 0x2, 0x0) 2018/03/30 10:21:14 executing program 3: r0 = userfaultfd(0xffffffffffeffffe) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000005480)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000340)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f00000054c0)) close(r1) mkdir(&(0x7f000082f000)='./control\x00', 0xfffffffffffffffd) r2 = creat(&(0x7f0000000080)='./control/file0\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000001fc0)={0xaa, 0x21}) r3 = creat(&(0x7f00000000c0)='./file1\x00', 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) ioctl$DRM_IOCTL_CONTROL(r2, 0x40086414, &(0x7f0000001500)={0x2, 0x1ff}) syz_open_dev$sndtimer(&(0x7f00000014c0)='/dev/snd/timer\x00', 0x0, 0x400) rename(&(0x7f0000000040)='./control/file0\x00', &(0x7f0000000000)='./file0\x00') rename(&(0x7f0000000200)='./file1\x00', &(0x7f00000001c0)='./file0\x00') stat(&(0x7f0000000180)='./control\x00', &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_fuse_mount(&(0x7f0000000100)='./file1\x00', 0xa000, 0x0, r4, 0x10000, 0x2020) close(r0) getsockname(r3, &(0x7f0000005140)=@ipx, &(0x7f0000001540)=0x80) getsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000140), &(0x7f0000001440)=0x4) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000004100)) recvmmsg(0xffffffffffffffff, &(0x7f0000005340)=[{{&(0x7f00000001c0)=@can, 0x80, &(0x7f0000000280)=[{&(0x7f0000000240)=""/6, 0x6}], 0x1, &(0x7f0000000380)=""/4096, 0x1000}, 0x4}, {{&(0x7f00000002c0)=@ethernet, 0x80, &(0x7f0000001700)=[{&(0x7f0000001380)=""/188, 0xbc}, {&(0x7f0000001580)=""/233, 0xe9}, {&(0x7f0000001680)=""/102, 0x66}, {&(0x7f0000002000)=""/4096, 0x1000}], 0x4, &(0x7f0000001740)=""/238, 0xee}, 0x1f}, {{&(0x7f0000001840)=@rc, 0x80, &(0x7f0000001940)=[{&(0x7f00000054c0)=""/6, 0x6}, {&(0x7f0000001900)=""/50, 0x32}], 0x2, &(0x7f0000001980)=""/113, 0x71, 0xe000000}, 0x1}, {{&(0x7f0000001a00)=@pppoe={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000001ac0), 0x0, &(0x7f0000001b00)=""/95, 0x5f}, 0x7f}, {{&(0x7f0000001b80)=@ipx, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000001c00)=""/151, 0x97}], 0x1, &(0x7f0000003000)=""/4096, 0x1000, 0x1}, 0x6}, {{0x0, 0x0, &(0x7f0000005240)=[{&(0x7f0000001d00)=""/250, 0xfa}, {&(0x7f0000001e00)=""/69, 0x45}, {&(0x7f0000001e80)=""/214, 0xd6}, {&(0x7f0000004000)=""/94, 0x5e}, {&(0x7f0000004080)=""/115, 0x73}, {&(0x7f0000001f80)=""/26, 0x1a}, {&(0x7f0000004140)=""/4096, 0x1000}, {&(0x7f00000051c0)=""/104, 0x68}], 0x8, &(0x7f00000052c0)=""/71, 0x47}}], 0x6, 0x2, &(0x7f0000005400)={0x77359400}) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000b0a000)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r6, 0x4010ae67, &(0x7f00000001c0)={0x7000, 0x104000}) ioctl$PIO_FONTRESET(r2, 0x4b6d, 0x0) connect$inet(r3, &(0x7f0000001480)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) r7 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/qat_adf_ctl\x00', 0x18002, 0x0) getsockopt$bt_BT_POWER(r7, 0x112, 0x9, &(0x7f0000000240)=0x8, &(0x7f0000000280)=0x1) 2018/03/30 10:21:14 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000, 0x0, 0x4}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000d80)={r5, 0x13c, 0x7, 0x0, 0x1, 0x8001}, 0x14) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000dc0)={0xaa, 0x20}) pwrite64(r1, &(0x7f0000000e00)="7437032bd6e223b3a59d10357fc245a11551c76207ed30241886ce0ea1326aeac569322a47e5909770909834b26bf6b04af3b30656cbc3e07c3eed14ee7c472c2d276872498ef33618509e2049213b9664560dc77dd302976456a0392edd116b9816cbca183c77f192c4c3260a385cc483327645104ab9987888488ff6b8e163c2eddc4fc33b9f9ba13abbb021303c8d438d96b2da7c190f9cdc9f2242c2df22ccc63b779747bc9b54e299a407b4150450352ce672efd9fd7565ffb5f410dd66a2061984a92c2ca847eb65e95168372a9e92cc53f27151c36569714d1b2b2b2d26b0e9668aa5042a767ab88ad81f2850cef1", 0xf2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) 2018/03/30 10:21:14 executing program 1: clone(0x200, &(0x7f0000151000), &(0x7f0000000080), &(0x7f0000f8b000), &(0x7f0000000100)) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f0000001340)=""/195) mknod(&(0x7f0000b75ff8)='./file0\x00', 0x2001001, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000240), &(0x7f0000000140)) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='syscall\x00') preadv(r1, &(0x7f0000000040)=[{&(0x7f00006f0000)=""/154, 0x9a}], 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x7ffffffc, 0x0) pread64(r1, &(0x7f00000000c0)=""/53, 0x35, 0x0) getpgrp(0x0) r3 = socket$vsock_stream(0x28, 0x1, 0x0) r4 = accept(r3, &(0x7f0000000580)=@rc, &(0x7f0000000280)=0x4c) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f00000004c0)=0x100000001, 0x8) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = getpid() sendmsg$nl_generic(r5, &(0x7f0000000400)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000010000800000000000949400cb1a260000000004000000001100", @ANYRES32=r6], 0x1c}, 0x1}, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x3, 0x10, 0xffffffffffffffff, 0x0) r7 = accept4$inet6(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0x1c, 0x80800) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r4, 0x84, 0x70, &(0x7f0000000600)={0x0, @in6={{0xa, 0x0, 0xfa5f, @ipv4={[], [0xff, 0xff]}, 0x6fa74d64}}, [0x40, 0xb27, 0x11a, 0x9, 0x5, 0x40c, 0x5, 0xffff, 0x9, 0x7, 0xfff, 0x4, 0x5b, 0x0, 0x4]}, &(0x7f0000000240)=0x100) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f0000000500)={r8, 0x101}, &(0x7f0000000540)=0x8) tee(r7, 0xffffffffffffffff, 0x6bf081f2, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xa, 0x3ff, 0x91f, 0xe134, 0x1a, 0xffffffffffffffff, 0x8}, 0x2c) r9 = socket$vsock_dgram(0x28, 0x2, 0x0) mmap(&(0x7f0000000000/0xf12000)=nil, 0xf12000, 0x1000001, 0x32, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000fb0000)={&(0x7f0000855000)="e91f7189591e9233614b"}, 0x10) writev(r9, &(0x7f0000000140), 0x100002fb) r10 = socket$inet6(0xa, 0x0, 0x7fc) bind$inet6(r10, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) 2018/03/30 10:21:14 executing program 0: ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000340)={0x0, &(0x7f0000000300)}) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ion\x00', 0xffeffffffffffffe, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00006f4000)={0x80fed, 0x11, 0x0, 0x0}) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000002d40)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000433000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000445000/0x18000)=nil, &(0x7f0000000100)=[@text32={0x20, &(0x7f0000000080)="0f350f01cac4e3d17e2b3666baf80cb8b73e9582ef66bafc0cec0f20e035000100000f22e066baf80cb84e823d89ef66bafc0ceceabb3e00003f00c174920000b805000000b9000000000f01d99a000000005b00", 0x54}], 0x1, 0x0, &(0x7f0000000140), 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000ffd000/0x1000)=nil}) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000380)=""/107, &(0x7f00000002c0)=0x6b) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x80, 0x80000) recvfrom$unix(r2, &(0x7f0000000400)=""/198, 0xc6, 0x12000, &(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e) 2018/03/30 10:21:14 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000, 0x0, 0x4}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000d80)={r5, 0x13c, 0x7, 0xaa5, 0x0, 0x8001}, 0x14) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000dc0)={0xaa, 0x20}) pwrite64(r1, &(0x7f0000000e00)="7437032bd6e223b3a59d10357fc245a11551c76207ed30241886ce0ea1326aeac569322a47e5909770909834b26bf6b04af3b30656cbc3e07c3eed14ee7c472c2d276872498ef33618509e2049213b9664560dc77dd302976456a0392edd116b9816cbca183c77f192c4c3260a385cc483327645104ab9987888488ff6b8e163c2eddc4fc33b9f9ba13abbb021303c8d438d96b2da7c190f9cdc9f2242c2df22ccc63b779747bc9b54e299a407b4150450352ce672efd9fd7565ffb5f410dd66a2061984a92c2ca847eb65e95168372a9e92cc53f27151c36569714d1b2b2b2d26b0e9668aa5042a767ab88ad81f2850cef1", 0xf2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) 2018/03/30 10:21:15 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0xf, &(0x7f0000a0c000)={{{@in6=@mcast2={0xff, 0x2, [], 0x1}, @in=@broadcast=0xffffffff}}, {{@in6=@mcast2={0xff, 0x2, [], 0x1}}, 0x0, @in6=@mcast2={0xff, 0x2, [], 0x1}}}, 0xe8) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x5, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(r2, 0x40086425, &(0x7f00000000c0)={r3, 0x2}) bind$inet6(r1, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f000000cfe4)={0xa, 0x4e20}, 0x1c) ioctl$TCXONC(r2, 0x540a, 0x80000000) ioctl$KDGKBDIACR(r2, 0x4b4a, &(0x7f0000000100)=""/25) bind$inet(r0, &(0x7f0000a0dff0)={0x2, 0x4e20, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd6050a09c0e081100010000000000000000000000000000bbfe8000000000000000000000000000aa4e204bc017ed186916cc706a097d4e2000089078"], &(0x7f0000000040)) setsockopt$netlink_NETLINK_CAP_ACK(r2, 0x10e, 0xa, &(0x7f00000001c0)=0x200, 0x4) 2018/03/30 10:21:15 executing program 7: clone(0x200, &(0x7f0000000100)="f0f7d70fc52207334efb558c957ea5882b23d85fa1659dc13aa7603b45aa407f02117308b1a8697bcf6617a98d145ec63b3cffa3123c2b94a42831af8d9bdb4b03d2954fdaa7e037f2c459a27e42921a924df6c5899ef4dbdb44bffbadd515d6024b7e3450b4ea54c55a229f4d694a292b270018a408b9ed54a0bc1929156ff004c1cf0b1728065c1ae04f4eeb552ff2420005e5ccb9400909127922c4a8e69ffbb96ca5bc95786113ae475b94c2c9a6a235276e2f1b7f01010000000000007a", &(0x7f0000000000), &(0x7f0000f8b000), &(0x7f0000000280)="4691d54682281c621d715903d0357b6a28ceb4a2a6bfa7faffb887caa17bc286811c1d27310f59c86cf2ac7e349095058bcd46cfbfc029423777c2ab53eaee3bc2523c7fed2706e9f8e8cede3294648ae96af9e22a3db1248ba09c5cad91df1cbfceb7e6d8b63e451ec6ba5be2019cead96ab44609317e851e7e1acc010e22967b6ae439ea76f8a02b87724e4247fbaa44fa070c") mknod(&(0x7f0000cd7000)='./file0\x00', 0x103a, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000380)=@ethernet={0x0, @broadcast}, &(0x7f0000000400)=0x80, 0x80000) accept4$inet6(r0, &(0x7f0000000440)={0x0, 0x0, 0x0, @local}, &(0x7f0000000480)=0x1c, 0x80000) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000340), &(0x7f000027a000)) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000080)={0x4, 0xffffffffffffff9c, 0x1}) bind$unix(r1, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) r2 = syz_open_procfs(0x0, &(0x7f000042cff4)='personality\x00') read(r2, &(0x7f0000f1bf7e)=""/130, 0xfffffdd8) signalfd4(r1, &(0x7f0000000240)={0xd10000000}, 0x8, 0x800) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000240)) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f0000000340)={0x0, r2}) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f00000004c0)=""/59, &(0x7f0000000500)=0x3b) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x9, 0x18}, 0xc) open$dir(&(0x7f000050bff8)='./file0\x00', 0x2, 0x0) sysfs$3(0x3) 2018/03/30 10:21:15 executing program 5: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x8000, 0x0) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000080)=0x8, 0x4) 2018/03/30 10:21:15 executing program 0: r0 = perf_event_open(&(0x7f0000c72000)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000877000)={0x2, 0x78, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000f02000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = dup3(r1, r0, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x22}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="5c00000022aaeaade9bdf92d9942fee33a5cd2228db0833404862699b1cc418a8459d21304f1d1f1033100de89912d550073c6e74ee968a28873edb1", @ANYRES16=r3, @ANYBLOB="00032dbd7000fedbdf25100000004800020008000800030000000800050008000000080009000900004008000700ffffff7f14000100000000090000000000000000000000000800050003000000080002004e240000"], 0x5c}, 0x1, 0x0, 0x0, 0x10}, 0x0) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x2000) [ 203.093755] IPVS: ftp: loaded support on port[0] = 21 [ 203.377446] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 203.792341] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 203.798442] 8021q: adding VLAN 0 to HW filter on device bond0 [ 203.842429] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 203.885565] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 203.906408] FAULT_INJECTION: forcing a failure. [ 203.906408] name failslab, interval 1, probability 0, space 0, times 0 [ 203.917856] CPU: 1 PID: 25488 Comm: syz-executor6 Not tainted 4.16.0-rc7+ #371 [ 203.925271] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 203.934606] Call Trace: [ 203.937171] dump_stack+0x194/0x24d [ 203.940777] ? arch_local_irq_restore+0x53/0x53 [ 203.945430] should_fail+0x8c0/0xa40 [ 203.949121] ? kstrdup+0x39/0x70 [ 203.952475] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 203.957550] ? cgroup_mkdir+0x553/0xfc0 [ 203.961499] ? vfs_mkdir+0x390/0x600 [ 203.965188] ? SyS_mkdirat+0x22b/0x2b0 [ 203.969050] ? do_syscall_64+0x281/0x940 [ 203.973085] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 203.978427] ? find_held_lock+0x35/0x1d0 [ 203.982473] ? find_held_lock+0x35/0x1d0 [ 203.986516] ? __lock_is_held+0xb6/0x140 [ 203.990567] ? check_same_owner+0x320/0x320 [ 203.994868] ? rcu_note_context_switch+0x710/0x710 [ 203.999775] ? rcu_read_lock_sched_held+0x108/0x120 [ 204.004772] should_failslab+0xec/0x120 [ 204.008724] kmem_cache_alloc+0x47/0x760 [ 204.012758] ? memcpy+0x45/0x50 [ 204.016022] ? kstrdup+0x59/0x70 [ 204.019371] __kernfs_new_node+0xe2/0x570 [ 204.023496] ? kernfs_dop_revalidate+0x380/0x380 [ 204.028231] ? kasan_check_read+0x11/0x20 [ 204.032352] ? read_word_at_a_time+0x12/0x20 [ 204.036734] ? strscpy+0x186/0x500 [ 204.040260] kernfs_new_node+0x80/0xe0 [ 204.044126] __kernfs_create_file+0x4b/0x320 [ 204.048515] cgroup_addrm_files+0x3c5/0xa70 [ 204.052823] ? cgroup_file_write+0x710/0x710 [ 204.057214] ? getrawmonotonic64+0x460/0x460 [ 204.061602] ? kernfs_active+0x92/0x160 [ 204.065554] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 204.070455] ? cgroup_kn_set_ugid+0x2c7/0x370 [ 204.074928] ? cgroup_file_name+0x1d0/0x1d0 [ 204.079236] css_populate_dir+0x340/0x420 [ 204.083367] cgroup_mkdir+0x553/0xfc0 [ 204.087139] ? __lock_is_held+0xb6/0x140 [ 204.091182] ? cgroup_destroy_locked+0x750/0x750 [ 204.095915] ? rcu_read_lock_sched_held+0x108/0x120 [ 204.100906] ? kmem_cache_free+0x258/0x2a0 [ 204.105119] ? set_nlink+0xc1/0x160 [ 204.108723] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 204.113627] ? generic_permission+0x105/0x3c0 [ 204.118099] ? cgroup_destroy_locked+0x750/0x750 [ 204.122831] kernfs_iop_mkdir+0x153/0x1e0 [ 204.126958] vfs_mkdir+0x390/0x600 [ 204.130480] SyS_mkdirat+0x22b/0x2b0 [ 204.134174] ? SyS_mknod+0x480/0x480 [ 204.137860] ? trace_hardirqs_on+0xd/0x10 [ 204.141982] ? do_syscall_64+0xb7/0x940 [ 204.145934] ? SyS_mknod+0x480/0x480 [ 204.149622] do_syscall_64+0x281/0x940 [ 204.153496] ? __do_page_fault+0xc90/0xc90 [ 204.157706] ? _raw_spin_unlock_irq+0x27/0x70 [ 204.162174] ? finish_task_switch+0x1c1/0x7e0 [ 204.166643] ? syscall_return_slowpath+0x550/0x550 [ 204.171548] ? syscall_return_slowpath+0x2ac/0x550 [ 204.176452] ? prepare_exit_to_usermode+0x350/0x350 [ 204.181443] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 204.186791] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 204.191616] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 204.196779] RIP: 0033:0x4548b9 [ 204.199946] RSP: 002b:00007fe6a9de1c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 204.207629] RAX: ffffffffffffffda RBX: 00007fe6a9de26d4 RCX: 00000000004548b9 [ 204.214875] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 204.222116] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 204.229359] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 2018/03/30 10:21:16 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000, 0x0, 0x4}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000d80)={r5, 0x13c, 0x7, 0xaa5, 0x0, 0x8001}, 0x14) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000dc0)={0xaa, 0x20}) pwrite64(r1, &(0x7f0000000e00)="7437032bd6e223b3a59d10357fc245a11551c76207ed30241886ce0ea1326aeac569322a47e5909770909834b26bf6b04af3b30656cbc3e07c3eed14ee7c472c2d276872498ef33618509e2049213b9664560dc77dd302976456a0392edd116b9816cbca183c77f192c4c3260a385cc483327645104ab9987888488ff6b8e163c2eddc4fc33b9f9ba13abbb021303c8d438d96b2da7c190f9cdc9f2242c2df22ccc63b779747bc9b54e299a407b4150450352ce672efd9fd7565ffb5f410dd66a2061984a92c2ca847eb65e95168372a9e92cc53f27151c36569714d1b2b2b2d26b0e9668aa5042a767ab88ad81f2850cef1", 0xf2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) 2018/03/30 10:21:16 executing program 5: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000d4b000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x3, [{{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}]}, 0x210) perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x78, 0x1e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000040)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x90) 2018/03/30 10:21:16 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "706f727431000200000000000000000000000000000000000000eb000000b2a587e2000000000000000000000000000101008e15e7af00", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f000019ffe9)={0xc1, @time={0x0, 0x989680}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0505350, &(0x7f0000000140)={{}, {}, 0x100000000}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000400)='/dev/sequencer2\x00', 0x0, 0x0) unshare(0x20020000) unshare(0x20000) accept4(r2, &(0x7f00000000c0)=@in6, &(0x7f0000000040)=0x80, 0x800) 2018/03/30 10:21:16 executing program 1: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40005, 0x0) fallocate(r0, 0x8, 0x7, 0x1000) 2018/03/30 10:21:16 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000340)='/dev/admmidi#\x00', 0xb8, 0x20000) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0505350, &(0x7f0000000140)={{0x7, 0x6}, {0x6, 0x2001}, 0xffffffffffffffff, 0x440000000001}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000080)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {}, 0x8, {0x2, 0x0, @rand_addr}, "00080700000400a0b22c582bf3aed17d"}) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000), &(0x7f0000000040)=0x4) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6e5, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000300)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@dev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_GSI_ROUTING(r2, 0x4008ae6a, &(0x7f0000000900)=ANY=[@ANYBLOB="0300000000000000fffffeff01000000000000000000000075070000ff07000000000000000000000000000000000000000000000000000007000000020000000000040000004d8e000054b2c9100000000000000000000000000000000000000000040000000700000000000000000000003f00000005000000000000000000000000000000000000000000000000000000932585126aa13c5a792e4b0c472a6c1760aef13d7b2530b98d1220716db65405818578594f3ebdc771a3656da3a6ac000000000000"]) r4 = gettid() sendmsg$unix(r1, &(0x7f0000000840)={&(0x7f00000004c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000800)=[{&(0x7f0000000540)="ae6cc083b8171a3010907d981c5923f7bfddccb280e33aa20ada16817ebbd5cb549fb99f46f005494e0bf3eb1c93dbd34e29800fa0984ea94ea0252a48790539767aa765aabbffabcf4fd50ce367eeeef65bfdfb8f5e2491ef8b7f9ca483a8f0", 0x60}, {&(0x7f00000005c0)="2c9d8dfb0a49b4f13f844bad83599f7f69729bff4c49534ba4bdd7fbae03ce7d5f241551c11d68f4c002ed0ddfd8dd090aeeeb1f7cfef83fb26bd666cd8e83ccf5b0f8bb5025ef835f51ffc343527ba21ec6e2efb6076d0a73fd6f92fbffa073217a890a8fbbf18e38d99908898fb0623b7cdd37305a28482ed46445e0527422af177471c57f0a7f7bfed1e6f81fc1267dc369ec1159a77d130a8129bebdddd51ca1aa04cbd56a55", 0xa8}, {&(0x7f0000000680)="8381301bb087f4b086384b71a52d7e7cb858470ba3a8855e9f1272c6d58dd76173c701c61c7afb28cdca96b60e3e2ee78d03602c05131be625c2a5d099c113db6aee0ed5704e94f52e6314f594d285e337826e6e4094aa89dcbda31727faa6", 0x5f}, {&(0x7f0000000700)="c1bd81b7cd7063ff37366c6564212a96d0164323960c25d648923fa2346684e8f7d25043510f9f3bb15ae1ecd87adcf68861f34d460f6f8b8bf6e762f62005cfb615a9591377b3cdaaebdca857f1091c91eaa8635b88119ff2094d2a8af98c4230d7c6335c54d20661dc23bb64ee262331e4710ba1e358e2bfb5c201b396c43cfe4c7e46c68b0f61163c94122ee74c660aa3ac74cc5a048ca2fbabe5c529cd2165574b6205e87c48e3b9c50950794440fd3d85a931b60508847b0705d5f69a64a6b50fc963b54c3abc046dc16485d0d7778826464335fcc67adf63f1a3a01cf459d7c13d", 0xe4}], 0x4, 0x0, 0x0, 0x40000}, 0x800) r5 = getpgrp(0x0) r6 = getuid() getgroups(0x2, &(0x7f0000001780)=[0xffffffffffffffff, 0xffffffffffffffff]) sendmsg$netlink(r2, &(0x7f0000001800)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000001900)=ANY=[@ANYBLOB="781200001800000125bd7000fedbdf2568124e0008004200", @ANYRES32=r3, @ANYBLOB="e2d43d9c22c556edadc96ec485ffac2e6997cbe5639258a4f3c77ccae7b7abc8e7e955aec649309b7bd42155feee49efdb2e3eb5c9cc171d063554755b9f0c85d750b48f68cbcc168c319491d15d03e6b1ab1e60716c733d4d890fbbee9511efac86887db3831b5d0bbc0ccc30e9801884b2b69cadcd13308f856857335f9ad8410f247e63fd68d05295feca5e4afe678e908bfbe166f9b827bb9276d393e58800f09da124a2bc5b3d0b397f2fdba2e5f29ee144dfb9691d0f763f6616afe04db059ca3bb182f5a1bfc6aea01778455d01ab2b47eb9ac48a91e7718139f80800120043bc9430c81ce8ee5cc8", @ANYRES32=r4, @ANYBLOB="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"], 0x1278}], 0x1, &(0x7f00000017c0)=[@cred={0x20, 0x1, 0x2, r5, r6, r7}], 0x20, 0x90}, 0x80) setsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f00000002c0)={0x8, 0x3}, 0x2) r8 = syz_open_dev$sg(&(0x7f0000567000)='/dev/sg#\x00', 0x0, 0x40002) ioctl(r8, 0x5380, &(0x7f0000ca7000)) setsockopt$ALG_SET_AEAD_AUTHSIZE(r1, 0x117, 0x5, 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000880)={'filter\x00'}, &(0x7f0000000280)=0x54) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f00000001c0)={r0}) 2018/03/30 10:21:16 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="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", 0xfc}], 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x200900, 0x103) connect$vsock_stream(r1, &(0x7f0000000600)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) socket$alg(0x26, 0x5, 0x0) rt_sigtimedwait(&(0x7f0000000140)={0xffffffff}, 0x0, &(0x7f0000000180), 0x8) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000500)={&(0x7f00000005c0)=[0x0, 0x0, 0x0], 0x3}) nanosleep(&(0x7f0000d1e000)={0x0, 0x1c9c380}, &(0x7f0000000000)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r2, 0x118, 0x0, &(0x7f0000000100)=0x7, 0x4) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000000c0)={0x1, 0x1, 0x1, 0x1, 0x0, 0x6}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000280)={r3, @in={{0x2, 0x4e23, @multicast2=0xe0000002}}, [0x8000, 0x9, 0x80000000, 0x3, 0x80, 0x8001, 0x800, 0x100, 0xe0db, 0x0, 0x2000000000, 0x200, 0x68, 0x0, 0x8]}, &(0x7f0000000380)=0x100) r4 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0xfffffffffffffdfa) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port1\x00', 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r4, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r5 = gettid() r6 = syz_open_procfs(r5, &(0x7f00000002c0)='maps\x00') readv(r6, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/28, 0x65}], 0x1) exit(0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r6, &(0x7f000004ffe0)=[{&(0x7f0000000000)=""/128, 0xe6}], 0x222) r7 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) connect$ax25(r2, &(0x7f00000006c0)={0x3, {"fc5da504005009"}, 0x7fff}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) getsockopt$netrom_NETROM_T1(r7, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r4, 0x80045301, &(0x7f0000000700)) 2018/03/30 10:21:16 executing program 6 (fault-call:3 fault-nth:17): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r0, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r0, &(0x7f0000000100)=""/65, 0x41) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) linkat(r0, &(0x7f0000000480)='./file1\x00', r1, &(0x7f00000004c0)='./file0\x00', 0x1000) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') unlink(&(0x7f00000000c0)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r0, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x12021) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000340)={0x8, 0x9, 0x4, 0x10000, 0x1, 0x7, 0x7fffffff, 0x0, 0x29, 0x0, 0x20}, 0xb) 2018/03/30 10:21:16 executing program 7: clone(0x200, &(0x7f0000000100)="f0f7d70fc52207334efb558c957ea5882b23d85fa1659dc13aa7603b45aa407f02117308b1a8697bcf6617a98d145ec63b3cffa3123c2b94a42831af8d9bdb4b03d2954fdaa7e037f2c459a27e42921a924df6c5899ef4dbdb44bffbadd515d6024b7e3450b4ea54c55a229f4d694a292b270018a408b9ed54a0bc1929156ff004c1cf0b1728065c1ae04f4eeb552ff2420005e5ccb9400909127922c4a8e69ffbb96ca5bc95786113ae475b94c2c9a6a235276e2f1b7f01010000000000007a", &(0x7f0000000000), &(0x7f0000f8b000), &(0x7f00000d5000)) mknod(&(0x7f0000cd7000)='./file0\x00', 0x103a, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x1, 0x880) sendmsg$rds(r0, &(0x7f0000000400)={&(0x7f0000000280)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10, &(0x7f00000003c0)=[{&(0x7f00000002c0)=""/47, 0x2f}, {&(0x7f0000000300)=""/181, 0xb5}], 0x2, 0x0, 0x0, 0x20000000}, 0x40040) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000340), &(0x7f000027a000)) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000080)={0x4, 0xffffffffffffff9c, 0x1}) bind$unix(r1, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e23}, 0xfc4c) r2 = syz_open_procfs(0x0, &(0x7f000042cff4)='personality\x00') read(r2, &(0x7f0000f1bf7e)=""/130, 0xfffffdd8) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000240)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x9, 0x18}, 0xc) open$dir(&(0x7f000050bff8)='./file0\x00', 0x2, 0x0) [ 204.236601] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000010 [ 204.244209] cgroup: cgroup_addrm_files: failed to add cgroup.subtree_control, err=-12 2018/03/30 10:21:16 executing program 1: perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x1, 0x0) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000100)=0x80) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000240)=@assoc_value={0x0, 0x100000001}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000180)=@assoc_value={r1, 0x80}, 0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, &(0x7f0000000400)=0x98) perf_event_open(&(0x7f0000000000)={0x0, 0xffffff5c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) 2018/03/30 10:21:16 executing program 0: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20202, 0x0) tee(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000000)=0x0) ptrace$getenv(0x4201, r1, 0x401, &(0x7f0000000080)) pipe2(&(0x7f00000000c0), 0x80800) ioctl$fiemap(r0, 0xc020660b, &(0x7f0000000040)=ANY=[@ANYBLOB="ff01000000000000030000000008000000000000000400000100000000000000"]) fallocate(r0, 0x11, 0x1, 0x8000000) 2018/03/30 10:21:16 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) r0 = open(&(0x7f000080dff6)='./file1\x00', 0x0, 0xfffffffffffffffe) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/net/pfkey\x00', 0x280000, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = creat(&(0x7f000078dff8)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, &(0x7f0000000180), &(0x7f00000001c0)=0x4) mmap(&(0x7f0000012000/0x3000)=nil, 0x3000, 0x4, 0x110, r0, 0x0) write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) link(&(0x7f0000f3bff8)='./file0\x00', &(0x7f00009db000)='./file1\x00') readlinkat(r3, &(0x7f0000000040)='./control/file0\x00', &(0x7f0000000080)=""/41, 0x29) rename(&(0x7f0000000100)='./control\x00', &(0x7f0000000140)='./control\x00') epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000480)={0x8}) r4 = creat(&(0x7f0000000000)='./file2\x00', 0xfffffffffffffd) getsockopt$ax25_buf(r0, 0x101, 0x19, &(0x7f00000002c0)=""/83, &(0x7f0000000340)=0x53) r5 = dup2(r0, r1) ioctl$DRM_IOCTL_GEM_FLINK(r4, 0xc008640a, &(0x7f0000000280)={0x0, 0x0}) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r4, 0x4010ae74, &(0x7f0000000380)={0xa30a, 0x1ff, 0x2}) getsockopt$inet6_tcp_int(r4, 0x6, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) ioctl$DRM_IOCTL_GEM_FLINK(r5, 0xc008640a, &(0x7f00000000c0)={0x0, r6}) openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x100, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r5, 0xc00c642d, &(0x7f0000000200)={r7, 0x80000, r5}) 2018/03/30 10:21:16 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000, 0x0, 0x4}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000d80)={r5, 0x13c, 0x7, 0xaa5, 0x0, 0x8001}, 0x14) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000dc0)={0xaa, 0x20}) pwrite64(r1, &(0x7f0000000e00)="7437032bd6e223b3a59d10357fc245a11551c76207ed30241886ce0ea1326aeac569322a47e5909770909834b26bf6b04af3b30656cbc3e07c3eed14ee7c472c2d276872498ef33618509e2049213b9664560dc77dd302976456a0392edd116b9816cbca183c77f192c4c3260a385cc483327645104ab9987888488ff6b8e163c2eddc4fc33b9f9ba13abbb021303c8d438d96b2da7c190f9cdc9f2242c2df22ccc63b779747bc9b54e299a407b4150450352ce672efd9fd7565ffb5f410dd66a2061984a92c2ca847eb65e95168372a9e92cc53f27151c36569714d1b2b2b2d26b0e9668aa5042a767ab88ad81f2850cef1", 0xf2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) 2018/03/30 10:21:16 executing program 6 (fault-call:3 fault-nth:18): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r0, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r0, &(0x7f0000000100)=""/65, 0x41) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) linkat(r0, &(0x7f0000000480)='./file1\x00', r1, &(0x7f00000004c0)='./file0\x00', 0x1000) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') unlink(&(0x7f00000000c0)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r0, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x12021) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000340)={0x8, 0x9, 0x4, 0x10000, 0x1, 0x7, 0x7fffffff, 0x0, 0x29, 0x0, 0x20}, 0xb) 2018/03/30 10:21:17 executing program 1: r0 = semget$private(0x0, 0xfffffffffffffffd, 0x0) semctl$SETVAL(r0, 0x0, 0x10, &(0x7f0000000280)) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) preadv(r1, &(0x7f0000215fc0)=[{&(0x7f000087ef6a)=""/1, 0x1}], 0x1, 0x0) preadv(r1, &(0x7f0000a19fd0)=[{&(0x7f00002ac000)=""/106, 0x6a}], 0x1, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x10, 0x3, 0xc) bind(r2, &(0x7f000000c000)=@nl=@kern={0x10, 0x0, 0x0, 0x400040}, 0xc) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x55dd060014cd46c2, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYBLOB="b100000054fff489bb13ad0e4bc3ef56c7b3c4d0dd242f108587d51df3915e08b23ae0f86b90cf0937fb8dda50b4598241471ef6b5a89eb92edb2e67528b316c043be28e9cb00c2e74000000000000000028cba96a30be5770079e22e3f69a482ce6ee6d7b9e06f9904dbc4a3b98cf9b3be0bce7176c2533e7e8eb56ee46b2c0c8edd956ec99548d0dddeb4f67800900c2b65e2fe60571612f6f724a48287db4852bdc280c0a58289721a41da8cf6ccf72e381a6e47d165c400c"], &(0x7f0000000180)=0x2) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000001c0)={r4, 0x3}, &(0x7f0000000200)=0x8) r6 = socket$inet(0x10, 0x3, 0xc) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000300)={r5, 0x3}, &(0x7f0000000340)=0x8) sendmsg(r6, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000002000)="24000000100007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b356da5a80d18bec4c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1, 0x0, 0x0, 0x3}, 0x0) ioctl$sock_bt_bnep_BNEPCONNDEL(r3, 0x400442c9, &(0x7f00000000c0)={0x8, @random="d683a8aefb33"}) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) setsockopt$sock_timeval(r1, 0x1, 0x0, &(0x7f00000002c0)={r7, r8/1000+30000}, 0x10) io_setup(0x0, &(0x7f00000000c0)=0x0) io_getevents(r9, 0x7ff, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000240)={0x77359400}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x0, 0x0) r10 = getpgid(0x0) tkill(r10, 0x15) [ 204.501671] bond0 (unregistering): Released all slaves [ 205.186891] IPVS: ftp: loaded support on port[0] = 21 [ 205.473998] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 205.889684] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 205.895779] 8021q: adding VLAN 0 to HW filter on device bond0 [ 205.939950] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 205.983434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 206.003487] FAULT_INJECTION: forcing a failure. [ 206.003487] name failslab, interval 1, probability 0, space 0, times 0 [ 206.014714] CPU: 1 PID: 25706 Comm: syz-executor6 Not tainted 4.16.0-rc7+ #371 [ 206.022047] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 206.031383] Call Trace: [ 206.033950] dump_stack+0x194/0x24d [ 206.037555] ? arch_local_irq_restore+0x53/0x53 [ 206.042206] should_fail+0x8c0/0xa40 [ 206.045899] ? kstrdup+0x39/0x70 [ 206.049247] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 206.054331] ? cgroup_mkdir+0x553/0xfc0 [ 206.058279] ? vfs_mkdir+0x390/0x600 [ 206.061965] ? SyS_mkdirat+0x22b/0x2b0 [ 206.065829] ? do_syscall_64+0x281/0x940 [ 206.069867] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 206.075219] ? find_held_lock+0x35/0x1d0 [ 206.079263] ? find_held_lock+0x35/0x1d0 [ 206.083307] ? __lock_is_held+0xb6/0x140 [ 206.087359] ? check_same_owner+0x320/0x320 [ 206.091662] ? rcu_note_context_switch+0x710/0x710 [ 206.096574] ? rcu_read_lock_sched_held+0x108/0x120 [ 206.101592] should_failslab+0xec/0x120 [ 206.105543] kmem_cache_alloc+0x47/0x760 [ 206.109578] ? memcpy+0x45/0x50 [ 206.112834] ? kstrdup+0x59/0x70 [ 206.116180] __kernfs_new_node+0xe2/0x570 [ 206.120304] ? kernfs_dop_revalidate+0x380/0x380 [ 206.125217] ? kasan_check_read+0x11/0x20 [ 206.129339] ? read_word_at_a_time+0x12/0x20 [ 206.133720] ? strscpy+0x186/0x500 [ 206.137247] kernfs_new_node+0x80/0xe0 [ 206.141113] __kernfs_create_file+0x4b/0x320 [ 206.145503] cgroup_addrm_files+0x3c5/0xa70 [ 206.149821] ? cgroup_file_write+0x710/0x710 [ 206.154216] ? getrawmonotonic64+0x460/0x460 [ 206.158605] ? kernfs_active+0x92/0x160 [ 206.162557] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 206.167471] ? cgroup_kn_set_ugid+0x2c7/0x370 [ 206.171940] ? cgroup_file_name+0x1d0/0x1d0 [ 206.176248] css_populate_dir+0x340/0x420 [ 206.180377] cgroup_mkdir+0x553/0xfc0 [ 206.184161] ? __lock_is_held+0xb6/0x140 [ 206.188210] ? cgroup_destroy_locked+0x750/0x750 [ 206.192941] ? rcu_read_lock_sched_held+0x108/0x120 [ 206.197930] ? kmem_cache_free+0x258/0x2a0 [ 206.202145] ? set_nlink+0xc1/0x160 [ 206.205751] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 206.210654] ? generic_permission+0x105/0x3c0 [ 206.215128] ? cgroup_destroy_locked+0x750/0x750 [ 206.219862] kernfs_iop_mkdir+0x153/0x1e0 [ 206.224162] vfs_mkdir+0x390/0x600 [ 206.227682] SyS_mkdirat+0x22b/0x2b0 [ 206.231376] ? SyS_mknod+0x480/0x480 [ 206.235061] ? trace_hardirqs_on+0xd/0x10 [ 206.239184] ? do_syscall_64+0xb7/0x940 [ 206.243136] ? SyS_mknod+0x480/0x480 [ 206.246825] do_syscall_64+0x281/0x940 [ 206.250687] ? __do_page_fault+0xc90/0xc90 [ 206.254894] ? _raw_spin_unlock_irq+0x27/0x70 [ 206.259378] ? finish_task_switch+0x1c1/0x7e0 [ 206.263849] ? syscall_return_slowpath+0x550/0x550 [ 206.268752] ? syscall_return_slowpath+0x2ac/0x550 [ 206.273656] ? prepare_exit_to_usermode+0x350/0x350 [ 206.278652] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 206.283999] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 206.288828] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 206.293992] RIP: 0033:0x4548b9 [ 206.297156] RSP: 002b:00007f6ba2c1fc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 206.304839] RAX: ffffffffffffffda RBX: 00007f6ba2c206d4 RCX: 00000000004548b9 [ 206.312083] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 206.319325] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 206.326778] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 2018/03/30 10:21:18 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000, 0x0, 0x4}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000d80)={r5, 0x13c, 0x7, 0xaa5, 0x1}, 0x14) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000dc0)={0xaa, 0x20}) pwrite64(r1, &(0x7f0000000e00)="7437032bd6e223b3a59d10357fc245a11551c76207ed30241886ce0ea1326aeac569322a47e5909770909834b26bf6b04af3b30656cbc3e07c3eed14ee7c472c2d276872498ef33618509e2049213b9664560dc77dd302976456a0392edd116b9816cbca183c77f192c4c3260a385cc483327645104ab9987888488ff6b8e163c2eddc4fc33b9f9ba13abbb021303c8d438d96b2da7c190f9cdc9f2242c2df22ccc63b779747bc9b54e299a407b4150450352ce672efd9fd7565ffb5f410dd66a2061984a92c2ca847eb65e95168372a9e92cc53f27151c36569714d1b2b2b2d26b0e9668aa5042a767ab88ad81f2850cef1", 0xf2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) 2018/03/30 10:21:18 executing program 3: ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000000c0)={0x8, 0x10, 0x1, 0xffffffffffffff9c}) flock(r0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000000)={@random="cd38ffe40f97", @link_local={0x1, 0x80, 0xc2}, [], {@ipv6={0x86dd, {0x0, 0x6, "e30600", 0x18, 0x40000000003a, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}}}}}, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x4ab, 0x400800) 2018/03/30 10:21:18 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="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", 0xfc}], 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x200900, 0x103) connect$vsock_stream(r1, &(0x7f0000000600)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f000073e000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(cbc-twofish-avx)\x00'}, 0x58) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000500)={&(0x7f00000005c0)=[0x0, 0x0, 0x0], 0x3}) nanosleep(&(0x7f0000d1e000)={0x0, 0x1c9c380}, &(0x7f0000000000)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r3, 0x118, 0x0, &(0x7f0000000100)=0x7, 0x4) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000000c0)={0x1, 0x1, 0x1, 0x1, 0x0, 0x6}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000280)={r4, @in={{0x2, 0x4e23, @multicast2=0xe0000002}}, [0x8000, 0x9, 0x80000000, 0x3, 0x80, 0x8001, 0x800, 0x100, 0xe0db, 0x0, 0x2000000000, 0x200, 0x68, 0x0, 0x8]}, &(0x7f0000000380)=0x100) r5 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0xfffffffffffffdfa) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r5, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port1\x00', 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r5, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r6 = gettid() r7 = syz_open_procfs(r6, &(0x7f00000002c0)='maps\x00') readv(r7, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/28, 0x65}], 0x1) exit(0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r7, &(0x7f000004ffe0)=[{&(0x7f0000000000)=""/128, 0xe6}], 0x222) r8 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) connect$ax25(r3, &(0x7f00000006c0)={0x3, {"fc5da504005009"}, 0x7fff}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) getsockopt$netrom_NETROM_T1(r8, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r5, 0x80045301, &(0x7f0000000700)) 2018/03/30 10:21:18 executing program 7: clone(0x200, &(0x7f0000000100)="f0f7d70fc52207334efb558c957ea5882b23d85fa1659dc13aa7603b45aa407f02117308b1a8697bcf6617a98d145ec63b3cffa3123c2b94a42831af8d9bdb4b03d2954fdaa7e037f2c459a27e42921a924df6c5899ef4dbdb44bffbadd515d6024b7e3450b4ea54c55a229f4d694a292b270018a408b9ed54a0bc1929156ff004c1cf0b1728065c1ae04f4eeb552ff2420005e5ccb9400909127922c4a8e69ffbb96ca5bc95786113ae475b94c2c9a6a235276e2f1b7f01010000000000007a", &(0x7f0000000000), &(0x7f0000f8b000), &(0x7f00000d5000)) mknod(&(0x7f0000cd7000)='./file0\x00', 0x103a, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000340), &(0x7f000027a000)) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000080)={0x4, 0xffffffffffffff9c, 0x1}) bind$unix(r0, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) r1 = syz_open_procfs(0x0, &(0x7f000042cff4)='personality\x00') read(r1, &(0x7f0000f1bf7e)=""/130, 0xfffffdd8) sendmsg$netrom(r0, &(0x7f0000000940)={&(0x7f0000000280)=@ax25={0x3, {"cd85ba04970d56"}, 0x80000000}, 0x10, &(0x7f0000000480)=[{&(0x7f00000002c0)="26bb98db5928adfbdcd078e61e08", 0xe}, {&(0x7f0000000300)="3bc76bbfc4d4267c6f6639eb66e60bc12cfcfe0d0969c514b884a99b3690c85fe7615c163a4b6c682a8a7ba25ad52289b249d55b1b87417726db9429adc24430c189513ab51933f14e81fbd1da653cff6a476750ef16a3829303e607b0de1eef825d1bb9beb1dc83b24a7626a4bb495c004312b3f10a8e9222742846cfd6cf421c84eb42fde7e4e53bf06437e3e238e84c1a04fe7445e8e9df37", 0x9a}, {&(0x7f00000003c0)="6811", 0x2}, {&(0x7f0000000400)="080300b62d3c31650984cea8f095803c1c3691ccdd367af64c3d65b3c3771e5a7d64c824741ddbe657d99b2815871c00902fba26b7a5e0fea1e1108d3e712abd3c0abd373a37f90226", 0x49}], 0x4, &(0x7f00000004c0)=[{0x88, 0x1ff, 0x1, "767ff13b2c9714abac8ea41824aa851b8cdeaf8328f34e36613f96adfd4a12f23fe2d422eb7beab862547fc3aec305c5b95ec2d7b9afcd4fc3b880fcfd301549e82994e2b2f5804c1dc7db2b65619ee6662cb06b36ab823a09934bc755d96b66cbbc8f79b08fd207ed4bc33562afc2b5bf96b6d52ec8"}, {0x38, 0xff, 0x8, "e1dbeac57bdb866291cebd0c9db5b9f0922a09c0453bbdb072b44b2a2be1e6345e3ef00b"}, {0x90, 0x105, 0x80, "c7373a0907f6016e4df93c3a7f6b68e671208e9a2a4dfdc9a533c1fff898ad13e2b4228877c2e8177bb10bed5900ad350de93545dc7281eb0ec321c184243dc24ff366fc8361f1a7ee979f457e2974db899ab67ceab068c693083e28afea21d3113a3e49f453c2ba6a6fd6b484593003330b5675b01e065e921997c43ea80c"}, {0x18, 0x10e, 0xbe, "2186359c27"}, {0x30, 0x1, 0x40, "aa22132d236c1dc238ba9e4ad0da75cbc3b7fbde48bceef0c7eb"}, {0xd8, 0x10e, 0x0, "d14cd67dbc75af9cdc71b3607cb90c4bf94688f69d368bdfb62de182be679b3e7eb6fe7477c4b0e17e180f34327849e39d556e3982cf8cf7658be73c78addcb80ec37aef762427a659f9b875715b0a87781559f98a541d280baa18bd31b6de0d15dbd8f72a91107d973d4f911b0dd659b28af2cb9446d3597899f0d394f1116cf1cb6d2e288c85e983090aaa635bbdc4b704ea468c65f15d1bd3d1ab88ad43847a3037b807e6f993713fb91ffb278686d5b15ca471b78bdfde8db29bdc33cc2c49927276"}, {0xe8, 0x6, 0x7, "059f71d4486125953c1b895c278b1e8d9bb2a350067df3082facf1e356ffa39aec0efd6452b3f67c691ae3e76281f9d59b9e73efdf81d9cc86a4dd0c06418203b321f968376067fe31f0760f40bed104570860af4d04daa26faede7fee7de427a74be0276c45fdfe45f43a9a94162f49ca05da702d51c601f8d6af9251194383cb53f49f05f72f94a5bdedd7211ec0460ecc2f2752d0ff9d253df6ddcedabfe800a153d2b1f3a14c5449ec46d5fd6983bb4b370651f6450ec3c31bb47b2670aae1d74aee7ef668fe75e763cee323f4ffc10c"}, {0x50, 0x10b, 0x9, "136e1f6412145a85b6d08c2c54703752cc0e0a3ba85d291f8c89323ceacce6b2481141b5618e6ee4f72c5d84a60b439c01a2d9115cce8900627c36f8"}, {0x98, 0x115, 0x1, "620b169a863231df9612b76839e2e4e062c01fbc23cc31ed7414eb968c4f4a4bbc7a4d719b7191c54dea7499d5f7b74b5e9c5692658985678d9dbc2f988573f797bd24016937bd1ad0f1ad12ea02e9e0067f713d1f72ca09ac3678dcd31d3a91f10d129898d4310892de2215ea905a480f6a4ea1d3a147063aa7e36d1806ce046a66b23187"}, {0x28, 0x117, 0x100, "839272ba5b897c6590b89bbef1f4ce0792495cd0f6003cc9"}], 0x468}, 0x10) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000240)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x9, 0x18}, 0xc) ioctl$VHOST_GET_VRING_BASE(r0, 0xc008af12, &(0x7f0000000240)) open$dir(&(0x7f000050bff8)='./file0\x00', 0x2, 0x0) 2018/03/30 10:21:18 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00007e5000)={0xffffffffffffffff, 0xffffffffffffffff}) read(0xffffffffffffffff, &(0x7f0000000080)=""/59, 0x3b) fcntl$setstatus(r1, 0x4, 0x0) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000100)={r1}) bind(0xffffffffffffffff, &(0x7f0000f70000)=@un=@file={0x0, './file0\x00'}, 0xa) connect$unix(r1, &(0x7f0000c8e000)=@abs={0x1, 0x0, 0x4e22}, 0xffffffffffffff31) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect(r0, &(0x7f0000000000)=@nl=@unspec, 0x80) 2018/03/30 10:21:18 executing program 6 (fault-call:3 fault-nth:19): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r0, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r0, &(0x7f0000000100)=""/65, 0x41) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) linkat(r0, &(0x7f0000000480)='./file1\x00', r1, &(0x7f00000004c0)='./file0\x00', 0x1000) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') unlink(&(0x7f00000000c0)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r0, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x12021) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000340)={0x8, 0x9, 0x4, 0x10000, 0x1, 0x7, 0x7fffffff, 0x0, 0x29, 0x0, 0x20}, 0xb) 2018/03/30 10:21:18 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x1, &(0x7f0000001fe8)=ANY=[@ANYBLOB="a9346dabcd4067ec57"], &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0xc3, &(0x7f0000009f3d)=""/195}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="0300001000000000250936c5e6eb5dd9cd6b0000000000000000000000000000950000000000000004779e4928dafdd22704356faf037443d06b50c67a3500000000691e6e8c13af3c9ab180a92942057de751f2ad296cd83fe616484e14c8733cbae7e4f8e6e885ff7bef40afc98b7ba448121939d57f79e21fc94a5f"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0x437, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000100)=0x0) sched_setparam(r1, &(0x7f0000000140)=0xb8c) r2 = socket(0x10, 0x400000000003, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000040)=r0, 0x4) write(r2, &(0x7f00000005c0)="260000005e0009010000eaf83a0000000000c6eee83e24e98ae6c232229c478c9ed09164b4c0", 0x26) sendto(r2, &(0x7f0000000000)="f6c6e0439caa3965978a9c9991b57071fab4c09c459ba419131dcdc0dcbf9e9df88a0f435c742d356d228e96574fe33ca5da0eb79c6744b3", 0x38, 0x40, &(0x7f0000000080)=@nfc={0x27, 0x0, 0x2, 0x7}, 0x80) 2018/03/30 10:21:19 executing program 1: clock_nanosleep(0x2, 0x0, &(0x7f0000b85000)={0x0, 0x989680}, &(0x7f0000443000)) gettid() r0 = socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000578ffc), &(0x7f0000b3effc)=0x4) timer_create(0x0, &(0x7f0000000200), &(0x7f0000044000)) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x20000, 0x0) semctl$GETPID(0x0, 0x0, 0xb, &(0x7f0000000400)=""/137) accept(r0, &(0x7f0000000340)=@alg, &(0x7f00000003c0)=0x80) getegid() getegid() r1 = timerfd_create(0x7, 0x0) readv(r1, &(0x7f0000c64fa0)=[{&(0x7f0000952000)=""/219, 0xdb}], 0x1) timerfd_settime(r1, 0x1, &(0x7f0000dfa000)={{0x77359400}, {0x0, 0x1c9c380}}, &(0x7f00003eb000)) getegid() getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) 2018/03/30 10:21:19 executing program 5: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x2132, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x141580, 0x0) signalfd(r0, &(0x7f0000000100)={0xc4b}, 0x8) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000040)=""/159) r1 = socket$inet(0xa, 0x801, 0x20) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000dc0)=@nat={"6e6174000000000000000000006affffff00", 0x1b, 0x5, 0x338, 0x0, 0x218, 0xffffffff, 0xc8, 0x218, 0x2c0, 0x2c0, 0xffffffff, 0x2c0, 0x2c0, 0x5, &(0x7f0000002fb0), {[{{@uncond, 0x0, 0x70, 0xa8}, @DNAT0={0x38, 'DNAT\x00', 0x0, {0x1, {0x0, @rand_addr, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @port, @icmp_id}}}}, {{@uncond, 0x0, 0x70, 0xa8}, @REDIRECT={0x38, 'REDIRECT\x00', 0x0, {0x1, {0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @multicast1=0xe0000001, @port, @gre_key}}}}, {{@uncond, 0x0, 0x70, 0xa8}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @multicast2=0xe0000002, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @icmp_id}}}}, {{@uncond, 0x0, 0x70, 0xa8}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @dev={0xac, 0x14}, @icmp_id, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x398) [ 206.334022] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000012 [ 206.341603] cgroup: cgroup_addrm_files: failed to add cgroup.events, err=-12 2018/03/30 10:21:19 executing program 3: sync() listxattr(&(0x7f0000005b40)='./file0\x00', &(0x7f0000005b80)=""/72, 0x48) r0 = memfd_create(&(0x7f0000000100)=']\x00', 0x0) clone(0x0, &(0x7f0000000200)="17dd6280de3693223b6fdbc70650db5722605e7d4cfec7dee9e7ca3a83bd750a10fca3bdd2c2fde305012a95b619af30af684bba6e9e2031b1eec7e667e9c22c674d6eb942b78258369909dc14f2f5bd60202d6a38d497b47baf3e89fbca89a91e4706f3efdb55b9e9857fa2e05fdd62de157a7f60228f2c807e86ce264193d1206f5402c6f095c94a510e0c705386635a3f1a5970fd087434c0bf52f98bc0c951a8c18f7b8221c007a7f1c8d5", &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000300)) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000580)={0x0, 0x7, 0x80000000, 0x5}, &(0x7f0000000600)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f00000007c0)={r1, 0xcc65}, 0x8) r2 = getpid() gettid() r3 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom(r3, &(0x7f0000000280)=""/191, 0xbf, 0x0, &(0x7f0000000340)=@can={0x1d}, 0x80) r4 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r5 = memfd_create(&(0x7f00000000c0)="74086e750000000000000000008c00", 0x2) ioctl$LOOP_CHANGE_FD(r5, 0x4c06, r4) pwritev(r5, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/loop-control\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000640)={0x0, @in={{0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}}}, &(0x7f0000000700)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000100)={0x9, 0x200, 0x2, 0x2, r6}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r5, 0x84, 0x73, &(0x7f0000000180)={r7, 0x0, 0x0, 0x101}, &(0x7f00000001c0)=0x18) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000500)={0xc000000, 0x3ff, 0x2c}) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x100, 0x0) sendfile(r4, r4, &(0x7f0000000080)=0x5f, 0x102000004) ioctl$LOOP_CLR_FD(r4, 0x4c01) sync() ftruncate(r4, 0x2) move_pages(r2, 0xa, &(0x7f0000000740)=[&(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000000)=[0x5, 0x90, 0xff, 0x5, 0x8], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0], 0x4) r8 = dup2(r5, r4) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000480)=0x8, 0xfffffffffffffd9e) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r5, 0x28, 0x0, &(0x7f00000005c0)=0x3, 0x8) setsockopt$IP_VS_SO_SET_EDIT(r8, 0x0, 0x483, &(0x7f0000000540)={0x84, @multicast2=0xe0000002, 0x4e20, 0x0, 'dh\x00', 0x28, 0xfff, 0x13}, 0x2c) ioctl$sock_netdev_private(r5, 0x89fe, &(0x7f00000003c0)="0aab95906cbf78d0113b9b11c035ec1b838e455485a0ae0c1dc7ead287ca35d95f330970a765dba3809e348d3d739c34fcbb996a276d6eae518354b310b63d5e6d4f02c584c900b9eed1ccd8c2d601c345a16a9770811f407c4232bb44f3f941d8cfe9138c1c2a09b466a541396572c076d8f96f042779cc2bdc8794dff7d80969b0a082393a735bb99d9c59fd538646854b79ccff7fdd4025a5c58b1e2acca8fd4f9a") 2018/03/30 10:21:19 executing program 6 (fault-call:3 fault-nth:20): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r0, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r0, &(0x7f0000000100)=""/65, 0x41) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) linkat(r0, &(0x7f0000000480)='./file1\x00', r1, &(0x7f00000004c0)='./file0\x00', 0x1000) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') unlink(&(0x7f00000000c0)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r0, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x12021) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000340)={0x8, 0x9, 0x4, 0x10000, 0x1, 0x7, 0x7fffffff, 0x0, 0x29, 0x0, 0x20}, 0xb) 2018/03/30 10:21:19 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000, 0x0, 0x4}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000d80)={r5, 0x13c, 0x7, 0xaa5, 0x1}, 0x14) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000dc0)={0xaa, 0x20}) pwrite64(r1, &(0x7f0000000e00)="7437032bd6e223b3a59d10357fc245a11551c76207ed30241886ce0ea1326aeac569322a47e5909770909834b26bf6b04af3b30656cbc3e07c3eed14ee7c472c2d276872498ef33618509e2049213b9664560dc77dd302976456a0392edd116b9816cbca183c77f192c4c3260a385cc483327645104ab9987888488ff6b8e163c2eddc4fc33b9f9ba13abbb021303c8d438d96b2da7c190f9cdc9f2242c2df22ccc63b779747bc9b54e299a407b4150450352ce672efd9fd7565ffb5f410dd66a2061984a92c2ca847eb65e95168372a9e92cc53f27151c36569714d1b2b2b2d26b0e9668aa5042a767ab88ad81f2850cef1", 0xf2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) 2018/03/30 10:21:19 executing program 7: clone(0x200, &(0x7f0000000100)="f0f7d70fc52207334efb558c957ea5882b23d85fa1659dc13aa7603b45aa407f02117308b1a8697bcf6617a98d145ec63b3cffa3123c2b94a42831af8d9bdb4b03d2954fdaa7e037f2c459a27e42921a924df6c5899ef4dbdb44bffbadd515d6024b7e3450b4ea54c55a229f4d694a292b270018a408b9ed54a0bc1929156ff004c1cf0b1728065c1ae04f4eeb552ff2420005e5ccb9400909127922c4a8e69ffbb96ca5bc95786113ae475b94c2c9a6a235276e2f1b7f01010000000000007a", &(0x7f0000000000), &(0x7f0000f8b000), &(0x7f00000d5000)) mknod(&(0x7f0000cd7000)='./file0\x00', 0x103a, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000340), &(0x7f000027a000)) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000080)={0x4, 0xffffffffffffff9c, 0x1}) bind$unix(r0, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) r1 = syz_open_procfs(0x0, &(0x7f000042cff4)='personality\x00') read(r1, &(0x7f0000000300)=""/130, 0x82) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000240)) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x9, 0x18}, 0xc) open$dir(&(0x7f00000003c0)='./file0\x00', 0xffffffffffffffff, 0x0) 2018/03/30 10:21:19 executing program 1: r0 = socket(0xa, 0x801, 0x8) getsockname$inet(r0, &(0x7f0000000000)={0x0, 0x0, @rand_addr}, &(0x7f0000000040)=0x10) 2018/03/30 10:21:19 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x9, &(0x7f0000000000)={0xffffffffffff19f8, @in6={{0xa, 0x4e20}}, 0x0, 0x2}, 0x5e9) 2018/03/30 10:21:19 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="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", 0xfc}], 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x200900, 0x103) connect$vsock_stream(r1, &(0x7f0000000600)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f000073e000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(cbc-twofish-avx)\x00'}, 0x58) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000500)={&(0x7f00000005c0)=[0x0, 0x0, 0x0], 0x3}) nanosleep(&(0x7f0000d1e000)={0x0, 0x1c9c380}, &(0x7f0000000000)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r3, 0x118, 0x0, &(0x7f0000000100)=0x7, 0x4) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000000c0)={0x1, 0x1, 0x1, 0x1, 0x0, 0x6}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000280)={r4, @in={{0x2, 0x4e23, @multicast2=0xe0000002}}, [0x8000, 0x9, 0x80000000, 0x3, 0x80, 0x8001, 0x800, 0x100, 0xe0db, 0x0, 0x2000000000, 0x200, 0x68, 0x0, 0x8]}, &(0x7f0000000380)=0x100) r5 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0xfffffffffffffdfa) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r5, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port1\x00', 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r5, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r6 = gettid() r7 = syz_open_procfs(r6, &(0x7f00000002c0)='maps\x00') readv(r7, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/28, 0x65}], 0x1) exit(0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r7, &(0x7f000004ffe0)=[{&(0x7f0000000000)=""/128, 0xe6}], 0x222) r8 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) connect$ax25(r3, &(0x7f00000006c0)={0x3, {"fc5da504005009"}, 0x7fff}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) getsockopt$netrom_NETROM_T1(r8, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r5, 0x80045301, &(0x7f0000000700)) 2018/03/30 10:21:19 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x400, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000140)={0x11, 0xaa, &(0x7f0000000080)="68b558c2995f1d64f7bf847f7286d79eaa54412a124dc98cede7e4ae933c39dfa35034aa5adf45f82932787b29beff3b0eec3d6257b6d097494dc3079ee9d7d386e105ae2145b217b4965acb6ad10b44f97512217dc9eea6ff4436e1588558ba3952038e22fa83661dd6d06be63ddede363bc99fefec3280a98d1b993a81eabc8fc3a640dd421d9ea9798889cb6f63f48ba2f4a3c99e0cc3a1975fe1e51d6f30f1fcb6a51de0b354b7ec"}) modify_ldt$write2(0x11, &(0x7f0000000180)={0xfff, 0x20000800, 0x7000, 0x3, 0x5451, 0x5, 0xcb8, 0x800, 0x8f63, 0x9}, 0x10) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2000, &(0x7f00000000c0), &(0x7f0000000000), &(0x7f0000001000), &(0x7f0000db7000)) 2018/03/30 10:21:19 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000002000)=@ethernet, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f000000dfc8)={&(0x7f0000019ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000019000)={0x1, 0x0, 0x0, {}, {}, {0x0, 0x0, 0x1}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "405e51f3ac446a3e"}}, 0x48}, 0x1}, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) r3 = openat$vnet(0xffffffffffffff9c, &(0x7f00002ac000)='/dev/vhost-net\x00', 0x2, 0x0) ptrace$getregs(0xe, 0x0, 0x200, &(0x7f00000002c0)=""/165) ioctl$int_in(r3, 0x0, &(0x7f0000000040)) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r4) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$TCSETS(r4, 0x5402, &(0x7f0000000700)={0x0, 0x86, 0x0, 0x4, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x7, 0x5, 0xd9}) ioctl$sock_SIOCSIFBR(r4, 0x8941, &(0x7f0000000600)=@add_del={0x2, &(0x7f0000000540)='bcsf0\x00', 0xfffffffffffffffc}) ioctl$VHOST_SET_VRING_ADDR(r3, 0x4028af11, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000080)=""/142, &(0x7f00000003c0)=""/69, &(0x7f0000000140)=""/14}) ioctl$VHOST_SET_FEATURES(r3, 0x4008af00, &(0x7f0000000640)=0x200000000) write$vnet(r3, &(0x7f0000000580)={0x1, {&(0x7f00000001c0)=""/219, 0x34c, &(0x7f0000000480)=""/98, 0xffffffffffffffff, 0x2}}, 0x68) ioctl$VHOST_NET_SET_BACKEND(r3, 0x4008af30, &(0x7f0000d7c000)={0x0, r4}) ioctl$VHOST_SET_LOG_BASE(r3, 0x4008af04, &(0x7f0000000500)=&(0x7f0000000380)) sendmmsg(r5, &(0x7f0000007840)=[{{&(0x7f0000000680)=@ax25={0x3, {"5b6adb975b9c0f"}, 0x7}, 0x80, &(0x7f0000000840), 0x0, &(0x7f0000000880), 0x0, 0x4}, 0x7}, {{0x0, 0x0, &(0x7f0000001e40)=[{&(0x7f0000000c40)="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", 0xfc}], 0x1, &(0x7f0000000a40)=ANY=[], 0x0, 0x800}, 0xff}, {{&(0x7f00000035c0)=@sco={0x1f, {0x8, 0x7, 0x1ff, 0xfffffffffffffffb, 0x0, 0x9e89}}, 0x80, &(0x7f0000005980)=[{&(0x7f0000003640)="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", 0x1000}], 0x1, &(0x7f0000005a00)}}, {{&(0x7f0000007200)=@in={0x2, 0x4e21, @broadcast=0xffffffff}, 0x80, &(0x7f0000007600)=[{&(0x7f0000007280)="a987ae5c10dcd0f729e4ad9d015c82d3df16a57f3a1a0f8a5b948ac7c7ff79f1c9908d7faed977b856141f6b03cf09d4f0fda1649cf73e07e4135d6c273833f9e2ca5cae6a453756e497494ef3079936f2bcfbde7229a2131cb888e77269c59809a9ecbd46df6c9725c5ef8dc2ca42d878711f570a4e70abf9ac50f52e85ef9a76d3d983ff8352ddbce873aea28cea27752b763714e747386055b4f3b2b2446064828a0d1fd5f7229689d88340f81fafaf24471cbb9e9fc53f607a5784167d183cda67f50c27966550cc9b136a77a667f47d105f0aaa5171742f8e8dd3c44753c20d4da04c748bc7c2138c", 0xeb}], 0x1, &(0x7f0000007680)=[{0x38, 0x112, 0xd86, "6d5ebf4e292e4fcc2baa163590df8941a0252f0015254a5c1f0266c727dd65e8ff7f"}], 0x38, 0xc841}, 0x20}], 0x4, 0xc004) sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000007ff0)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f000000afb8)={0x1, 0x0, 0x0, {0x77359400}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "8e15adecfc04aba1"}}, 0x48}, 0x1}, 0x0) dup2(r2, r0) 2018/03/30 10:21:19 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000, 0x0, 0x4}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000d80)={r5, 0x13c, 0x7, 0xaa5, 0x1}, 0x14) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000dc0)={0xaa, 0x20}) pwrite64(r1, &(0x7f0000000e00)="7437032bd6e223b3a59d10357fc245a11551c76207ed30241886ce0ea1326aeac569322a47e5909770909834b26bf6b04af3b30656cbc3e07c3eed14ee7c472c2d276872498ef33618509e2049213b9664560dc77dd302976456a0392edd116b9816cbca183c77f192c4c3260a385cc483327645104ab9987888488ff6b8e163c2eddc4fc33b9f9ba13abbb021303c8d438d96b2da7c190f9cdc9f2242c2df22ccc63b779747bc9b54e299a407b4150450352ce672efd9fd7565ffb5f410dd66a2061984a92c2ca847eb65e95168372a9e92cc53f27151c36569714d1b2b2b2d26b0e9668aa5042a767ab88ad81f2850cef1", 0xf2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) [ 206.695201] bond0 (unregistering): Released all slaves [ 207.460802] IPVS: ftp: loaded support on port[0] = 21 [ 207.745481] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 208.164281] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 208.170373] 8021q: adding VLAN 0 to HW filter on device bond0 [ 208.213950] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 208.257126] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 208.275792] FAULT_INJECTION: forcing a failure. [ 208.275792] name failslab, interval 1, probability 0, space 0, times 0 [ 208.287058] CPU: 1 PID: 25970 Comm: syz-executor6 Not tainted 4.16.0-rc7+ #371 [ 208.294403] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 208.303742] Call Trace: [ 208.306306] dump_stack+0x194/0x24d [ 208.309909] ? arch_local_irq_restore+0x53/0x53 [ 208.314562] should_fail+0x8c0/0xa40 [ 208.318256] ? kstrdup+0x39/0x70 [ 208.321603] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 208.326679] ? cgroup_mkdir+0x553/0xfc0 [ 208.330629] ? vfs_mkdir+0x390/0x600 [ 208.334317] ? SyS_mkdirat+0x22b/0x2b0 [ 208.338180] ? do_syscall_64+0x281/0x940 [ 208.342219] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 208.347560] ? find_held_lock+0x35/0x1d0 [ 208.351603] ? find_held_lock+0x35/0x1d0 [ 208.355646] ? __lock_is_held+0xb6/0x140 [ 208.359698] ? check_same_owner+0x320/0x320 [ 208.363998] ? rcu_note_context_switch+0x710/0x710 [ 208.368911] ? rcu_read_lock_sched_held+0x108/0x120 [ 208.373908] should_failslab+0xec/0x120 [ 208.377863] kmem_cache_alloc+0x47/0x760 [ 208.381897] ? memcpy+0x45/0x50 [ 208.385153] ? kstrdup+0x59/0x70 [ 208.388501] __kernfs_new_node+0xe2/0x570 [ 208.392633] ? kernfs_dop_revalidate+0x380/0x380 [ 208.397369] ? kasan_check_read+0x11/0x20 [ 208.401490] ? read_word_at_a_time+0x12/0x20 [ 208.405871] ? strscpy+0x186/0x500 [ 208.409399] kernfs_new_node+0x80/0xe0 [ 208.413268] __kernfs_create_file+0x4b/0x320 [ 208.417660] cgroup_addrm_files+0x3c5/0xa70 [ 208.421971] ? cgroup_file_write+0x710/0x710 [ 208.426363] ? getrawmonotonic64+0x460/0x460 [ 208.430749] ? kernfs_active+0x92/0x160 [ 208.434708] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 208.439615] ? cgroup_kn_set_ugid+0x2c7/0x370 [ 208.444087] ? cgroup_file_name+0x1d0/0x1d0 [ 208.448395] css_populate_dir+0x340/0x420 [ 208.452524] cgroup_mkdir+0x553/0xfc0 [ 208.456300] ? __lock_is_held+0xb6/0x140 [ 208.460347] ? cgroup_destroy_locked+0x750/0x750 [ 208.465078] ? rcu_read_lock_sched_held+0x108/0x120 [ 208.470068] ? kmem_cache_free+0x258/0x2a0 [ 208.474279] ? set_nlink+0xc1/0x160 [ 208.477882] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 208.482785] ? generic_permission+0x105/0x3c0 [ 208.487258] ? cgroup_destroy_locked+0x750/0x750 [ 208.491988] kernfs_iop_mkdir+0x153/0x1e0 [ 208.496116] vfs_mkdir+0x390/0x600 [ 208.499640] SyS_mkdirat+0x22b/0x2b0 [ 208.503335] ? SyS_mknod+0x480/0x480 [ 208.507023] ? trace_hardirqs_on+0xd/0x10 [ 208.511147] ? do_syscall_64+0xb7/0x940 [ 208.515100] ? SyS_mknod+0x480/0x480 [ 208.518792] do_syscall_64+0x281/0x940 [ 208.522653] ? __do_page_fault+0xc90/0xc90 [ 208.526861] ? _raw_spin_unlock_irq+0x27/0x70 [ 208.531333] ? finish_task_switch+0x1c1/0x7e0 [ 208.535806] ? syscall_return_slowpath+0x550/0x550 [ 208.540713] ? syscall_return_slowpath+0x2ac/0x550 [ 208.545620] ? prepare_exit_to_usermode+0x350/0x350 [ 208.550613] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 208.555959] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 208.560783] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 208.565944] RIP: 0033:0x4548b9 [ 208.569109] RSP: 002b:00007fd3c930dc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 208.576794] RAX: ffffffffffffffda RBX: 00007fd3c930e6d4 RCX: 00000000004548b9 [ 208.584037] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 208.591281] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 208.598524] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 2018/03/30 10:21:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt(r0, 0x400000000000003a, 0x20000000000001, &(0x7f0000000040)=""/188, &(0x7f0000000000)=0x4509630b) 2018/03/30 10:21:21 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000fcbff7)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x400, 0x0) sendmmsg$alg(r1, &(0x7f0000002380)=[{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="dabf9e10578be01804dbb0c0e0b1b58f4269b6e7b7c2fe3d3a693dca8d1131f1f88c101b4b57bbef348e55278dc65b8555cf62496dffff69a086f1bddc895c7935f1e041e58ac6382d95d88b941ecd735601e920dc301a31535754d863372305cb47a5e9008ec0b9a58137623f122b29ef8313699e7116ac9d98bcddc93f60db7c7eef3f3e3c00f6b0c4a364de3be380bca9099f", 0x94}], 0x1, &(0x7f0000000240)=[@assoc={0x18, 0x117, 0x4}, @assoc={0x18, 0x117, 0x4, 0x72}, @iv={0x1018, 0x117, 0x2, 0x1000, "f7c7990acbca8c5bc2f72376ba35d08623bcbea5606018003eb9727bc083a236bc7b3cefcc589cfbe3e1c61d2337fb51778b1219d3991af18efb77e5dcee3d8532d66c36db50e1dc44965460838b6b78564259b6ce0fbff192e3e604ed47f08820267eda8e7b0a7285fb0ed34f3342c4395da20ece9aac211c73d7e8bdfa302c24d4f0edea0c16eadf71a6191cdd04a926fd93fbb26fcbd6ea570482c77b474ef86cee127bf4abcaed025c20e4d5593c8e6ba7de9b861dc3728a2b4f4b7842697ed6d5705c7fff8548ad951e94321819288655927fad2801be69954e80b45e8803c407af894e3349de36c2701ac6520e410ede4feb23247b1aa38521fd3e4f7abea41800ce5c14e4e5fdeaadc9efd75bbb4791f8a12d89043a4493e7e146305d5a85f8d952457dd64665008483c447821e26d8a88e2720b72fe46b354c2c94bc90195bdba87b21689cd7cf49995b5d0412672eec1e0a9281aa4e6aa1aced267b44ebb8f64dd406546a0dd175241821a5300d6c313c0efae4f728b3860c7fc31c8eb262e8d9af7dae558400db11699e0400c3a75cb721a7ce2424e4a1c040ca97b0646f935914c50b9d7ecec6c3b40f0a3d056848dbc0ab3fa5ada16d7770b57141691b67bf4c3cac06db4113060d7680a3e814a0fe6db0f17dd4bdb169ebed084eb7dc7c204509ae578dccdfbc80b4c8288ab5c58b13aaad7ed0160455a58c8b3bd7e669e30af197d11b8da6fe2d5880cd16f8f064068019b02ca2d3ae58af91013d7ff337b459b2f4be58fc86525ddcfbf241d6a392a55852c4543fc2bfc53e32e2ca3c87c90ba073d9ee0b4c79b7c168536a8a386ac3b0c04c3e1e553e9855cbab71fab6aa665479cdc524d67c7349370391195766d4440edc8891f8c64fdd206cfd388ad809dec6bd46d7bd07d03aa7a1cc3682f4a10ca9cd69ddca4eefd0da6df982ac98fdeb647984672c2bb921da0a1a3da2180657ef8482bb0eb43d2f30bbdff7c3e632303bb381f1a1ba34eecfe378ea026c6e5820dec4ff0e373a9a5494d5feac14578f6224eeda8e6e941406e1b38febeb1cf3065c0f945b04ceac34179d30b936dd97b0dbf0fbd9aee11af6e3b682f000ce6322fd6bd91e4197d756a3875470648cc8c7464a3706c772d81856cfffa160b5171c890cd8b1e4db60a002a1ca24d6db848e14356f0515cd074c1132b660ab452644f9fbeb4a9cf37666805439e74d4ea8adaafa080d2c9a539d5ca4122740afa1980cb5a66a06dacdce30dde45ed43c1aaa0e600c5640496d04f9158b60aa9039c232f3930352c46054027c74b1a35c3de478160338275301380959188d3e1aa739ce1b315553a7fe0d92016711a86d7164c0f9a6d430596e3c9ced1c05becb2959ef3a8d7064d6c3a131cb529a7f1ac4dc21b9d669ac3b3b5dfcf08c2053e27cb447c5ae1b5905457875750ca4b1f7ba71d423d3486a0e0cb19d5f78f0647683455148686b8e202384124a76cf2cadd43f631072e694c13abf6b4385c221550a9c84f7b422f3d0c090f4d3ef44ab0e0da5e869c95865ac04ea56c72dddce845a54a5188a1492a009df337b15c051431642d19ff919a21cc08c5e71b8406767ffd5507ea961bcbe9b901c50dcc681f2a35ff0093bf9c8e3d5c00f068076042c8edffe4e23cb1b7f7c50cf369d556c4a0312b13e3f0cbb132cb4bf8db5de75541c8a22966c42d07d1eadaa0310c2f4929375fef3f1aec89cde019eab58cde6ed7b4ded52f26d240d7ada39d577f50f9d91e7a0c6f795419f7e656d684e463c8cc39146fe8425587d16a8577f9d251d3e47f638aef2d9d47bdf4f93b31825aa08e63ef4903187859a3fc79194235f2395b237c642e922a07def06fdfd4de23d85cdb203631fa9212f16cf9569ef9a1ab1b82e8a5e8622b708d6a24384bfdb619e1469b47cc4cd2711e11b88868064bb66343544a0f139f6ac96ed95b56c168eb46514adabbd3bb079736313b3e11ccc2f2e451f878470d494d6f2601bf23c7c990f2d6cc8ba20d42884d762da2b575288bba2146e54389923cb8d828596489a928efd0d9c88dbff317aad09f975022d1e01c6842ba499dc241a7b51bd2b5072952b9f2aa55ef888956b0fde820a2c0a019789aef9a832b7911274f0c53621854960c3da33ca4959a2f480e2e219f1a279703ca84936ab785ab51f026f0cdc3fc57816116a034580d2887151fbc5c0921b6ca7389b6561e1f3d6dcb5ae9ae22a4defa17153b34df9631f21d25097cdfd0162ef6cd9cccce55c8d12bf2289437d9765fff33979df27fd804c174f2870d31b10e98c87c52fdb33c37e7b0077e5da3fab867ead0c80591931a9380b8499c363f3c9251f9152fceb39dea798750272d6ccb33dd4a978419424cbc54f609d4b893ef89735211fccd913da9f8fb8fadbacdc61bb9f83e6d9a302ff089846e78cb1d5609c07b62af8c0bed81ec139dc692cf352442d8d605778b536cc2e84ad4316f41ba8669e26dc5e567b165ff90e5998e096d8d2c5c4b133e2e1aa8e1aa26c895b1101193f865d8657b30e97c08f45bf0493d3148b0729970760221332006ed23b770a0318cce25fd4271da9c9abad0d695afa2a08896f5bce10b12ca3a97fbb348f6869e8f5ed77c98c892096d359c193a8edf0fe2449fb05e4915d47a782c48d9eaee6124e5a074d14ff2f75d378ba5a047abe0f4ac91bfb54129f609b7b8d7672c867d0acfe48202fa685eec21e9116f72c44c9b38113bace48973390b32a045711c4f761801737684f842bc13c60f3f3745b034930adf49b611ff474610fe22102add87a93709097b475aed49bf1c5820b5a4267a46c23d18b00de060c987213d9c99e61f52e6b1552bf6b0046524460e46286734e6036b85641b64b96153bf5042c0a5ee77dc0646740d6b535fb8669ad89f53fb7d73460ad839aeead478688be77ad682b4312591d4e64a4969a72661c68fca1624e6fb3a927d6d3ad45971853a25dbf1b82cfbfd5e84e29f3df7e0ec233b24297e1f8ab6fa312394dcafd3bf2249c777eff1b08549e39866dfbdb9f08b22c9321e3789e0fc4f007efe561929fdf1ff03e9ff7b003ac818ae86a2ee7c57cb5c9101d6af27f3d53ebc4808082d1f810af100f267af0d2dab0271829f8908ba31e5f00644fb878f5fedd4c497f7b3a8adf7df42b709cd804cfb30d9560ce0e2e3293c519c8a3390e71378fbbeaa29dac3f53de4bcb6a010350dcd84bb0e78341dff61af93065b25db68a854adb960682534c623ad5480e3c91f87376f7948712e302ea7dc9fcad2763670a5c237164b4eeff75b05322e760041aa099cab54cd805e1e07adf87a1fba8bb8ab51bccbb8ed800b8ca8512a3352f6b8edb6fea19670ff3fd637a4df08abbb34ff0802802b910c8ef9507422f3257f9515dd14f7d2bc50e865f3d1c879fa759a872e5a3217e0ff3f60a9648d8709e14583f5bbda8688f4c0db0a8dda65600451df99750ae71a241d9aaf3121511acac57296e73cf1d5aaa16f3b7d737795d74b5b7d8dfa3dafe26ac14637f2d4b6db83751c43e8a8454fa78493e0ffc747f5c297f5ec89ebb2c7bb3f4bf4e91fb2c034e87e72f6c512e530eac94629d91b67ae1305d74dee4c1f72d8249b5907499167d78bf369a4fb30040fe9bf43d829da0da9479a46d01a6539381313eab81c3542d8d687db4cb595b22473c5300ed6c9c8db3739353adce334cf5cc9ff2a141faffeb9a7e522edd38367120c7c9efcc45a783df9bf4784f8db362caba24a6c0b73ab89e0a1e4171e8fc50428adc1ddf9f7fda1c49fde6560921e07c8c802c3542cc0e8f4e9fc2e05d62a9b4bd1eac1ee3ac7093fe1b6884111ccc86902cd049dfc42cbccb03f1098439841996244f5f77aa921b9210479b5ac51e485611bee7585054bf8a0b37fbe29f4b24286f343a531acaf1a35e7bc3f4f1294cea90865dea8b1144da7d68cb49e5a673fda17cbfad84d058e0401b613d79889d663d4db8cfa4dac1e918fd44c25b7c3bc1aa8f51e660fdf3fac179cca72cb19b74f90c35aa363b6387d29f956b6d5b246b4c1db953101830052af41f38a6edb23e5651ca45e73d9bf6d533a3e82c7c5b7efca92cc645da82a000a57a40730bba2e035ae73fbc9e1867aed87a390a7d5f77e2870ecb135d2a02bf0d40e7994f7229ebe0388039498f682202c7368300681d8729e7c0f7e7db4adc78c29927e7bc57f34e17acbf1b5bac662b5b8175961a771be88398d04455be8414b9f81941c649c97c48b1d47ce299bdd65522ba033bcff5b9188fcb36f8e0081a2af1ec3593fd990e4993927688990cedc8d0a49a07f34191cc7ae42361f34c20aaa4f3d9b9890e4e2916d7f24428fd9bc677313160d5e09ac26e867cb964c31624f0d7bffb680c18488838253b7d7e167345f06ac097e879685f2994030242fe1b49602ca9b666792007daf8479c5659472de43a504fcf0dccab7545b17adb962ad06b7632ecf396c0a93f05111cf0b4a6bb3e0e00f7b1a0fbc2d435428569552c0dbb3cbc0af9a6dc3b587bdadece1868632ed5a37316577dc534acdde316f035132c4f9f5abfc924e6ac92662d78bab1f90a47af8647bf93be309eb65024b6b80fe440513e1ddc9fbd516e4e7400f6fcb6495bcba367a81cc78bf1c5df7f13df7602378fbbfc2afbe49e5a8497a3e9788c9ba0f3b1a9b7f2f5042674a30290ffe49d2a2b33c38b7090a7a0ee65e455a4e3280d70ded86ec5d3a9f284546f99f58c967a877193c7f313c34606c49bbff9c33bfbe86b9c466b625329c899f9420a646f3d55511e4563f4706e6f816b0e4800f0d3294a322627a4d832d888b8b897c0b581a18d9d88dd7085372ec9781f59854da637dc7b447d21a732ffd395bd5cd36cd983fa03e64a32fe38bd1525fec09a69e0a70927b3faec54888105d2ee500f51e113fac5e19d6402cfa2b316b9d8629087ce9c04eb8f69c12e3366d3f3fa2404c476b2e02fff4f5c480665299eefc38c43b834c52ca7b21b7b710e8140dd9606bb85b6849f2856111a59e7e1474a62776a5517e4e3ebf3cc79a461106682a07458f8e6ffc163b1105fd2dbce5d12757bb7a2471c472341d5fc5f73799e4ebd25ef56395b201f994f8b8b412bc4bbb08fd14a7c2aac57be49bb260fdfc5b1e5f8cef88179e6dafdd8dbc3d587c112aeff763097e2eac04717d261bba215b23cdaa95c38995b3dff971d5bd5237e2fc9f11657812760f663ed3e9cf1e09c0f3045490e44f4c3cdb546e3b07ee909034c3d2d716b736c4574c6023a0014404820c612960e8348bad4e49c25d85e1a1b354aa130e307918c12a9b44a7e4a408a44d8c374c132c495ce6fd24b241b7aae393304bb2753dbf1d4849fcd6fba56acaa00494db1daa268002ef65a4027eaa40c6baa2f9c0e01655d02effe6fd7165a77b217c514e009c9978532a71c1bc15f8de723de40a69380944fc7aff691876df6b5cdf5bf23bb0575af24715f6976559719f093bde277e8aa8a156a0b550a3bbee71f8d46a72690f618cd53caf857524c86eb80a1386cdbde234d7fc56687a6b0d92aaaf422537b68e80537461147f9db494a8735a65e2fe6f11c72ca6f190ac5437888ea491a73b9aaf40337b0d95f4b2c2db4ab8b5f2621df0f7da9c1f36e728a937e90b1d760b6e23683a50e5c4138f4f05dc835abec9307bd24dd90f5dad1b7eb2ece6ce402124ad87ec39da3c6d8eb0f9fef06afe63d016fa5e1e1774d1b12b6ffbf0e9e0df00c42b5f26e7bf0158ba7"}, @op={0x18, 0x117, 0x3}, @op={0x18, 0x117, 0x3, 0x1}], 0x1078, 0x1}, {0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000012c0)="a21429b079ebff80b3ca0070728bc6b8997b0f16e664525ed6bf6fa6e2dddc562cd895814afa3a6d01bbecca6e20f12132f2a0470c5c539ea7175d0bcdf9c5e4fd4c529f6db3293c37722992195c6fbc2e63307bf7c6a57fd280639c1dec3df6284e2379fc22677b71c63b459450644778b1e55f051ecb9f83e256c6f87f727d5d9d8f2bc99a968ef5b396a0d8bc75d103e2fd62bf581a24af2e91655dfefca2e4056bd4a26de9ba2a617b721f778844f225bac0991be15129f62472aa84b06393485cc0bfcce70e6d562e6348ef50e6c95e60add40c21fa5494b3d3652c20b1ee8feae4c48b488422722b5412d4f24642c933b69cb62821b6d5bd1fa97358ae885a4749ad44971e63ac8509be101c7723ec55b4f551ae7342e68f963ee25d11ddb4f6be4f19680e86299b617a677ca9c5e72e422c4a43871fdb5d54ca9c164b6159dd44547806823bb619c268d0e8c354d563ad161fcaee51177bf32a9e8f17d94a259009dfea84bf7813e3306db3ecedbad5906fb1ef5c3b948241ba4474d5a7e2273af71e0f5e5d665a3e708394dd89b3a8caeab1ba23d49dd92796f189c89bfc3950ae45449bc6e89a6d43814c7c674b8c11847c9794ae4cb4f6da087dbf8b036cb49ce2666986cf5554599ca0222d02616785024570f9b671a11df2e3541e7a38bff90039d6a5dff4d9f4443c9d5baf8358574e1fc714d44a8c0af50b75ec502674ee91a785eaeb80aab3b1307d8c1850221a6530c5edcf91871c08e89a3bc1901c8ce0614e62489675d3405203f2be2b43d962d068cd94c8a95187a9319c33631e57b7f295fd83b0ec11534c127990d1d73942f8ab77b8617f2a95768bd77d85dc9915a07eb85287ee7ff0572893e9600bf45c3dc0432e1ef6c00dc3e0c5823b208aaa1ff018275ef061ac65a6c8472a34964abdb675ba71283835689129dc53157d13eef195fe30f28406aeb82bcc78301654c5161b2984b859807775ca8bc48933ebf7095aea9249473f50f671706371d26781ea4cdc954dd3cb1afec0bc2d2b021c913b2390574a5e92c3e7361cdcf7181325e905374451d8f1e721a2c68325c5400849288f476a04933afd9ba711bf8fd0e2d07c0f5e2a2e6414c3c5e8d80fef02749e1c1b33d9776defb2f99b6e6428aedab5e2151cfba2f3f14093dca3efcf22e7f3daf9e9db7e43cdebfbcfeaffd580d8a96bbaa35a606901d46cc1da7e1bd0605b57fdc2208f470d99772d317b2d4788e36448e8c6d0dc0134dc89a8b0255d6bc4eade8f995d3db789c8f4c5676bce323ecc767c298c78f7c700a58b7ead9dcdf86d8e7cd9f821f8bc668d896a3548023f0910f25a91131d8802515c821001d9848e2e0cb5250d6d642fa01b343a2348339ddc2b4d8dbb15f7d999aa5a90e1c5de50a71b06d167a8a3b1688717dcbc4066d8fdb7ee3be85a5fe36f6c8b3d5caeecd1a0a587d2246e4f6c2fd807a15dd4b796dd8521728152c501085bada2f63a689fd263b7c7ce8742c627505e1234736d548dbd50cc5ac10d2c315b676562848094d6ef1140de914def1635fb3deee9fbc72585f4d089b9ba3c2243d8907c06c295ec64570c91e78eecbce4f4e44c964e2be884de2977e2485b0749be5b8f96eb2bfbbdbb0622e0f4f308cd8113f5c53959b287e120076f53bc2b121d1e5e642fc27d638d7cd88b7157d17cc5c0a54844b0cf0ea76e6eacd03aec692280d6c6bb9290fe714ae93cb171635c50de4ec11cb3ad25cdc2e9ee33e76ac1a6de5a14615afccc8df9f262de3f03cd41a54e983b99c1cf543b39f9d27f057e052bcbaed66508f03bf4e9a0862b5ca083e00272ca165558fe08499939da30b80cf399662fa12926cd61c278c435647a2d1423e08645351f3683e1cd47fff452527ba36f97fdacd71be29041f7290929737b8a4b8ab7d928c70227ff3413723bfb3c4638128a0e8f89870b8755624de2d3a9724c82d1f31792bb2055ad77c5ccd3f758eab3695ec2fb4b1829dbe3ca6c716c3544780148f660aff86273d196f89ca4fae9a032428e0525eef36a23a62ae89df608cfe966d8c3f77eadf8323150989621019f4173ef9dee7b0824fd6c67976a09b92b037a57cf4e4c1e183a1a1481ad4912acfb4346820a7a72b627acd22d741098e1d7d6265906f1ba6283cb817bdf724605ca159ac87534f55f5f096fb44e2d0bb7e75763824f1271a3d787deb184b98701f8230b7e0c76aec8daf564f32f3bcc040ccd76b38876b9515de0bf0b0fda02302d613cf09e2c857eb0860c2f0fbb094794b59a12033def2567969566d02a771c2a5c61fbeb71776c63eb7add5910fdcfef1030010bdad0885ebdfa84c9e3dbec5434abde6142631bd4c723de076ac53f4027af8f560c25560d3e32d1d4f0b5d94ff059373e404552890692358b8ef6b0c5b7365f8fdea92f8c677fbb64a3b99dbc4dbde454de0d99b5172634e42d6f2d88c6511815d1c3642c462ac32600f4e526c0365df22e401121079c277772826b5f8324678a79cd2fe23ac9f08bd83f5b5f3a64a232926212340090412027b7f7d4d8bd093722042f4cc92bef8b14e89d48e6c9ae6b8bc3e30634d8bcff46d63aae1ef0ce68faaa95339b9c434d449c2700d95b6fa6eb54f8542b226459a7159bf1fdb5782997ff04842e8c37fabe926e5085f18efca4c41b810719756842f48d72835b6a4484aa519c1cf86d76bf409ff815dd91c3839e06edd8eb0fa8a96a2122746b2ebf2e89620f27199e817702c3eb1842911f98044e5f36b2ad5c1f7a6db278b75c5f3e7559c5c502ce7cc4a081bf5441bd6a16340b7c6f3b292eb1268a90d3e07805a98b845f81ea1e8ccee0d98b4ac29d303eada72e98b896f96b79f62d1d20e55655a211a819a440226013b5aeed8949557de3f1d50c2266e794a828c137fe5b21df8a95448499276322c7f86ac376ab844046029bb46096f84440eb179fb618fa89a4fdfd1bb6860611f3d17df5a0fa48dab1d14105c91053e62574fe26336260614ed8c3d5a601d69fade0b18cc52aac1ff75e0ef3e3da65057579c6b40740a16e479ba35fb89e2eef43edb07e0168e0f34d8447010f27a943c34d6d6ec966087dd4fbe6ace4fae9abda97835e65095b45ad3ae81c57295a8bbf9678852b46cf0fbd6be4f59d82d8d33ca5ca1373a3cdd6abd8443fa25bdf7a948f91f0564c983a9f92c877f3040d0a9d7bbf3cb241bb68c5604c8260f289520d21003bda19aa5595bae6606a8c87ae44c9e786555f269ba72b183a4f30ce1811d86de44c1828fead705855c88709a13164767e1b523a2f793fac6bb87d55d24f4fbfbcdc8b7d48a47348c6778697ed2a66ac4dfda8473b9bc50599422df9897d5255a25c2b741609930c0bf655e9924284ae62c965f4c37383d95417c6298d9781b86e95fc4db14f442739e36eef4da3be5f906272cc64524ed07b1cb8e4052af10ba14d69628a888120e3445d6b466ac426c9de70525d75282609103da2ff46cb9438d68fa15a493168755352e7ecfa0f1c691427ea932a3f73fe6a05c5cc61ae28257db828772847f53cad191a1f198ca56f8119cf36408c6bb4869bae772bc0ef2b6a717044cad5886521e1698b15f93942cdf9b1aea4f4f1990ec6ac021cf6419ee3b49e9bf46df01a08cbf56e99d02daea2b62f5c0929e0937ff638302bc23756f720fcc5b3d8c19689454c35abdb9a81590cc92af0d30c015c70f211e45884cd3353fde94c43dfa9da648e0c3e2b40deecb1a95807dfa02e72dee991bb03bbadbdeb457e58b707727c7ae9f08601452e1a1a3d94b3ebf888d0dcb32f39ba5d15a85cfc70625069860223cad8d7a7e7ac9c9544145cca87e9f4984491ba68eb592b3fd1a13639fdcd0be7dd4fdff8575a6383ae98b857254b4fb8585d66c0c423aab596312fce9f2b9c99f509b9122c2a8e5eab75fc6f490564565cde6c87fb6fd68a96a33227384faf7046880fae1f5534c5b71e7fb3f1df8f7c6d28228e7e64899c096f1989e98e1ce69ae8a7e60ab542b08b497339ac9375e74589fe2bc083fb3af1cfefd2a1d3988c00d6abebfee998b289c126ff5b218813975a57ab16749a03625ee5d634768ee41f36dacbded92c59efa514647e2edaa87d9fe4ab108df714b056c9603568b67c7f1af53282d7fff71abebe0522c0efd14c384045bd22b99762e207fcb1700f67c9dd96e5085abeef98973667eaabb4fbad472a2c4a43d710ac4da768d57e3edd2b861669cab4bf1f0344240f8d1593347474d19867ed57b034fddce09108ba3e06fb1bc5502696761ae87fff4abbe4819e1ffbc5b37994f1e933f71c538e62d09cc6a39350dadf29e70ccc5830498d51708d54a4e7f5e4d520004fe7284531766967383ef7938c733034ae8c885494e1b2fb97d00c886d6a28b39169765aad90075f16a49a429cca70325b5a87286e47032c969a17695b08f75397ae657d03f29ead5390eee36e4cb20753d670423c3ae63b2d1c69c18dcbf4e413057f87facf171670115ab2432771ba80a9f3b45feeacabdc2d8879f8fcbdcd96809bac053c07f813dbc7172e83c253b513fd0ee10179ae351ab33caebcd8e4db1511c4104207eb726a0b36f58068b42d4897485c276ee68ad11687a0049e5bfc2c81098f7d25fb7616c781079444e8e8d56862e56d6e3fb679dbf98392e67c38e9854cdfae5975c7e2714f0fd80546fe7e054726a762572e8eec7b1ab0ca1d45ca253b306aa15085acfe4a79926ed858753378fe89d4cf28fc62a14822a45f024db824ed89eb6c0dc4fa9ae718e02423db6edbb0096f74e6121371cd336ea25994aa3699b4d012dbb5f04b2f12267607888df4f9711ac13bd2f4778078bbcb913d658c29d6238e2238d1ab721914681ebf99f56f3f581641319455ed35f6608d217c8b4060c55797db17212b81bee4cdf2a224bf9d975ea42a50621b91e2a729e9898cf20037537914f3df959d61ed495a44eb6c8de2ec9783f7034ba5d7311462b04dc4db4163190ca9167fbac25d601eec71dbdcb565413438801969774ce49a4577caaf4b0425bfd499e91b2a1de422943a478cf584a211254960bc26acaed3fc4324512e78c0f943ac9b1df4ef2dd3dfb970a5de72e8ed9956fbae904bb9ea7eeeb60484ef957922f818620a245f4c099ca68ca8e632c13e8e8bd14cd7407669d1ac4dd0120737ecf39bb43f3bfb8ade3788094224b7c2abd4214f13765e2fcdbf6b63d85200326580eab0ac69581992f96edbd2ba5e2fc13f169acca6d1951a4686769f6ebadc7431205e6752ba144aead2448c5bf2ae44722923d45592326fa5175e4aeaef920ebeaecd99367d992cc6c6d93c6570e2d681ab898174f2c9e13eba84a453fef2353b2bbc6057da0717103c70871e91a185a1123d8859defccbf2ade2d4c940094b6704dbbc2c5fe2a82678435d801fd8fb8255c1000633f6e6a57c4f7868eeae481acac87053f4461c596b9338b84ad781e3b03a79f01baedd6e3795a05489af6fa0eb40967920214c635b25443a697072a58bfedf430de499e94a00026fc8a3104d6791174a5546be8f780ea5ffa1f4b306a365d2850521c60ea12a59c8d1b50d246790286cec91a7cb483f32004e62d4aea38f0fafb7103e80825948df7e59c9a857f6bef0813f70ca50f5ea8680ce4e41648f01c1e6644be39fa2576811e2fa73855099dbdd20276916311f85bde30a8e376a992a74e226559dea675f9d428e489abff1a0348cbe517e139ae58593482371211ced7856", 0x1000}, {&(0x7f00000022c0)="7001c71ef9a8c2b122d121554b80218a8f444078f4906b66f9e783e616e96e9b27b097d69512b89020b7af496178e253335f3c10ebe6b193c0a1f984b6a594e035adf751c4f3ed009d7397da0f081fb84aecfae288c23088", 0x58}], 0x2, &(0x7f0000002340)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x2, 0x20040000) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000000c0)={[], 0x0, 0x1600}) ioctl$KVM_RUN(r3, 0xae80, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x9, 0x13, r0, 0x0) 2018/03/30 10:21:21 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000, 0x0, 0x4}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000d80)={r5, 0x13c, 0x7, 0xaa5, 0x1, 0x8001}, 0x14) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000dc0)={0xaa, 0x20}) pwrite64(r1, &(0x7f0000000e00)="7437032bd6e223b3a59d10357fc245a11551c76207ed30241886ce0ea1326aeac569322a47e5909770909834b26bf6b04af3b30656cbc3e07c3eed14ee7c472c2d276872498ef33618509e2049213b9664560dc77dd302976456a0392edd116b9816cbca183c77f192c4c3260a385cc483327645104ab9987888488ff6b8e163c2eddc4fc33b9f9ba13abbb021303c8d438d96b2da7c190f9cdc9f2242c2df22ccc63b779747bc9b54e299a407b4150450352ce672efd9fd7565ffb5f410dd66a2061984a92c2ca847eb65e95168372a9e92cc53f27151c36569714d1b2b2b2d26b0e9668aa5042a767ab88ad81f2850cef1", 0xf2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) 2018/03/30 10:21:21 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f000001d000)="a9", 0x1, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r0, 0x7) r1 = accept4(r0, 0x0, &(0x7f0000021000), 0x0) connect$l2tp(r1, &(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffff9c, 0x4, 0x3, 0x0, 0x2, {0xa, 0x4e23, 0xffff, @mcast2={0xff, 0x2, [], 0x1}, 0x2}}}, 0x32) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x0, 0x10}, &(0x7f00000002c0)=0x18) clock_gettime(0x3, &(0x7f00000000c0)) getsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000000), &(0x7f0000000040)=0x4) setitimer(0x0, &(0x7f0000000fe0)={{0x100000000000, 0x2710}, {0x77359400}}, &(0x7f0000000fe0)) 2018/03/30 10:21:21 executing program 7: clone(0x200, &(0x7f0000000100)="f0f7d70fc52207334efb558c957ea5882b23d85fa1659dc13aa7603b45aa407f02117308b1a8697bcf6617a98d145ec63b3cffa3123c2b94a42831af8d9bdb4b03d2954fdaa7e037f2c459a27e42921a924df6c5899ef4dbdb44bffbadd515d6024b7e3450b4ea54c55a229f4d694a292b270018a408b9ed54a0bc1929156ff004c1cf0b1728065c1ae04f4eeb552ff2420005e5ccb9400909127922c4a8e69ffbb96ca5bc95786113ae475b94c2c9a6a235276e2f1b7f01010000000000007a", &(0x7f0000000000), &(0x7f0000f8b000), &(0x7f00000d5000)) mknod(&(0x7f0000cd7000)='./file0\x00', 0x103a, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000340), &(0x7f0000000340)=[&(0x7f0000000300)='personality\x00']) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000080)={0x4, 0xffffffffffffff9c, 0x1}) bind$unix(r0, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='selinuxfs\x00', 0x4000, 0x0) r1 = syz_open_procfs(0x0, &(0x7f000042cff4)='personality\x00') read(r1, &(0x7f0000f1bf7e)=""/130, 0xfffffdd8) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000240)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x9, 0x18}, 0xc) open$dir(&(0x7f000050bff8)='./file0\x00', 0x2, 0x0) 2018/03/30 10:21:21 executing program 0: ioctl$DRM_IOCTL_RM_MAP(0xffffffffffffffff, 0x4028641b, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000ffa000/0x1000)=nil}) clone(0x0, &(0x7f0000000000), &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000240)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000280)=0x10) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'bcsh0\x00', 0x3}) r1 = socket$unix(0x1, 0x2, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000640)=ANY=[@ANYBLOB="ac141412e00000010000000004000000ac1414aa00008001ac1414bbe00000021f784d7d848ed2d3f6d730669901fe3df4d12e1549f905e55928a333ac2dac28336c1865937f883cac41827782339b219d6bbc321232c0e767701714f419fa3cdb85ad9f0e82986de205cd63a5c474185c067f622480906c1d30225fe3a6669d342abd11652767fc5bdfb89b8f21668ecf85cede19459c6ddd91bbf55525e350f886e2f24e4a89639821db281102fb3af27041ce5ec7c13f88d4375b32cdf5913d3f64e75b976f630e95dd94d86387da1740ff82cf59db2e2f57638ff1d25edf5bdd88d26d4a421992fc74e118bc5b09c906"], 0x1) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000480)="ed1a7b781d232d492d659a02df7d552a25abf02c05529e1f187f70c3c82bc5deb6b35ed744c554afb8fe213b566eff28d4c253d15961655ffd88b726cad7e44044d6c34fb214d443521d49e36038bd99feec1aab8b6e9d70f9dc7738525a0ce3b599437cb53f4e5e21b411aca54a71d8b2e1e06dc2a61f3cd0896ae96a5fd818df3fa5da275090c01279f448a8226b5b67329dd7ee4018b66ca42ca1", 0x9c, 0xfffffffffffffff8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000540)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xe8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8923, &(0x7f0000000380)={'bcsh0\x00', 0xfff}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000100)='highspeed\x00', 0xa) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000340)) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x501002, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10100}, 0xc, &(0x7f0000000400)={&(0x7f0000000740)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="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"], 0x124}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) 2018/03/30 10:21:21 executing program 6 (fault-call:3 fault-nth:21): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r0, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r0, &(0x7f0000000100)=""/65, 0x41) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) linkat(r0, &(0x7f0000000480)='./file1\x00', r1, &(0x7f00000004c0)='./file0\x00', 0x1000) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') unlink(&(0x7f00000000c0)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r0, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x12021) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000340)={0x8, 0x9, 0x4, 0x10000, 0x1, 0x7, 0x7fffffff, 0x0, 0x29, 0x0, 0x20}, 0xb) 2018/03/30 10:21:21 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="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", 0xfc}], 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x200900, 0x103) connect$vsock_stream(r1, &(0x7f0000000600)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f000073e000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(cbc-twofish-avx)\x00'}, 0x58) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000500)={&(0x7f00000005c0)=[0x0, 0x0, 0x0], 0x3}) nanosleep(&(0x7f0000d1e000)={0x0, 0x1c9c380}, &(0x7f0000000000)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r3, 0x118, 0x0, &(0x7f0000000100)=0x7, 0x4) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000000c0)={0x1, 0x1, 0x1, 0x1, 0x0, 0x6}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000280)={r4, @in={{0x2, 0x4e23, @multicast2=0xe0000002}}, [0x8000, 0x9, 0x80000000, 0x3, 0x80, 0x8001, 0x800, 0x100, 0xe0db, 0x0, 0x2000000000, 0x200, 0x68, 0x0, 0x8]}, &(0x7f0000000380)=0x100) r5 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0xfffffffffffffdfa) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r5, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port1\x00', 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r5, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r6 = gettid() r7 = syz_open_procfs(r6, &(0x7f00000002c0)='maps\x00') readv(r7, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/28, 0x65}], 0x1) exit(0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r7, &(0x7f000004ffe0)=[{&(0x7f0000000000)=""/128, 0xe6}], 0x222) r8 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) connect$ax25(r3, &(0x7f00000006c0)={0x3, {"fc5da504005009"}, 0x7fff}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) getsockopt$netrom_NETROM_T1(r8, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r5, 0x80045301, &(0x7f0000000700)) [ 208.605766] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000014 [ 208.613513] cgroup: cgroup_addrm_files: failed to add cgroup.max.descendants, err=-12 2018/03/30 10:21:21 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) unshare(0x400) getsockname$inet(r0, &(0x7f0000000100)={0x0, 0x0, @dev}, &(0x7f0000000140)=0x10) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x40401, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000040)=0x76) 2018/03/30 10:21:21 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000, 0x0, 0x4}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000d80)={r5, 0x13c, 0x7, 0xaa5, 0x1, 0x8001}, 0x14) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000dc0)={0xaa, 0x20}) pwrite64(r1, &(0x7f0000000e00)="7437032bd6e223b3a59d10357fc245a11551c76207ed30241886ce0ea1326aeac569322a47e5909770909834b26bf6b04af3b30656cbc3e07c3eed14ee7c472c2d276872498ef33618509e2049213b9664560dc77dd302976456a0392edd116b9816cbca183c77f192c4c3260a385cc483327645104ab9987888488ff6b8e163c2eddc4fc33b9f9ba13abbb021303c8d438d96b2da7c190f9cdc9f2242c2df22ccc63b779747bc9b54e299a407b4150450352ce672efd9fd7565ffb5f410dd66a2061984a92c2ca847eb65e95168372a9e92cc53f27151c36569714d1b2b2b2d26b0e9668aa5042a767ab88ad81f2850cef1", 0xf2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) 2018/03/30 10:21:21 executing program 5: r0 = memfd_create(&(0x7f0000000000)=',md5sum\x00', 0x2) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x100000001) getsockopt$inet6_int(r0, 0x29, 0xf, &(0x7f0000000040), &(0x7f0000000080)=0x4) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x200000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000100)=[@in6={0xa, 0x4e23, 0x4, @remote={0xfe, 0x80, [], 0xbb}, 0x930}, @in6={0xa, 0x4e20, 0x2, @loopback={0x0, 0x1}, 0xa86}, @in={0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}, @in6={0xa, 0x4e21, 0x91, @mcast2={0xff, 0x2, [], 0x1}, 0x2}, @in6={0xa, 0x4e22, 0x363b, @local={0xfe, 0x80, [], 0xaa}, 0x6}], 0x80) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x80002, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r0, 0x4040aea0, &(0x7f00000001c0)={0x8, 0x0, 0x8, 0x0, 0x2c8, 0xfff, 0x101, 0x4, 0x8, 0x400, 0x20, 0x8, 0x0, 0x7, 0x0, 0x2, 0x8000, 0x8, 0x7}) ioctl$ASHMEM_GET_PIN_STATUS(r2, 0x7709, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x4c, &(0x7f0000000200)=[@in={0x2, 0x4e22, @loopback=0x7f000001}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in6={0xa, 0x4e21, 0x3ff, @mcast2={0xff, 0x2, [], 0x1}, 0x6}]}, &(0x7f00000002c0)=0x10) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000300)={r3, 0x102, 0x7ff, 0x8}, &(0x7f0000000340)=0x10) getsockopt$EBT_SO_GET_INIT_INFO(r2, 0x0, 0x82, &(0x7f0000000380)={'nat\x00'}, &(0x7f0000000400)=0x78) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r2, 0xc0bc5351, &(0x7f0000000440)={0x7, 0x3, 'client1\x00', 0x2, "ecb89428a7b88cb5", "105280654476593c1c8aeb6f1ee33189268494a13afdf8ce528a64ecfe32da8d", 0xffffffffffffff92, 0x1}) listen(r2, 0x1) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000500)='/dev/mixer\x00', 0xa0002, 0x0) ioctl$sock_SIOCGSKNS(r4, 0x894c, &(0x7f0000000540)=0x8) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000580)={{&(0x7f0000ff9000/0x4000)=nil, 0x4000}, 0x2}) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000005c0)=0x1, 0x4) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000600)=0x80, 0x4) ioctl$VT_GETSTATE(r2, 0x5603, &(0x7f0000000640)={0x2, 0x4, 0x9}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r1, 0x408c5333, &(0x7f0000000680)={0x80, 0x8000, 0x7, 'queue0\x00', 0x8}) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000780)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r2, &(0x7f0000000840)={&(0x7f0000000740)={0x10}, 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x3c, r5, 0xa02, 0x70bd2b, 0x25dfdbfb, {0x1}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x94}, 0x4000000) pwrite64(r1, &(0x7f0000000880)="ce713850a572f5fc864d85cdc51de46983ee01a788774e", 0x17, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f00000008c0)={0x2, 0x2, 0x3, 0x6, r3}, &(0x7f0000000900)=0x10) getsockopt$IPT_SO_GET_ENTRIES(r4, 0x0, 0x41, &(0x7f0000000940)={'security\x00', 0xe6, "e3d0471ece0aebd53d26a28a45b1abe57fdf48b5333f92f2bc1a58d1412fc3e56f7af08900f0e379252fcb1a5ba41c3e61ccaa5ce7bff04a89889e24bc6a28a9e9186b81cfe2671aa802886d82af0b0a8ab90da6c6ef58a0b15158d65230041daa0113e05a077b8f2ab86a821484cd808c57f8f575a17e26d6540c5b9b12168d414f9021bac51402943d8c16d69777b828b7f6e43e689eeaac0c11188a2f0c358d87e24100293509b7cdf5a510af901c0167059ac68ab48f333bdecf796afb93e7b3ee507aa25c4370df1416a97a45e3ce6088ddc277e576f4bc1fbd1d8c711e205275d0383a"}, &(0x7f0000000a80)=0x10a) llistxattr(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)=""/57, 0x39) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000b40)=0x0) ioctl$TIOCSPGRP(r4, 0x5410, &(0x7f0000000b80)=r6) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000bc0)={{{@in=@rand_addr, @in=@broadcast}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000cc0)=0xe8) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000000d00)={@loopback={0x0, 0x1}, 0x0, 0x3, 0xff, 0x8, 0xa259, 0x0, 0x6}, 0x20) 2018/03/30 10:21:21 executing program 6 (fault-call:3 fault-nth:22): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r0, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r0, &(0x7f0000000100)=""/65, 0x41) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) linkat(r0, &(0x7f0000000480)='./file1\x00', r1, &(0x7f00000004c0)='./file0\x00', 0x1000) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') unlink(&(0x7f00000000c0)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r0, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x12021) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000340)={0x8, 0x9, 0x4, 0x10000, 0x1, 0x7, 0x7fffffff, 0x0, 0x29, 0x0, 0x20}, 0xb) 2018/03/30 10:21:21 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x42000, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000080)={'ah\x00'}, &(0x7f0000000000)=0x24b) 2018/03/30 10:21:21 executing program 3: perf_event_open(&(0x7f0000220000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000504ff7)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x101102, 0x0) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) prlimit64(0x0, 0x7, &(0x7f0000d41000), &(0x7f0000eebff0)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = semget$private(0x0, 0x2, 0x3c0) r4 = geteuid() stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getuid() fstat(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r3, 0x0, 0x1, &(0x7f00000001c0)={{0x0, r4, r5, r6, r7, 0x112, 0x6}, 0x6, 0x3f, 0xfd}) 2018/03/30 10:21:21 executing program 7: clone(0x200, &(0x7f0000000100)="f0f7d70fc52207334efb558c957ea5882b23d85fa1659dc13aa7603b45aa407f02117308b1a8697bcf6617a98d145ec63b3cffa3123c2b94a42831af8d9bdb4b03d2954fdaa7e037f2c459a27e42921a924df6c5899ef4dbdb44bffbadd515d6024b7e3450b4ea54c55a229f4d694a292b270018a408b9ed54a0bc1929156ff004c1cf0b1728065c1ae04f4eeb552ff2420005e5ccb9400909127922c4a8e69ffbb96ca5bc95786113ae475b94c2c9a6a235276e2f1b7f01010000000000007a", &(0x7f0000000000), &(0x7f0000f8b000), &(0x7f00000d5000)) mknod(&(0x7f0000cd7000)='./file0\x00', 0x103a, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000340), &(0x7f0000000280)=[&(0x7f0000000240)='$vboxnet1\\,$ppp1vmnet0-mime_typewlan0-$selinux\x00']) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000080)={0x4, 0xffffffffffffff9c, 0x1}) bind$unix(r0, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) bind(r0, &(0x7f0000000300)=@pptp={0x18, 0x2, {0x3, @multicast2=0xe0000002}}, 0x80) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f00000002c0)={0x6, 0x7}) r1 = syz_open_procfs(0x0, &(0x7f000042cff4)='personality\x00') read(r1, &(0x7f0000f1bf7e)=""/130, 0xfffffdd8) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000240)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x9, 0x18}, 0xc) open$dir(&(0x7f000050bff8)='./file0\x00', 0x2, 0x0) [ 208.819992] ÿ: renamed from bcsh0 [ 208.920676] bond0 (unregistering): Released all slaves [ 209.587781] IPVS: ftp: loaded support on port[0] = 21 [ 209.874778] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 210.285917] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 210.292037] 8021q: adding VLAN 0 to HW filter on device bond0 [ 210.334903] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 210.379520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 210.399313] FAULT_INJECTION: forcing a failure. [ 210.399313] name failslab, interval 1, probability 0, space 0, times 0 [ 210.410563] CPU: 0 PID: 26194 Comm: syz-executor6 Not tainted 4.16.0-rc7+ #371 [ 210.417906] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 210.427239] Call Trace: [ 210.429804] dump_stack+0x194/0x24d [ 210.433409] ? arch_local_irq_restore+0x53/0x53 [ 210.438064] should_fail+0x8c0/0xa40 [ 210.441751] ? kstrdup+0x39/0x70 [ 210.445095] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 210.450173] ? cgroup_mkdir+0x553/0xfc0 [ 210.454120] ? vfs_mkdir+0x390/0x600 [ 210.457805] ? SyS_mkdirat+0x22b/0x2b0 [ 210.461665] ? do_syscall_64+0x281/0x940 [ 210.465702] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 210.471047] ? find_held_lock+0x35/0x1d0 [ 210.475109] ? find_held_lock+0x35/0x1d0 [ 210.479152] ? __lock_is_held+0xb6/0x140 [ 210.483201] ? check_same_owner+0x320/0x320 [ 210.487500] ? rcu_note_context_switch+0x710/0x710 [ 210.492405] ? rcu_read_lock_sched_held+0x108/0x120 [ 210.497403] should_failslab+0xec/0x120 [ 210.501352] kmem_cache_alloc+0x47/0x760 [ 210.505384] ? memcpy+0x45/0x50 [ 210.508642] ? kstrdup+0x59/0x70 [ 210.511987] __kernfs_new_node+0xe2/0x570 [ 210.516113] ? kernfs_dop_revalidate+0x380/0x380 [ 210.520849] ? kasan_check_read+0x11/0x20 [ 210.524972] ? read_word_at_a_time+0x12/0x20 [ 210.529352] ? strscpy+0x186/0x500 [ 210.532883] kernfs_new_node+0x80/0xe0 [ 210.536748] __kernfs_create_file+0x4b/0x320 [ 210.541135] cgroup_addrm_files+0x3c5/0xa70 [ 210.545443] ? cgroup_file_write+0x710/0x710 [ 210.549837] ? getrawmonotonic64+0x460/0x460 [ 210.554224] ? kernfs_active+0x92/0x160 [ 210.558177] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 210.563083] ? cgroup_kn_set_ugid+0x2c7/0x370 [ 210.567556] ? cgroup_file_name+0x1d0/0x1d0 [ 210.571868] css_populate_dir+0x340/0x420 [ 210.575997] cgroup_mkdir+0x553/0xfc0 [ 210.579776] ? __lock_is_held+0xb6/0x140 [ 210.583820] ? cgroup_destroy_locked+0x750/0x750 [ 210.588558] ? rcu_read_lock_sched_held+0x108/0x120 [ 210.593552] ? kmem_cache_free+0x258/0x2a0 [ 210.597766] ? set_nlink+0xc1/0x160 [ 210.601459] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 210.606366] ? generic_permission+0x105/0x3c0 [ 210.610840] ? cgroup_destroy_locked+0x750/0x750 [ 210.615574] kernfs_iop_mkdir+0x153/0x1e0 [ 210.619701] vfs_mkdir+0x390/0x600 [ 210.623224] SyS_mkdirat+0x22b/0x2b0 [ 210.626920] ? SyS_mknod+0x480/0x480 [ 210.630622] ? trace_hardirqs_on+0xd/0x10 [ 210.634745] ? do_syscall_64+0xb7/0x940 [ 210.638699] ? SyS_mknod+0x480/0x480 [ 210.642388] do_syscall_64+0x281/0x940 [ 210.646248] ? __do_page_fault+0xc90/0xc90 [ 210.650456] ? _raw_spin_unlock_irq+0x27/0x70 [ 210.654927] ? finish_task_switch+0x1c1/0x7e0 [ 210.659407] ? syscall_return_slowpath+0x550/0x550 [ 210.664312] ? syscall_return_slowpath+0x2ac/0x550 [ 210.669217] ? prepare_exit_to_usermode+0x350/0x350 [ 210.674208] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 210.679568] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 210.684396] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 210.689559] RIP: 0033:0x4548b9 [ 210.692741] RSP: 002b:00007f0d8a15bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 210.700431] RAX: ffffffffffffffda RBX: 00007f0d8a15c6d4 RCX: 00000000004548b9 [ 210.707676] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 210.714922] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 210.722166] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 2018/03/30 10:21:23 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={&(0x7f00003c7ff4)={0x10}, 0xc, &(0x7f0000bd7000)={&(0x7f0000c07e98)=@newsa={0x154, 0x10, 0x713, 0xffffffffffffffff, 0xffffffffffffffff, {{@in=@rand_addr, @in6=@dev={0xfe, 0x80}}, {@in6, 0xffffffffffffffff, 0x33}, @in=@broadcast=0xffffffff, {}, {}, {}, 0xffffffffffffffff, 0xffffffffffffffff, 0xa}, [@replay_esn_val={0x1c, 0x17, {0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff}}, @algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x154}, 0x1}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x5e4, 0x300) getsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000200), &(0x7f0000000240)=0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={r0}) syz_open_dev$binder(&(0x7f0000001340)='/dev/binder#\x00', 0x0, 0x800) poll(&(0x7f0000000080)=[{r2, 0x8000}, {r2, 0x1}, {r0}, {r2, 0x4000}, {r2, 0x1}, {r2, 0x400}, {r0, 0x400}, {r0, 0x5002}], 0x8, 0x5) ioctl$sock_netdev_private(r2, 0x89fd, &(0x7f00000012c0)="d5d8c3f7b53fdf8dfbeca15713f44a375f4b3232173dc29443ba84d849896651f271d2a403bbe5149f08e899ed5f23fe519a78ec1371f73e1082a0c9f8d4") setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x4e24}, @in6={0xa, 0x4e24, 0x9, @local={0xfe, 0x80, [], 0xaa}, 0x1}], 0x2c) pwritev(r2, &(0x7f0000001200)=[{&(0x7f00000000c0)="b68516498862f5058c733a17e326adfc2ebadb6e75a36043442b4e06426f98746c93dad3a08d939d1d24590315d5e4bebb78ff5046fb92b15dc0322a145cdfafaff303c89b0346b6074c45d04bcd404b967448791d709df712dd50a06d659ce31c8b9f8a37a1d121282aa41f30da38bea544691f8f8979f2e12f408a6ef05785d5f51d2389dbbd3e862b64ec50c53c72a89cd4393b6b6823a8a591d0aa0807888ebd8620b7f903f043201101d26f12232b0065c4b135cc378902cde7f8d9564184bb1903b6733984477ab5033867e7be88d3f2199d457dc43ec58807d0b2c285e8d1acbefdc4a875060b3f258781fa985ad2b3afffed", 0xf6}, {&(0x7f00000011c0)="43c19ea4f287cf08c6", 0x9}], 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000001240), &(0x7f0000001280)=0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000280)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000002c0)=0x24) setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000300)={r3, 0x7f, 0x80}, 0x10) 2018/03/30 10:21:23 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000, 0x0, 0x4}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000d80)={r5, 0x13c, 0x7, 0xaa5, 0x1, 0x8001}, 0x14) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000dc0)={0xaa, 0x20}) pwrite64(r1, &(0x7f0000000e00)="7437032bd6e223b3a59d10357fc245a11551c76207ed30241886ce0ea1326aeac569322a47e5909770909834b26bf6b04af3b30656cbc3e07c3eed14ee7c472c2d276872498ef33618509e2049213b9664560dc77dd302976456a0392edd116b9816cbca183c77f192c4c3260a385cc483327645104ab9987888488ff6b8e163c2eddc4fc33b9f9ba13abbb021303c8d438d96b2da7c190f9cdc9f2242c2df22ccc63b779747bc9b54e299a407b4150450352ce672efd9fd7565ffb5f410dd66a2061984a92c2ca847eb65e95168372a9e92cc53f27151c36569714d1b2b2b2d26b0e9668aa5042a767ab88ad81f2850cef1", 0xf2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) 2018/03/30 10:21:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000004c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) r1 = open(&(0x7f0000d93ff8)='./file0\x00', 0x80040, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)={0x0, 0x0}) r3 = add_key(&(0x7f0000000380)='pkcs7_test\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r4 = add_key$keyring(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8) mkdir(&(0x7f0000000940)='./file1\x00', 0x171) keyctl$instantiate_iov(0x14, r3, &(0x7f0000000800)=[{&(0x7f0000000400)}], 0x1, r4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ppoll(&(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f0000000000)={0xc2}, 0xe93722db4874638e) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000180)=0xc) getuid() sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000001740)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000000000000000000000000000000000ecce617987a4ec46387b889d080000"], 0x14}, 0x1}, 0x0) r8 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) sync() ioctl$KVM_SET_USER_MEMORY_REGION(r6, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r8, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000de9000)=[@text32={0x20, &(0x7f0000f59fc6)="0fc75fedc4c3c968fb6c0f9cfbb9040100c00f3266b842008ee80f230064672ec015dec4e245bea5d41e6082f9440f20c03506000000440f22c0", 0x3a}], 0x1, 0x0, &(0x7f0000000180), 0x1ba) syz_open_dev$admmidi(&(0x7f0000000300)='/dev/admmidi#\x00', 0x0, 0xe553a10b723012d6) ioctl$KVM_RUN(r7, 0xae80, 0x0) fstat(r0, &(0x7f0000000280)) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000040)={0x0, r2}) ioctl$KVM_GET_EMULATED_CPUID(r1, 0xc008ae09, &(0x7f0000000180)=""/18) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000080)={0x0, r9}) r10 = open(&(0x7f0000000240)='./file0\x00', 0x14104a, 0x0) write$evdev(r10, &(0x7f0000037fe8)=[{}], 0x18) sendfile(r10, r1, &(0x7f00009bcffe), 0x4c35) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[]}, 0x1}, 0x80) 2018/03/30 10:21:23 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="84d5aef1603cb020c5b219faa757913ec85ee74a155e1d635566777b78600bc65bf01ce33de9a6bc3a2041890df0926f2cfc2a7d63690f6b55610593773041755f61b034e3a62a770855b2c0481df219efbfa8ffd0c665434a1de026bcfb654d597ef77a7b231aa9efe45c53811c7591d56f69e9c6231e6da993bbd2a6133805be0c18ba114cfe865e693024a56c3331b93c03e25927a504d27acebf7eecd33d7c69359e3ca37dc546c4fc5bc62596a94cdc00f9b973616a9d2ebad2d9b3e60261ae73b8397694e1f0851475b4236fb47989e6bfd1ad926a01523df3f689dc2603a76b5fc5e023d5449d066d424d1001fee5d653c21fdb751e95ff2b", 0xfc}], 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x200900, 0x103) connect$vsock_stream(r1, &(0x7f0000000600)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) rt_sigtimedwait(&(0x7f0000000140)={0xffffffff}, 0x0, &(0x7f0000000180), 0x8) bind$alg(0xffffffffffffffff, &(0x7f000073e000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(cbc-twofish-avx)\x00'}, 0x58) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000500)={&(0x7f00000005c0)=[0x0, 0x0, 0x0], 0x3}) nanosleep(&(0x7f0000d1e000)={0x0, 0x1c9c380}, &(0x7f0000000000)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r2, 0x118, 0x0, &(0x7f0000000100)=0x7, 0x4) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000000c0)={0x1, 0x1, 0x1, 0x1, 0x0, 0x6}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000280)={r3, @in={{0x2, 0x4e23, @multicast2=0xe0000002}}, [0x8000, 0x9, 0x80000000, 0x3, 0x80, 0x8001, 0x800, 0x100, 0xe0db, 0x0, 0x2000000000, 0x200, 0x68, 0x0, 0x8]}, &(0x7f0000000380)=0x100) r4 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0xfffffffffffffdfa) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port1\x00', 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r4, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r5 = gettid() r6 = syz_open_procfs(r5, &(0x7f00000002c0)='maps\x00') readv(r6, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/28, 0x65}], 0x1) exit(0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r6, &(0x7f000004ffe0)=[{&(0x7f0000000000)=""/128, 0xe6}], 0x222) r7 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) connect$ax25(r2, &(0x7f00000006c0)={0x3, {"fc5da504005009"}, 0x7fff}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) getsockopt$netrom_NETROM_T1(r7, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r4, 0x80045301, &(0x7f0000000700)) 2018/03/30 10:21:23 executing program 3: r0 = socket$inet(0x2, 0x6, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000008c0)=@broute={'broute\x00', 0x20, 0x2, 0x3e8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000280], 0x0, &(0x7f0000000240), &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'ip6gretap0\x00', 'syz_tun\x00', 'ip6tnl0\x00', 'syz_tun\x00', @link_local={0x1, 0x80, 0xc2}, [0x0, 0x1000, 0x0, 0x0, 0xff], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0x108, 0x158}, [@common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x10000, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0xd, 0x0, 0x86dd, 'syzkaller0\x00', 'tunl0\x00', 'sit0\x00', 'ifb0\x00', @empty, [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x130, 0x1b0, 0x200, [@ip6={'ip6\x00', 0x50, {{@empty, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}}}, @limit={'limit\x00', 0x20, {{0x0, 0xec}}}]}, [@common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x81, 'syz1\x00'}}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}}]}]}, 0x460) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x2, 0xa2b, 0x4, 0x7, 0x2, 0x20, 0x10000, 0x8a82}, &(0x7f0000000180)=0x20) r1 = socket(0x1d, 0xb, 0x0) setsockopt$inet_group_source_req(r1, 0x0, 0xfe0d64ad1c6cb9f1, &(0x7f0000000680)={0x1000, {{0x2, 0x4e23, @multicast1=0xe0000001}}, {{0x2, 0x4e22, @broadcast=0xffffffff}}}, 0x108) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) r4 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000400)={0x0, 0x0, 0x3, 0xffffffff}, &(0x7f0000000440)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}}, [0x7fff, 0x2, 0x3, 0x0, 0x5, 0x5, 0x6, 0x10001, 0x9, 0x200, 0x4, 0x3304, 0x6, 0x8]}, &(0x7f0000000580)=0x100) getsockopt$inet_sctp_SCTP_RTOINFO(r4, 0x84, 0x0, &(0x7f00000005c0)={0x0, 0x10001, 0x81, 0x9}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000640)={0x0, @in6={{0xa, 0x4e23, 0x81, @mcast2={0xff, 0x2, [], 0x1}, 0x7fff}}, 0x2, 0x4, 0xf8, 0x1, 0x6}, &(0x7f0000000700)=0x98) getsockopt$inet_sctp6_SCTP_CONTEXT(r4, 0x84, 0x11, &(0x7f0000000740)={0x0, 0x200}, &(0x7f0000000340)=0x8) pselect6(0x40, &(0x7f0000000a80)={0x28b, 0x3, 0x9, 0x8001, 0xff, 0x1ff, 0x40, 0x10000}, &(0x7f0000000b00)={0x92a, 0x7, 0x7fff, 0x9, 0x200, 0x5, 0x8, 0x1f}, &(0x7f0000000b40)={0x80000001, 0x81, 0x2, 0x4, 0x3, 0x7, 0xb3f5, 0x37ef}, &(0x7f0000000bc0), &(0x7f0000000c40)={&(0x7f0000000c00)={0x6}, 0x8}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e23, 0x7, @dev={0xfe, 0x80, [], 0xe}, 0x3}}}, &(0x7f0000000880)=0x84) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f00000008c0)={0x0, 0x1b5}, &(0x7f0000000900)=0x8) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000280)=@in={0x2, 0x4e20}, 0x10, &(0x7f00000003c0)=[{&(0x7f00000002c0)="b25b2002e7d8bc055c7d9ed742f2ca865f150419606e27d187b4ce0f2f81d8a0ab0d18a71f265b68c86f9c82600911dcc4698a4baebfb56adf90bec3", 0x3c}], 0x1, &(0x7f0000000940), 0x0, 0x24000001}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'ipddp0\x00', @ifru_mtu=0x1}) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) sendfile(r3, r3, &(0x7f0000000080), 0x102000004) ioctl$LOOP_CLR_FD(r3, 0x4c01) fdatasync(r3) nanosleep(&(0x7f00000001c0)={0x77359400}, &(0x7f0000000200)) getsockopt$bt_l2cap_L2CAP_LM(r4, 0x6, 0x3, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f00000007c0)) socket$inet6(0x10, 0x2, 0x0) ioctl$EVIOCRMFF(r4, 0x40044581, &(0x7f0000000100)=0x3) socket$bt_cmtp(0x1f, 0x3, 0x5) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000001640)=@broute={'broute\x00', 0x20, 0x1, 0x1e8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001700], 0x0, &(0x7f0000001980), &(0x7f0000001700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'vcan0\x00', 'ifb0\x00', 'syzkaller0\x00', 'vcan0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @link_local={0x1, 0x80, 0xc2}, [], 0x70, 0xf8, 0x128}, [@common=@dnat={'dnat\x00', 0x10, {{@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, 0xffffffffffffffff}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x4, 'syz0\x00'}}}]}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffbffffffffffe}]}, 0x260) 2018/03/30 10:21:23 executing program 6 (fault-call:3 fault-nth:23): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r0, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r0, &(0x7f0000000100)=""/65, 0x41) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) linkat(r0, &(0x7f0000000480)='./file1\x00', r1, &(0x7f00000004c0)='./file0\x00', 0x1000) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') unlink(&(0x7f00000000c0)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r0, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x12021) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000340)={0x8, 0x9, 0x4, 0x10000, 0x1, 0x7, 0x7fffffff, 0x0, 0x29, 0x0, 0x20}, 0xb) 2018/03/30 10:21:23 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x20) sendmsg$nl_generic(r0, &(0x7f0000004fc8)={&(0x7f0000379000)={0x10}, 0xc, &(0x7f0000012ff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000004ffffff0700007e7a4f52a7131e9ab5f011a1fd95775424f1e7fb0f7b6741538e7c27abc0bdba9872be78cb9ea9e3bcd6eb4d38120da332edeb95bdff39f05debec36258f7401a42b07f45b35df8d7823bca5b0f4b9a37e37c1dac6a8fcb6dba4de5038ddfd185047febea689f561013888e72fb2e18508e74fce75359fa427d61907f8ef6e1a054efaed0d3bb3c23348e9eae7b991895365de77b8702f1a621f15f35b82214b2bbab0bce5356b8dfa28714d2d62f23170ed825aadda3a924e12bde826ff48b84e5de1993c6c45942afb2769a492d320d0509794da3e"], 0x14}, 0x1}, 0x0) 2018/03/30 10:21:23 executing program 7: clone(0x200, &(0x7f0000000100)="f0f7d70fc52207334efb558c957ea5882b23d85fa1659dc13aa7603b45aa407f02117308b1a8697bcf6617a98d145ec63b3cffa3123c2b94a42831af8d9bdb4b03d2954fdaa7e037f2c459a27e42921a924df6c5899ef4dbdb44bffbadd515d6024b7e3450b4ea54c55a229f4d694a292b270018a408b9ed54a0bc1929156ff004c1cf0b1728065c1ae04f4eeb552ff2420005e5ccb9400909127922c4a8e69ffbb96ca5bc95786113ae475b94c2c9a6a235276e2f1b7f01010000000000007a", &(0x7f0000000000), &(0x7f0000f8b000), &(0x7f00000d5000)) mknod(&(0x7f0000cd7000)='./file0\x00', 0x103a, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000340), &(0x7f000027a000)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340)={0x0}, &(0x7f0000000400)=0xc) ptrace$getsig(0x4202, r0, 0x2, &(0x7f0000000440)) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000080)={0x4, 0xffffffffffffff9c, 0x1}) bind$unix(r1, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000002c0)) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000300)) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000003c0)=0x0) r3 = syz_open_procfs(r2, &(0x7f0000000480)="6e657420f89c04365f726f75746500") read(r3, &(0x7f0000f1bf7e)=""/130, 0xfffffdd8) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000240)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x9, 0x18}, 0xc) open$dir(&(0x7f000050bff8)='./file0\x00', 0x2, 0x0) [ 210.729408] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000016 [ 210.736867] cgroup: cgroup_addrm_files: failed to add cgroup.max.depth, err=-12 2018/03/30 10:21:23 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00001d4ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000040)={0x2, 0x0, [0x0, 0x0]}) symlink(&(0x7f0000192000)='./file0\x00', &(0x7f0000044ff2)='./control\x00') mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000179ff8)='./control\x00', &(0x7f0000014000)='anon_inodefs\x00', 0x9002, &(0x7f0000fcb000)) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000600)=@nat={'nat\x00', 0x19, 0x4, 0x553, [0x200000c0, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000080), &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]}, 0x5cb) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000014ff8)='./file0\x00', &(0x7f0000014000)='ramfs\x00', 0xb3b9, &(0x7f0000005000)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000680)='/dev/dsp\x00', 0x8000, 0x0) unshare(0x80008282) r1 = syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0xd27, 0x10580) setsockopt$ALG_SET_AEAD_AUTHSIZE(r1, 0x117, 0x5, 0x0, 0x8) fchmod(r1, 0x8) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)=0x0) wait4(r2, 0x0, 0x200000040000002, &(0x7f0000781f70)) prctl$setendian(0x14, 0x1) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f00000000c0)=0x2, 0x4) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x9, 0x10080) ioctl$SNDRV_TIMER_IOCTL_START(r3, 0x54a0) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x8000) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x4032, 0xffffffffffffffff, 0x0) r4 = userfaultfd(0x0) pread64(r3, &(0x7f0000000180)=""/101, 0x65, 0x0) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000000080)={0xaa}) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r5 = dup(r4) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0x3, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000004000)=0x1000, 0x4) ioctl$UFFDIO_COPY(r5, 0xc028aa03, &(0x7f0000003ff0)={&(0x7f0000011000/0x3000)=nil, 0x400000}) 2018/03/30 10:21:23 executing program 7: clone(0x200, &(0x7f0000000100)="f0f7d70fc52207334efb558c957ea5882b23d85fa1659dc13aa7603b45aa407f02117308b1a8697bcf6617a98d145ec63b3cffa3123c2b94a42831af8d9bdb4b03d2954fdaa7e037f2c459a27e42921a924df6c5899ef4dbdb44bffbadd515d6024b7e3450b4ea54c55a229f4d694a292b270018a408b9ed54a0bc1929156ff004c1cf0b1728065c1ae04f4eeb552ff2420005e5ccb9400909127922c4a8e69ffbb96ca5bc95786113ae475b94c2c9a6a235276e2f1b7f01010000000000007a", &(0x7f0000000000), &(0x7f0000f8b000), &(0x7f00000d5000)) mknod(&(0x7f0000cd7000)='./file0\x00', 0x103a, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000340), &(0x7f000027a000)) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000080)={0x4, 0xffffffffffffff9c, 0x1}) bind$unix(r0, &(0x7f0000000240)=@abs={0x1, 0x0, 0x4e22}, 0x6e) r1 = syz_open_procfs(0x0, &(0x7f000042cff4)='personality\x00') read(r1, &(0x7f0000000380)=""/130, 0xfffffffffffffe9a) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000240)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x9, 0x18}, 0xc) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f00000001c0)='personality\x00') open$dir(&(0x7f000050bff8)='./file0\x00', 0x2, 0x0) 2018/03/30 10:21:23 executing program 6 (fault-call:3 fault-nth:24): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r0, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r0, &(0x7f0000000100)=""/65, 0x41) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) linkat(r0, &(0x7f0000000480)='./file1\x00', r1, &(0x7f00000004c0)='./file0\x00', 0x1000) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') unlink(&(0x7f00000000c0)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r0, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x12021) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000340)={0x8, 0x9, 0x4, 0x10000, 0x1, 0x7, 0x7fffffff, 0x0, 0x29, 0x0, 0x20}, 0xb) 2018/03/30 10:21:23 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00004e0ff7)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f0000291000)=ANY=[@ANYBLOB="d7ffff3f0000000010000000"]) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x80081, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x4c, &(0x7f0000000040)=[@in6={0xa, 0x4e24, 0x600000000000, @loopback={0x0, 0x1}, 0x6}, @in={0x2, 0x4e20, @multicast1=0xe0000001}, @in={0x2, 0x4e23, @broadcast=0xffffffff}, @in={0x2, 0x4e21, @rand_addr=0x100}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000340)={r2, @in6={{0xa, 0x4e24, 0x1, @mcast1={0xff, 0x1, [], 0x1}, 0x1f}}, 0x800000000000000, 0x401}, &(0x7f00000001c0)=0x90) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000200)={0x0, @in6={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}}, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, &(0x7f0000000300)=0x98) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x79) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000400)=0x1) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, &(0x7f00000000c0), &(0x7f0000000100)=0xc) 2018/03/30 10:21:23 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000, 0x0, 0x4}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000d80)={r5, 0x13c, 0x7, 0xaa5, 0x1, 0x8001}, 0x14) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000dc0)={0xaa}) pwrite64(r1, &(0x7f0000000e00)="7437032bd6e223b3a59d10357fc245a11551c76207ed30241886ce0ea1326aeac569322a47e5909770909834b26bf6b04af3b30656cbc3e07c3eed14ee7c472c2d276872498ef33618509e2049213b9664560dc77dd302976456a0392edd116b9816cbca183c77f192c4c3260a385cc483327645104ab9987888488ff6b8e163c2eddc4fc33b9f9ba13abbb021303c8d438d96b2da7c190f9cdc9f2242c2df22ccc63b779747bc9b54e299a407b4150450352ce672efd9fd7565ffb5f410dd66a2061984a92c2ca847eb65e95168372a9e92cc53f27151c36569714d1b2b2b2d26b0e9668aa5042a767ab88ad81f2850cef1", 0xf2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) [ 211.012641] bond0 (unregistering): Released all slaves [ 211.736244] IPVS: ftp: loaded support on port[0] = 21 [ 212.022549] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 212.444281] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 212.450380] 8021q: adding VLAN 0 to HW filter on device bond0 [ 212.494656] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 212.538353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 212.558588] FAULT_INJECTION: forcing a failure. [ 212.558588] name failslab, interval 1, probability 0, space 0, times 0 [ 212.569820] CPU: 1 PID: 26400 Comm: syz-executor6 Not tainted 4.16.0-rc7+ #371 [ 212.577156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 212.586490] Call Trace: [ 212.589071] dump_stack+0x194/0x24d [ 212.592676] ? arch_local_irq_restore+0x53/0x53 [ 212.597327] should_fail+0x8c0/0xa40 [ 212.601018] ? kstrdup+0x39/0x70 [ 212.604370] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 212.609448] ? cgroup_mkdir+0x553/0xfc0 [ 212.613396] ? vfs_mkdir+0x390/0x600 [ 212.617083] ? SyS_mkdirat+0x22b/0x2b0 [ 212.620942] ? do_syscall_64+0x281/0x940 [ 212.624981] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 212.630324] ? find_held_lock+0x35/0x1d0 [ 212.634366] ? find_held_lock+0x35/0x1d0 [ 212.638408] ? __lock_is_held+0xb6/0x140 [ 212.642461] ? check_same_owner+0x320/0x320 [ 212.646761] ? rcu_note_context_switch+0x710/0x710 [ 212.651664] ? rcu_read_lock_sched_held+0x108/0x120 [ 212.656661] should_failslab+0xec/0x120 [ 212.660612] kmem_cache_alloc+0x47/0x760 [ 212.664647] ? memcpy+0x45/0x50 [ 212.667904] ? kstrdup+0x59/0x70 [ 212.671251] __kernfs_new_node+0xe2/0x570 [ 212.675376] ? kernfs_dop_revalidate+0x380/0x380 [ 212.680112] ? kasan_check_read+0x11/0x20 [ 212.684235] ? read_word_at_a_time+0x12/0x20 [ 212.688618] ? strscpy+0x186/0x500 [ 212.692149] kernfs_new_node+0x80/0xe0 [ 212.696020] __kernfs_create_file+0x4b/0x320 [ 212.700411] cgroup_addrm_files+0x3c5/0xa70 [ 212.704720] ? cgroup_file_write+0x710/0x710 [ 212.709111] ? getrawmonotonic64+0x460/0x460 [ 212.713500] ? kernfs_active+0x92/0x160 [ 212.717455] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 212.722360] ? cgroup_kn_set_ugid+0x2c7/0x370 [ 212.726831] ? cgroup_file_name+0x1d0/0x1d0 [ 212.732009] css_populate_dir+0x340/0x420 [ 212.736141] cgroup_mkdir+0x553/0xfc0 [ 212.739916] ? __lock_is_held+0xb6/0x140 [ 212.743960] ? cgroup_destroy_locked+0x750/0x750 [ 212.748696] ? rcu_read_lock_sched_held+0x108/0x120 [ 212.753688] ? kmem_cache_free+0x258/0x2a0 [ 212.757904] ? set_nlink+0xc1/0x160 [ 212.761507] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 212.766409] ? generic_permission+0x105/0x3c0 [ 212.770884] ? cgroup_destroy_locked+0x750/0x750 [ 212.775615] kernfs_iop_mkdir+0x153/0x1e0 [ 212.779743] vfs_mkdir+0x390/0x600 [ 212.783267] SyS_mkdirat+0x22b/0x2b0 [ 212.786964] ? SyS_mknod+0x480/0x480 [ 212.790652] ? trace_hardirqs_on+0xd/0x10 [ 212.794778] ? do_syscall_64+0xb7/0x940 [ 212.798733] ? SyS_mknod+0x480/0x480 [ 212.802424] do_syscall_64+0x281/0x940 [ 212.806285] ? __do_page_fault+0xc90/0xc90 [ 212.810494] ? _raw_spin_unlock_irq+0x27/0x70 [ 212.814967] ? finish_task_switch+0x1c1/0x7e0 [ 212.819437] ? syscall_return_slowpath+0x550/0x550 [ 212.824346] ? syscall_return_slowpath+0x2ac/0x550 [ 212.829252] ? prepare_exit_to_usermode+0x350/0x350 [ 212.834256] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 212.839600] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 212.844425] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 212.849589] RIP: 0033:0x4548b9 [ 212.852753] RSP: 002b:00007fca68e1cc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 212.860435] RAX: ffffffffffffffda RBX: 00007fca68e1d6d4 RCX: 00000000004548b9 [ 212.867680] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 212.874924] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 212.882168] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 2018/03/30 10:21:25 executing program 5: r0 = add_key(&(0x7f000003dff8)='keyring\x00', &(0x7f000001d000)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f0000027ff8)='keyring\x00', &(0x7f000003dffb)={0x73, 0x79, 0x7a}, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x80000) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000040)) 2018/03/30 10:21:25 executing program 7: clone(0x200, &(0x7f0000000100)="f0f7d70fc52207334efb558c957ea5882b23d85fa1659dc13aa7603b45aa407f02117308b1a8697bcf6617a98d145ec63b3cffa3123c2b94a42831af8d9bdb4b03d2954fdaa7e037f2c459a27e42921a924df6c5899ef4dbdb44bffbadd515d6024b7e3450b4ea54c55a229f4d694a292b270018a408b9ed54a0bc1929156ff004c1cf0b1728065c1ae04f4eeb552ff2420005e5ccb9400909127922c4a8e69ffbb96ca5bc95786113ae475b94c2c9a6a235276e2f1b7f01010000000000007a", &(0x7f0000000000), &(0x7f0000f8b000), &(0x7f00000d5000)) mknod(&(0x7f0000cd7000)='./file0\x00', 0xa8, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f00000002c0), &(0x7f0000000580)=[&(0x7f0000000300)='personality\x00', &(0x7f0000000340)='personality\x00', &(0x7f0000000380)='personality\x00', &(0x7f00000003c0)='mime_typewlan0%\x00', &(0x7f0000000400)='\x00', &(0x7f0000000440)='em0\x00', &(0x7f0000000640)=':cpuset)&&\x00', &(0x7f00000004c0)='personality\x00', &(0x7f0000000500)=':vboxnet1\\!ppp1security\x00', &(0x7f0000000600)='personality\x00']) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000080)={0x4, 0xffffffffffffff9c, 0x1}) socket$nl_netfilter(0x10, 0x3, 0xc) bind$unix(r0, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) r1 = syz_open_procfs(0x0, &(0x7f000042cff4)='personality\x00') ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000240)={0x0, 0x0, 0x4}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000280)={r2, 0x80000, r1}) read(r1, &(0x7f0000f1bf7e)=""/130, 0xfffffdd8) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000240)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x9, 0x18}, 0xc) open$dir(&(0x7f000050bff8)='./file0\x00', 0x2, 0x0) 2018/03/30 10:21:25 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000, 0x0, 0x4}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000d80)={r5, 0x13c, 0x7, 0xaa5, 0x1, 0x8001}, 0x14) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000dc0)={0xaa}) pwrite64(r1, &(0x7f0000000e00)="7437032bd6e223b3a59d10357fc245a11551c76207ed30241886ce0ea1326aeac569322a47e5909770909834b26bf6b04af3b30656cbc3e07c3eed14ee7c472c2d276872498ef33618509e2049213b9664560dc77dd302976456a0392edd116b9816cbca183c77f192c4c3260a385cc483327645104ab9987888488ff6b8e163c2eddc4fc33b9f9ba13abbb021303c8d438d96b2da7c190f9cdc9f2242c2df22ccc63b779747bc9b54e299a407b4150450352ce672efd9fd7565ffb5f410dd66a2061984a92c2ca847eb65e95168372a9e92cc53f27151c36569714d1b2b2b2d26b0e9668aa5042a767ab88ad81f2850cef1", 0xf2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) 2018/03/30 10:21:25 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000000c0)=0x1, 0x4) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f0000000000)=@sack_info={0x0, 0xb6, 0x101}, &(0x7f0000000040)=0xc) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000080)={r1, 0x7e, 0x2, 0x20}, 0x10) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x200000, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000200)={0x1000, 0x0, 0x4, 0xd3000000000, 0x34da00000000, 0x2, 0x7f, 0x10000, 0x10001, 0x10001, 0x5, 0x7f}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r2, 0x40505330, &(0x7f0000000180)={{0x15ab27b1}, {0x8000, 0xfff}, 0x81, 0x1, 0x1f}) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000100)=@sack_info={0x0, 0xffffffffffff0001}, 0xc) 2018/03/30 10:21:25 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f000000d379)={&(0x7f00000021c0)=ANY=[@ANYBLOB="2400000000000008000d00d5000000"], 0x24}, 0x1}, 0x0) 2018/03/30 10:21:25 executing program 0: r0 = socket$inet(0x2, 0x4000000805, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000100)={0x0, {0x2}, {0x2, 0x4e24, @broadcast=0xffffffff}, {0x2, 0x4e23, @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='syz_tun\x00'}) r2 = accept$netrom(r1, 0x0, &(0x7f0000000040)) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000080)=0x5, 0x4) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.threads\x00', 0x2, 0x0) socket(0x0, 0x0, 0x0) 2018/03/30 10:21:25 executing program 6 (fault-call:3 fault-nth:25): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r0, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r0, &(0x7f0000000100)=""/65, 0x41) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) linkat(r0, &(0x7f0000000480)='./file1\x00', r1, &(0x7f00000004c0)='./file0\x00', 0x1000) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') unlink(&(0x7f00000000c0)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r0, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x12021) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000340)={0x8, 0x9, 0x4, 0x10000, 0x1, 0x7, 0x7fffffff, 0x0, 0x29, 0x0, 0x20}, 0xb) 2018/03/30 10:21:25 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="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", 0xfc}], 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x200900, 0x103) connect$vsock_stream(r1, &(0x7f0000000600)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) rt_sigtimedwait(&(0x7f0000000140)={0xffffffff}, 0x0, &(0x7f0000000180), 0x8) bind$alg(0xffffffffffffffff, &(0x7f000073e000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(cbc-twofish-avx)\x00'}, 0x58) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000500)={&(0x7f00000005c0)=[0x0, 0x0, 0x0], 0x3}) nanosleep(&(0x7f0000d1e000)={0x0, 0x1c9c380}, &(0x7f0000000000)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r2, 0x118, 0x0, &(0x7f0000000100)=0x7, 0x4) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000000c0)={0x1, 0x1, 0x1, 0x1, 0x0, 0x6}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000280)={r3, @in={{0x2, 0x4e23, @multicast2=0xe0000002}}, [0x8000, 0x9, 0x80000000, 0x3, 0x80, 0x8001, 0x800, 0x100, 0xe0db, 0x0, 0x2000000000, 0x200, 0x68, 0x0, 0x8]}, &(0x7f0000000380)=0x100) r4 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0xfffffffffffffdfa) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port1\x00', 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r4, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r5 = gettid() r6 = syz_open_procfs(r5, &(0x7f00000002c0)='maps\x00') readv(r6, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/28, 0x65}], 0x1) exit(0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r6, &(0x7f000004ffe0)=[{&(0x7f0000000000)=""/128, 0xe6}], 0x222) r7 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) connect$ax25(r2, &(0x7f00000006c0)={0x3, {"fc5da504005009"}, 0x7fff}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) getsockopt$netrom_NETROM_T1(r7, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r4, 0x80045301, &(0x7f0000000700)) 2018/03/30 10:21:25 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000380)='/dev/dsp#\x00', 0x480c, 0x2000) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000640)={0x0, 0x1f}, &(0x7f0000000680)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f00000006c0)={0x0, 0xa6, "f7acf5e0079792c0a85b1f295daf081564681562a895b38967969f7d3f452dba6fa83db890bde9acbbaeae2e39e7d49fde79e81a573ecbb54b7c5cbcfc79b6bd109e4f2f8749938b0d5e1bfe0e7c1a8625576994bf148c392656e7c57b825dec0e64c24617704b3868751f4bca725517ae78629f669385422f2e87104fa1596a84fb455bcc6dc078af073ea8aad97b7be292baaaa8adecf2de0ad563cd2902847133087b7806"}, &(0x7f0000000780)=0xae) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000001f00)={0x0, 0x3fc000000, 0x1000, 0x7f, 0x5, 0x8, 0x4, 0x2, {0x0, @in6={{0xa, 0x4e22, 0x6, @mcast1={0xff, 0x1, [], 0x1}, 0x6}}, 0x1, 0x81, 0x9, 0x0, 0x3}}, &(0x7f0000001fc0)=0xb0) getsockopt$inet_udp_int(r0, 0x11, 0x0, &(0x7f0000000440), &(0x7f0000000480)=0x4) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x72, &(0x7f0000002000)={0x0, 0x10000}, &(0x7f0000002040)=0xc) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000002580)={0x0, 0xa4, &(0x7f00000024c0)=[@in={0x2, 0x4e21, @multicast2=0xe0000002}, @in6={0xa, 0x4e22, 0x193c, @loopback={0x0, 0x1}, 0x2}, @in6={0xa, 0x4e20, 0x9, @empty, 0x89}, @in={0x2, 0x4e23}, @in6={0xa, 0x4e23, 0x80d, @local={0xfe, 0x80, [], 0xaa}, 0x2}, @in={0x2, 0x4e24, @broadcast=0xffffffff}, @in={0x2, 0x4e20, @broadcast=0xffffffff}, @in={0x2, 0x4e21, @multicast1=0xe0000001}]}, &(0x7f00000025c0)=0x10) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000002600)={0x0, 0x80}, &(0x7f0000002640)=0x8) ioctl$KVM_SET_SREGS(r0, 0x4138ae84, &(0x7f0000001940)={{0x2000, 0x100000, 0x9, 0x3, 0x2, 0x1f, 0x1, 0x8, 0x200, 0x5000, 0x8, 0x1000}, {0x1000, 0xf000, 0xf, 0x4f6d, 0x20, 0xa9, 0x180000000, 0x9, 0x1ff, 0x8, 0x3, 0x8a}, {0xd000, 0x6000, 0xf, 0x4, 0x2e7, 0x7, 0xfffffffeffffffff, 0x3f, 0x0, 0x4, 0xfffffffffffffffe, 0x7277}, {0x4000, 0x7005, 0xb, 0xfff, 0x1, 0xfffffffffffff800, 0x401, 0xd1a0, 0xfffffffffffff57e, 0x20, 0x1, 0x8}, {0x7002, 0xd000, 0xf, 0x20, 0x1, 0xf79, 0x6, 0x8, 0x9, 0x5, 0x5, 0x8000}, {0x10001, 0x3, 0x0, 0x85c3, 0x0, 0x1, 0x5, 0x8, 0xc, 0x7, 0x20000000000, 0x7}, {0x15000, 0xf000, 0xc, 0x8, 0x1, 0x100000001, 0x2, 0xffffffffffff5bfa, 0x1, 0x7ff, 0x81, 0x9e}, {0xd000, 0xf000, 0xf, 0x6, 0x0, 0x3, 0x4, 0x0, 0x2, 0xff, 0xfff, 0x4}, {0x10000, 0x5000}, {0xd000, 0xd000}, 0xa0010000, 0x0, 0x107002, 0x100, 0x3, 0x4800, 0x2000, [0xc67, 0x80, 0x244, 0x10001]}) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000002680)={0x0, 0x4}, &(0x7f00000026c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000002700)={0x0, @in={{0x2, 0x4e22, @loopback=0x7f000001}}, [0x0, 0x2, 0x6, 0x1c7, 0xfffffffffffffffb, 0x7, 0x3, 0x4, 0x6, 0x3, 0x3, 0x1ff, 0x4, 0x40, 0x4]}, &(0x7f0000002800)=0x100) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000003a40)={0x0, 0x1}, &(0x7f0000003a80)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000003ac0)={0x0, 0x6}, &(0x7f0000003b00)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000003b40)={0x0, 0x100000000}, &(0x7f0000003b80)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f0000003bc0)=@sack_info={0x0, 0x0, 0x7}, &(0x7f0000003c00)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f00000041c0)={0x0, 0x8, "7cb68ef6fbf7fe17"}, &(0x7f0000004200)=0x10) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000004240)=ANY=[@ANYRES32=0x0, @ANYBLOB], &(0x7f00000042c0)=0x2) sendmmsg$inet_sctp(r0, &(0x7f0000004380)=[{&(0x7f00000003c0)=@in={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10, &(0x7f0000000600)=[{&(0x7f0000000400)="b6ace726b246", 0x6}, {&(0x7f0000000540)="3337618928e158e3e9fe9cfc1b640fbf61c6096fda352bc6fa5c2861d9d9056bb71f9bbc1fef724cb7ff9f152bf640f908e87f66a95e19976ffc4742fdc43021a8795832a87ad951faf04dd3496ca9eefa97f3d945d15afe41edc40aa4c876f78a1b889ee7317f493f34183a036eee906067bd0cc68e3f4653af918932b697fabd7c7a0b81204fa4587417bd406a25f9e62ece790b6001996e39c1b9fa1ea4e7526c793769", 0xa5}], 0x2, &(0x7f00000007c0)=[@sndinfo={0x20, 0x84, 0x2, {0x800, 0x0, 0x0, 0x1, r1}}], 0x30, 0x4000}, {&(0x7f0000000840)=@in6={0xa, 0x4e23, 0x5, @local={0xfe, 0x80, [], 0xaa}, 0x3}, 0x1c, &(0x7f0000001e40)=[{&(0x7f0000000880)="93459dbfda55ed664e4964652f7d599736e5ad905c25cefca669c06b6241f0f34b80287f92954368527b3f228aa9a3a257cca26b7f843db2b02c433eb4fe9fe21292194d059a951046bd5ba3a6d4e06a29be089801c50d2f8121d1d84c4bdd9b7bcac8fafd20785d6b12da6ce9b80f480ced801d9a32997748e4ec5a955826dfdc9ac91c93ef83a1bd68f66f9b9cd0b0079cd4d72facc0cd44ff0978cc76d924ca1e115c32d0a04a9e6d4e30f360be6e66fc3ad50063bc9b0949933df1ff82be17894e0f018a81be766f40cb2ba3755f60ba318d6b2091f834bad4d7681781b044329b7e4f", 0xe5}, {&(0x7f0000000a40)="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", 0xf00}, {&(0x7f0000001a80)="607fd74ee28ba8d183af34a47d7b697719385373502c3d5d55be910c23f0bfe470ed2127827647e3631ec3c5233b4fc4f3b56973edc4be82f70e16442e89e26b8aae9f3229c4e74ab81e46708211bd3716437b16c086327301c2d75387505d99c490e4eb0158ad39710ab407e0a6a660571d6b20d757cac6e2fc17b08850e9cdb6a286201ddbc8079d4328e9a310f91d3736dc80736466d51a859f91a5a40d74990bcf147d", 0xa5}, {&(0x7f0000001bc0)="63dfb23f9de27d5d418023fa7014c07c2b20eb84435a6b40acef70d69707d8efd2591574b903dabef80cf88651a865595b4740f905713f829834cc766f26f65086d999e1e17094e100e5f13d0d8cd7c08571e2efdd9e63e217a7957e13a7adc6a6cd9cdedc298a498ec9fac6c1000a86cdb16b7a83ca9e56784edba34c4c54f11aacf5ab39693475fb537abb92126df3c61760", 0x93}, {&(0x7f0000001d00)="a3891fc451055c05459e5d3bf6735b6c063310a302fe9e834656152f922d", 0x1e}], 0x5, &(0x7f0000002080)=[@init={0x18, 0x84, 0x0, {0xffffffff, 0x80000000, 0x0, 0xc}}, @init={0x18, 0x84, 0x0, {0x10000, 0x0, 0x40, 0x6}}, @sndrcv={0x30, 0x84, 0x1, {0x1000, 0x1, 0x8202, 0x7, 0xffffffff, 0x5, 0x5, 0x0, r2}}], 0x90, 0x40}, {&(0x7f0000002140)=@in={0x2, 0x4e21}, 0x10, &(0x7f0000002340)=[{&(0x7f0000002180)="64d8df866eeaab057a3e8ecfa30b96b3d0059373c7fa78beaa141784f03c811bd1116d08c8916c6907dca222ccf6afcc449af7c9dcd76359c78f66cf5936eafa5ce61f287fa31390406020bf28b65f83c2e748e293dc76db237879bfaa8e1917473904ca1dcb41c9832ba2c33d3e6f0d753efffbc631f1b3ca3dc62a3c0a46c6383ceb877d95e21f18499986f815e98676ee3410bb35a5e892b6aaf7287f85ac64f81248ec236e05a29d598e6c02de94a6af3c618c32ca6174bf1149f5c8fed799cc5f86fda7ab944a846f20", 0xcc}, {&(0x7f00000022c0)="75ca01a5147f6d369ba1", 0xa}], 0x2, &(0x7f0000002380)=[@init={0x18, 0x84, 0x0, {0x7fff, 0x83}}, @init={0x18, 0x84, 0x0, {0x3, 0x4, 0x1, 0x7}}, @init={0x18, 0x84, 0x0, {0x3, 0x3, 0x5, 0xf78b}}, @init={0x18, 0x84, 0x0, {0x10000, 0x7f, 0x3ff, 0x9}}], 0xc0, 0x40}, {&(0x7f0000002440)=@in={0x2, 0x4e23, @rand_addr=0x3}, 0x10, &(0x7f0000002480), 0x0, &(0x7f0000002840)=[@sndinfo={0x20, 0x84, 0x2, {0xe19, 0x0, 0x8, 0x1, r3}}, @sndrcv={0x30, 0x84, 0x1, {0x1e92, 0x0, 0x4, 0xff, 0xff, 0x41, 0x800, 0x401, r4}}, @init={0x18, 0x84, 0x0, {0x0, 0xfff, 0x9, 0x3}}, @init={0x18, 0x84, 0x0, {0x100, 0x401, 0x0, 0x6}}, @sndinfo={0x20, 0x84, 0x2, {0x336b17a7000000, 0x8, 0x9, 0x5, r5}}, @sndinfo={0x20, 0x84, 0x2, {0x8, 0x8, 0x6134c1b7, 0x6, r6}}], 0x120, 0x14}, {&(0x7f0000002980)=@in6={0xa, 0x4e23, 0x9, @empty, 0xa486}, 0x1c, &(0x7f0000003a00)=[{&(0x7f00000029c0)="d70670a19e1bfb42c2853df9f18503f46e3af33b3091226c57df2163905e97e073d70fa168dfee719ccd660de79c5aab973762fcd0", 0x35}], 0x1, &(0x7f0000003c40)=[@sndinfo={0x20, 0x84, 0x2, {0x5, 0x8000, 0x9, 0x3, r7}}, @init={0x18, 0x84, 0x0, {0x1ff, 0x0, 0x55, 0x2a3}}, @sndinfo={0x20, 0x84, 0x2, {0x100000001, 0x200, 0x2, 0xffffffffffffffeb, r8}}, @sndrcv={0x30, 0x84, 0x1, {0x1, 0x100000001, 0x800e, 0x6, 0x8, 0xfff, 0x7fffffff, 0x81, r9}}, @sndrcv={0x30, 0x84, 0x1, {0x2, 0xffffffffffffffe1, 0x2, 0x100, 0x100000000, 0x10000, 0x80000000, 0x4, r10}}], 0xf0, 0x4000040}, {&(0x7f0000003d40)=@in={0x2, 0x4e21, @multicast2=0xe0000002}, 0x10, &(0x7f0000004000)=[{&(0x7f0000003d80)}, {&(0x7f0000003e40)="10c8a96984346904d52027dbd3a313ce9562159d2a535097cc7dfd68e8fe4942e47149f1a8719bbd4f1b89777fc392cfe4989482bf68e5f60155fddf4dd02b70cbe7f9980c0b1940a36e48c8f0ed4625b98cdeb431f2d9e4dcaf334115f7538e05b51c12211ef495a57866ead3fb96a448eb0e849fe12a5ecc911595e60723bb4a0102b7f865f935db6fa8125a2a247b003ab223d9d40e50c42a6196ef6d2c05ae2a7dc2749ac0082d263f20de", 0xad}, {&(0x7f0000003f40)="722dac9d4c973c0379686b17f633906bb7e8f22bac10abfe64d33ba60ccc7048740fb8837f0960588f044d3bda90810db110963aaf2d0b569e091eca249af7dbdf8707894ad69bf4158160d47279da9e522aceab1ae789ee1e687578f0ab9b05b164d3ff9f367549967b300da6e8a43ffe548b6b75a5aee16ea68183bb00f0202ae144cda41772738f", 0x89}], 0x3, 0x0, 0x0, 0x800}], 0x6, 0x40) r11 = socket$nl_xfrm(0x10, 0x3, 0x6) r12 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8000, 0x0) ioctl$KVM_GET_SREGS(r12, 0x8138ae83, &(0x7f0000000080)) getsockopt$inet_sctp_SCTP_INITMSG(r12, 0x84, 0x2, &(0x7f0000000000), &(0x7f00000001c0)=0x8) sendmsg$nl_xfrm(r11, &(0x7f0000bf4000)={&(0x7f000068f000)={0x10}, 0xc, &(0x7f0000197000)={&(0x7f0000000200)=ANY=[@ANYBLOB="6c010000170015030000000000000000ac14ffaa0000000000000000000000000000000000000000ac14ffbb000000000000000000000000ff010000000000000000000000000001ac14ffaa00000000000000000000000000000000000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="0000e9000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000068de3496c27c57ecc19501ae00e9520000000000000044000500e0000002000000000000000000000000000000000000000000000000fe800000000005000000000000000000000000000000000000608bd33500000000000000"], 0x5}, 0x1}, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000002480)='/dev/vcs\x00', 0x400, 0x0) fcntl$setflags(r11, 0x2, 0x1) [ 212.889411] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000018 [ 212.896899] cgroup: cgroup_addrm_files: failed to add cgroup.stat, err=-12 2018/03/30 10:21:25 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x0) perf_event_open(&(0x7f0000bba000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000040)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x40, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_BROADCAST={0xc, 0x2, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, @IFLA_IFNAME={0x14, 0x3, 'lo\x00'}]}, 0x40}, 0x1}, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000200)={0x0, 0x1, 0x2}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000a00)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000004000000a8040000400100000000000040010000c0e3ffffbf030000c003000004000000000000000000000000000000850bfe3b05b0d9c49644b8cdd9739475a088ecb4769319170d735104472aab038110e9a3b223898915b3acd0b3727d543d3349394ff2602a6d58fad8079810a01325ebfb8f7879b1a01e87624a0e7ff3119023128420fd91e8021717c8e7"], 0x1) gettid() r2 = syz_open_procfs(0x0, &(0x7f0000000380)="6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a402f1265047502f6c2dd9f655a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a86e30a86bc0d37a6438b99a45ea22b1f4fb050000000000000000000000000044b800e87953ed64ae2f3f5f53c78f80293abf2a8486bd65d593cea221df08495ace8ea1f739deb9394733c7f2a8bc8469c6ab2ec67eeec0f89c726db45b9fbf07b5e70840d3520ab33cd4619123cbd3b6246e1c0fb86835c5a2d52e02d7f8da762ba15a81fafeb2c9549175") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='.', &(0x7f0000000240)='ubifs\x00', 0x1004, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) mount(&(0x7f000000a000)='.', &(0x7f0000852000)='.', &(0x7f0000a60000)='ramfs\x00', 0x0, &(0x7f0000d1cfff)="d6") preadv(r2, &(0x7f0000000040)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f000000d000)) prctl$void(0x22) 2018/03/30 10:21:25 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x10000805) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0xadd, 0x200) ioctl(r0, 0x10000002284, &(0x7f0000b3bfff)) syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x2, 0x101000) 2018/03/30 10:21:25 executing program 6 (fault-call:3 fault-nth:26): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r0, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r0, &(0x7f0000000100)=""/65, 0x41) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) linkat(r0, &(0x7f0000000480)='./file1\x00', r1, &(0x7f00000004c0)='./file0\x00', 0x1000) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') unlink(&(0x7f00000000c0)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r0, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x12021) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000340)={0x8, 0x9, 0x4, 0x10000, 0x1, 0x7, 0x7fffffff, 0x0, 0x29, 0x0, 0x20}, 0xb) 2018/03/30 10:21:25 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000, 0x0, 0x4}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000d80)={r5, 0x13c, 0x7, 0xaa5, 0x1, 0x8001}, 0x14) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000dc0)={0xaa}) pwrite64(r1, &(0x7f0000000e00)="7437032bd6e223b3a59d10357fc245a11551c76207ed30241886ce0ea1326aeac569322a47e5909770909834b26bf6b04af3b30656cbc3e07c3eed14ee7c472c2d276872498ef33618509e2049213b9664560dc77dd302976456a0392edd116b9816cbca183c77f192c4c3260a385cc483327645104ab9987888488ff6b8e163c2eddc4fc33b9f9ba13abbb021303c8d438d96b2da7c190f9cdc9f2242c2df22ccc63b779747bc9b54e299a407b4150450352ce672efd9fd7565ffb5f410dd66a2061984a92c2ca847eb65e95168372a9e92cc53f27151c36569714d1b2b2b2d26b0e9668aa5042a767ab88ad81f2850cef1", 0xf2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) 2018/03/30 10:21:25 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x100000000106, 0x0) writev(r0, &(0x7f000036bfd0)=[{&(0x7f0000b51000)="eb", 0x1}], 0x1) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000040)=0x4000000058) read(r0, &(0x7f0000000140)=""/1, 0xfffffffffffffeb7) 2018/03/30 10:21:25 executing program 3: mkdir(&(0x7f0000278000)='./file0\x00', 0x0) mount(&(0x7f0000f20ff8)='./file0\x00', &(0x7f0000abe000)='./file0\x00', &(0x7f00004daffa)='ramfs\x00', 0x10, &(0x7f000032a000)) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x1110c0, 0x0) r0 = creat(&(0x7f0000015ff4)='./file0/bus\x00', 0x0) writev(r0, &(0x7f0000017000)=[{&(0x7f0000b22fda)='y', 0x1}], 0x1) 2018/03/30 10:21:25 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x4, 0x0) sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000040)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2058f6cfba0f2c0f27c2d10000002c00fd060000000000000000040000000c00"], 0x20}, 0x1}, 0x0) 2018/03/30 10:21:25 executing program 7: clone(0x200, &(0x7f0000000100)="f0f7d70fc52207334efb558c957ea5882b23d85fa1659dc13aa7603b45aa407f02117308b1a8697bcf6617a98d145ec63b3cffa3123c2b94a42831af8d9bdb4b03d2954fdaa7e037f2c459a27e42921a924df6c5899ef4dbdb44bffbadd515d6024b7e3450b4ea54c55a229f4d694a292b270018a408b9ed54a0bc1929156ff004c1cf0b1728065c1ae04f4eeb552ff2420005e5ccb9400909127922c4a8e69ffbb96ca5bc95786113ae475b94c2c9a6a235276e2f1b7f01010000000000007a", &(0x7f0000000000), &(0x7f0000f8b000), &(0x7f00000d5000)) mknod(&(0x7f0000cd7000)='./file0\x00', 0x103a, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000340), &(0x7f000027a000)) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000080)={0x4, 0xffffffffffffff9c, 0x1}) bind$unix(r0, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) r1 = syz_open_procfs(0x0, &(0x7f000042cff4)='personality\x00') read(r1, &(0x7f0000f1bf7e)=""/130, 0xfffffdd8) ioctl$VHOST_GET_VRING_BASE(r0, 0xc008af12, &(0x7f0000000240)) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000240)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x9, 0x18}, 0xc) open$dir(&(0x7f000050bff8)='./file0\x00', 0x2, 0x0) 2018/03/30 10:21:25 executing program 1: r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f00000001c0)='maps\x00') shmget(0x0, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) exit(0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x28, &(0x7f0000000100)}, 0x10) pread64(r1, &(0x7f0000000000)=""/193, 0x26, 0x1b) [ 213.233213] bond0 (unregistering): Released all slaves [ 213.930471] IPVS: ftp: loaded support on port[0] = 21 [ 214.216895] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 214.627552] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 214.633644] 8021q: adding VLAN 0 to HW filter on device bond0 [ 214.677193] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 214.720349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 214.738785] FAULT_INJECTION: forcing a failure. [ 214.738785] name failslab, interval 1, probability 0, space 0, times 0 [ 214.750036] CPU: 0 PID: 26637 Comm: syz-executor6 Not tainted 4.16.0-rc7+ #371 [ 214.757369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 214.766701] Call Trace: [ 214.769268] dump_stack+0x194/0x24d [ 214.772872] ? arch_local_irq_restore+0x53/0x53 [ 214.777527] should_fail+0x8c0/0xa40 [ 214.781219] ? kstrdup+0x39/0x70 [ 214.784566] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 214.789641] ? cgroup_mkdir+0x553/0xfc0 [ 214.793590] ? vfs_mkdir+0x390/0x600 [ 214.797277] ? SyS_mkdirat+0x22b/0x2b0 [ 214.801136] ? do_syscall_64+0x281/0x940 [ 214.805172] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 214.810516] ? find_held_lock+0x35/0x1d0 [ 214.814558] ? find_held_lock+0x35/0x1d0 [ 214.818599] ? __lock_is_held+0xb6/0x140 [ 214.822651] ? check_same_owner+0x320/0x320 [ 214.826949] ? rcu_note_context_switch+0x710/0x710 [ 214.831855] ? rcu_read_lock_sched_held+0x108/0x120 [ 214.836854] should_failslab+0xec/0x120 [ 214.840804] kmem_cache_alloc+0x47/0x760 [ 214.844840] ? memcpy+0x45/0x50 [ 214.848095] ? kstrdup+0x59/0x70 [ 214.851443] __kernfs_new_node+0xe2/0x570 [ 214.855569] ? kernfs_dop_revalidate+0x380/0x380 [ 214.860395] ? kasan_check_read+0x11/0x20 [ 214.864516] ? read_word_at_a_time+0x12/0x20 [ 214.868897] ? strscpy+0x186/0x500 [ 214.872425] kernfs_new_node+0x80/0xe0 [ 214.876292] __kernfs_create_file+0x4b/0x320 [ 214.880681] cgroup_addrm_files+0x3c5/0xa70 [ 214.884988] ? cgroup_file_write+0x710/0x710 [ 214.889379] ? getrawmonotonic64+0x460/0x460 [ 214.893771] ? kernfs_active+0x92/0x160 [ 214.897724] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 214.902628] ? cgroup_kn_set_ugid+0x2c7/0x370 [ 214.907099] ? cgroup_file_name+0x1d0/0x1d0 [ 214.911409] css_populate_dir+0x340/0x420 [ 214.915538] cgroup_mkdir+0x553/0xfc0 [ 214.919314] ? __lock_is_held+0xb6/0x140 [ 214.923357] ? cgroup_destroy_locked+0x750/0x750 [ 214.928090] ? rcu_read_lock_sched_held+0x108/0x120 [ 214.933080] ? kmem_cache_free+0x258/0x2a0 [ 214.937292] ? set_nlink+0xc1/0x160 [ 214.940894] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 214.945797] ? generic_permission+0x105/0x3c0 [ 214.950270] ? cgroup_destroy_locked+0x750/0x750 [ 214.955000] kernfs_iop_mkdir+0x153/0x1e0 [ 214.959129] vfs_mkdir+0x390/0x600 [ 214.962650] SyS_mkdirat+0x22b/0x2b0 [ 214.966345] ? SyS_mknod+0x480/0x480 [ 214.970032] ? trace_hardirqs_on+0xd/0x10 [ 214.974154] ? do_syscall_64+0xb7/0x940 [ 214.978107] ? SyS_mknod+0x480/0x480 [ 214.981795] do_syscall_64+0x281/0x940 [ 214.985656] ? __do_page_fault+0xc90/0xc90 [ 214.989865] ? _raw_spin_unlock_irq+0x27/0x70 [ 214.994339] ? finish_task_switch+0x1c1/0x7e0 [ 214.998808] ? syscall_return_slowpath+0x550/0x550 [ 215.003712] ? syscall_return_slowpath+0x2ac/0x550 [ 215.008617] ? prepare_exit_to_usermode+0x350/0x350 [ 215.013609] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 215.018955] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 215.023781] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 215.028945] RIP: 0033:0x4548b9 [ 215.032106] RSP: 002b:00007f92e9806c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 215.039788] RAX: ffffffffffffffda RBX: 00007f92e98076d4 RCX: 00000000004548b9 [ 215.047040] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 215.054284] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 215.061526] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 2018/03/30 10:21:27 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000040), &(0x7f0000000080)=0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r0, &(0x7f00000000c0)="50aaf5c2f698a2659a595770a4ab0ea60ee1dc06", &(0x7f0000000100)}, 0x18) getsockname$netlink(r0, &(0x7f0000000180), &(0x7f00000001c0)=0xc) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000200)={0x401, 0x0, 0x7, 'queue1\x00', 0x2}) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000500)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000340)={0x15c, r1, 0x100, 0x70bd2a, 0x25dfdbff, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7fffffff}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x81}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x4}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback=0x7f000001}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xffffffff}, @IPVS_CMD_ATTR_DEST={0x40, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@dev={0xac, 0x14, 0x14, 0xb}}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7fff}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1000}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x5}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x6c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bpq0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ifb0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}]}]}, 0x15c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) setsockopt$inet6_dccp_int(r0, 0x21, 0x4, &(0x7f0000000540)=0x4, 0x4) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000580)={0x0, 0x1, 0x5, 0x6, 0xfffffffffffffffc, 0x7, 0x1, 0x0, {0x0, @in6={{0xa, 0x7ff, 0x2, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x10000, 0x8, 0x10001, 0x2}}, &(0x7f0000000640)=0xb0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000680)={r2, @in6={{0xa, 0x4e24, 0x1, @remote={0xfe, 0x80, [], 0xbb}, 0x401}}, 0x8, 0xffffffff, 0x4, 0x1, 0x40}, &(0x7f0000000740)=0x98) shmget(0x1, 0x1000, 0x8, &(0x7f0000ffe000/0x1000)=nil) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000780)=@sack_info={r3, 0x2, 0x80000001}, &(0x7f00000007c0)=0xc) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f0000000800)=""/27) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) shmget(0x1, 0x2000, 0x2, &(0x7f0000ffe000/0x2000)=nil) r4 = msgget$private(0x0, 0x403) msgctl$IPC_RMID(r4, 0x0) shmget(0x3, 0x3000, 0x7c000041, &(0x7f0000ffc000/0x3000)=nil) r5 = dup(r0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r5, 0x28, 0x2, &(0x7f0000000840)=0xe0, 0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000880)={r3, @in={{0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}}}, &(0x7f0000000940)=0x84) syz_open_dev$binder(&(0x7f0000000980)='/dev/binder#\x00', 0x0, 0x2) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f00000009c0)={0x706066d4, 0x0, 0x8001, 0x9, 0xfffffffffffffffd, 0x1ff, 0x9, 0x0, r6}, &(0x7f0000000a00)=0x20) ioctl$BINDER_SET_CONTEXT_MGR(r5, 0x40046207, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r5, 0xc06864a1, &(0x7f0000000a80)={&(0x7f0000000a40)=[0xa6, 0x6, 0x5], 0x3, 0x7fff, 0xffffffffffffff9b, 0x1, 0x8, 0x20000000000000, {0x33b, 0xfffffffffffffff9, 0x3f, 0x101, 0x6, 0xa09, 0x80000000, 0x9, 0x2, 0x3ff, 0x4, 0x1ff, 0x2, 0x7, "91f3ea371390d743dd6d62a1c4c4a33fb5cc5130a88a9f2e5a27c2cb09b02fcb"}}) syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x7fff, 0x100) io_setup(0x4, &(0x7f0000000b40)=0x0) io_destroy(r7) ioctl$EVIOCSREP(r5, 0x40084503, &(0x7f0000000b80)=[0x1, 0x9]) getsockopt$inet_int(r0, 0x0, 0x2, &(0x7f0000000bc0), &(0x7f0000000c00)=0x4) 2018/03/30 10:21:27 executing program 5: socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000223fd4)=[@in={0x2, 0x0, @loopback=0x7f000001}], 0x10) mmap(&(0x7f0000286000/0x2000)=nil, 0x2000, 0x8, 0x32, 0xffffffffffffffff, 0x3) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000080), 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000240)=ANY=[@ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYPTR64=&(0x7f0000000040)=ANY=[@ANYPTR64], @ANYRES64, @ANYPTR64=&(0x7f0000000180)=ANY=[@ANYPTR, @ANYRES16]], @ANYRES32], &(0x7f0000000000)=0x2) r0 = semget$private(0x0, 0x7, 0x88) semctl$IPC_INFO(r0, 0x4, 0x3, &(0x7f0000000200)=""/44) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x40000, 0x0) getsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000100)=0x9, &(0x7f0000000140)=0x1) 2018/03/30 10:21:27 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x100000000106, 0x0) writev(r0, &(0x7f000036bfd0)=[{&(0x7f0000b51000)="eb", 0x1}], 0x1) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000040)=0x4000000058) read(r0, &(0x7f0000000140)=""/1, 0xfffffffffffffeb7) 2018/03/30 10:21:27 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000, 0x0, 0x4}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000d80)={r5, 0x13c, 0x7, 0xaa5, 0x1, 0x8001}, 0x14) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000dc0)={0xaa, 0x20}) pwrite64(0xffffffffffffffff, &(0x7f0000000e00)="7437032bd6e223b3a59d10357fc245a11551c76207ed30241886ce0ea1326aeac569322a47e5909770909834b26bf6b04af3b30656cbc3e07c3eed14ee7c472c2d276872498ef33618509e2049213b9664560dc77dd302976456a0392edd116b9816cbca183c77f192c4c3260a385cc483327645104ab9987888488ff6b8e163c2eddc4fc33b9f9ba13abbb021303c8d438d96b2da7c190f9cdc9f2242c2df22ccc63b779747bc9b54e299a407b4150450352ce672efd9fd7565ffb5f410dd66a2061984a92c2ca847eb65e95168372a9e92cc53f27151c36569714d1b2b2b2d26b0e9668aa5042a767ab88ad81f2850cef1", 0xf2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) 2018/03/30 10:21:27 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="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", 0xfc}], 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x200900, 0x103) connect$vsock_stream(r1, &(0x7f0000000600)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) rt_sigtimedwait(&(0x7f0000000140)={0xffffffff}, 0x0, &(0x7f0000000180), 0x8) bind$alg(0xffffffffffffffff, &(0x7f000073e000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(cbc-twofish-avx)\x00'}, 0x58) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000500)={&(0x7f00000005c0)=[0x0, 0x0, 0x0], 0x3}) nanosleep(&(0x7f0000d1e000)={0x0, 0x1c9c380}, &(0x7f0000000000)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r2, 0x118, 0x0, &(0x7f0000000100)=0x7, 0x4) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000000c0)={0x1, 0x1, 0x1, 0x1, 0x0, 0x6}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000280)={r3, @in={{0x2, 0x4e23, @multicast2=0xe0000002}}, [0x8000, 0x9, 0x80000000, 0x3, 0x80, 0x8001, 0x800, 0x100, 0xe0db, 0x0, 0x2000000000, 0x200, 0x68, 0x0, 0x8]}, &(0x7f0000000380)=0x100) r4 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0xfffffffffffffdfa) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port1\x00', 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r4, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r5 = gettid() r6 = syz_open_procfs(r5, &(0x7f00000002c0)='maps\x00') readv(r6, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/28, 0x65}], 0x1) exit(0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r6, &(0x7f000004ffe0)=[{&(0x7f0000000000)=""/128, 0xe6}], 0x222) r7 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) connect$ax25(r2, &(0x7f00000006c0)={0x3, {"fc5da504005009"}, 0x7fff}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) getsockopt$netrom_NETROM_T1(r7, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r4, 0x80045301, &(0x7f0000000700)) 2018/03/30 10:21:27 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f00000001c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="0090d15e"], &(0x7f00000002c0)=0x2) r2 = socket$pptp(0x18, 0x1, 0x2) perf_event_open(&(0x7f0000000000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r2, &(0x7f0000000200)=""/88, 0x58) write$cgroup_pid(r1, &(0x7f0000000340)={[0x32, 0x38, 0x36, 0x32, 0x35, 0x38]}, 0x6) clone(0x0, &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)) madvise(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x0) perf_event_open(&(0x7f0000348f88)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBLED(r1, 0x4b64, &(0x7f0000000180)) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000080)=0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000280)={0x4, 0x0, 0x10003, 0x7f}) ioctl$DRM_IOCTL_AGP_UNBIND(r1, 0x40106437, &(0x7f0000000300)={r4, 0xff}) ptrace$peekuser(0x3, r3, 0xfffffffffffffffe) 2018/03/30 10:21:27 executing program 6 (fault-call:3 fault-nth:27): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r0, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r0, &(0x7f0000000100)=""/65, 0x41) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) linkat(r0, &(0x7f0000000480)='./file1\x00', r1, &(0x7f00000004c0)='./file0\x00', 0x1000) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') unlink(&(0x7f00000000c0)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r0, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x12021) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000340)={0x8, 0x9, 0x4, 0x10000, 0x1, 0x7, 0x7fffffff, 0x0, 0x29, 0x0, 0x20}, 0xb) 2018/03/30 10:21:27 executing program 7: clone(0x200, &(0x7f0000000100)="f0f7d70fc52207334efb558c957ea5882b23d85fa1659dc13aa7603b45aa407f02117308b1a8697bcf6617a98d145ec63b3cffa3123c2b94a42831af8d9bdb4b03d2954fdaa7e037f2c459a27e42921a924df6c5899ef4dbdb44bffbadd515d6024b7e3450b4ea54c55a229f4d694a292b270018a408b9ed54a0bc1929156ff004c1cf0b1728065c1ae04f4eeb552ff2420005e5ccb9400909127922c4a8e69ffbb96ca5bc95786113ae475b94c2c9a6a235276e2f1b7f01010000000000007a", &(0x7f0000000000), &(0x7f0000f8b000), &(0x7f00000d5000)) mknod(&(0x7f0000cd7000)='./file0\x00', 0x103a, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000340), &(0x7f000027a000)) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000080)={0x4, 0xffffffffffffff9c, 0x1}) bind$unix(r0, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) syz_open_procfs(0x0, &(0x7f000042cff4)='personality\x00') read(r0, &(0x7f0000000240)=""/130, 0xfffffffffffffe5a) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000240)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x9, 0x18}, 0xc) open$dir(&(0x7f000050bff8)='./file0\x00', 0x2, 0x0) [ 215.068768] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 000000000000001a [ 215.076514] cgroup: cgroup_addrm_files: failed to add cpu.stat, err=-12 2018/03/30 10:21:27 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet6(0xa, 0x6, 0xfffffffffffffffb) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000080)={'ip6_vti0\x00', {0x2, 0x4e20, @broadcast=0xffffffff}}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_XCRS(r3, 0x4188aea7, &(0x7f0000000140)=ANY=[@ANYBLOB="400100000000991ab2d8576f2c7bb1182e0a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000760000000000000000000000000000000000000000803e0d4cade10000e4ff000000"]) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x2000, 0x0) 2018/03/30 10:21:27 executing program 6 (fault-call:3 fault-nth:28): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r0, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r0, &(0x7f0000000100)=""/65, 0x41) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) linkat(r0, &(0x7f0000000480)='./file1\x00', r1, &(0x7f00000004c0)='./file0\x00', 0x1000) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') unlink(&(0x7f00000000c0)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r0, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x12021) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000340)={0x8, 0x9, 0x4, 0x10000, 0x1, 0x7, 0x7fffffff, 0x0, 0x29, 0x0, 0x20}, 0xb) 2018/03/30 10:21:27 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000240)={0x2, 0x0, [{}, {0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1}]}) 2018/03/30 10:21:27 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x100000000106, 0x0) writev(r0, &(0x7f000036bfd0)=[{&(0x7f0000b51000)="eb", 0x1}], 0x1) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000040)=0x4000000058) read(r0, &(0x7f0000000140)=""/1, 0xfffffffffffffeb7) 2018/03/30 10:21:27 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000, 0x0, 0x4}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000d80)={r5, 0x13c, 0x7, 0xaa5, 0x1, 0x8001}, 0x14) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000dc0)={0xaa, 0x20}) pwrite64(0xffffffffffffffff, &(0x7f0000000e00)="7437032bd6e223b3a59d10357fc245a11551c76207ed30241886ce0ea1326aeac569322a47e5909770909834b26bf6b04af3b30656cbc3e07c3eed14ee7c472c2d276872498ef33618509e2049213b9664560dc77dd302976456a0392edd116b9816cbca183c77f192c4c3260a385cc483327645104ab9987888488ff6b8e163c2eddc4fc33b9f9ba13abbb021303c8d438d96b2da7c190f9cdc9f2242c2df22ccc63b779747bc9b54e299a407b4150450352ce672efd9fd7565ffb5f410dd66a2061984a92c2ca847eb65e95168372a9e92cc53f27151c36569714d1b2b2b2d26b0e9668aa5042a767ab88ad81f2850cef1", 0xf2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) 2018/03/30 10:21:27 executing program 1: r0 = socket$inet(0x10, 0x3, 0x0) socket$pppoe(0x18, 0x1, 0x0) sendmsg(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f0000003000)=[{&(0x7f0000005fdb)="240000001800030307fffd946fa200001c140000feffffff031d8568791ba3a2d188527e", 0x24}], 0x1}, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)={0x0, 0x7}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000080)={r1, 0x7f, 0x20, 0x4, 0x8000}, &(0x7f00000000c0)=0x18) 2018/03/30 10:21:27 executing program 7: clone(0x200, &(0x7f0000000100)="f0f7d70fc52207334efb558c957ea5882b23d85fa1659dc13aa7603b45aa407f02117308b1a8697bcf6617a98d145ec63b3cffa3123c2b94a42831af8d9bdb4b03d2954fdaa7e037f2c459a27e42921a924df6c5899ef4dbdb44bffbadd515d6024b7e3450b4ea54c55a229f4d694a292b270018a408b9ed54a0bc1929156ff004c1cf0b1728065c1ae04f4eeb552ff2420005e5ccb9400909127922c4a8e69ffbb96ca5bc95786113ae475b94c2c9a6a235276e2f1b7f01010000000000007a", &(0x7f0000000000), &(0x7f0000f8b000), &(0x7f00000d5000)) mknod(&(0x7f0000cd7000)='./file0\x00', 0x103a, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000340), &(0x7f000027a000)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000240)={0x4, r0, 0x1}) bind$unix(r1, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) r2 = syz_open_procfs(0x0, &(0x7f000042cff4)='personality\x00') read(r2, &(0x7f0000f1bf7e)=""/130, 0xfffffdd8) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000240)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x9, 0x18}, 0xc) open$dir(&(0x7f000050bff8)='./file0\x00', 0x2, 0x0) 2018/03/30 10:21:27 executing program 5: perf_event_open(&(0x7f0000000f88)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f0000000080)=""/255, 0xff}], 0x259) read(r0, &(0x7f0000000700)=""/188, 0xbc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000006c0)={0xffffffffffffffff, &(0x7f0000000500)='Z', &(0x7f0000000600)=""/183}, 0x18) ioctl$KVM_SET_TSS_ADDR(0xffffffffffffffff, 0xae47, 0xd000) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) socket$inet6_sctp(0xa, 0x0, 0x84) r1 = syz_open_pts(r0, 0x2) io_setup(0x1, &(0x7f0000000300)=0x0) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) io_getevents(r2, 0x101, 0x4, &(0x7f0000000340)=[{}, {}, {}, {}], &(0x7f0000000400)={r3, r4+10000000}) r5 = dup3(r1, r0, 0x0) io_setup(0x20, &(0x7f0000000180)) ioctl$KVM_GET_MSRS(r5, 0xc008ae88, &(0x7f0000000280)=ANY=[@ANYBLOB="040000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"]) syz_open_dev$midi(&(0x7f0000000440)='/dev/midi#\x00', 0xfffffffffffffff9, 0x400040) syz_open_dev$vcsa(&(0x7f0000000ff5)='/dev/vcsa#\x00', 0x3ff, 0x0) creat(&(0x7f0000000240)='./file0\x00', 0x40) syz_open_dev$vcsn(&(0x7f0000407ff6)='/dev/vcs#\x00', 0x4, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f000093f000), 0x8}) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x9, 0xffffffffffffffff, &(0x7f0000001000), 0x0, 0x8, 0x0, 0x0, r5}, &(0x7f0000000200)) write(r0, &(0x7f0000c34fff), 0xffffff0b) 2018/03/30 10:21:27 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x100000000106, 0x0) writev(r0, &(0x7f000036bfd0)=[{&(0x7f0000b51000)="eb", 0x1}], 0x1) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000040)=0x4000000058) read(r0, &(0x7f0000000140)=""/1, 0xfffffffffffffeb7) [ 215.264063] netlink: 8 bytes leftover after parsing attributes in process `syz-executor1'. [ 215.336505] bond0 (unregistering): Released all slaves [ 215.381531] netlink: 8 bytes leftover after parsing attributes in process `syz-executor1'. [ 216.103905] IPVS: ftp: loaded support on port[0] = 21 [ 216.388483] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 216.814949] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 216.821058] 8021q: adding VLAN 0 to HW filter on device bond0 [ 216.864998] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 216.909745] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 216.928749] FAULT_INJECTION: forcing a failure. [ 216.928749] name failslab, interval 1, probability 0, space 0, times 0 [ 216.939999] CPU: 0 PID: 26861 Comm: syz-executor6 Not tainted 4.16.0-rc7+ #371 [ 216.947347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 216.956687] Call Trace: [ 216.959252] dump_stack+0x194/0x24d [ 216.962854] ? arch_local_irq_restore+0x53/0x53 [ 216.967497] ? is_bpf_text_address+0xa4/0x120 [ 216.971971] ? kernel_text_address+0x102/0x140 [ 216.976539] should_fail+0x8c0/0xa40 [ 216.980227] ? __save_stack_trace+0x7e/0xd0 [ 216.984527] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 216.989614] ? save_stack+0xa3/0xd0 [ 216.993215] ? save_stack+0x43/0xd0 [ 216.996821] ? find_held_lock+0x35/0x1d0 [ 217.000871] ? __lock_is_held+0xb6/0x140 [ 217.004925] ? check_same_owner+0x320/0x320 [ 217.009218] ? kmem_cache_alloc+0x4e9/0x760 [ 217.013515] ? rcu_note_context_switch+0x710/0x710 [ 217.018430] should_failslab+0xec/0x120 [ 217.022382] __kmalloc+0x63/0x760 [ 217.025812] ? sched_create_group+0x22/0x70 [ 217.030110] ? kzalloc+0xf/0x20 [ 217.033369] kzalloc+0xf/0x20 [ 217.036449] alloc_fair_sched_group+0x5e/0x530 [ 217.041021] sched_create_group+0x35/0x70 [ 217.045144] cpu_cgroup_css_alloc+0xe/0x30 [ 217.049358] cgroup_apply_control_enable+0x44d/0xbc0 [ 217.054447] ? cgroup_propagate_control+0x570/0x570 [ 217.059448] ? css_populate_dir+0x289/0x420 [ 217.063749] cgroup_mkdir+0x56f/0xfc0 [ 217.067522] ? __lock_is_held+0xb6/0x140 [ 217.071566] ? cgroup_destroy_locked+0x750/0x750 [ 217.076298] ? rcu_read_lock_sched_held+0x108/0x120 [ 217.081291] ? kmem_cache_free+0x258/0x2a0 [ 217.085526] ? set_nlink+0xc1/0x160 [ 217.089144] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 217.094049] ? generic_permission+0x105/0x3c0 [ 217.098520] ? cgroup_destroy_locked+0x750/0x750 [ 217.103252] kernfs_iop_mkdir+0x153/0x1e0 [ 217.107377] vfs_mkdir+0x390/0x600 [ 217.110901] SyS_mkdirat+0x22b/0x2b0 [ 217.114594] ? SyS_mknod+0x480/0x480 [ 217.118280] ? trace_hardirqs_on+0xd/0x10 [ 217.122411] ? do_syscall_64+0xb7/0x940 [ 217.126365] ? SyS_mknod+0x480/0x480 [ 217.130053] do_syscall_64+0x281/0x940 [ 217.133920] ? __do_page_fault+0xc90/0xc90 [ 217.138128] ? _raw_spin_unlock_irq+0x27/0x70 [ 217.142598] ? finish_task_switch+0x1c1/0x7e0 [ 217.147068] ? syscall_return_slowpath+0x550/0x550 [ 217.151989] ? syscall_return_slowpath+0x2ac/0x550 [ 217.156895] ? prepare_exit_to_usermode+0x350/0x350 [ 217.161886] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 217.167228] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 217.172055] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 217.177216] RIP: 0033:0x4548b9 [ 217.180378] RSP: 002b:00007f560ac2ec68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 217.188058] RAX: ffffffffffffffda RBX: 00007f560ac2f6d4 RCX: 00000000004548b9 [ 217.195306] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 217.202547] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 2018/03/30 10:21:29 executing program 1: r0 = perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x78, 0x1e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000003c0)={0x0, @in6={{0xa, 0x4e24, 0x3, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, &(0x7f0000000480)=0x84) bind$netrom(0xffffffffffffffff, &(0x7f0000000100)=@ax25={0x3, {"082d45310473ff"}, 0x100000001}, 0xffffffffffffff35) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f00000002c0)=ANY=[@ANYRES32=r1, @ANYBLOB="00082700de20fd5e0cfd6af1b46f78dacfdb4d8b684a62e36b35006a19"], 0x2) getegid() socket$inet(0x2, 0x5, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)="2f65786500000000000090d8b75e67e16b394342abb5158df87ea8984e79c93df7498b2b34796068700e29fbd789f9a031f23e16c96e30baed2961953b057f7a3222943acc4b8cfa4de553f8276731ddeb811efd44ea011e1a0db9074a28a826c88566b89c57cc3cca4aec41d37fa27c8daa19030d03139d0aea71d509d9a20ba7deceb656cc1308d9d1f111b6bd1595486f55e229923be4ed8cbfb78e86280b4cacf386bfac070afb312a4c520a03b27f805d181bd09ea208931a36e888060a2d") perf_event_open(&(0x7f0000223000)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MARK_BUFS(r2, 0x40206417, &(0x7f00000000c0)={0xfc, 0xba, 0x6, 0x643, 0x8, 0xe195}) fsetxattr(r2, &(0x7f0000000140)=@known='user.syz\x00', &(0x7f0000000000)='\x00', 0x3df, 0x0) fremovexattr(r2, &(0x7f0000000080)=@known='user.syz\x00') ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000200)={0x4, @time, 0x7, {0x18c9, 0xff}, 0x93, 0x0, 0x4}) 2018/03/30 10:21:29 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000fcbff7)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x00') ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) alarm(0x100000001) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r3 = fcntl$dupfd(r2, 0x406, r2) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f00009fb000/0x18000)=nil, &(0x7f0000000440)=[@text32={0x20, &(0x7f0000000400)="c4c1df7cfe0f01df0f01c8660f62bf00100000b8010000000f01c10f0766baf80cb879ddb68eef66bafc0cec9b0f213ff20f1a31", 0x34}], 0x1, 0x1a, &(0x7f0000000480)=[@efer={0x2, 0x4800}], 0x1) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000000)={"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"}) 2018/03/30 10:21:29 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000, 0x0, 0x4}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000d80)={r5, 0x13c, 0x7, 0xaa5, 0x1, 0x8001}, 0x14) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000dc0)={0xaa, 0x20}) pwrite64(0xffffffffffffffff, &(0x7f0000000e00)="7437032bd6e223b3a59d10357fc245a11551c76207ed30241886ce0ea1326aeac569322a47e5909770909834b26bf6b04af3b30656cbc3e07c3eed14ee7c472c2d276872498ef33618509e2049213b9664560dc77dd302976456a0392edd116b9816cbca183c77f192c4c3260a385cc483327645104ab9987888488ff6b8e163c2eddc4fc33b9f9ba13abbb021303c8d438d96b2da7c190f9cdc9f2242c2df22ccc63b779747bc9b54e299a407b4150450352ce672efd9fd7565ffb5f410dd66a2061984a92c2ca847eb65e95168372a9e92cc53f27151c36569714d1b2b2b2d26b0e9668aa5042a767ab88ad81f2850cef1", 0xf2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) 2018/03/30 10:21:29 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="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", 0xfc}], 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x200900, 0x103) r1 = socket$alg(0x26, 0x5, 0x0) rt_sigtimedwait(&(0x7f0000000140)={0xffffffff}, 0x0, &(0x7f0000000180), 0x8) bind$alg(r1, &(0x7f000073e000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(cbc-twofish-avx)\x00'}, 0x58) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000500)={&(0x7f00000005c0)=[0x0, 0x0, 0x0], 0x3}) nanosleep(&(0x7f0000d1e000)={0x0, 0x1c9c380}, &(0x7f0000000000)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r2, 0x118, 0x0, &(0x7f0000000100)=0x7, 0x4) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000000c0)={0x1, 0x1, 0x1, 0x1, 0x0, 0x6}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000280)={r3, @in={{0x2, 0x4e23, @multicast2=0xe0000002}}, [0x8000, 0x9, 0x80000000, 0x3, 0x80, 0x8001, 0x800, 0x100, 0xe0db, 0x0, 0x2000000000, 0x200, 0x68, 0x0, 0x8]}, &(0x7f0000000380)=0x100) r4 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0xfffffffffffffdfa) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port1\x00', 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r4, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r5 = gettid() r6 = syz_open_procfs(r5, &(0x7f00000002c0)='maps\x00') readv(r6, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/28, 0x65}], 0x1) exit(0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r6, &(0x7f000004ffe0)=[{&(0x7f0000000000)=""/128, 0xe6}], 0x222) r7 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) connect$ax25(r2, &(0x7f00000006c0)={0x3, {"fc5da504005009"}, 0x7fff}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) getsockopt$netrom_NETROM_T1(r7, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r4, 0x80045301, &(0x7f0000000700)) 2018/03/30 10:21:29 executing program 6 (fault-call:3 fault-nth:29): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r0, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r0, &(0x7f0000000100)=""/65, 0x41) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) linkat(r0, &(0x7f0000000480)='./file1\x00', r1, &(0x7f00000004c0)='./file0\x00', 0x1000) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') unlink(&(0x7f00000000c0)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r0, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x12021) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000340)={0x8, 0x9, 0x4, 0x10000, 0x1, 0x7, 0x7fffffff, 0x0, 0x29, 0x0, 0x20}, 0xb) 2018/03/30 10:21:29 executing program 7: clone(0x200, &(0x7f0000000100)="f0f7d70fc52207334efb558c957ea5882b23d85fa1659dc13aa7603b45aa407f02117308b1a8697bcf6617a98d145ec63b3cffa3123c2b94a42831af8d9bdb4b03d2954fdaa7e037f2c459a27e42921a924df6c5899ef4dbdb44bffbadd515d6024b7e3450b4ea54c55a229f4d694a292b270018a408b9ed54a0bc1929156ff004c1cf0b1728065c1ae04f4eeb552ff2420005e5ccb9400909127922c4a8e69ffbb96ca5bc95786113ae475b94c2c9a6a235276e2f1b7f01010000000000007a", &(0x7f0000000000), &(0x7f0000f8b000), &(0x7f0000000480)="6129f5b9a7d0acf7943e927dc7f82b6db2a847704f34c879fdad54f4e2221aaf67f8ba5b0aa139822f7061d83c801be49ec43fffce9ac714945134ae8c141ee9d6e3a92352edf588d0584e04a5b85806c18673a93b002ed9682cd12de4d97d4c179de6cd1a91396df4f22a7500ec") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000680)={r0, &(0x7f0000000500)="84a493e5c3052fcd412c39d65e2fec0c1d0c7fea3b00e52100c3636b593955e3ad8a36ceab677981cb8d10c9d09a77111345c892c0f1f36d83fc0499f68f54265302b87fb5bbab981be47eaf9640cd549b3db22ce67f9419ea88b4ab26b208b35a55422fd7b5f62d5ac12cc17620544483487123491f6b5812b8096f20f2491ced13ed29eff7a9c0bbaa34a6932611d43585bcefbb344475d91657bb67dd28c14f8e362ecb3d717e2aa15af1981a6a8d2eb63adb9196d6ce7a4135a137d01316e99a783862b0df94125b", &(0x7f0000000600)="84d3a20b9072c1eaf211918770af8034db421c8ff54451b0f4a940d7106a8c86c95a2cff96a2a2d1db101eb1bc3c74ad51b51f1743abd034734440654bb6809048c928b1c76319c1a89a8ecfa990e4c97d1b", 0x3}, 0x20) r2 = perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x1, 0x3, 0x7fff, 0x4a, 0x0, 0xff, 0x4, 0x1, 0x2, 0xfff, 0x400, 0x10000, 0x80, 0x81, 0x0, 0x0, 0xfff, 0x8, 0x1ff, 0x80000000, 0x2, 0x1, 0x51, 0x40, 0x4, 0xfffffffffffff000, 0x7ff, 0x2, 0x3, 0x7, 0x4, 0x2, 0x89, 0x0, 0x9, 0x9, 0x0, 0xffffffffffffff7f, 0x4, @perf_config_ext={0x1, 0x7fff}, 0x4000, 0x10000, 0xfffffffffffffffc, 0x1, 0x7, 0x5, 0xfff}, 0x0, 0xd, 0xffffffffffffff9c, 0x2) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f0000000340)={0x3, {{0xa, 0x4e23, 0xfda4, @local={0xfe, 0x80, [], 0xaa}, 0x40}}, {{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}}, 0x108) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000300)={0x3, r2}) mknod(&(0x7f0000cd7000)='./file0\x00', 0x103a, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000340), &(0x7f000027a000)) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000080)={0x4, 0xffffffffffffff9c, 0x1}) bind$unix(r3, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) r4 = syz_open_procfs(0x0, &(0x7f000042cff4)='personality\x00') read(r4, &(0x7f0000f1bf7e)=""/130, 0xfffffdd8) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000240)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x9, 0x18}, 0xc) open$dir(&(0x7f000050bff8)='./file0\x00', 0x2, 0x0) 2018/03/30 10:21:29 executing program 5: r0 = socket$unix(0x1, 0x7, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000080)=0xffffffffffffff9e, 0x629b1f532b9b467e) r2 = socket(0x0, 0x6, 0x4) bind$unix(r2, &(0x7f0000001200)=@abs={0x1, 0x0, 0x4e24}, 0x6e) r3 = perf_event_open(&(0x7f0000220000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) r4 = syz_open_dev$audion(&(0x7f0000001400)='/dev/audio#\x00', 0x2, 0x440480) ioctl$DRM_IOCTL_GET_MAGIC(r4, 0x80046402, &(0x7f0000001440)=0x8) open(&(0x7f00000001c0)="e91f7189591e9233614b00", 0x502, 0x80) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r4, 0xc0045540, &(0x7f00000013c0)=0x20000000000ee) listen(r1, 0x0) connect$unix(r0, &(0x7f000066fff4)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) dup3(r3, r1, 0x0) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f00000014c0)={'bond0\x00', {0x2, 0x4e21, @multicast2=0xe0000002}}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000001480)='/proc/self/net/pfkey\x00', 0x8000, 0x0) r5 = semget(0x0, 0x4, 0x200) pipe(&(0x7f0000001500)) semctl$GETNCNT(r5, 0x2, 0xe, &(0x7f00000012c0)=""/228) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000140)=@generic={0x52, 0xffffffff, 0x1}) r6 = syz_open_procfs(0x0, &(0x7f0000001280)='net/wireless\x00') pread64(r6, &(0x7f0000000200)=""/4096, 0x1000, 0x0) ioctl$TIOCGPGRP(r6, 0x540f, &(0x7f0000000040)=0x0) capset(&(0x7f00000000c0)={0x399f1336, r7}, &(0x7f0000000100)={0x1, 0x4, 0x1, 0x9, 0x6a92, 0x1}) ioctl$UFFDIO_WAKE(0xffffffffffffff9c, 0x8010aa02, &(0x7f0000000180)={&(0x7f0000ff3000/0xb000)=nil, 0xb000}) 2018/03/30 10:21:29 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x100000000106, 0x0) writev(r0, &(0x7f000036bfd0)=[{&(0x7f0000b51000)="eb", 0x1}], 0x1) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000040)=0x4000000058) [ 217.209791] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 217.217033] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 000000000000001c 2018/03/30 10:21:29 executing program 1: syz_emit_ethernet(0x15, &(0x7f0000000000)={@link_local={0x1, 0x80, 0xc2}, @dev={[0xaa, 0xaa, 0xaa, 0xaa]}, [{[], {0x8100}}], {@llc={0x4, {@llc={0xff, 0xff, 'a'}}}}}, &(0x7f0000000080)) r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x7f, 0x80) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x3, @loopback={0x0, 0x1}, 0x8}, 0x1c) 2018/03/30 10:21:29 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x100000000106, 0x0) writev(r0, &(0x7f000036bfd0)=[{&(0x7f0000b51000)="eb", 0x1}], 0x1) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000040)=0x4000000058) 2018/03/30 10:21:29 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000, 0x0, 0x4}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000d80)={r5, 0x13c, 0x7, 0xaa5, 0x1, 0x8001}, 0x14) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000dc0)={0xaa, 0x20}) pwrite64(r1, &(0x7f0000000e00), 0x0, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) 2018/03/30 10:21:30 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x6, 0x0) ioctl$KVM_SET_SREGS(r1, 0x4138ae84, &(0x7f0000000100)={{0x2000, 0x100000, 0x9, 0x0, 0x3f, 0x2, 0x4, 0x5, 0x52c5e267, 0x1, 0x1f, 0x4}, {0x16000, 0x1f002, 0x1f, 0xff, 0x100000000, 0x49, 0xfff, 0xfff, 0x9, 0x4, 0x43, 0x2}, {0x100000, 0x10d000, 0x0, 0x2, 0x1, 0x7, 0x5, 0xffffffffffff9b08, 0x1000, 0x5d82, 0x3, 0x91}, {0x1f000, 0x0, 0x9, 0x1, 0x200, 0x9, 0x6, 0xedb, 0x1e, 0x2, 0x81, 0x1}, {0x1, 0x7000, 0xd, 0x29, 0x0, 0x1000, 0xfffffffffffffbaf, 0x2, 0x7, 0x0, 0x4, 0x9eee}, {0x5000, 0x3002, 0xc, 0x100000000, 0x101, 0xff, 0x6, 0x0, 0x80000001, 0x8, 0x9}, {0xf000, 0x101001, 0xf, 0xd69e, 0x7, 0x80000001, 0x12000000, 0x0, 0x1b90ae83, 0x2, 0x4, 0x40}, {0x7000, 0xd000, 0xe, 0x9, 0x463d, 0x7, 0x8000, 0x8000, 0x943, 0x1000, 0x4000000000000000, 0x10000}, {0x4000, 0x3000}, {0xf000, 0x1d000}, 0x80000000, 0x0, 0x0, 0x40000, 0xc, 0x2c00, 0x1000, [0x5, 0x8, 0x8000, 0xfffffffffffffffb]}) bind$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x2712, @my=0x0}, 0xfffffffffffffedd) bind$vsock_stream(r0, &(0x7f00000000c0)={0x28, 0x0, 0x0, @host=0x2}, 0x10) 2018/03/30 10:21:30 executing program 3: unshare(0x800) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGLCKTRMIOS(r1, 0x5456, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x80}) r2 = syz_open_dev$adsp(&(0x7f00000003c0)='/dev/adsp#\x00', 0xffffffffffff0001, 0x10000) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r0, 0x4008ae48, &(0x7f0000000880)) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r2, 0x80dc5521, &(0x7f0000000400)=""/88) r3 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0xfffffffffffffffc, 0x10000) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000800)=@filter={'filter\x00', 0xe, 0x2, 0x328, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f0000000480), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x11, 0x8, 0x809b, 'tunl0\x00', 'lo\x00', 'irlan0\x00', 'gretap0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0x0, 0x0, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0xff, 0x0, 0x0, 0xff], 0x70, 0xa0, 0xe8}, [@common=@STANDARD={'\x00', 0x8}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x7ff, 0x8000, 0x7fff}}}}, {{{0x5, 0x50, 0xf8, 'syzkaller0\x00', 'tunl0\x00', 'lo\x00', 'syz_tun\x00', @empty, [0xff, 0x0, 0xff, 0x0, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0x0, 0xff], 0xc0, 0x138, 0x1b0, [@nfacct={'nfacct\x00', 0x28, {{'syz1\x00', 0x8}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x1000000000000000, 0x17f8, 0x7, 0x0, 0x0, "157b559af7393ff607f1c23b4426f758b6a7af3e64c935e19f40b69f1b1ac537d21783a3a55f792182813994d1dc00b7a36ab8b01827772e1c4d464016f0d3d3"}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0xabe3, 0x0, 0x0, 0x0, "ee8ff2b80b99ae56fdd3e2ff3228c3845ac20ffd61d33aa22bb27ab2de98951d675ba0e499ef3e729ee14f3a588af5b3e4c6db5245beff73745fb9da151a501b"}}}}]}]}, 0x3a0) utime(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)={0x80, 0xc3b}) recvmsg$kcm(r3, &(0x7f0000000380)={&(0x7f0000000140)=@sco, 0x80, &(0x7f00000002c0)=[{&(0x7f00000000c0)=""/36, 0x24}, {&(0x7f00000001c0)=""/36, 0x24}, {&(0x7f0000000200)=""/44, 0x2c}, {&(0x7f0000000240)=""/73, 0x49}], 0x4, &(0x7f0000000300)=""/103, 0x67, 0x4348}, 0x0) 2018/03/30 10:21:30 executing program 6 (fault-call:3 fault-nth:30): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r0, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r0, &(0x7f0000000100)=""/65, 0x41) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) linkat(r0, &(0x7f0000000480)='./file1\x00', r1, &(0x7f00000004c0)='./file0\x00', 0x1000) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') unlink(&(0x7f00000000c0)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r0, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x12021) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000340)={0x8, 0x9, 0x4, 0x10000, 0x1, 0x7, 0x7fffffff, 0x0, 0x29, 0x0, 0x20}, 0xb) 2018/03/30 10:21:30 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x4000, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x1e, &(0x7f0000000100)=""/65, &(0x7f0000000180)=0x41) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89b0, &(0x7f0000000240)={'vcan0\x00', @ifru_data=&(0x7f0000000080)="48803d6b61439579b6d04dd4102d09b21f8e3ef66a49b9acdf65e7fc2c583929"}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) setsockopt$packet_int(r2, 0x107, 0xc, &(0x7f0000000040)=0x80000001, 0x4) 2018/03/30 10:21:30 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x100000000106, 0x0) writev(r0, &(0x7f000036bfd0)=[{&(0x7f0000b51000)="eb", 0x1}], 0x1) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000040)=0x4000000058) 2018/03/30 10:21:30 executing program 7: clone(0x200, &(0x7f0000000100)="f0f7d70fc52207334efb558c957ea5882b23d85fa1659dc13aa7603b45aa407f02117308b1a8697bcf6617a98d145ec63b3cffa3123c2b94a42831af8d9bdb4b03d2954fdaa7e037f2c459a27e42921a924df6c5899ef4dbdb44bffbadd515d6024b7e3450b4ea54c55a229f4d694a292b270018a408b9ed54a0bc1929156ff004c1cf0b1728065c1ae04f4eeb552ff2420005e5ccb9400909127922c4a8e69ffbb96ca5bc95786113ae475b94c2c9a6a235276e2f1b7f01010000000000007a", &(0x7f0000000000), &(0x7f0000f8b000), &(0x7f00000d5000)) mknod(&(0x7f0000cd7000)='./file0\x00', 0x103a, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000340), &(0x7f000027a000)) mknod(&(0x7f0000000240)='./file0\x00', 0x100, 0x1) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f00000002c0)={0x4, 0xffffffffffffff9c, 0x1}) bind$unix(r0, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) r1 = syz_open_procfs(0x0, &(0x7f000042cff4)='personality\x00') ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f0000000280)) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000080)=0x0) process_vm_readv(r2, &(0x7f0000000900)=[{&(0x7f0000000300)=""/72, 0x48}, {&(0x7f0000000380)=""/184, 0xb8}, {&(0x7f0000000440)=""/212, 0xd4}, {&(0x7f0000000540)=""/204, 0xcc}, {&(0x7f0000000640)=""/51, 0x33}, {&(0x7f0000000680)=""/191, 0xbf}, {&(0x7f0000000740)=""/152, 0x98}, {&(0x7f0000000800)=""/208, 0xd0}], 0x8, &(0x7f0000000e40)=[{&(0x7f0000000980)=""/15, 0xf}, {&(0x7f00000009c0)=""/203, 0xcb}, {&(0x7f0000000ac0)=""/236, 0xec}, {&(0x7f0000000bc0)=""/107, 0x6b}, {&(0x7f0000000c40)=""/239, 0xef}, {&(0x7f0000000d40)=""/221, 0xdd}], 0x6, 0x0) read(r1, &(0x7f0000f1bf7e)=""/130, 0xfffffdd8) execve(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00), &(0x7f0000000240)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x9, 0x18}, 0xc) open$dir(&(0x7f000050bff8)='./file0\x00', 0x2, 0x0) [ 217.553438] bond0 (unregistering): Released all slaves [ 218.244788] IPVS: ftp: loaded support on port[0] = 21 [ 218.528469] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 218.944543] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 218.950635] 8021q: adding VLAN 0 to HW filter on device bond0 [ 218.993830] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 219.037875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 219.059379] FAULT_INJECTION: forcing a failure. [ 219.059379] name failslab, interval 1, probability 0, space 0, times 0 [ 219.070644] CPU: 0 PID: 27084 Comm: syz-executor6 Not tainted 4.16.0-rc7+ #371 [ 219.077987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 219.087320] Call Trace: [ 219.089889] dump_stack+0x194/0x24d [ 219.093493] ? arch_local_irq_restore+0x53/0x53 [ 219.098144] should_fail+0x8c0/0xa40 [ 219.101835] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 219.106915] ? trace_hardirqs_off+0x10/0x10 [ 219.111213] ? alloc_fair_sched_group+0xd6/0x530 [ 219.115945] ? sched_create_group+0x35/0x70 [ 219.120244] ? cgroup_apply_control_enable+0x44d/0xbc0 [ 219.125496] ? SyS_mkdirat+0x22b/0x2b0 [ 219.129359] ? print_irqtrace_events+0x270/0x270 [ 219.134095] ? find_held_lock+0x35/0x1d0 [ 219.138138] ? __lock_is_held+0xb6/0x140 [ 219.142192] ? check_same_owner+0x320/0x320 [ 219.146488] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 219.151478] ? rcu_note_context_switch+0x710/0x710 [ 219.156392] should_failslab+0xec/0x120 [ 219.160342] kmem_cache_alloc_node_trace+0x5a/0x760 [ 219.165335] ? __refill_cfs_bandwidth_runtime+0x120/0x120 [ 219.170847] ? sched_create_group+0x22/0x70 [ 219.175143] ? find_next_bit+0xcc/0x100 [ 219.179100] alloc_fair_sched_group+0x1f0/0x530 [ 219.183752] sched_create_group+0x35/0x70 [ 219.187882] cpu_cgroup_css_alloc+0xe/0x30 [ 219.192092] cgroup_apply_control_enable+0x44d/0xbc0 [ 219.197181] ? cgroup_propagate_control+0x570/0x570 [ 219.202181] ? css_populate_dir+0x289/0x420 [ 219.206483] cgroup_mkdir+0x56f/0xfc0 [ 219.210258] ? __lock_is_held+0xb6/0x140 [ 219.214302] ? cgroup_destroy_locked+0x750/0x750 [ 219.219035] ? rcu_read_lock_sched_held+0x108/0x120 [ 219.224027] ? kmem_cache_free+0x258/0x2a0 [ 219.228243] ? set_nlink+0xc1/0x160 [ 219.231848] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 219.236748] ? generic_permission+0x105/0x3c0 [ 219.241227] ? cgroup_destroy_locked+0x750/0x750 [ 219.245963] kernfs_iop_mkdir+0x153/0x1e0 [ 219.250092] vfs_mkdir+0x390/0x600 [ 219.253611] SyS_mkdirat+0x22b/0x2b0 [ 219.257303] ? SyS_mknod+0x480/0x480 [ 219.260988] ? trace_hardirqs_on+0xd/0x10 [ 219.265116] ? do_syscall_64+0xb7/0x940 [ 219.269067] ? SyS_mknod+0x480/0x480 [ 219.272756] do_syscall_64+0x281/0x940 [ 219.276617] ? __do_page_fault+0xc90/0xc90 [ 219.280827] ? _raw_spin_unlock_irq+0x27/0x70 [ 219.285297] ? finish_task_switch+0x1c1/0x7e0 [ 219.289769] ? syscall_return_slowpath+0x550/0x550 [ 219.294673] ? syscall_return_slowpath+0x2ac/0x550 [ 219.299578] ? prepare_exit_to_usermode+0x350/0x350 [ 219.304573] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 219.309917] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 219.314743] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 219.319906] RIP: 0033:0x4548b9 [ 219.323072] RSP: 002b:00007fd50c68ec68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 219.330752] RAX: ffffffffffffffda RBX: 00007fd50c68f6d4 RCX: 00000000004548b9 2018/03/30 10:21:32 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002ac0)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = syz_open_dev$sg(&(0x7f00000024c0)='/dev/sg#\x00', 0x9, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, &(0x7f0000002dc0)={[], 0x4b9, 0x7f910fbf, 0x6640, 0x0, 0x0, 0x0, 0xd000, [], 0x7}) mkdir(&(0x7f0000000000)='./file0\x00', 0x2000) writev(r1, &(0x7f00000027c0)=[{&(0x7f00000026c0)="fdaa2c240921abb301600a760a62335a2a293713c887be1c0c360b7061392ab770890427781a3a32138ff6ed4757f0d09af511f9ba3d37f7f6481b76726059c40f32f823cb15c69220839b70ae3f54b5d0ff3756014c7c016d51f6163a6d036bd160418c5a2933212866268950fc834b1ea8ec9fb6e09426769010734c2b10d86ea770ffee34b8ba6d5ae1d836c0f3aeb03f20aa02aa1fb32eb1356f3e445d9434a8227f9914fc6bf334f0d2b7918bb17e8fed755f85fd2f9af914fb82c1f19b0f233846d20a182e1900eb3c0080f885fe0211aa941ac78b96d79ed82105", 0xde}], 0x1) unlink(&(0x7f0000000080)='./file0/file0\x00') r2 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x9e9a, 0x204200) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x4000) socketpair(0x1, 0x80007, 0x17bc4266, &(0x7f0000002540)) accept$ipx(0xffffffffffffffff, &(0x7f0000000600), &(0x7f0000000640)=0x10) clone(0x0, &(0x7f0000aed000), &(0x7f00002dc000), &(0x7f000045e000), &(0x7f0000e30fff)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000040)='securityvboxnet1,-\x00') setrlimit(0x0, &(0x7f000068d000)) dup3(r1, r2, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x1, 0xc32, 0x8}, 0x2c) setsockopt$nfc_llcp_NFC_LLCP_RW(0xffffffffffffffff, 0x118, 0x0, &(0x7f0000000180), 0x4) mknod$loop(&(0x7f0000000200)='./file0/file0\x00', 0x100, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) utime(&(0x7f0000002a40)='./file0\x00', &(0x7f0000002a80)={0x9, 0x800}) recvmsg$kcm(r4, &(0x7f0000002480)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000140)=""/9, 0x9}, {&(0x7f0000000280)=""/36, 0x24}, {&(0x7f00000002c0)=""/150, 0x96}, {&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/72, 0x48}], 0x5, &(0x7f0000001480)=""/4096, 0x1000, 0x4}, 0x40000021) execveat(r2, &(0x7f0000000240)='./file0\x00', &(0x7f0000002bc0)=[&(0x7f0000002b00)='.em1\x00', &(0x7f0000002b40)='/dev/sg#\x00', &(0x7f0000002b80)='\x00'], &(0x7f0000002d80)=[&(0x7f0000002c00)='[\x00', &(0x7f0000002c40)='./cgroup.net\x00', &(0x7f0000002c80)='/dev/sg#\x00', &(0x7f0000002cc0)='\x00', &(0x7f0000002d00)='posix_acl_accessvboxnet0em1(vboxnet0@\x00', &(0x7f0000002d40)='./cgroup.net\x00'], 0x0) accept4$alg(r5, 0x0, 0x0, 0x0) inotify_add_watch(r0, &(0x7f0000002a00)='./file0/file0\x00', 0x0) rmdir(&(0x7f0000002500)='./file0\x00') r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r6, 0x6, 0x7, &(0x7f0000d17ffc)=0x5, 0x4) getsockopt$inet6_tcp_int(r6, 0x6, 0x7, &(0x7f00001dcffc), &(0x7f0000d21ffc)=0x4) 2018/03/30 10:21:32 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="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", 0xfc}], 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x200900, 0x103) r1 = socket$alg(0x26, 0x5, 0x0) rt_sigtimedwait(&(0x7f0000000140)={0xffffffff}, 0x0, &(0x7f0000000180), 0x8) bind$alg(r1, &(0x7f000073e000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(cbc-twofish-avx)\x00'}, 0x58) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000500)={&(0x7f00000005c0)=[0x0, 0x0, 0x0], 0x3}) nanosleep(&(0x7f0000d1e000)={0x0, 0x1c9c380}, &(0x7f0000000000)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r2, 0x118, 0x0, &(0x7f0000000100)=0x7, 0x4) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000000c0)={0x1, 0x1, 0x1, 0x1, 0x0, 0x6}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000280)={r3, @in={{0x2, 0x4e23, @multicast2=0xe0000002}}, [0x8000, 0x9, 0x80000000, 0x3, 0x80, 0x8001, 0x800, 0x100, 0xe0db, 0x0, 0x2000000000, 0x200, 0x68, 0x0, 0x8]}, &(0x7f0000000380)=0x100) r4 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0xfffffffffffffdfa) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port1\x00', 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r4, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r5 = gettid() r6 = syz_open_procfs(r5, &(0x7f00000002c0)='maps\x00') readv(r6, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/28, 0x65}], 0x1) exit(0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r6, &(0x7f000004ffe0)=[{&(0x7f0000000000)=""/128, 0xe6}], 0x222) r7 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) connect$ax25(r2, &(0x7f00000006c0)={0x3, {"fc5da504005009"}, 0x7fff}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) getsockopt$netrom_NETROM_T1(r7, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r4, 0x80045301, &(0x7f0000000700)) 2018/03/30 10:21:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) fcntl$setownex(r0, 0xf, &(0x7f00000002c0)={0x2, r1}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f000039cfe4)={0xa, 0x4e22}, 0x1c) r3 = syz_open_dev$sndpcmp(&(0x7f00000005c0)='/dev/snd/pcmC#D#p\x00', 0x84ea, 0x20000) sendmsg$netrom(r3, &(0x7f00000009c0)={&(0x7f0000000600)=@ax25={0x3, {"176892e98541d3"}, 0x400}, 0x10, &(0x7f00000007c0)=[{&(0x7f0000000640)="b87bde7d1b19e7b89a37ce028ca98d62e1664024c230477b143855d86f2b18e5ac4f6b1c625942c8d022be72198205d1d5d0bcb69608720e7e3a30c3ca73256b3a5a48c98b493af4ad", 0x49}, {&(0x7f00000006c0)="c9a950ae73f5727b3ec81bc282ede9c02edd1511cf8e813714c881d5055e85ef74cab9c942f465affc207c", 0x2b}, {&(0x7f0000000700)="f1b1eae8d2acdd061db433178919a0176a0e07f6f3da52b7c7f790bc858c8df4fbd08a98957bef0f295536681e729be17d31decfa2c366e580d6f7967e874e66971f7416f5fe99291bf9b81abdb2882d64293cf6703e66c1c62336906df22f4bb966c8b00c7f9a3dd2cf3410f7bcfd00dbe3f987cec155d7efc7bd2b560697c7c1f3cf7cbe0d54f8ea34e3becb778e66", 0x90}], 0x3, &(0x7f0000000800)=[{0x88, 0x109, 0x6, "43a86606316aa442c870db2708e55a280c44f880321fa5c0cec4bd89c89671f25c371dedbcec9458e85f48fe8815a051642069cbd2f65cfe43b23a01507209ec0af413a85496c26c8164a089ed6afd633d7a0d42badba3916f6c41de47b12ec2eeb4e49b9a3d319c73177019426376e7e891f158354794"}, {0x68, 0x139, 0x0, "9f0a74eae85d3dec3275dcf2e85af0589d83da68fd0b6764e403acd293155cecef138a716fe9ea68511a63b962d629be410ca928a71cd6ea30a1c5db96ab96b352d0f089050ed6e5aeb005a2155d8e1a62a6131194b90d"}, {0xa0, 0x10f, 0x401, "347f197cd2cb692bf536190c6b1b908f7d388759b84cd1489d3f7ec7ced8283c82a8529065087cca908788ae522a78ad6c1d4d0add786186c89249d4ad2ef1790397f58ee92bd30efd324953c76a157a567b1f3a9f2e16f0a78ad7a5f4686a6734ca82ed3a84bacc51860723dbcc428c64c4f92bf1026a53ab22256dc18856f2317b019a84278a971c4a24"}], 0x190, 0x8000}, 0x0) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000500)={0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000540)=[@in6={0xa, 0x4e22, 0x804, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0x3c7a}, @in={0x2, 0x4e22, @loopback=0x7f000001}, @in={0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}, @in={0x2, 0x4e21, @broadcast=0xffffffff}, @in6={0xa, 0x4e23, 0x9, @mcast1={0xff, 0x1, [], 0x1}, 0x5a936bf6}], 0x68) listen(r2, 0x0) sendto$inet6(r0, &(0x7f0000c7a000), 0xfffffde5, 0x20000004, &(0x7f00005f0fe4)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}}, 0x1c) r5 = accept(r2, 0x0, &(0x7f0000000480)) getsockopt$bt_BT_SECURITY(r5, 0x112, 0x4, &(0x7f00000004c0), 0x2) r6 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x9, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r6, 0x4008af23, &(0x7f0000000280)={0x0, 0x400000000000000}) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x13, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000020000000000000000000095000000000000008b606972788e3e50acd1accc320f30b554f0d685b7f75c9530a96befe9bf1b3b5ff0d6b15049f7a933e58ccb2abe4909dd26ebc99aa101dffb249feb6c0ceef4aeb1523ba03e475a5f6f80aacc25009e0cab81ff4208e4eec29b7f5bcd8bdf888129886b7fca4513667fdf0a58928b5ba00b406b4af3ecfb26c1ae9e3fe05ebe"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000240)={r0, r7}) sendmsg$kcm(r6, &(0x7f0000000380)={&(0x7f0000000140)=@l2={0x1f}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='A', 0x1}], 0x1, &(0x7f00000003c0), 0x0, 0x1000000000000}, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r6, 0x1, 0x1, &(0x7f0000000340)={0x2}, 0x4) setsockopt$inet6_icmp_ICMP_FILTER(r6, 0x1, 0x1, &(0x7f0000000300)={0xfffffffffffffffd}, 0x4) syz_emit_ethernet(0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ffffffffffffffffffffffff86dd60c000e20003000000000000000000000000ffffac14ffaaff0200000000000000000000000000018100907806000000d39d73eda42acad38a8caea396b719d09d68dd37f7a5e1a860df19a0e5ab852afac87f6ba6ce5ce1661d9e440d0aff07ab022a6794"], 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)='A', 0x1, 0x0, 0x0, 0x0) ioctl$KDDISABIO(r6, 0x4b37) 2018/03/30 10:21:32 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000, 0x0, 0x4}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000d80)={r5, 0x13c, 0x7, 0xaa5, 0x1, 0x8001}, 0x14) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000dc0)={0xaa, 0x20}) pwrite64(r1, &(0x7f0000000e00), 0x0, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) 2018/03/30 10:21:32 executing program 5: r0 = syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x7, 0x8040) clock_nanosleep(0x0, 0x0, &(0x7f00006ba000)={0x0, 0x1c9c380}, &(0x7f0000daaff8)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f00000001c0)={0x15, 0x71, &(0x7f0000000300)="ee087de71f8ea802f9b67101e46ef9dc044ca7b77e4952efef48a26c73cb21472da8ff29b987bfd7e2d5ddec3d36b6beba6be5ff04dde1bd9f7dd3f66619452a7057e926de829b899c554417aa96496528f35a02801309d0a66c50aea22d7d24a066d8b277efdb01a16e326b64ad0bdfd8"}) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000140)={0xaa}) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp\x00') ioctl$DRM_IOCTL_SWITCH_CTX(r2, 0x40086424, &(0x7f0000000200)={0x0, 0x1}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000ff2000/0xe000)=nil, 0xe000}, 0x1}) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x80, 0x0) sendmsg$IPVS_CMD_FLUSH(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x6000402}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)=ANY=[@ANYBLOB="80000000"], 0x1}, 0x1, 0x0, 0x0, 0x41}, 0x20000000) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000100)=r2) 2018/03/30 10:21:32 executing program 7: clone(0x200, &(0x7f0000000100)="f0f7d70fc52207334efb558c957ea5882b23d85fa1659dc13aa7603b45aa407f02117308b1a8697bcf6617a98d145ec63b3cffa3123c2b94a42831af8d9bdb4b03d2954fdaa7e037f2c459a27e42921a924df6c5899ef4dbdb44bffbadd515d6024b7e3450b4ea54c55a229f4d694a292b270018a408b9ed54a0bc1929156ff004c1cf0b1728065c1ae04f4eeb552ff2420005e5ccb9400909127922c4a8e69ffbb96ca5bc95786113ae475b94c2c9a6a235276e2f1b7f01010000000000007a", &(0x7f0000000000), &(0x7f0000f8b000), &(0x7f00000d5000)) mknod(&(0x7f0000cd7000)='./file0\x00', 0x103a, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000340), &(0x7f000027a000)) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000080)={0x4, 0xffffffffffffff9c, 0x1}) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000280)={{0x8, 0x6, 0x7fffffff, 0x5, "6f41027290639dcb96bf9c3a3e4f27c43b6960d1dee9af24d9331cfc16a1bc39680fd9a26ee5ca1fe3dfc350", 0x3}, 0x9, [0x401, 0x6eb, 0x3, 0x0, 0x5e8c, 0x7aa9, 0x80000001, 0xffff, 0xc0, 0x80000000, 0x401, 0x133, 0xfffffffffffffffa, 0xcba, 0x1, 0x7, 0x4, 0x5, 0x6, 0x401, 0x8, 0x5bab, 0x0, 0x7, 0x7, 0x8, 0x2, 0x80000001, 0x9, 0x1, 0x1, 0xe7, 0x9, 0x8, 0x8, 0x1f, 0x3f, 0x9, 0x2, 0x80000000, 0x80000000, 0x3, 0x6, 0x6, 0xfffffffffffffc01, 0x80000001, 0x2, 0x6, 0x76, 0x1ef, 0x0, 0xff2b, 0x3, 0x6, 0x20, 0x5, 0x6, 0x7, 0x73d4, 0x1, 0xaa6, 0x9, 0xffffffff80000000, 0x2, 0x7ff, 0x3, 0xffffffffffffff80, 0xffffffffffffffe1, 0x75d5, 0x8000000000000000, 0x1000, 0x7, 0x2, 0x0, 0x5, 0x9, 0x7fffffff, 0x100000001, 0xffffffffffffff81, 0x7fffffff, 0x100000001, 0x4000000000000000, 0x7, 0x1f, 0x2, 0x362a8d27, 0x5, 0x7fffffff, 0x400, 0x200, 0x40, 0x5, 0xf7, 0x0, 0x2, 0x5, 0x9, 0x6, 0x0, 0x9, 0x6, 0x9, 0x4, 0x8001, 0x9, 0x0, 0xa4, 0x8000, 0x7fff, 0x92, 0x3, 0xfff, 0x26b, 0x3, 0x100, 0x101, 0x7, 0x1f, 0x9, 0x8, 0x6, 0x4, 0x9, 0x574b, 0x0, 0x0, 0x9], {r1, r2+30000000}}) bind$unix(r0, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) r3 = syz_open_procfs(0x0, &(0x7f000042cff4)='personality\x00') read(r3, &(0x7f0000f1bf7e)=""/130, 0xfffffdd8) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000240)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x9, 0x18}, 0xc) open$dir(&(0x7f000050bff8)='./file0\x00', 0x2, 0x0) 2018/03/30 10:21:32 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x100000000106, 0x0) writev(r0, &(0x7f000036bfd0)=[{&(0x7f0000b51000)="eb", 0x1}], 0x1) read(r0, &(0x7f0000000140)=""/1, 0xfffffffffffffeb7) 2018/03/30 10:21:32 executing program 6 (fault-call:3 fault-nth:31): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r0, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r0, &(0x7f0000000100)=""/65, 0x41) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) linkat(r0, &(0x7f0000000480)='./file1\x00', r1, &(0x7f00000004c0)='./file0\x00', 0x1000) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') unlink(&(0x7f00000000c0)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r0, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x12021) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000340)={0x8, 0x9, 0x4, 0x10000, 0x1, 0x7, 0x7fffffff, 0x0, 0x29, 0x0, 0x20}, 0xb) [ 219.337995] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 219.345241] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 219.352482] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 219.359724] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 000000000000001e 2018/03/30 10:21:32 executing program 7: clone(0x200, &(0x7f0000000100)="f0f7d70fc52207334efb558c957ea5882b23d85fa1659dc13aa7603b45aa407f02117308b1a8697bcf6617a98d145ec63b3cffa3123c2b94a42831af8d9bdb4b03d2954fdaa7e037f2c459a27e42921a924df6c5899ef4dbdb44bffbadd515d6024b7e3450b4ea54c55a229f4d694a292b270018a408b9ed54a0bc1929156ff004c1cf0b1728065c1ae04f4eeb552ff2420005e5ccb9400909127922c4a8e69ffbb96ca5bc95786113ae475b94c2c9a6a235276e2f1b7f01010000000000007a", &(0x7f0000000000), &(0x7f0000f8b000), &(0x7f00000d5000)) mknod(&(0x7f0000cd7000)='./file0\x00', 0x103a, 0x7) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/unix\x00') setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0x5, 0x4) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000340), &(0x7f000027a000)) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000080)={0x4, 0xffffffffffffff9c, 0x1}) bind$unix(r1, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) r2 = syz_open_procfs(0x0, &(0x7f000042cff4)='personality\x00') read(r2, &(0x7f0000f1bf7e)=""/130, 0xfffffdd8) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000240)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={r2, 0x28, &(0x7f0000000640)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000006c0)={r3, 0x9, 0x17}, 0xc) execveat(r1, &(0x7f00000002c0)='./file0\x00', &(0x7f00000003c0)=[&(0x7f0000000300)='\x00', &(0x7f0000000340)='nodevbdev\x00', &(0x7f0000000380)='net/unix\x00'], &(0x7f0000000600)=[&(0x7f0000000400)=']security.self#\x00', &(0x7f0000000440)='user\x00', &(0x7f0000000480)='net/unix\x00', &(0x7f00000004c0)='[\\(\\%md5sumsecurityeth0\x00', &(0x7f0000000500)='personality\x00', &(0x7f0000000540)='net/unix\x00', &(0x7f0000000580)='Q\x00', &(0x7f00000000c0)='personality\x00'], 0x1900) creat(&(0x7f0000000240)='./file0\x00', 0x160) open$dir(&(0x7f000050bff8)='./file0\x00', 0x2, 0x0) 2018/03/30 10:21:32 executing program 6 (fault-call:3 fault-nth:32): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r0, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r0, &(0x7f0000000100)=""/65, 0x41) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) linkat(r0, &(0x7f0000000480)='./file1\x00', r1, &(0x7f00000004c0)='./file0\x00', 0x1000) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') unlink(&(0x7f00000000c0)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r0, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x12021) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000340)={0x8, 0x9, 0x4, 0x10000, 0x1, 0x7, 0x7fffffff, 0x0, 0x29, 0x0, 0x20}, 0xb) 2018/03/30 10:21:32 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x100000000106, 0x0) writev(r0, &(0x7f000036bfd0)=[{&(0x7f0000b51000)="eb", 0x1}], 0x1) read(r0, &(0x7f0000000140)=""/1, 0xfffffffffffffeb7) 2018/03/30 10:21:32 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000, 0x0, 0x4}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000d80)={r5, 0x13c, 0x7, 0xaa5, 0x1, 0x8001}, 0x14) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000dc0)={0xaa, 0x20}) pwrite64(r1, &(0x7f0000000e00), 0x0, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) 2018/03/30 10:21:32 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000384ff7)='/dev/ppp\x00', 0x0, 0x0) futex(&(0x7f000000cffc)=0x4, 0x800000000007, 0x400000000008, &(0x7f0000000080)={0x77359400, 0x4}, &(0x7f0000000040), 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000219ff0)={0x77359400}, &(0x7f0000048000), 0x0) exit(0xfffffffffffffffe) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) ppoll(&(0x7f0000000200)=[{r0}], 0x1, &(0x7f0000000240), &(0x7f0000000280), 0x8) 2018/03/30 10:21:32 executing program 7: clone(0x200, &(0x7f0000000100)="f0f7d70fc52207334efb558c957ea5882b23d85fa1659dc13aa7603b45aa407f02117308b1a8697bcf6617a98d145ec63b3cffa3123c2b94a42831af8d9bdb4b03d2954fdaa7e037f2c459a27e42921a924df6c5899ef4dbdb44bffbadd515d6024b7e3450b4ea54c55a229f4d694a292b270018a408b9ed54a0bc1929156ff004c1cf0b1728065c1ae04f4eeb552ff2420005e5ccb9400909127922c4a8e69ffbb96ca5bc95786113ae475b94c2c9a6a235276e2f1b7f01010000000000007a", &(0x7f0000000000), &(0x7f0000f8b000), &(0x7f00000d5000)) mknod(&(0x7f0000cd7000)='./file0\x00', 0x103a, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000340), &(0x7f000027a000)) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000080)={0x0, 0xffffffffffffff9c, 0xffffffffffffffff}) bind$unix(r0, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000003c0)=0x0) syz_open_procfs(r1, &(0x7f0000000340)="7a6f756e747300b806917b966993645c30d4bdb7952a2b2f512f7882a746c8772a5d0193b2c8ecaef2be90db80c97ba620f910b5b2f2a6c134c40694685ea5") read(r0, &(0x7f0000f1bf7e)=""/130, 0xff92) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000240)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x9, 0x18}, 0xc) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000240)=0xfffffffffffffe00, 0x8) open$dir(&(0x7f000050bff8)='./file0\x00', 0x2, 0x0) 2018/03/30 10:21:32 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="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", 0xfc}], 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x200900, 0x103) r1 = socket$alg(0x26, 0x5, 0x0) rt_sigtimedwait(&(0x7f0000000140)={0xffffffff}, 0x0, &(0x7f0000000180), 0x8) bind$alg(r1, &(0x7f000073e000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(cbc-twofish-avx)\x00'}, 0x58) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000500)={&(0x7f00000005c0)=[0x0, 0x0, 0x0], 0x3}) nanosleep(&(0x7f0000d1e000)={0x0, 0x1c9c380}, &(0x7f0000000000)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r2, 0x118, 0x0, &(0x7f0000000100)=0x7, 0x4) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000000c0)={0x1, 0x1, 0x1, 0x1, 0x0, 0x6}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000280)={r3, @in={{0x2, 0x4e23, @multicast2=0xe0000002}}, [0x8000, 0x9, 0x80000000, 0x3, 0x80, 0x8001, 0x800, 0x100, 0xe0db, 0x0, 0x2000000000, 0x200, 0x68, 0x0, 0x8]}, &(0x7f0000000380)=0x100) r4 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0xfffffffffffffdfa) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port1\x00', 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r4, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r5 = gettid() r6 = syz_open_procfs(r5, &(0x7f00000002c0)='maps\x00') readv(r6, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/28, 0x65}], 0x1) exit(0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r6, &(0x7f000004ffe0)=[{&(0x7f0000000000)=""/128, 0xe6}], 0x222) r7 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) connect$ax25(r2, &(0x7f00000006c0)={0x3, {"fc5da504005009"}, 0x7fff}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) getsockopt$netrom_NETROM_T1(r7, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r4, 0x80045301, &(0x7f0000000700)) [ 219.663284] bond0 (unregistering): Released all slaves [ 220.441192] IPVS: ftp: loaded support on port[0] = 21 [ 220.722911] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 221.131361] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 221.137453] 8021q: adding VLAN 0 to HW filter on device bond0 [ 221.181412] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 221.225165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 221.247093] FAULT_INJECTION: forcing a failure. [ 221.247093] name failslab, interval 1, probability 0, space 0, times 0 [ 221.258550] CPU: 1 PID: 27305 Comm: syz-executor6 Not tainted 4.16.0-rc7+ #371 [ 221.265889] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 221.275222] Call Trace: [ 221.277798] dump_stack+0x194/0x24d [ 221.281405] ? arch_local_irq_restore+0x53/0x53 [ 221.286052] ? __save_stack_trace+0x7e/0xd0 [ 221.290371] should_fail+0x8c0/0xa40 [ 221.294066] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 221.299144] ? kasan_kmalloc+0xad/0xe0 [ 221.303009] ? kmem_cache_alloc_node_trace+0x150/0x760 [ 221.308262] ? alloc_fair_sched_group+0x267/0x530 [ 221.313078] ? sched_create_group+0x35/0x70 [ 221.317460] ? cpu_cgroup_css_alloc+0xe/0x30 [ 221.321847] ? vfs_mkdir+0x390/0x600 [ 221.325532] ? SyS_mkdirat+0x22b/0x2b0 [ 221.329395] ? do_syscall_64+0x281/0x940 [ 221.333430] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 221.338778] ? find_held_lock+0x35/0x1d0 [ 221.342822] ? __lock_is_held+0xb6/0x140 [ 221.346875] ? check_same_owner+0x320/0x320 [ 221.351176] ? rcu_note_context_switch+0x710/0x710 [ 221.356089] should_failslab+0xec/0x120 [ 221.360039] kmem_cache_alloc_node_trace+0x5a/0x760 [ 221.365031] ? unregister_fair_sched_group+0x5e0/0x5e0 [ 221.370285] ? find_next_bit+0xcc/0x100 [ 221.374240] alloc_fair_sched_group+0x1f0/0x530 [ 221.378893] sched_create_group+0x35/0x70 [ 221.383021] cpu_cgroup_css_alloc+0xe/0x30 [ 221.387230] cgroup_apply_control_enable+0x44d/0xbc0 [ 221.392323] ? cgroup_propagate_control+0x570/0x570 [ 221.397324] ? css_populate_dir+0x289/0x420 [ 221.401626] cgroup_mkdir+0x56f/0xfc0 [ 221.405402] ? __lock_is_held+0xb6/0x140 [ 221.409444] ? cgroup_destroy_locked+0x750/0x750 [ 221.414174] ? rcu_read_lock_sched_held+0x108/0x120 [ 221.419165] ? kmem_cache_free+0x258/0x2a0 [ 221.423393] ? set_nlink+0xc1/0x160 [ 221.426997] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 221.431905] ? generic_permission+0x105/0x3c0 [ 221.436378] ? cgroup_destroy_locked+0x750/0x750 [ 221.441113] kernfs_iop_mkdir+0x153/0x1e0 [ 221.445243] vfs_mkdir+0x390/0x600 [ 221.448768] SyS_mkdirat+0x22b/0x2b0 [ 221.452462] ? SyS_mknod+0x480/0x480 [ 221.456148] ? trace_hardirqs_on+0xd/0x10 [ 221.460273] ? do_syscall_64+0xb7/0x940 [ 221.464225] ? SyS_mknod+0x480/0x480 [ 221.467915] do_syscall_64+0x281/0x940 [ 221.471790] ? __do_page_fault+0xc90/0xc90 [ 221.475997] ? _raw_spin_unlock_irq+0x27/0x70 [ 221.480472] ? finish_task_switch+0x1c1/0x7e0 [ 221.484943] ? syscall_return_slowpath+0x550/0x550 [ 221.489847] ? syscall_return_slowpath+0x2ac/0x550 [ 221.494754] ? prepare_exit_to_usermode+0x350/0x350 [ 221.499755] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 221.505101] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 221.509928] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 221.515090] RIP: 0033:0x4548b9 [ 221.518252] RSP: 002b:00007fbd64351c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 2018/03/30 10:21:34 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x100000000106, 0x0) writev(r0, &(0x7f000036bfd0)=[{&(0x7f0000b51000)="eb", 0x1}], 0x1) read(r0, &(0x7f0000000140)=""/1, 0xfffffffffffffeb7) 2018/03/30 10:21:34 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000040), &(0x7f0000000080)=0x4) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = dup3(r2, r2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, &(0x7f0000000200)="0f30f3afbaf80c66b8981d068566efbafc0c66b80d00008066ef660f320f01df650f01ca66b9800000c00f326635000100000f3066b9700900000f3266b9800000c00f326635002000000f30f30f07", 0x4f}], 0x1, 0x0, &(0x7f00000002c0), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000000)=ANY=[@ANYBLOB="0100000000e4fffd8d04"]) ioctl$LOOP_SET_STATUS(r3, 0x4c02, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x15, 0x11, "63d4f2e21d210207d139619f2d0a8df808b8c89c03076380f0ba12ace5f6768aec32d61828b7c8049b350e980182401c5ff3d84b24c0a444c62281e662c29658", "d9cb38abb568a47e924c1b67ee1a9b4083ee733b608a7edf4c396df176b53614", [0x0, 0xbc53]}) 2018/03/30 10:21:34 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000, 0x0, 0x4}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000d80)={r5, 0x13c, 0x7, 0xaa5, 0x1, 0x8001}, 0x14) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000dc0)={0xaa, 0x20}) pwrite64(r1, &(0x7f0000000e00)="7437032bd6e223b3a59d10357fc245a11551c76207ed30241886ce0ea1326aeac569322a47e5909770909834b26bf6b04af3b30656cbc3e07c3eed14ee7c472c2d276872498ef33618509e2049213b9664560dc77dd302976456a0392edd116b9816cbca183c77f192c4c3260a385cc483327645104ab99878", 0x79, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) 2018/03/30 10:21:34 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x16907e, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000040)=@abs, 0x6e) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f00000001c0)={0xef16, 0x3, 0x100, 'queue1\x00', 0xc622}) pwritev(r0, &(0x7f0000001400)=[{&(0x7f0000000180)='9', 0x1}], 0x1, 0x0) 2018/03/30 10:21:34 executing program 6 (fault-call:3 fault-nth:33): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r0, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r0, &(0x7f0000000100)=""/65, 0x41) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) linkat(r0, &(0x7f0000000480)='./file1\x00', r1, &(0x7f00000004c0)='./file0\x00', 0x1000) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') unlink(&(0x7f00000000c0)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r0, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x12021) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000340)={0x8, 0x9, 0x4, 0x10000, 0x1, 0x7, 0x7fffffff, 0x0, 0x29, 0x0, 0x20}, 0xb) 2018/03/30 10:21:34 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000000)=0x3, 0x4) rt_sigprocmask(0x0, &(0x7f0000024000)={0xfffffffffffffffe}, 0x0, 0x8) io_setup(0x20, &(0x7f0000c6b000)=0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x2000, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@newneigh={0x44, 0x1c, 0x8, 0x70bd25, 0x25dfdbfe, {0x0, 0x0, 0x0, r3, 0x0, 0xa0, 0xf}, [@NDA_CACHEINFO={0x14, 0x3, {0x4, 0x0, 0x597, 0x4}}, @NDA_PROBES={0x8, 0x4, 0x8}, @NDA_DST_MAC={0xc, 0x1, @random="8a804e03a224"}]}, 0x44}, 0x1, 0x0, 0x0, 0x10}, 0x0) io_submit(r1, 0x1, &(0x7f0000356ff0)=[&(0x7f0000928fc0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000001ec0)}]) mq_getsetattr(r0, &(0x7f0000000040)={0x1000, 0xff, 0x5, 0x3ff, 0x1ff, 0x0, 0x7f, 0x7}, &(0x7f0000000080)) 2018/03/30 10:21:34 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="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", 0xfc}], 0x1, 0x0) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000600)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) r1 = socket$alg(0x26, 0x5, 0x0) rt_sigtimedwait(&(0x7f0000000140)={0xffffffff}, 0x0, &(0x7f0000000180), 0x8) bind$alg(r1, &(0x7f000073e000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(cbc-twofish-avx)\x00'}, 0x58) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000500)={&(0x7f00000005c0)=[0x0, 0x0, 0x0], 0x3}) nanosleep(&(0x7f0000d1e000)={0x0, 0x1c9c380}, &(0x7f0000000000)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r2, 0x118, 0x0, &(0x7f0000000100)=0x7, 0x4) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000000c0)={0x1, 0x1, 0x1, 0x1, 0x0, 0x6}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000280)={r3, @in={{0x2, 0x4e23, @multicast2=0xe0000002}}, [0x8000, 0x9, 0x80000000, 0x3, 0x80, 0x8001, 0x800, 0x100, 0xe0db, 0x0, 0x2000000000, 0x200, 0x68, 0x0, 0x8]}, &(0x7f0000000380)=0x100) r4 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0xfffffffffffffdfa) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port1\x00', 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r4, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r5 = gettid() r6 = syz_open_procfs(r5, &(0x7f00000002c0)='maps\x00') readv(r6, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/28, 0x65}], 0x1) exit(0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r6, &(0x7f000004ffe0)=[{&(0x7f0000000000)=""/128, 0xe6}], 0x222) r7 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) connect$ax25(r2, &(0x7f00000006c0)={0x3, {"fc5da504005009"}, 0x7fff}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) getsockopt$netrom_NETROM_T1(r7, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r4, 0x80045301, &(0x7f0000000700)) 2018/03/30 10:21:34 executing program 7: clone(0x200, &(0x7f0000000100)="f0f7d70fc52207334efb558c957ea5882b23d85fa1659dc13aa7603b45aa407f02117308b1a8697bcf6617a98d145ec63b3cffa3123c2b94a42831af8d9bdb4b03d2954fdaa7e037f2c459a27e42921a924df6c5899ef4dbdb44bffbadd515d6024b7e3450b4ea54c55a229f4d694a292b270018a408b9ed54a0bc1929156ff004c1cf0b1728065c1ae04f4eeb552ff2420005e5ccb9400909127922c4a8e69ffbb96ca5bc95786113ae475b94c2c9a6a235276e2f1b7f01010000000000007a", &(0x7f0000000d40), &(0x7f0000f8b000), &(0x7f00000d5000)) mknod(&(0x7f0000cd7000)='./file0\x00', 0x103a, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000700)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000780)='map_files\x00') execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000580)=[&(0x7f0000000380)='personality\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='.\x00', &(0x7f0000000440)='\x00', &(0x7f0000000480)='personality\x00', &(0x7f00000004c0)='personality\x00', &(0x7f0000000500)='personality\x00', &(0x7f0000000540)='personality\x00'], &(0x7f0000000680)=[&(0x7f00000005c0)='personality\x00', &(0x7f0000000600)='personality\x00', &(0x7f0000000640)='personality\x00']) r2 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$sock_inet_SIOCSIFNETMASK(r2, 0x891c, &(0x7f00000006c0)={'vlan0\x00', {0x2, 0x4e20, @broadcast=0xffffffff}}) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000340), &(0x7f000027a000)) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0x4008af13, &(0x7f0000000dc0)={0x3, 0x80}) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000080)={0x4, 0xffffffffffffff9c, 0x1}) bind$unix(r3, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) r4 = syz_open_procfs(0x0, &(0x7f000042cff4)='personality\x00') read(r4, &(0x7f0000f1bf7e)=""/130, 0xfffffdd8) ioctl$KVM_SIGNAL_MSI(r4, 0x4020aea5, &(0x7f0000000740)={0x7000, 0x4, 0x8, 0x800, 0xc9b}) ioctl$DRM_IOCTL_RES_CTX(r4, 0xc0106426, &(0x7f0000000a00)={0x2, &(0x7f00000007c0)=[{0x0}, {}]}) ioctl$DRM_IOCTL_DMA(r3, 0xc0406429, &(0x7f0000000b40)={r5, 0x2, &(0x7f0000000a40)=[0x7, 0x80], &(0x7f0000000a80)=[0x5, 0x5, 0x1, 0x7ff], 0x31, 0x5, 0x8, &(0x7f0000000ac0)=[0x1, 0xffffffffffffffff, 0x1, 0xba71, 0x6], &(0x7f0000000b00)=[0x5, 0x3, 0x101, 0xff, 0x800]}) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x4e20, 0x7fffffff, @remote={0xfe, 0x80, [], 0xbb}, 0x9}}, 0x7, 0x3, 0x0, "21e9aab33669e019577e248c37eb5dc526fbe6b4442c9414813562fad4546b071758ba6e91d74d83560824af9809541eba5c4b6881503d3b2c8de38833ee1c9bc337d71c74d2c731e3e7717b6910a8da"}, 0xd8) r6 = request_key(&(0x7f0000000b80)='blacklist\x00', &(0x7f0000000bc0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000c00)='.\x00', 0xfffffffffffffffa) fstat(r1, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, &(0x7f0000000cc0)) utime(&(0x7f0000000000)='./file0\x00', &(0x7f0000000d80)={0x1000, 0x7}) keyctl$chown(0x4, r6, r7, r8) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000240)) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000800)={'vlan0\x00', 0x0}) stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000900)={{{@in6=@ipv4={[], [0xff, 0xff], @rand_addr=0x6}, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0x4e23, 0x2, 0x4e21, 0x6b71, 0x2, 0x20, 0x0, 0x2c, r9, r10}, {0x7, 0x4, 0x8, 0x8, 0x91, 0x4, 0xf9, 0x5}, {0x6, 0x5, 0x5, 0x1a9852d6}, 0x100000001, 0x0, 0x2, 0x1, 0x2, 0x3}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x4d2, 0x2b}, 0xa, @in6=@mcast1={0xff, 0x1, [], 0x1}, 0x3500, 0x2, 0x3, 0x7, 0x0, 0x1, 0x80}}, 0xe8) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000e00)={'irlan0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x9, 0x18}, 0xc) open$dir(&(0x7f000050bff8)='./file0\x00', 0x2, 0x0) [ 221.526540] RAX: ffffffffffffffda RBX: 00007fbd643526d4 RCX: 00000000004548b9 [ 221.533791] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 221.541036] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 221.548277] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 221.555520] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000020 2018/03/30 10:21:34 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000540), &(0x7f0000000100)=0x4) ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000840)={[{0xb6, 0x5, 0x5, 0x20, 0x10001, 0x7, 0x8, 0x4, 0x3, 0x5, 0x101, 0x8}, {0x3ff, 0x80, 0x6, 0x6, 0x2, 0x4, 0x4, 0x0, 0x7, 0x80, 0x6, 0x100000000, 0x8ea}, {0x9, 0x9, 0x40, 0xac07, 0x90000, 0xfffffffffffffffe, 0x8000, 0x3, 0x0, 0x81, 0xbc96, 0x7, 0x80000000}], 0x2}) fstatfs(r0, &(0x7f0000000900)=""/33) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x105541, 0x0) pwrite64(r1, &(0x7f0000008040)="9a", 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f00000003c0)={0x3, 0xffff, 0x7, 0x7ff, 0x0, 0x401}) getsockopt$inet_tcp_int(r1, 0x6, 0x3ffff, &(0x7f0000000140), &(0x7f0000000480)=0x4) r2 = getpgrp(0xffffffffffffffff) ioprio_set$pid(0x1, r2, 0x9) setsockopt$ALG_SET_AEAD_AUTHSIZE(r1, 0x117, 0x5, 0x0, 0x80) pkey_alloc(0x0, 0x2) getsockopt$inet_tcp_buf(r1, 0x6, 0xf, &(0x7f00000001c0)=""/195, &(0x7f0000000080)=0x18f) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f0000000580)={'ip6_vti0\x00', 0x1}) sched_getattr(r2, &(0x7f00000000c0), 0x30, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x0, 0x0) ioctl$KVM_GET_CPUID2(r3, 0xc008ae91, &(0x7f0000000040)={0x2, 0x0, [{}, {}]}) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_SERVICE(r4, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x72b7690402ceb228, 0x0, 0x421, 0x70bd29, 0x25dfdbfd, {0x4}, [@IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback=0x7f000001}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote={0xac, 0x14, 0x14, 0xbb}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x7}]}, @IPVS_CMD_ATTR_DEST={0x58, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x3}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x400}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@loopback={0x0, 0x1}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x198000000}]}, 0x90}, 0x1, 0x0, 0x0, 0x20048085}, 0x4000) ioctl$ASHMEM_SET_PROT_MASK(r3, 0x40087705, &(0x7f0000000100)={0x3ff, 0x8d}) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000440)={'eql\x00', {0x2, 0x4e22, @multicast1=0xe0000001}}) sendmsg$nl_generic(r4, &(0x7f0000b3dfc8)={&(0x7f0000001580)={0x10}, 0xc, &(0x7f00000015c0)={&(0x7f0000abf000)={0x18, 0x20, 0x109, 0x0, 0x0, {0x4}, [@nested={0x4, 0x12}]}, 0x18}, 0x1}, 0x0) r5 = syz_open_dev$sndpcmc(&(0x7f0000000600)='/dev/snd/pcmC#D#c\x00', 0x10000, 0x10080) sendto$unix(r1, &(0x7f0000000180)="840fcc9412e23f4b216bd1662f17c93c0d8149d27fb12c10d615a72b615b7abdff7c7bf47abdd3dd24d66a4f45c2d98d06925faf", 0x34, 0x0, 0x0, 0x0) getpgrp(r2) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000680)={{{@in=@loopback}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f0000000780)=0xe8) getsockopt$nfc_llcp(r3, 0x118, 0x1, &(0x7f00000004c0)=""/87, 0x57) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) clone(0x40000800, &(0x7f00000002c0)="5cd3bfb9988e23fd12566a79f8559d8c201de42fe1989f534ec8d1d50b9dc4235344367527b8249fd0c9334034767dff094e4debb9bda6ed10a317d3aa6b338f7b4197fc8428fab49ec28a879ac4dc520e22d359a0822d4d6744bf9fcf88a47d3ec4c2c7785c68fc7768e6920a", &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) 2018/03/30 10:21:34 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000006c0)={&(0x7f00000005c0)={0x10}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)=@ipv6_newroute={0x1c, 0x18, 0x801, 0x0, 0x0, {0xa, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7}}, 0x1c}, 0x1}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x100, 0x400000) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000040)=0x6, 0x4) 2018/03/30 10:21:34 executing program 6 (fault-call:3 fault-nth:34): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r0, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r0, &(0x7f0000000100)=""/65, 0x41) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) linkat(r0, &(0x7f0000000480)='./file1\x00', r1, &(0x7f00000004c0)='./file0\x00', 0x1000) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') unlink(&(0x7f00000000c0)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r0, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x12021) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000340)={0x8, 0x9, 0x4, 0x10000, 0x1, 0x7, 0x7fffffff, 0x0, 0x29, 0x0, 0x20}, 0xb) 2018/03/30 10:21:34 executing program 0: writev(0xffffffffffffffff, &(0x7f000036bfd0)=[{&(0x7f0000b51000)="eb", 0x1}], 0x1) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000040)=0x4000000058) read(0xffffffffffffffff, &(0x7f0000000140)=""/1, 0xfffffffffffffeb7) 2018/03/30 10:21:34 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000, 0x0, 0x4}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000d80)={r5, 0x13c, 0x7, 0xaa5, 0x1, 0x8001}, 0x14) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000dc0)={0xaa, 0x20}) pwrite64(r1, &(0x7f0000000e00)="7437032bd6e223b3a59d10357fc245a11551c76207ed30241886ce0ea1326aeac569322a47e5909770909834b26bf6b04af3b30656cbc3e07c3eed14ee7c472c2d276872498ef33618509e2049213b9664560dc77dd302976456a0392edd116b9816cbca183c77f192c4c3260a385cc483327645104ab99878", 0x79, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) [ 221.722644] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 221.729555] IPv6: NLM_F_CREATE should be set when creating new route [ 221.736106] IPv6: NLM_F_CREATE should be set when creating new route 2018/03/30 10:21:34 executing program 1: r0 = socket(0x1d, 0x3, 0x1) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x65, 0x5, &(0x7f0000000000)=0xaaae, 0x4) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000040)=0x54, 0x4) r2 = socket$alg(0x26, 0x5, 0x0) r3 = open(&(0x7f0000000740)='./file0\x00', 0x121700, 0x1) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000780)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000900)={{0x3, 0x7, 0x80000000, 0xff, "2e7fe7b3888f17afc6ba837cc343402007bd4cfaf4478927174a6c209e6a069035bb353e135a046d0c2dfdf1", 0xffffffff}, 0x0, 0x0, 0x38df, r4, 0x3, 0x20, "562306537ab10345aedf42fa6cdebe75167bbff099fa8ead8194638137a01b424a907894fb8ddea612a51dffcee062ba4f3e0a7295422929d58cf6476c865e23", &(0x7f0000000880)='$vmnet1\x00', 0x8, [], [0x1, 0x9, 0x10000, 0x2]}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000640)) bind$alg(r2, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r5, &(0x7f0000002380)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000002340), 0x13f, 0x8}}, 0x20) write$rdma_cm(r5, &(0x7f00000023c0)=ANY=[@ANYBLOB="02000000280000fa00000000160000000a004e2135000000ff01050009000000000000000000000102000000"], 0x2c) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000000c0)={0x0, 0x0, 0xffffffff, 0x0, 0xff, 0xa46e}, &(0x7f00000005c0)=0x14) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000600)={r6, 0x6}, 0x8) openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x80000, 0x0) write$rdma_cm(r5, &(0x7f0000000040)=ANY=[@ANYBLOB="02000000280000fa00000000000000000a000000000000000000000000000000000002000000000000000000"], 0x2c) write$rdma_cm(r5, &(0x7f0000000540)=ANY=[], 0xffffffffffffffe2) close(r5) pipe(&(0x7f0000000100)={0xffffffffffffffff}) quotactl(0xc7e, &(0x7f0000000540)='./file0\x00', 0x0, &(0x7f00000007c0)="60c271239f7118f47aa9d14a5af187c54a835f2bd65a233756d38fc149c8e4d111009acd4470067096790dc7c95435478316a78c3c9183af3ed15d57f3b61c2e1ec8c5ff04a6476a64975d2285dc9533b3a426b9b4fcea1fe5dbd4e63a258abadadd084eff8a3e3ff2c69321bcd062a860b38133dd8dbdc7f9df91c0eaadd40e1a2da025c5a413a1f43410734586c8cb5ec519c7b1") setsockopt$inet6_group_source_req(r7, 0x29, 0x0, &(0x7f00000002c0)={0xffffffffffffe55c, {{0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x6c}}, {{0xa, 0x4e20, 0x3f, @remote={0xfe, 0x80, [], 0xbb}, 0x2}}}, 0x108) getsockname$netrom(r0, &(0x7f00000006c0), &(0x7f0000000700)=0x10) ioctl$sock_inet_SIOCGIFDSTADDR(r7, 0x8917, &(0x7f00000001c0)={'erspan0\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xb}}}) bind$alg(r7, &(0x7f0000000dc0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-camellia-aesni-avx2\x00'}, 0xd) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000680)={0x3, 0xffff, 0x3d, 0x4, 0x8, 0x1, 0x4}, 0xc) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000180)={'bcsh0\x00', 0x8002}) sendmsg$can_raw(r0, &(0x7f0000001000)={&(0x7f0000002ff0)={0x1d, r8}, 0x10, &(0x7f0000000000)={&(0x7f0000000200)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "e8282fc0575571f77ac8d4132539bc55d7906fe0fecb3d2f991075b83294d4a7b02ade8cba5f219fcf41fcb9d4d14c85b70cdfd0994acc2709e56f37a1afee32"}, 0x48}, 0x1}, 0x0) 2018/03/30 10:21:34 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000, 0x0, 0x4}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000d80)={r5, 0x13c, 0x7, 0xaa5, 0x1, 0x8001}, 0x14) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000dc0)={0xaa, 0x20}) pwrite64(r1, &(0x7f0000000e00)="7437032bd6e223b3a59d10357fc245a11551c76207ed30241886ce0ea1326aeac569322a47e5909770909834b26bf6b04af3b30656cbc3e07c3eed14ee7c472c2d276872498ef33618509e2049213b9664560dc77dd302976456a0392edd116b9816cbca183c77f192c4c3260a385cc483327645104ab99878", 0x79, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) 2018/03/30 10:21:34 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="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", 0xfc}], 0x1, 0x0) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000600)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) r1 = socket$alg(0x26, 0x5, 0x0) rt_sigtimedwait(&(0x7f0000000140)={0xffffffff}, 0x0, &(0x7f0000000180), 0x8) bind$alg(r1, &(0x7f000073e000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(cbc-twofish-avx)\x00'}, 0x58) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000500)={&(0x7f00000005c0)=[0x0, 0x0, 0x0], 0x3}) nanosleep(&(0x7f0000d1e000)={0x0, 0x1c9c380}, &(0x7f0000000000)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r2, 0x118, 0x0, &(0x7f0000000100)=0x7, 0x4) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000000c0)={0x1, 0x1, 0x1, 0x1, 0x0, 0x6}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000280)={r3, @in={{0x2, 0x4e23, @multicast2=0xe0000002}}, [0x8000, 0x9, 0x80000000, 0x3, 0x80, 0x8001, 0x800, 0x100, 0xe0db, 0x0, 0x2000000000, 0x200, 0x68, 0x0, 0x8]}, &(0x7f0000000380)=0x100) r4 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0xfffffffffffffdfa) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port1\x00', 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r4, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r5 = gettid() r6 = syz_open_procfs(r5, &(0x7f00000002c0)='maps\x00') readv(r6, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/28, 0x65}], 0x1) exit(0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r6, &(0x7f000004ffe0)=[{&(0x7f0000000000)=""/128, 0xe6}], 0x222) r7 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) connect$ax25(r2, &(0x7f00000006c0)={0x3, {"fc5da504005009"}, 0x7fff}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) getsockopt$netrom_NETROM_T1(r7, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r4, 0x80045301, &(0x7f0000000700)) [ 221.771283] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 221.866898] bond0 (unregistering): Released all slaves [ 222.578752] IPVS: ftp: loaded support on port[0] = 21 [ 222.865714] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 223.286789] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 223.292886] 8021q: adding VLAN 0 to HW filter on device bond0 [ 223.337107] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 223.380639] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 223.400436] FAULT_INJECTION: forcing a failure. [ 223.400436] name failslab, interval 1, probability 0, space 0, times 0 [ 223.411730] CPU: 0 PID: 27526 Comm: syz-executor6 Not tainted 4.16.0-rc7+ #371 [ 223.419080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 223.428410] Call Trace: [ 223.430977] dump_stack+0x194/0x24d [ 223.434583] ? arch_local_irq_restore+0x53/0x53 [ 223.439240] should_fail+0x8c0/0xa40 [ 223.442931] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 223.448039] ? find_held_lock+0x35/0x1d0 [ 223.452084] ? __lock_is_held+0xb6/0x140 [ 223.456137] ? check_same_owner+0x320/0x320 [ 223.460438] ? rcu_note_context_switch+0x710/0x710 [ 223.465354] should_failslab+0xec/0x120 [ 223.469306] __kmalloc_track_caller+0x5f/0x760 [ 223.473871] ? string+0x180/0x200 [ 223.477296] ? kstrdup_const+0x39/0x50 [ 223.481164] kstrdup+0x39/0x70 [ 223.484333] kstrdup_const+0x39/0x50 [ 223.488026] __kernfs_new_node+0xa2/0x570 [ 223.492151] ? kernfs_dop_revalidate+0x380/0x380 [ 223.497241] ? snprintf+0xc0/0xf0 [ 223.500671] ? vsprintf+0x40/0x40 [ 223.504101] ? rq_clock+0x90/0x90 [ 223.507537] kernfs_new_node+0x80/0xe0 [ 223.511405] __kernfs_create_file+0x4b/0x320 [ 223.515810] cgroup_addrm_files+0x3c5/0xa70 [ 223.520121] ? cgroup_file_write+0x710/0x710 [ 223.524519] ? cpu_cgroup_css_alloc+0x30/0x30 [ 223.529008] ? __lock_is_held+0xb6/0x140 [ 223.533057] ? sched_online_group+0x4e0/0x4e0 [ 223.537532] ? cpu_cgroup_css_online+0x3a/0x50 [ 223.542089] ? online_css+0x224/0x2e0 [ 223.545871] css_populate_dir+0x198/0x420 [ 223.550000] cgroup_apply_control_enable+0x390/0xbc0 [ 223.555094] ? cgroup_propagate_control+0x570/0x570 [ 223.560094] ? css_populate_dir+0x289/0x420 [ 223.564396] cgroup_mkdir+0x56f/0xfc0 [ 223.568171] ? __lock_is_held+0xb6/0x140 [ 223.572215] ? cgroup_destroy_locked+0x750/0x750 [ 223.576948] ? rcu_read_lock_sched_held+0x108/0x120 [ 223.581938] ? kmem_cache_free+0x258/0x2a0 [ 223.586153] ? set_nlink+0xc1/0x160 [ 223.589758] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 223.594661] ? generic_permission+0x105/0x3c0 [ 223.599133] ? cgroup_destroy_locked+0x750/0x750 [ 223.603878] kernfs_iop_mkdir+0x153/0x1e0 [ 223.608010] vfs_mkdir+0x390/0x600 [ 223.611535] SyS_mkdirat+0x22b/0x2b0 [ 223.615231] ? SyS_mknod+0x480/0x480 [ 223.618919] ? trace_hardirqs_on+0xd/0x10 [ 223.623042] ? do_syscall_64+0xb7/0x940 [ 223.626994] ? SyS_mknod+0x480/0x480 [ 223.630698] do_syscall_64+0x281/0x940 [ 223.634558] ? __do_page_fault+0xc90/0xc90 [ 223.638770] ? _raw_spin_unlock_irq+0x27/0x70 [ 223.643241] ? finish_task_switch+0x1c1/0x7e0 [ 223.647715] ? syscall_return_slowpath+0x550/0x550 [ 223.652620] ? syscall_return_slowpath+0x2ac/0x550 [ 223.657523] ? prepare_exit_to_usermode+0x350/0x350 [ 223.662515] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 223.667859] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 223.672683] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 223.677846] RIP: 0033:0x4548b9 [ 223.681009] RSP: 002b:00007f621515fc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 223.689277] RAX: ffffffffffffffda RBX: 00007f62151606d4 RCX: 00000000004548b9 [ 223.696521] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 223.703765] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 223.711010] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 223.718259] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000022 2018/03/30 10:21:36 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) writev(r0, &(0x7f000036bfd0)=[{&(0x7f0000b51000)="eb", 0x1}], 0x1) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000040)=0x4000000058) read(r0, &(0x7f0000000140)=""/1, 0xfffffffffffffeb7) 2018/03/30 10:21:36 executing program 3: perf_event_open(&(0x7f0000d2af88)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1245, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000e2d000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000e4e000)=0x200000000) write$vnet(r0, &(0x7f0000000200)={0x1, {&(0x7f0000000000)=""/230, 0xe6, &(0x7f0000000100)=""/247, 0x0, 0x2}}, 0x68) write$vnet(r0, &(0x7f0000b28000)={0x1, {&(0x7f000074a000)=""/207, 0xcf, &(0x7f000072bfce)=""/50, 0x0, 0x2}}, 0x68) write$vnet(r0, &(0x7f00005ebf98)={0x1, {&(0x7f00000003c0)=""/28, 0x97d30bd3405764fa, &(0x7f0000000340)=""/73, 0x0, 0x3}}, 0x68) r1 = shmget(0x0, 0x1000, 0x100, &(0x7f0000ffc000/0x1000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) r2 = syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x9, 0x4000) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x80, 0x271}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000600)=ANY=[@ANYRES32=r3, @ANYBLOB="e6000000d7422702889abc23e7af6e016aa410f6eef5caef327e5153e59c4256bcc40c4367bc11f79cd7d44f4160074d3b051fba695e1f8203e1a04fcca724d31a31919ec191747c3208861d5c1556e5bf964dd238179a58eedf4c77b69c1348b0fa0a9c32652bc7afdc0367d9094ca3c715d5fc95fb444b0a2564ef5c5fe93c24e4584979c098aa09dc9801368cf54bee53353703713decb6b71785a5ae7140aed6a847b84249936edd4ba675f1fc30e89bdbbca72fdec6af9656a76470b3f3145e6f5b8105e22e4776a878d8185da14af15daf30827aa7693b74b6eadfc62605157283ccf20d389887e412e0e6935aa463fd0fe3c5f5a95904aaf6a3d0b67141c2b91e558d6ec8e97eade830958ccd4331bd64c1132b2ebdeb3c6b707ff49d2165baada25ec2f8ad8837af5c15f6e680505bf575c3fcd9c6798c2d7ecd65ffe9f332b725b86b47c1f7d5c8bf2d338b9941a65c248a330453a334c26e8327320b2428360c2ef70f3fa225c860b4f490789dd5c50db73c8718c44d704e89b28fa047dc7550e6bda80899a5a982e7106b78942b44855887608fb19bad98b13a59b53fd514e04cc55b84f3f7156ad497bcf7577c52087fef154471df18e669138858747f7011b81f5c7f00447ad11c6de66c8ab2f97ce7936c046d3135fa54fe3ce49f8e000d52240408f15ca1313749ca64a4488324d5c51243"], &(0x7f0000000500)=0x2) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x19, &(0x7f0000000540)={r3, 0xfffffffffffffe00}, 0x8) 2018/03/30 10:21:36 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x4, 0x1, 0xd, 0x2}, 0x10}, 0x1}, 0x800000) 2018/03/30 10:21:36 executing program 7: clone(0x200, &(0x7f0000000240)="f0f7d70fc52207334efb558c957ea5882b23d85fa1659dc13aa7603b45aa407f02117308b1a8697bcf6617a98d145ec63b3cffa3123c2b94a42831af8d9bdb4b03d2954fdaa7e037f2c459a27e42921a924df6c5899ef4dbdb44bffbadd515d6024b7e3450b4ea54c55a229f4d694a292b270018a408b9ed54a0bc1929156ff004c1cf0b1728065c1ae04f4eeb552ff2420005e5ccb9400909127922c4a8e69ffbb96ca5bc95786113ae475b94c2c9a6a235276e2f1b7f01010000000000007a", &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000300)="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") mknod(&(0x7f0000cd7000)='./file0\x00', 0x103a, 0xfffffffc) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000340), &(0x7f000027a000)) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000080)={0x4, 0xffffffffffffff9c, 0x1}) bind$unix(r0, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) r1 = syz_open_procfs(0x0, &(0x7f000042cff4)='personality\x00') fchmodat(r0, &(0x7f0000000440)='./file0\x00', 0x60) read(r1, &(0x7f0000f1bf7e)=""/130, 0xfffffdd8) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000240)) bind$unix(r1, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0x6e) accept(r0, &(0x7f0000000480)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000180)=0x80) mknod(&(0x7f0000000100)='./file0\x00', 0x10, 0x0) r2 = fcntl$getown(r1, 0x9) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r2, 0x10, &(0x7f0000000140)={0x100000000}) open$dir(&(0x7f000050bff8)='./file0\x00', 0x2, 0x0) 2018/03/30 10:21:36 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000, 0x0, 0x4}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000d80)={r5, 0x13c, 0x7, 0xaa5, 0x1, 0x8001}, 0x14) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000dc0)={0xaa, 0x20}) pwrite64(r1, &(0x7f0000000e00)="7437032bd6e223b3a59d10357fc245a11551c76207ed30241886ce0ea1326aeac569322a47e5909770909834b26bf6b04af3b30656cbc3e07c3eed14ee7c472c2d276872498ef33618509e2049213b9664560dc77dd302976456a0392edd116b9816cbca183c77f192c4c3260a385cc483327645104ab9987888488ff6b8e163c2eddc4fc33b9f9ba13abbb021303c8d438d96b2da7c190f9cdc9f2242c2df22ccc63b779747bc9b54e299a407b4150450352ce672ef", 0xb6, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) 2018/03/30 10:21:36 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x8000, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x1f183484f86513fe, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x8040, 0x0) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"]) 2018/03/30 10:21:36 executing program 6 (fault-call:3 fault-nth:35): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r0, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r0, &(0x7f0000000100)=""/65, 0x41) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) linkat(r0, &(0x7f0000000480)='./file1\x00', r1, &(0x7f00000004c0)='./file0\x00', 0x1000) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') unlink(&(0x7f00000000c0)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r0, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x12021) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000340)={0x8, 0x9, 0x4, 0x10000, 0x1, 0x7, 0x7fffffff, 0x0, 0x29, 0x0, 0x20}, 0xb) 2018/03/30 10:21:36 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="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", 0xfc}], 0x1, 0x0) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000600)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) r1 = socket$alg(0x26, 0x5, 0x0) rt_sigtimedwait(&(0x7f0000000140)={0xffffffff}, 0x0, &(0x7f0000000180), 0x8) bind$alg(r1, &(0x7f000073e000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(cbc-twofish-avx)\x00'}, 0x58) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000500)={&(0x7f00000005c0)=[0x0, 0x0, 0x0], 0x3}) nanosleep(&(0x7f0000d1e000)={0x0, 0x1c9c380}, &(0x7f0000000000)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r2, 0x118, 0x0, &(0x7f0000000100)=0x7, 0x4) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000000c0)={0x1, 0x1, 0x1, 0x1, 0x0, 0x6}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000280)={r3, @in={{0x2, 0x4e23, @multicast2=0xe0000002}}, [0x8000, 0x9, 0x80000000, 0x3, 0x80, 0x8001, 0x800, 0x100, 0xe0db, 0x0, 0x2000000000, 0x200, 0x68, 0x0, 0x8]}, &(0x7f0000000380)=0x100) r4 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0xfffffffffffffdfa) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port1\x00', 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r4, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r5 = gettid() r6 = syz_open_procfs(r5, &(0x7f00000002c0)='maps\x00') readv(r6, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/28, 0x65}], 0x1) exit(0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r6, &(0x7f000004ffe0)=[{&(0x7f0000000000)=""/128, 0xe6}], 0x222) r7 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) connect$ax25(r2, &(0x7f00000006c0)={0x3, {"fc5da504005009"}, 0x7fff}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) getsockopt$netrom_NETROM_T1(r7, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r4, 0x80045301, &(0x7f0000000700)) [ 223.726121] cgroup: cgroup_addrm_files: failed to add weight, err=-12 2018/03/30 10:21:36 executing program 5: r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) flistxattr(r0, &(0x7f0000000300)=""/106, 0x6a) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r3 = socket$kcm(0x29, 0x5, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x40, 0x0) symlinkat(&(0x7f0000000380)='./file0\x00', r4, &(0x7f0000000400)='./file0\x00') ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f000031aff8)={r1, r2}) r5 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0xa8100, 0x40) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x5, 0x1000}) symlinkat(&(0x7f0000000180)='./file0\x00', r5, &(0x7f0000000200)='./file0\x00') 2018/03/30 10:21:36 executing program 1: perf_event_open(&(0x7f0000220000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x9, 0x400000000000062}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={0xffffffffffffff9c}) r2 = accept$ax25(0xffffffffffffff9c, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x9, 0x109000) ioctl$KVM_SET_FPU(r3, 0x41a0ae8d, &(0x7f0000000340)={[], 0x0, 0x6, 0x845e, 0x0, 0x10001, 0x3000, 0x0, [], 0xa2e}) ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f00000002c0)={r2, 0x1000}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000fbb000)={r0, &(0x7f0000811000), &(0x7f0000fbbf1a)=""/230}, 0x18) r4 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0xfffffffffffffffe, 0x20000) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r4, 0x111, 0x3, 0x0, 0x4) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00008a5ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) r6 = dup3(r1, r5, 0x0) getpeername$ipx(r4, &(0x7f00000000c0), &(0x7f0000000100)=0x10) readahead(r0, 0x2, 0x7fff) ioctl$UFFDIO_WAKE(r4, 0x8010aa02, &(0x7f0000000080)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r5, 0x84, 0x22, &(0x7f0000000140)={0x3, 0x8000, 0x17, 0x9, 0x0}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f00000001c0)={0x3, 0x3056edcc, 0x2, 0x7fffffff, 0xffff, 0x2e76, 0x5, 0x4, r7}, &(0x7f0000000200)=0x20) 2018/03/30 10:21:36 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x100000000106, 0x0) writev(0xffffffffffffffff, &(0x7f000036bfd0)=[{&(0x7f0000b51000)="eb", 0x1}], 0x1) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000040)=0x4000000058) read(r0, &(0x7f0000000140)=""/1, 0xfffffffffffffeb7) 2018/03/30 10:21:36 executing program 6 (fault-call:3 fault-nth:36): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r0, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r0, &(0x7f0000000100)=""/65, 0x41) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) linkat(r0, &(0x7f0000000480)='./file1\x00', r1, &(0x7f00000004c0)='./file0\x00', 0x1000) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') unlink(&(0x7f00000000c0)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r0, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x12021) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000340)={0x8, 0x9, 0x4, 0x10000, 0x1, 0x7, 0x7fffffff, 0x0, 0x29, 0x0, 0x20}, 0xb) 2018/03/30 10:21:36 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x7, &(0x7f0000364ffc)=0xff, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x7fe, 0x1b7) sendto$inet(r0, &(0x7f00000000c0), 0xd0, 0x0, &(0x7f0000ee9ff0)={0x2, 0x4e20}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x8, &(0x7f0000eed000)="0f", 0x1) recvmsg(r0, &(0x7f0000bd9000)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00009fdfaf)=""/81, 0x51}, 0x40002106) perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000f17000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000000005420, &(0x7f0000000000)) 2018/03/30 10:21:36 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000, 0x0, 0x4}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000d80)={r5, 0x13c, 0x7, 0xaa5, 0x1, 0x8001}, 0x14) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000dc0)={0xaa, 0x20}) pwrite64(r1, &(0x7f0000000e00)="7437032bd6e223b3a59d10357fc245a11551c76207ed30241886ce0ea1326aeac569322a47e5909770909834b26bf6b04af3b30656cbc3e07c3eed14ee7c472c2d276872498ef33618509e2049213b9664560dc77dd302976456a0392edd116b9816cbca183c77f192c4c3260a385cc483327645104ab9987888488ff6b8e163c2eddc4fc33b9f9ba13abbb021303c8d438d96b2da7c190f9cdc9f2242c2df22ccc63b779747bc9b54e299a407b4150450352ce672ef", 0xb6, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) 2018/03/30 10:21:36 executing program 7: clone(0x200, &(0x7f0000000100)="f0f7d70fc52207334efb558c957ea5882b23d85fa1659dc13aa7603b45aa407f02117308b1a8697bcf6617a98d145ec63b3cffa3123c2b94a42831af8d9bdb4b03d2954fdaa7e037f2c459a27e42921a924df6c5899ef4dbdb44bffbadd515d6024b7e3450b4ea54c55a229f4d694a292b270018a408b9ed54a0bc1929156ff004c1cf0b1728065c1ae04f4eeb552ff2420005e5ccb9400909127922c4a8e69ffbb96ca5bc95786113ae475b94c2c9a6a235276e2f1b7f01010000000000007a", &(0x7f0000000000), &(0x7f0000f8b000), &(0x7f00000d5000)) mknod(&(0x7f0000cd7000)='./file0\x00', 0x103a, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000340), &(0x7f000027a000)) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000080)={0x4, 0xffffffffffffff9c, 0x1}) bind$unix(r0, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) r1 = syz_open_procfs(0x0, &(0x7f000042cff4)='personality\x00') read(r1, &(0x7f0000f1bf7e)=""/130, 0xfffffdd8) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000240)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x9, 0x18}, 0xc) getpeername(r0, &(0x7f0000000240)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast1}}}, &(0x7f00000002c0)=0x80) recvfrom$llc(r2, &(0x7f0000000300)=""/62, 0x3e, 0x40000022, &(0x7f0000000340)={0x1a, 0x336, 0x8, 0x9, 0x78500ee, 0x1000, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x10) open$dir(&(0x7f000050bff8)='./file0\x00', 0x2, 0x0) 2018/03/30 10:21:36 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x9, 0x400000000000062}, 0xfffffffffffffdd5) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x800, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000240)={0x0, 0x2, 0x8}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000002c0)={0x1b, 0x8200, 0x6, 0x6, r2}, &(0x7f0000000300)=0x10) r3 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x2, 0x20000) setsockopt$inet_tcp_buf(r3, 0x6, 0x2f, &(0x7f0000000100)="568836a200cc44ba5b3fffa09b21af6c2a7477155bfba522554c4cc0170024dc4cdaa13505f5ba13b4b47c8ef3264f9aba469b1900a686efcd12cff6ec6e49e014207d7ae690f8f142b86b21e65c36d9324a6e63152467d37971ba8a98741e4c091b15aa7f76c73e9c22d1ff3897f71624226f6498d97e245d5b185f598b42e63825f5ba3099f03c988590e340822bad528f6f9f031254b487a3dcad3df4855833ae4681f07b5c8e682a007ab4b0ab97d42af3461caf610c8e540e0eb2403d9352666c8f8ea693391f56092812a85b5b80ac29a661aed993371f93ca49a3205889441daf713fac7deb16ce67a9076c683af82aee6b2db44b6f87", 0xfa) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000fbb000)={r0, &(0x7f0000811000), &(0x7f0000fbbf1a)=""/230}, 0x18) 2018/03/30 10:21:36 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) getegid() connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x4}, 0x7c) sendmmsg(r0, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000003c0)}}, {{&(0x7f00000004c0)=@in6={0xa, 0x4e22, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c, &(0x7f0000000680), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="280000000000000029ddffff010000002b07df2fd0846bc0964f4ffde3d917e38200000000000000"], 0x28}}], 0x2, 0x0) 2018/03/30 10:21:36 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x40, 0x4) futex(&(0x7f0000000380), 0xc, 0x0, &(0x7f0000fd7ff0)={0x77359400}, &(0x7f0000048000), 0x0) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000080)={0x0, 0x81, 0x0, 0x4, 0x45a0, 0x5ed2fbf0, 0x59c, 0x0, {0x0, @in6={{0xa, 0x4e24, 0x10000, @mcast2={0xff, 0x2, [], 0x1}, 0x100000001}}, 0x0, 0x5, 0x3, 0x5, 0x1}}, &(0x7f0000000140)=0xb0) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000180)={r1, 0x2, 0x7, 0x9}, &(0x7f00000001c0)=0x10) [ 223.947990] bond0 (unregistering): Released all slaves 2018/03/30 10:21:36 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x200900, 0x103) connect$vsock_stream(r1, &(0x7f0000000600)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) r2 = socket$alg(0x26, 0x5, 0x0) rt_sigtimedwait(&(0x7f0000000140)={0xffffffff}, 0x0, &(0x7f0000000180), 0x8) bind$alg(r2, &(0x7f000073e000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(cbc-twofish-avx)\x00'}, 0x58) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000500)={&(0x7f00000005c0)=[0x0, 0x0, 0x0], 0x3}) nanosleep(&(0x7f0000d1e000)={0x0, 0x1c9c380}, &(0x7f0000000000)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r3, 0x118, 0x0, &(0x7f0000000100)=0x7, 0x4) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000000c0)={0x1, 0x1, 0x1, 0x1, 0x0, 0x6}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000280)={r4, @in={{0x2, 0x4e23, @multicast2=0xe0000002}}, [0x8000, 0x9, 0x80000000, 0x3, 0x80, 0x8001, 0x800, 0x100, 0xe0db, 0x0, 0x2000000000, 0x200, 0x68, 0x0, 0x8]}, &(0x7f0000000380)=0x100) r5 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0xfffffffffffffdfa) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r5, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port1\x00', 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r5, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r6 = gettid() r7 = syz_open_procfs(r6, &(0x7f00000002c0)='maps\x00') readv(r7, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/28, 0x65}], 0x1) exit(0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r7, &(0x7f000004ffe0)=[{&(0x7f0000000000)=""/128, 0xe6}], 0x222) r8 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) connect$ax25(r3, &(0x7f00000006c0)={0x3, {"fc5da504005009"}, 0x7fff}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) getsockopt$netrom_NETROM_T1(r8, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r5, 0x80045301, &(0x7f0000000700)) 2018/03/30 10:21:36 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$describe(0x6, r1, &(0x7f0000000140)=""/209, 0xd1) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f00000000c0)) 2018/03/30 10:21:36 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000, 0x0, 0x4}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000d80)={r5, 0x13c, 0x7, 0xaa5, 0x1, 0x8001}, 0x14) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000dc0)={0xaa, 0x20}) pwrite64(r1, &(0x7f0000000e00)="7437032bd6e223b3a59d10357fc245a11551c76207ed30241886ce0ea1326aeac569322a47e5909770909834b26bf6b04af3b30656cbc3e07c3eed14ee7c472c2d276872498ef33618509e2049213b9664560dc77dd302976456a0392edd116b9816cbca183c77f192c4c3260a385cc483327645104ab9987888488ff6b8e163c2eddc4fc33b9f9ba13abbb021303c8d438d96b2da7c190f9cdc9f2242c2df22ccc63b779747bc9b54e299a407b4150450352ce672ef", 0xb6, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) 2018/03/30 10:21:36 executing program 3: r0 = socket$inet6(0xa, 0x80008, 0xd541) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='yeah\x00', 0x5) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x109000, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000080)=0x3) connect$inet6(r0, &(0x7f0000000000)={0xa}, 0x1c) sendmmsg(r0, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000540)}}, {{&(0x7f00000004c0)=@in6={0x2, 0x2, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x80, &(0x7f0000000680), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="1000000000000000294dd668712c6ad4625c82da90000032000000"], 0x10}}], 0x2, 0x0) accept$packet(r1, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000980)=0x14) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f00000009c0)={@remote={0xfe, 0x80, [], 0xbb}, r2}, 0x14) 2018/03/30 10:21:36 executing program 5: r0 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000000)) 2018/03/30 10:21:36 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x100000000106, 0x0) writev(r0, &(0x7f000036bfd0), 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000040)=0x4000000058) read(r0, &(0x7f0000000140)=""/1, 0xfffffffffffffeb7) 2018/03/30 10:21:36 executing program 3: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = accept(r0, &(0x7f0000000580)=@rc, &(0x7f0000000280)=0x4c) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="4b135613"], 0x1}, 0x1, 0x0, 0x0, 0x20008004}, 0x40000) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f00000004c0)=0x100000001, 0x8) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = getpid() sendmsg$nl_generic(r2, &(0x7f0000000400)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000003c0)={&(0x7f0000000140)={0x1c, 0x20, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0x11, @pid=r3}]}, 0x1c}, 0x1}, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x3, 0x1b071, 0xffffffffffffffff, 0x0) r4 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000000180)={0x0, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0x1c, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000600)={0x0, @in6={{0xa, 0x4e22, 0xfa5f, @ipv4={[], [0xff, 0xff]}, 0x6fa74d64}}, [0x40, 0xb27, 0x11a, 0x9, 0x5, 0x0, 0x5, 0xffff, 0x9, 0x7, 0xfff, 0x4, 0x5b, 0x0, 0x4]}, &(0x7f0000000240)=0x100) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000500)={r5, 0x101}, &(0x7f0000000540)=0x8) tee(r4, 0xffffffffffffffff, 0x6bf081f2, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xa, 0x3ff, 0x91f, 0xe134, 0x1a, 0xffffffffffffffff, 0x8}, 0x2c) r6 = socket$vsock_dgram(0x28, 0x2, 0x0) writev(r6, &(0x7f0000000140), 0x100002fb) getsockname$ipx(r1, &(0x7f0000000440), &(0x7f0000000480)=0x10) r7 = socket$inet6(0xa, 0x0, 0x7fc) bind$inet6(r7, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) listen(r7, 0x43) r8 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) r9 = socket$inet6_sctp(0xa, 0x1, 0x84) connect$inet6(r9, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r8, &(0x7f0000000140)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendmsg$netlink(r8, &(0x7f00009f3fc8)={0x0, 0x0, &(0x7f000070f000)=[{&(0x7f0000a77000)={0x2300}, 0x2300}], 0x1, &(0x7f0000414000)}, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') ioctl$sock_inet_SIOCDELRT(r10, 0x890c, &(0x7f0000000880)={0x2ce7, {0x2, 0x4e22, @multicast2=0xe0000002}, {0x2, 0x4e21, @loopback=0x7f000001}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, 0x4, 0x9, 0x7, 0xfffffffffffff001, 0x0, 0x0, 0x5, 0x0, 0x1}) ioctl$sock_kcm_SIOCKCMUNATTACH(r10, 0x89e1, &(0x7f00000000c0)={r6}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000800)=[@in6={0xa, 0x4e24, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}, 0x8000000000}, @in6={0xa, 0x0, 0x20000000000000, @loopback={0x0, 0x1}, 0x80}, @in={0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, @in={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, @in6={0xa, 0x4e23, 0x9, @empty, 0x8}], 0x74) 2018/03/30 10:21:36 executing program 1: getegid() getresgid(&(0x7f00000000c0)=0x0, &(0x7f0000000100), &(0x7f0000000300)) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = memfd_create(&(0x7f0000000340)='/selinux/enforce\x00', 0x2) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000380)=""/53, &(0x7f0000000440)=0x35) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000003c0), &(0x7f0000000400)=0xb) setresgid(0x0, r0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e21, 0x4, @remote={0xfe, 0x80, [], 0xbb}, 0x3}}, [0x8, 0x4, 0x7f, 0x9, 0x72, 0x3, 0xff, 0x10001, 0x401, 0x40, 0x6, 0x30, 0xfffffffffffffc01, 0x1f, 0x4]}, &(0x7f00000002c0)=0x100) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000580)=@sack_info={r2, 0x100, 0x9}, 0xc) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/enforce\x00', 0x20680, 0x0) accept$netrom(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x10) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20000, 0x0) ioctl$PERF_EVENT_IOC_ID(r3, 0x80082407, &(0x7f0000000440)) r5 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_ADD(r4, 0x4c81, r5) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e21, 0xaeab, @mcast2={0xff, 0x2, [], 0x1}, 0x25b8}}, 0x1, 0x66fd}, &(0x7f0000000540)=0x90) semget(0x2, 0x1, 0x2) 2018/03/30 10:21:36 executing program 7: clone(0x200, &(0x7f0000000100)="f0f7d70fc52207334efb558c957ea5882b23d85fa1659dc13aa7603b45aa407f02117308b1a8697bcf6617a98d145ec63b3cffa3123c2b94a42831af8d9bdb4b03d2954fdaa7e037f2c459a27e42921a924df6c5899ef4dbdb44bffbadd515d6024b7e3450b4ea54c55a229f4d694a292b270018a408b9ed54a0bc1929156ff004c1cf0b1728065c1ae04f4eeb552ff2420005e5ccb9400909127922c4a8e69ffbb96ca5bc95786113ae475b94c2c9a6a235276e2f1b7f01010000000000007a", &(0x7f0000000000), &(0x7f0000f8b000), &(0x7f00000d5000)) r0 = syz_open_dev$mouse(&(0x7f0000002480)='/dev/input/mouse#\x00', 0x3e0b, 0x40) connect$netlink(r0, &(0x7f00000024c0)=@unspec, 0xc) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/audio\x00', 0x101000, 0x0) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f0000002440)={0x7f, 0x9, 0xf95, 0x1000, &(0x7f0000000400)=""/4096, 0x1000, &(0x7f0000001400)=""/4096, 0x40, &(0x7f0000002400)=""/64}) mknod(&(0x7f0000cd7000)='./file0\x00', 0x103a, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000340), &(0x7f000027a000)) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000080)={0x4, 0xffffffffffffff9c, 0x1}) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, './file0/file0\x00'}, 0x373) r3 = syz_open_procfs(0x0, &(0x7f000042cff4)='personality\x00') read(r3, &(0x7f0000f1bf7e)=""/130, 0xfffffdd8) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000002500)=0x4) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000240)) ioctl$TIOCCONS(r3, 0x541d) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x9, 0x18}, 0xc) open$dir(&(0x7f000050bff8)='./file0\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000280)=r3) ioctl$DRM_IOCTL_CONTROL(r2, 0x40086414, &(0x7f00000002c0)={0x3, 0xfffffffffffff001}) recvfrom$unix(r3, &(0x7f0000000300)=""/24, 0x18, 0x2, &(0x7f0000000340)=@abs={0x1, 0x0, 0x4e22}, 0x6e) ioctl$KVM_IRQ_LINE(r2, 0x4008ae61, &(0x7f0000000240)={0x0, 0x100000001}) [ 224.892517] IPVS: ftp: loaded support on port[0] = 21 [ 225.185078] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 225.615958] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 225.622073] 8021q: adding VLAN 0 to HW filter on device bond0 [ 225.668578] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 225.713887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 225.733510] FAULT_INJECTION: forcing a failure. [ 225.733510] name failslab, interval 1, probability 0, space 0, times 0 [ 225.744736] CPU: 0 PID: 27779 Comm: syz-executor6 Not tainted 4.16.0-rc7+ #371 [ 225.752075] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 225.761412] Call Trace: [ 225.763985] dump_stack+0x194/0x24d [ 225.767590] ? arch_local_irq_restore+0x53/0x53 [ 225.772252] should_fail+0x8c0/0xa40 [ 225.775940] ? kstrdup+0x39/0x70 [ 225.779286] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 225.784365] ? cgroup_apply_control_enable+0x390/0xbc0 [ 225.789616] ? kernfs_iop_mkdir+0x153/0x1e0 [ 225.793910] ? vfs_mkdir+0x390/0x600 [ 225.797597] ? SyS_mkdirat+0x22b/0x2b0 [ 225.801458] ? do_syscall_64+0x281/0x940 [ 225.805493] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 225.810865] ? find_held_lock+0x35/0x1d0 [ 225.814911] ? find_held_lock+0x35/0x1d0 [ 225.818953] ? __lock_is_held+0xb6/0x140 [ 225.823009] ? check_same_owner+0x320/0x320 [ 225.827313] ? rcu_note_context_switch+0x710/0x710 [ 225.832216] ? rcu_read_lock_sched_held+0x108/0x120 [ 225.837214] should_failslab+0xec/0x120 [ 225.841165] kmem_cache_alloc+0x47/0x760 [ 225.845199] ? memcpy+0x45/0x50 [ 225.848452] ? kstrdup+0x59/0x70 [ 225.851796] __kernfs_new_node+0xe2/0x570 [ 225.855921] ? kernfs_dop_revalidate+0x380/0x380 [ 225.860661] ? snprintf+0xc0/0xf0 [ 225.864091] ? vsprintf+0x40/0x40 [ 225.867516] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 225.872424] ? cgroup_file_name+0x1d0/0x1d0 [ 225.876722] kernfs_new_node+0x80/0xe0 [ 225.880588] __kernfs_create_file+0x4b/0x320 [ 225.884982] cgroup_addrm_files+0x3c5/0xa70 [ 225.889290] ? cgroup_file_write+0x710/0x710 [ 225.893671] ? cpu_cgroup_css_alloc+0x30/0x30 [ 225.898157] ? __lock_is_held+0xb6/0x140 [ 225.902199] ? sched_online_group+0x4e0/0x4e0 [ 225.906666] ? cpu_cgroup_css_online+0x3a/0x50 [ 225.911223] ? online_css+0x224/0x2e0 [ 225.915006] css_populate_dir+0x198/0x420 [ 225.919139] cgroup_apply_control_enable+0x390/0xbc0 [ 225.924227] ? cgroup_propagate_control+0x570/0x570 [ 225.929228] ? css_populate_dir+0x289/0x420 [ 225.933616] cgroup_mkdir+0x56f/0xfc0 [ 225.937391] ? __lock_is_held+0xb6/0x140 [ 225.941436] ? cgroup_destroy_locked+0x750/0x750 [ 225.946166] ? rcu_read_lock_sched_held+0x108/0x120 [ 225.951155] ? kmem_cache_free+0x258/0x2a0 [ 225.955367] ? set_nlink+0xc1/0x160 [ 225.958977] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 225.963880] ? generic_permission+0x105/0x3c0 [ 225.968354] ? cgroup_destroy_locked+0x750/0x750 [ 225.973086] kernfs_iop_mkdir+0x153/0x1e0 [ 225.977212] vfs_mkdir+0x390/0x600 [ 225.980733] SyS_mkdirat+0x22b/0x2b0 [ 225.984428] ? SyS_mknod+0x480/0x480 [ 225.988113] ? trace_hardirqs_on+0xd/0x10 [ 225.992239] ? do_syscall_64+0xb7/0x940 [ 225.996190] ? SyS_mknod+0x480/0x480 [ 225.999880] do_syscall_64+0x281/0x940 [ 226.003743] ? __do_page_fault+0xc90/0xc90 [ 226.007953] ? finish_task_switch+0x1c1/0x7e0 [ 226.012425] ? syscall_return_slowpath+0x550/0x550 [ 226.017332] ? syscall_return_slowpath+0x2ac/0x550 [ 226.022236] ? prepare_exit_to_usermode+0x350/0x350 [ 226.027230] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 226.032581] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 226.037405] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 226.042569] RIP: 0033:0x4548b9 [ 226.045733] RSP: 002b:00007efcf13a9c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 226.053413] RAX: ffffffffffffffda RBX: 00007efcf13aa6d4 RCX: 00000000004548b9 2018/03/30 10:21:38 executing program 6 (fault-call:3 fault-nth:37): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r0, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r0, &(0x7f0000000100)=""/65, 0x41) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) linkat(r0, &(0x7f0000000480)='./file1\x00', r1, &(0x7f00000004c0)='./file0\x00', 0x1000) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') unlink(&(0x7f00000000c0)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r0, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x12021) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000340)={0x8, 0x9, 0x4, 0x10000, 0x1, 0x7, 0x7fffffff, 0x0, 0x29, 0x0, 0x20}, 0xb) 2018/03/30 10:21:38 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000, 0x0, 0x4}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000d80)={r5, 0x13c, 0x7, 0xaa5, 0x1, 0x8001}, 0x14) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000dc0)={0xaa, 0x20}) pwrite64(r1, &(0x7f0000000e00)="7437032bd6e223b3a59d10357fc245a11551c76207ed30241886ce0ea1326aeac569322a47e5909770909834b26bf6b04af3b30656cbc3e07c3eed14ee7c472c2d276872498ef33618509e2049213b9664560dc77dd302976456a0392edd116b9816cbca183c77f192c4c3260a385cc483327645104ab9987888488ff6b8e163c2eddc4fc33b9f9ba13abbb021303c8d438d96b2da7c190f9cdc9f2242c2df22ccc63b779747bc9b54e299a407b4150450352ce672efd9fd7565ffb5f410dd66a2061984a92c2ca847eb65e95168372a9e92cc53", 0xd4, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) 2018/03/30 10:21:38 executing program 5: syz_emit_ethernet(0x6e, &(0x7f00000000c0)=ANY=[@ANYBLOB="cd390b081bf2ffffffffffff86dd6002290f00383a0000000000000000000000ffffe0004e8e220fa6f50001ff02000000000000000000000000000102009078020000000000000000000000000001fe800000000000000000000000fff900802a08000000006b"], 0x0) 2018/03/30 10:21:38 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x100000000106, 0x0) writev(r0, &(0x7f000036bfd0), 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000040)=0x4000000058) read(r0, &(0x7f0000000140)=""/1, 0xfffffffffffffeb7) 2018/03/30 10:21:38 executing program 1: mmap(&(0x7f0000000000/0xd25000)=nil, 0xd25000, 0x0, 0x32, 0xffffffffffffffff, 0x42) pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140)={&(0x7f0000000100), 0x8}) 2018/03/30 10:21:38 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000005480)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000340)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f00000054c0)) close(r1) mkdir(&(0x7f000082f000)='./control\x00', 0x0) creat(&(0x7f0000000080)='./control/file0\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) userfaultfd(0x0) r2 = socket$inet(0x10, 0x0, 0x0) sendmsg(r2, &(0x7f0000000680)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000580)="240000001a00030207fffd946fa281bc04eee6d87986e0d387d2b78502add131b4d9c404c15f2f98a4002cf0eda84957256df38f949a20305c7c0100000000000000", 0x42}], 0x1, 0x0, 0x0, 0x4014}, 0x2000c040) setsockopt$RDS_RECVERR(r2, 0x114, 0x5, &(0x7f0000000200)=0x1, 0x4) ioctl$KVM_SET_GSI_ROUTING(0xffffffffffffffff, 0x4008ae6a, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) mkdir(&(0x7f000052aff8)='./file0\x00', 0x0) r3 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000033ff8)='./file0\x00', 0x0) mount(&(0x7f0000df2000)='./file0/file0\x00', &(0x7f0000a16ff8)='./file0\x00', &(0x7f0000df2ffd)='\x00v\t', 0x1001, &(0x7f0000a06000)) r4 = open(&(0x7f00001d4ff8)='./file0\x00', 0x0, 0x0) renameat(r4, &(0x7f00000000c0)='./file0\x00', r3, &(0x7f0000000100)='./file1\x00') r5 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x8004e20, 0x3}, 0x1c) r6 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r7 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r7, &(0x7f0000f50f90), 0x0, 0x81006) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, r7) r8 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f000052f000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) sendmsg$key(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000500)=ANY=[]}, 0x1}, 0x0) close(r8) 2018/03/30 10:21:38 executing program 7: clone(0x200, &(0x7f0000000100)="f0f7d70fc52207334efb558c957ea5882b23d85fa1659dc13aa7603b45aa407f02117308b1a8697bcf6617a98d145ec63b3cffa3123c2b94a42831af8d9bdb4b03d2954fdaa7e037f2c459a27e42921a924df6c5899ef4dbdb44bffbadd515d6024b7e3450b4ea54c55a229f4d694a292b270018a408b9ed54a0bc1929156ff004c1cf0b1728065c1ae04f4eeb552ff2420005e5ccb9400909127922c4a8e69ffbb96ca5bc95786113ae475b94c2c9a6a235276e2f1b7f01010000000000007a", &(0x7f0000000000), &(0x7f0000f8b000), &(0x7f00000d5000)) mknod(&(0x7f0000cd7000)='./file0\x00', 0x103a, 0x0) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340), &(0x7f0000000280)) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000080)={0x4, 0xffffffffffffff9c, 0x1}) bind$unix(r0, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) r1 = syz_open_procfs(0x0, &(0x7f000042cff4)='personality\x00') ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000280)={0x0, 0xb79, 0x0, 0x4, 0x7f800000000000}) recvfrom$ipx(r1, &(0x7f00000002c0)=""/252, 0xfc, 0x1, &(0x7f00000003c0)={0x4, 0x7, 0x5, "5dc2bbce61f3", 0x5}, 0x10) read(r1, &(0x7f0000f1bf7e)=""/130, 0xfffffdd8) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000240)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x9, 0x18}, 0xc) open$dir(&(0x7f000050bff8)='./file0\x00', 0x2, 0x0) 2018/03/30 10:21:38 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x200900, 0x103) connect$vsock_stream(r1, &(0x7f0000000600)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) r2 = socket$alg(0x26, 0x5, 0x0) rt_sigtimedwait(&(0x7f0000000140)={0xffffffff}, 0x0, &(0x7f0000000180), 0x8) bind$alg(r2, &(0x7f000073e000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(cbc-twofish-avx)\x00'}, 0x58) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000500)={&(0x7f00000005c0)=[0x0, 0x0, 0x0], 0x3}) nanosleep(&(0x7f0000d1e000)={0x0, 0x1c9c380}, &(0x7f0000000000)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r3, 0x118, 0x0, &(0x7f0000000100)=0x7, 0x4) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000000c0)={0x1, 0x1, 0x1, 0x1, 0x0, 0x6}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000280)={r4, @in={{0x2, 0x4e23, @multicast2=0xe0000002}}, [0x8000, 0x9, 0x80000000, 0x3, 0x80, 0x8001, 0x800, 0x100, 0xe0db, 0x0, 0x2000000000, 0x200, 0x68, 0x0, 0x8]}, &(0x7f0000000380)=0x100) r5 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0xfffffffffffffdfa) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r5, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port1\x00', 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r5, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r6 = gettid() r7 = syz_open_procfs(r6, &(0x7f00000002c0)='maps\x00') readv(r7, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/28, 0x65}], 0x1) exit(0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r7, &(0x7f000004ffe0)=[{&(0x7f0000000000)=""/128, 0xe6}], 0x222) r8 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) connect$ax25(r3, &(0x7f00000006c0)={0x3, {"fc5da504005009"}, 0x7fff}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) getsockopt$netrom_NETROM_T1(r8, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r5, 0x80045301, &(0x7f0000000700)) 2018/03/30 10:21:38 executing program 5: syz_emit_ethernet(0x3e, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaeaffffffffffff86dd60016111b1080400000073a4e1954bea468d9fc5f5c1ae100000000800000000ffffac14f2aaf74804000000000000002563fec8f1baef42994850d9a151881318c38df5ad9833f3cec5e3d52218cf0ede4f83924dd3d38c9f886e34e043e370c7e11e10a882823260936ca18597990d946a66eec26ec29b764ad6e048c45e5919c425b5eeb34228f463076a118abe4c559063c0feb34b91b7f474e35567eb8860d90adf116990a2bc3d6100a8624234516f096a205be8b1a9321b1cb8c120bc8d8ec3aac8a40000"], 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x1feffd, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000040), 0x2) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000080)={0x4, 0x7, 0x1, 0x3, 0x3ff, 0x5, 0xd8ce}, 0xc) semget$private(0x0, 0x0, 0x44) 2018/03/30 10:21:38 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x100000000106, 0x0) writev(r0, &(0x7f000036bfd0), 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000040)=0x4000000058) read(r0, &(0x7f0000000140)=""/1, 0xfffffffffffffeb7) [ 226.060655] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 226.067898] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 226.075227] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 226.082730] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000024 [ 226.090406] cgroup: cgroup_addrm_files: failed to add weight.nice, err=-12 2018/03/30 10:21:38 executing program 1: syz_emit_ethernet(0x4e, &(0x7f0000005faa)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv6={0x86dd, {0x0, 0x6, "c0e544", 0x18, 0x40000000003a, 0x0, @dev={0xfe, 0x80}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@mld={0xffffff83, 0x0, 0x0, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}}}}, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x1fd) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000040)={0x5}, 0xfffffffffffffea0) 2018/03/30 10:21:38 executing program 6 (fault-call:3 fault-nth:38): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r0, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r0, &(0x7f0000000100)=""/65, 0x41) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) linkat(r0, &(0x7f0000000480)='./file1\x00', r1, &(0x7f00000004c0)='./file0\x00', 0x1000) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') unlink(&(0x7f00000000c0)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r0, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x12021) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000340)={0x8, 0x9, 0x4, 0x10000, 0x1, 0x7, 0x7fffffff, 0x0, 0x29, 0x0, 0x20}, 0xb) 2018/03/30 10:21:38 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x100000000106, 0x0) writev(r0, &(0x7f000036bfd0)=[{&(0x7f0000b51000)}], 0x1) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000040)=0x4000000058) read(r0, &(0x7f0000000140)=""/1, 0xfffffffffffffeb7) 2018/03/30 10:21:38 executing program 7: clone(0x200, &(0x7f0000000100)="f0f7d70fc52207334efb558c957ea5882b23d85fa1659dc13aa7603b45aa407f02117308b1a8697bcf6617a98d145ec63b3cffa3123c2b94a42831af8d9bdb4b03d2954fdaa7e037f2c459a27e42921a924df6c5899ef4dbdb44bffbadd515d6024b7e3450b4ea54c55a229f4d694a292b270018a408b9ed54a0bc1929156ff004c1cf0b1728065c1ae04f4eeb552ff2420005e5ccb9400909127922c4a8e69ffbb96ca5bc95786113ae475b94c2c9a6a235276e2f1b7f01010000000000007a", &(0x7f0000000000), &(0x7f0000f8b000), &(0x7f00000d5000)) mknod(&(0x7f0000cd7000)='./file0\x00', 0x103a, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000340), &(0x7f000027a000)) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000080)={0x4, 0xffffffffffffff9c, 0x1}) bind$unix(r0, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) r1 = syz_open_procfs(0x0, &(0x7f000042cff4)='personality\x00') read(r1, &(0x7f0000f1bf7e)=""/130, 0xfffffdd8) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000240)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x9, 0x18}, 0xc) open$dir(&(0x7f000050bff8)='./file0\x00', 0x2, 0x0) symlinkat(&(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00') 2018/03/30 10:21:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000340)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000380)='net/mcfilter\x00') ioctl$VT_RESIZEX(r2, 0x560a, &(0x7f0000000040)={0x2, 0x80000001, 0x5, 0x53c, 0xffffffff}) write(r0, &(0x7f0000000100)="290000001400070002ffffffea08e0eb010010e2dfa4478b775b226dc539050fc544858d3600000000", 0x29) 2018/03/30 10:21:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa}, 0x1c) ioctl$int_in(r1, 0x5452, &(0x7f0000000040)) sendto$inet6(r1, &(0x7f00002a0b14)="f6", 0x1, 0x200408d4, &(0x7f000072e000)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080)=0x40, 0x4) r2 = accept$netrom(r0, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000400)={0x0, 0x1a}, &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000480)={r3, 0x101}, 0x8) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f00000001c0)={'HL\x00'}, &(0x7f0000000280)=0x1e) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003c1000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r4 = socket$l2tp(0x18, 0x1, 0x1) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r4, 0x111, 0x5, 0xfffffffffffffff9, 0x4) r5 = socket$nl_generic(0x10, 0x3, 0x10) readv(r5, &(0x7f0000001680)=[{&(0x7f0000001640)=""/49, 0x31}], 0x1) socket$inet(0x2, 0x0, 0xffffffffffffbbe0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r5, 0x54a2) accept4(r2, &(0x7f00000004c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000540)=0x80, 0x80800) gettid() open(&(0x7f0000000100)='./file0\x00', 0x42000, 0x110) sendmsg$nl_generic(r5, &(0x7f0000018000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f000000e000)={&(0x7f00000016c0)=ANY=[@ANYBLOB="cc0000001d00ffff000000004000000001000000da4f6010b5e1ff0c2a6d1619965d2d508a435a526be38d5e9711fe7397e2e4dd6099f626b15d55111b00a44c3e467b58b6a8ff0482b80ee984cc49cfaf305f8090908586c03354d7e59bf04eaf1d94324f07386d290bce331521b5d864b5b691aecad1564b289427c10279919a421cd363f696436b0715fd550e2839340ff9d9ae2242ae251ff2baf3854ea5538fcb7822ba2afd20a1e3b441fbd8f4658805986bd6bbf21da9210130eaf8267d7b864c7b9928655d870000"], 0x1}, 0x1}, 0x0) 2018/03/30 10:21:38 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x200900, 0x103) connect$vsock_stream(r1, &(0x7f0000000600)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) r2 = socket$alg(0x26, 0x5, 0x0) rt_sigtimedwait(&(0x7f0000000140)={0xffffffff}, 0x0, &(0x7f0000000180), 0x8) bind$alg(r2, &(0x7f000073e000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(cbc-twofish-avx)\x00'}, 0x58) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000500)={&(0x7f00000005c0)=[0x0, 0x0, 0x0], 0x3}) nanosleep(&(0x7f0000d1e000)={0x0, 0x1c9c380}, &(0x7f0000000000)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r3, 0x118, 0x0, &(0x7f0000000100)=0x7, 0x4) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000000c0)={0x1, 0x1, 0x1, 0x1, 0x0, 0x6}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000280)={r4, @in={{0x2, 0x4e23, @multicast2=0xe0000002}}, [0x8000, 0x9, 0x80000000, 0x3, 0x80, 0x8001, 0x800, 0x100, 0xe0db, 0x0, 0x2000000000, 0x200, 0x68, 0x0, 0x8]}, &(0x7f0000000380)=0x100) r5 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0xfffffffffffffdfa) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r5, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port1\x00', 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r5, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r6 = gettid() r7 = syz_open_procfs(r6, &(0x7f00000002c0)='maps\x00') readv(r7, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/28, 0x65}], 0x1) exit(0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r7, &(0x7f000004ffe0)=[{&(0x7f0000000000)=""/128, 0xe6}], 0x222) r8 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) connect$ax25(r3, &(0x7f00000006c0)={0x3, {"fc5da504005009"}, 0x7fff}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) getsockopt$netrom_NETROM_T1(r8, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r5, 0x80045301, &(0x7f0000000700)) 2018/03/30 10:21:38 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000, 0x0, 0x4}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000d80)={r5, 0x13c, 0x7, 0xaa5, 0x1, 0x8001}, 0x14) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000dc0)={0xaa, 0x20}) pwrite64(r1, &(0x7f0000000e00)="7437032bd6e223b3a59d10357fc245a11551c76207ed30241886ce0ea1326aeac569322a47e5909770909834b26bf6b04af3b30656cbc3e07c3eed14ee7c472c2d276872498ef33618509e2049213b9664560dc77dd302976456a0392edd116b9816cbca183c77f192c4c3260a385cc483327645104ab9987888488ff6b8e163c2eddc4fc33b9f9ba13abbb021303c8d438d96b2da7c190f9cdc9f2242c2df22ccc63b779747bc9b54e299a407b4150450352ce672efd9fd7565ffb5f410dd66a2061984a92c2ca847eb65e95168372a9e92cc53", 0xd4, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) [ 226.298520] bond0 (unregistering): Released all slaves 2018/03/30 10:21:38 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x40000, 0x0) clone(0x0, &(0x7f0000000000), &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) fcntl$setlease(r0, 0x400, 0x0) r2 = perf_event_open(&(0x7f0000000540)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x100000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$key(0xf, 0x3, 0x2) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x105541, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000001c0)={0x0, 0x7, 0x5}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000000240)={0x8, 0x208, 0xfffffffffffffffb, 0x9, r5}, &(0x7f0000000280)=0x10) pwrite64(r4, &(0x7f0000008040), 0x0, 0x0) getsockopt$inet_tcp_int(r4, 0x6, 0x6, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$KDSETMODE(r4, 0x4b3a, 0x401) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000080)=0x0) r7 = getpgrp(r6) ioprio_set$pid(0x1, r7, 0x9) r8 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f0000000300)="030b", 0x2, 0xfffffffffffffffd) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) getgroups(0x5, &(0x7f00000005c0)=[0x0, 0x0, 0x0]) keyctl$chown(0x4, r8, 0x0, 0x0) ioctl$DRM_IOCTL_SET_UNIQUE(r4, 0x40106410, &(0x7f00000000c0)={0x4f, &(0x7f00000004c0)="e72ddffbcce6b03b3a82c48a01b1b9e292b1b107febc3fc8bfbfb9378e21f0a804616a61b629f06bb018a366e8ad566f083af118f65631817ba304cd1961d98d0063f858a6e1bf85d51c35c103b1d5"}) getuid() setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000400)={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x5c) getsockopt$ax25_buf(r4, 0x101, 0x0, &(0x7f0000000640)=""/125, &(0x7f00000006c0)=0x7d) signalfd(r2, &(0x7f00000002c0)={0x4}, 0x8) ioctl$sock_ipx_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000100)={'dummy0\x00', {0x4, 0x7ff, 0x0, "0be47daea147"}}) sysfs$3(0x3) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000280)={0x1ff, 0x9, 0x400, 0x0, 0x2, 0x100}) r9 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x60000, 0x0) accept4$inet6(r9, &(0x7f0000000100), &(0x7f0000000140)=0x1c, 0x0) socket$alg(0x26, 0x5, 0x0) 2018/03/30 10:21:39 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x100000000106, 0x0) writev(r0, &(0x7f000036bfd0)=[{&(0x7f0000b51000)}], 0x1) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000040)=0x4000000058) read(r0, &(0x7f0000000140)=""/1, 0xfffffffffffffeb7) 2018/03/30 10:21:39 executing program 1: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x16907e, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000048000), 0xfffffffffffffffd) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x980, 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000edfff0)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0x80000000000004, 0x1, &(0x7f0000cc3ff0)={0x0, 0x989680}, &(0x7f0000000080), 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000280)={0x1}) r1 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000fb6000)=""/28, 0x1c) r2 = dup2(r1, r1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f000019ffe9)={0xc1}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f00000000c0)={{}, 'port0\x00', 0x0, 0x1000000000, 0x0, 0x0, 0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r1, 0xc0305302, &(0x7f0000000180)={0x4, 0x8, 0x0, 0x1, 0x0, 0x3}) timer_create(0x7, &(0x7f0000000340)={0x0, 0x37, 0x1}, &(0x7f0000000540)=0x0) clock_gettime(0x0, &(0x7f0000000580)={0x0, 0x0}) timer_settime(r3, 0x1, &(0x7f00000005c0)={{r4, r5+30000000}}, &(0x7f0000000600)) ioctl$fiemap(r2, 0xc020660b, &(0x7f0000000480)=ANY=[]) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f00000001c0)={{0x3}, 'port1\x00', 0x84, 0x80000, 0x0, 0xffffffffffffff01, 0x3, 0x0, 0x200f, 0x0, 0x4}) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000000)={{}, 'port1\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0bc5310, &(0x7f0000000280)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000fdbff0)='/dev/sequencer2\x00', 0x0, 0x0) symlinkat(&(0x7f0000000400)='./file0\x00', r2, &(0x7f0000000440)='./file0\x00') setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000180)=0x40, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xf) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/29, 0x1d}, {&(0x7f0000000380)=""/98, 0x62}, {&(0x7f0000000400)=""/140, 0x8c}, {&(0x7f00000004c0)=""/5, 0x5}], 0x4, 0x0) socketpair(0x0, 0x80000, 0x3fd, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000000140)=[@in6={0xa, 0x0, 0x100000001, @mcast1={0xff, 0x1, [], 0x1}, 0x200}, @in={0x2, 0x4e22}], 0x2c) 2018/03/30 10:21:39 executing program 7: clone(0x200, &(0x7f0000000100)="f0f7d70fc52207334efb558c957ea5882b23d85fa1659dc13aa7603b45aa407f02117308b1a8697bcf6617a98d145ec63b3cffa3123c2b94a42831af8d9bdb4b03d2954fdaa7e037f2c459a27e42921a924df6c5899ef4dbdb44bffbadd515d6024b7e3450b4ea54c55a229f4d694a292b270018a408b9ed54a0bc1929156ff004c1cf0b1728065c1ae04f4eeb552ff2420005e5ccb9400909127922c4a8e69ffbb96ca5bc95786113ae475b94c2c9a6a235276e2f1b7f01010000000000007a", &(0x7f0000000000), &(0x7f0000f8b000), &(0x7f00000d5000)) mknod(&(0x7f0000cd7000)='./file0\x00', 0x103a, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000340), &(0x7f000027a000)) open$dir(&(0x7f00000000c0)='./file1\x00', 0x101100, 0xe0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000080)={0x4, 0xffffffffffffff9c, 0x1}) bind$unix(r0, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) r1 = syz_open_procfs(0x0, &(0x7f000042cff4)='personality\x00') read(r1, &(0x7f0000f1bf7e)=""/130, 0xd7b6666ef9ec02cd) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000240)) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000240)={0x6, 0x80}) open$dir(&(0x7f000050bff8)='./file0\x00', 0x2, 0x0) 2018/03/30 10:21:39 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000, 0x0, 0x4}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000d80)={r5, 0x13c, 0x7, 0xaa5, 0x1, 0x8001}, 0x14) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000dc0)={0xaa, 0x20}) pwrite64(r1, &(0x7f0000000e00)="7437032bd6e223b3a59d10357fc245a11551c76207ed30241886ce0ea1326aeac569322a47e5909770909834b26bf6b04af3b30656cbc3e07c3eed14ee7c472c2d276872498ef33618509e2049213b9664560dc77dd302976456a0392edd116b9816cbca183c77f192c4c3260a385cc483327645104ab9987888488ff6b8e163c2eddc4fc33b9f9ba13abbb021303c8d438d96b2da7c190f9cdc9f2242c2df22ccc63b779747bc9b54e299a407b4150450352ce672efd9fd7565ffb5f410dd66a2061984a92c2ca847eb65e95168372a9e92cc53", 0xd4, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) 2018/03/30 10:21:39 executing program 3: r0 = syz_open_dev$sndmidi(&(0x7f0000653fee)='/dev/snd/midiC#D#\x00', 0x200, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000180)={0x0, 0x401}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000006c0)={r1, 0x40, &(0x7f0000000240)=[@in={0x2, 0x4e20, @multicast2=0xe0000002}, @in={0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}, @in={0x2, 0x4e23}, @in={0x2, 0x4e21, @loopback=0x7f000001}]}, &(0x7f0000000700)=0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x3) r2 = fcntl$getown(r0, 0x9) ustat(0x72ec2682, &(0x7f0000001680)) r3 = getpgrp(0x0) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r0, &(0x7f0000000300)={r0, r0}) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000000003000000115600000000000000b2000000000000000000000000000200000000000000000000000000000000000000000000000000000000000559858e838353573cbd059b940fbbdd440e19223942a0d58369e5e26a3abfdcf7f073694b335676bb0507f463975e64336c6a"], 0x1) ppoll(&(0x7f0000000040)=[{}, {r0}], 0x2, &(0x7f00000000c0), &(0x7f0000000100), 0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000005c0)={0x1}, 0x1) inotify_init() r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x2, 0x0) sendmsg$nfc_llcp(r4, &(0x7f0000000640)={&(0x7f0000000280)={0x27, 0x0, 0x4, 0x7, 0x1, 0x2, "22dd483f69cbb2f9ad614d307bde52bad1d1c11381cf5253d6cabfb29f3dffd4c28439e22c562434c708fcd1e045d4348cd982f6ceff6f05ae5c932f9d9c41", 0x36}, 0x60, &(0x7f0000000540), 0x0, &(0x7f0000000680)=ANY=[], 0x0, 0x20004000}, 0x80) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000580)={0x0, 0x17, &(0x7f0000000340)="1d9b8a1367db2ac42276d59e7325e4fa51464fb4c2879e"}) dup2(r0, r4) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000380)={0x0, 0x9}, &(0x7f0000000600)=0x18) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f00000019c0)={0x0, 0x0, 0x10}, &(0x7f0000001a00)=0xc) sendmsg$inet_sctp(r4, &(0x7f0000001b40)={&(0x7f0000000200)=@in6={0xa, 0x4e24, 0x4000000000000, @remote={0xfe, 0x80, [], 0xbb}, 0x6}, 0x1c, &(0x7f0000001940)=[{&(0x7f0000000480)="58913d9f8977a9cb0b94b91b4762b066455ada6eca89a068559cc93697873db2292f0d095aef21c50a06bcf1e0a24dd39d62fb9108b033c3f8c60a0777393d08d813f8f470046c870440844012e323264dbe33c02696c14656692ddd14d5260d0db88446e8befda6ae496968b7eaa590c44d02b32366ca9bb3244472e693521fd724d4d646de1e24b20e7cfdb4b5b1db7ae0e18e72d76d210fbf212bc06a50bfbd485d9ba3d8d5a79d5294b81fc480536c43fe44df92377f430f839c03f0d847b892e2ac3a4a4328da3daa0d2e", 0xcd}], 0x1, &(0x7f0000001a40)=[@sndrcv={0x30, 0x84, 0x1, {0x9700000000000000, 0x4, 0x206, 0x2, 0x6, 0x1f2ec637, 0x1000, 0x2d24ea3, r5}}], 0x30}, 0x0) r6 = eventfd2(0x2, 0x0) write$eventfd(r6, &(0x7f0000000000)=0xfffffffffffffffd, 0x8) write$eventfd(r6, &(0x7f0000000040), 0x8) readv(r6, &(0x7f0000002fe0)=[{&(0x7f0000002f94)=""/108, 0x6c}], 0x1) 2018/03/30 10:21:39 executing program 5: io_setup(0x20, &(0x7f000086a000)=0x0) r1 = socket$inet(0x2, 0x805, 0x0) bind$inet(r1, &(0x7f00003daff0)={0x2, 0x4e23}, 0x10) setsockopt$inet_int(r1, 0x0, 0x1, &(0x7f0000000080)=0x7, 0x4) sendto$inet(r1, &(0x7f0000000180)='\a', 0x1, 0x0, &(0x7f0000000040)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = getpgid(0x0) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x0, 0x0) io_cancel(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x7, 0x2, r3, &(0x7f0000000280)="eb21ee22e8393b2f7a3c315a72f09f1a82f76c5c1664a95e9e83be8c33a88647d818f5f58e6c16bd987922a3412b31ebbb9f9fbf8e6db54a53d1f262a1867f14043a2c80500a5f40f9727f2475c8c33446a8bdfa2fbeaaa6618c8430a0ac85c3713d4854d5726a38ae7d79e59100e12f9aa7a375ef474a6ba8cfaad55e23d23ed8ac65924689aa47935957c43a573693933d5545338c1c68beb79be449da3a425c4ae36237b1f3ca8ef48b5d1e6ccc28160f7e656c22519063d35a319cfbffb4210b86e570fe99407ff6b95c2a4e04c029b085cf3b8b25fecf06ce15676a648f4405d38d2bc9f3a34e2dbc7ed6a822f0a71bb772", 0xf4, 0x1, 0x0, 0x1, r5}, &(0x7f00000001c0)) sched_rr_get_interval(0x0, &(0x7f0000000180)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x101, 0x0) getpeername$ax25(r6, &(0x7f0000000100), &(0x7f0000000140)=0x10) io_submit(r0, 0x1, &(0x7f00001b2000)=[&(0x7f0000a42fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f00000bcf3f)}]) socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x5, 0x31, 0xffffffffffffffff, 0x0) waitid(0x0, r4, 0x0, 0x41000001, &(0x7f0000000580)) ioctl$VHOST_SET_VRING_BASE(r5, 0x4008af12, &(0x7f0000000200)={0x0, 0x20}) io_getevents(r0, 0x0, 0x1, &(0x7f0000e72fe0)=[{}], &(0x7f00009ca000)) ioctl$KVM_XEN_HVM_CONFIG(r5, 0x4038ae7a, &(0x7f0000000540)={0x9f, 0x373, &(0x7f0000000380)="8519e311d837eedf97be0195813c2c46dff40a4df4be6c69fd81b8ff22dc261c77ce30b5903a63704a792d98d8dffd640c816c3d3e5f82d84f5950c325d5e4c1c11e7349e977382f5971b74bdadaf339e3dbb3d2cf1a7aef68bf2a37b1dd1f932483bc888c0f572c5d5643040c0910e37499ab9491ee3c6c3d06d0ce767f5b948ecc90cc72d8f8d4e5a2fff1fa82b08fbca44fa2053457aaa80aab04059504c2254b87fd34ef45b2293757c1a9780a4ba9d53d49c757573d2062d2fb9385f5ca336cf0d10eb47ca5af86f02b644f7481a908b9038584f5", &(0x7f0000000480)="b4509ca8c330a1ff3b8423034bae471d9b1d6dd3c73520aa92d0656ffc2669adf9ef0ae6f677cd9bd26436a3805263b7a3269f7f132779c1f232b528fb71f6eb497ba00cd4386ba6d4df2b3c16a6a6a42dfcf5307d4f17bb91512821ed51c81aa818b1576412a6eb5359843334eeefef0df1cae5c81710f3acd913e9a906a6e5a4c5883e3c7c79b8f7dfeeff4f6a854ea8b89db7d652e75759c96545873e16d704b7cf893caabc68370be9dde6c3afd675b54e48", 0xd7, 0xb4}) 2018/03/30 10:21:39 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x100000000106, 0x0) writev(r0, &(0x7f000036bfd0)=[{&(0x7f0000b51000)}], 0x1) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000040)=0x4000000058) read(r0, &(0x7f0000000140)=""/1, 0xfffffffffffffeb7) [ 227.243927] IPVS: ftp: loaded support on port[0] = 21 [ 227.532548] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 227.946680] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 227.952790] 8021q: adding VLAN 0 to HW filter on device bond0 [ 227.996447] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 228.039985] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 228.046157] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 228.053116] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 228.071782] FAULT_INJECTION: forcing a failure. [ 228.071782] name failslab, interval 1, probability 0, space 0, times 0 [ 228.083061] CPU: 0 PID: 28052 Comm: syz-executor6 Not tainted 4.16.0-rc7+ #371 [ 228.090398] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 228.099726] Call Trace: [ 228.102292] dump_stack+0x194/0x24d [ 228.105904] ? arch_local_irq_restore+0x53/0x53 [ 228.110563] should_fail+0x8c0/0xa40 [ 228.114257] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 228.119338] ? rb_first_postorder+0xa0/0xa0 [ 228.123632] ? __mutex_lock+0x16f/0x1a80 [ 228.127668] ? save_stack+0x43/0xd0 [ 228.131265] ? kasan_kmalloc+0xad/0xe0 [ 228.135131] ? trace_hardirqs_off+0x10/0x10 [ 228.139432] ? find_held_lock+0x35/0x1d0 [ 228.143473] ? __lock_is_held+0xb6/0x140 [ 228.147526] ? check_same_owner+0x320/0x320 [ 228.151823] ? lock_downgrade+0x980/0x980 [ 228.155950] ? rcu_note_context_switch+0x710/0x710 [ 228.160867] should_failslab+0xec/0x120 [ 228.164823] __kmalloc_track_caller+0x5f/0x760 [ 228.169385] ? string+0x180/0x200 [ 228.172811] ? kstrdup_const+0x39/0x50 [ 228.176678] kstrdup+0x39/0x70 [ 228.179849] kstrdup_const+0x39/0x50 [ 228.183541] __kernfs_new_node+0xa2/0x570 [ 228.187665] ? kernfs_dop_revalidate+0x380/0x380 [ 228.192407] ? snprintf+0xc0/0xf0 [ 228.195835] ? vsprintf+0x40/0x40 [ 228.199261] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 228.204169] ? cgroup_file_name+0x1d0/0x1d0 [ 228.208467] kernfs_new_node+0x80/0xe0 [ 228.212334] __kernfs_create_file+0x4b/0x320 [ 228.216723] cgroup_addrm_files+0x3c5/0xa70 [ 228.221036] ? cgroup_file_write+0x710/0x710 [ 228.225420] ? cpu_cgroup_css_alloc+0x30/0x30 [ 228.229909] ? __lock_is_held+0xb6/0x140 [ 228.233953] ? sched_online_group+0x4e0/0x4e0 [ 228.238423] ? cpu_cgroup_css_online+0x3a/0x50 [ 228.242982] ? online_css+0x224/0x2e0 [ 228.246762] css_populate_dir+0x198/0x420 [ 228.250898] cgroup_apply_control_enable+0x390/0xbc0 [ 228.255986] ? cgroup_propagate_control+0x570/0x570 [ 228.260989] ? css_populate_dir+0x289/0x420 [ 228.265294] cgroup_mkdir+0x56f/0xfc0 [ 228.269066] ? __lock_is_held+0xb6/0x140 [ 228.273110] ? cgroup_destroy_locked+0x750/0x750 [ 228.277843] ? rcu_read_lock_sched_held+0x108/0x120 [ 228.282833] ? kmem_cache_free+0x258/0x2a0 [ 228.287047] ? set_nlink+0xc1/0x160 [ 228.290652] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 228.295553] ? generic_permission+0x105/0x3c0 [ 228.300030] ? cgroup_destroy_locked+0x750/0x750 [ 228.304853] kernfs_iop_mkdir+0x153/0x1e0 [ 228.308981] vfs_mkdir+0x390/0x600 [ 228.312502] SyS_mkdirat+0x22b/0x2b0 [ 228.316194] ? SyS_mknod+0x480/0x480 [ 228.319878] ? trace_hardirqs_on+0xd/0x10 [ 228.324006] ? do_syscall_64+0xb7/0x940 [ 228.327961] ? SyS_mknod+0x480/0x480 [ 228.331649] do_syscall_64+0x281/0x940 [ 228.335510] ? __do_page_fault+0xc90/0xc90 [ 228.339719] ? _raw_spin_unlock_irq+0x27/0x70 [ 228.344189] ? finish_task_switch+0x1c1/0x7e0 [ 228.348658] ? syscall_return_slowpath+0x550/0x550 [ 228.353561] ? syscall_return_slowpath+0x2ac/0x550 [ 228.358464] ? prepare_exit_to_usermode+0x350/0x350 [ 228.363458] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 228.368800] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 228.373623] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 228.378784] RIP: 0033:0x4548b9 [ 228.381949] RSP: 002b:00007fefc1957c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 2018/03/30 10:21:41 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000780)=[{&(0x7f0000000400)="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", 0xfc}], 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x200900, 0x103) connect$vsock_stream(r0, &(0x7f0000000600)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) r1 = socket$alg(0x26, 0x5, 0x0) rt_sigtimedwait(&(0x7f0000000140)={0xffffffff}, 0x0, &(0x7f0000000180), 0x8) bind$alg(r1, &(0x7f000073e000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(cbc-twofish-avx)\x00'}, 0x58) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000500)={&(0x7f00000005c0)=[0x0, 0x0, 0x0], 0x3}) nanosleep(&(0x7f0000d1e000)={0x0, 0x1c9c380}, &(0x7f0000000000)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r2, 0x118, 0x0, &(0x7f0000000100)=0x7, 0x4) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000000c0)={0x1, 0x1, 0x1, 0x1, 0x0, 0x6}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000280)={r3, @in={{0x2, 0x4e23, @multicast2=0xe0000002}}, [0x8000, 0x9, 0x80000000, 0x3, 0x80, 0x8001, 0x800, 0x100, 0xe0db, 0x0, 0x2000000000, 0x200, 0x68, 0x0, 0x8]}, &(0x7f0000000380)=0x100) r4 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000fb6000)=""/28, 0xfffffffffffffdfa) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port1\x00', 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r4, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r5 = gettid() r6 = syz_open_procfs(r5, &(0x7f00000002c0)='maps\x00') readv(r6, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/28, 0x65}], 0x1) exit(0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r6, &(0x7f000004ffe0)=[{&(0x7f0000000000)=""/128, 0xe6}], 0x222) r7 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) connect$ax25(r2, &(0x7f00000006c0)={0x3, {"fc5da504005009"}, 0x7fff}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) getsockopt$netrom_NETROM_T1(r7, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r4, 0x80045301, &(0x7f0000000700)) 2018/03/30 10:21:41 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000, 0x0, 0x4}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000d80)={r5, 0x13c, 0x7, 0xaa5, 0x1, 0x8001}, 0x14) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000dc0)={0xaa, 0x20}) pwrite64(r1, &(0x7f0000000e00)="7437032bd6e223b3a59d10357fc245a11551c76207ed30241886ce0ea1326aeac569322a47e5909770909834b26bf6b04af3b30656cbc3e07c3eed14ee7c472c2d276872498ef33618509e2049213b9664560dc77dd302976456a0392edd116b9816cbca183c77f192c4c3260a385cc483327645104ab9987888488ff6b8e163c2eddc4fc33b9f9ba13abbb021303c8d438d96b2da7c190f9cdc9f2242c2df22ccc63b779747bc9b54e299a407b4150450352ce672efd9fd7565ffb5f410dd66a2061984a92c2ca847eb65e95168372a9e92cc53f27151c36569714d1b2b2b2d26b0e9", 0xe3, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) 2018/03/30 10:21:41 executing program 3: r0 = socket$inet(0x2, 0x5, 0x2000000088) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000e7c000), 0x0, 0x8084, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) 2018/03/30 10:21:41 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x100000000106, 0x0) writev(r0, &(0x7f000036bfd0)=[{&(0x7f0000b51000)="eb", 0x1}], 0x1) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000040)=0x4000000058) read(r0, &(0x7f0000000140)=""/1, 0xfffffffffffffeb7) 2018/03/30 10:21:41 executing program 7: clone(0x200, &(0x7f0000000100)="f0f7d70fc52207334efb558c957ea5882b23d85fa1659dc13aa7603b45aa407f02117308b1a8697bcf6617a98d145ec63b3cffa3123c2b94a42831af8d9bdb4b03d2954fdaa7e037f2c459a27e42921a924df6c5899ef4dbdb44bffbadd515d6024b7e3450b4ea54c55a229f4d694a292b270018a408b9ed54a0bc1929156ff004c1cf0b1728065c1ae04f4eeb552ff2420005e5ccb9400909127922c4a8e69ffbb96ca5bc95786113ae475b94c2c9a6a235276e2f1b7f01010000000000007a", &(0x7f0000000000), &(0x7f0000f8b000), &(0x7f00000d5000)) mknod(&(0x7f0000cd7000)='./file0\x00', 0x103a, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000340), &(0x7f000027a000)) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000080)={0x4, 0xffffffffffffff9c, 0x1}) bind$unix(r0, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) r1 = syz_open_procfs(0x0, &(0x7f000042cff4)='personality\x00') read(r1, &(0x7f0000f1bf7e)=""/130, 0xfffffdd8) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000240)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x9, 0x18}, 0xc) open$dir(&(0x7f000050bff8)='./file0\x00', 0x2, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00', r1}, 0x10) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f00000002c0)={0x5, 0x0, 0x10000, 0x8}) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f0000000380)={0x200000005d32, r2}) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000300)=0x0) prctl$setptracer(0x59616d61, r3) 2018/03/30 10:21:41 executing program 6 (fault-call:3 fault-nth:39): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r0, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r0, &(0x7f0000000100)=""/65, 0x41) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) linkat(r0, &(0x7f0000000480)='./file1\x00', r1, &(0x7f00000004c0)='./file0\x00', 0x1000) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') unlink(&(0x7f00000000c0)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r0, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x12021) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000340)={0x8, 0x9, 0x4, 0x10000, 0x1, 0x7, 0x7fffffff, 0x0, 0x29, 0x0, 0x20}, 0xb) 2018/03/30 10:21:41 executing program 5: r0 = syz_open_dev$tun(&(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket(0x1b, 0xf, 0x4) sendmsg$nfc_llcp(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x27, 0x0, 0x1, 0x7, 0x6, 0x0, "1c61f8dc83497f3a19c4c26801201d7efe5cf595b46a62f334edad422356122ba94eeeebc5c83342c56e50c8ad1832351c94c40eeec2d428b5b08f5c4057f4", 0x12}, 0x60, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x4000}, 0x0) recvmsg$netrom(r1, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x80000000000001, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r2, 0xc0bc5310, &(0x7f00000002c0)) write(r1, &(0x7f0000000080), 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f00000001c0)=0x4) r3 = semget$private(0x0, 0x6, 0x0) unshare(0x40000) semtimedop(r3, &(0x7f00000a8000)=[{0x3, 0xfffffffffffffff9, 0x1000}], 0x1, &(0x7f0000efe000)={0x2000}) semctl$SETALL(r3, 0x0, 0x11, &(0x7f0000003000)=[0x0, 0x0, 0x0, 0x7fff]) semop(r3, &(0x7f0000fcffe2)=[{0x3}], 0x1) unshare(0x40600) ioctl$void(r0, 0x5451) r4 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x80000001) r5 = dup2(r4, r0) exit(0x40) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000180)=r2, 0x4) ioctl$TUNSETQUEUE(r5, 0x400454d9, &(0x7f00000003c0)={'erspan0\x00', 0x3fe}) 2018/03/30 10:21:41 executing program 1: mkdir(&(0x7f000082f000)='./control\x00', 0x0) r0 = creat(&(0x7f0000000080)='./control/file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000005cc0)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000005b40)=[{{&(0x7f0000000200)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000280)=""/134, 0x86}], 0x1, &(0x7f0000000380)=""/181, 0xb5, 0x4}, 0xe0}, {{&(0x7f0000000440)=@nfc, 0x80, &(0x7f0000001b80)=[{&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/185, 0xb9}, {&(0x7f0000001580)=""/200, 0xc8}, {&(0x7f0000001680)=""/108, 0x6c}, {&(0x7f0000001700)=""/189, 0xbd}, {&(0x7f00000017c0)=""/53, 0x35}, {&(0x7f0000001800)=""/223, 0xdf}, {&(0x7f0000001900)=""/233, 0xe9}, {&(0x7f0000001a00)=""/221, 0xdd}, {&(0x7f0000001b00)=""/128, 0x80}], 0xa, &(0x7f0000001c40)=""/75, 0x4b, 0x80000000000}, 0x2}, {{&(0x7f0000001cc0)=@ax25, 0x80, &(0x7f0000002f80)=[{&(0x7f0000001d40)=""/224, 0xe0}, {&(0x7f0000001e40)=""/60, 0x3c}, {&(0x7f0000001e80)=""/4096, 0x1000}, {&(0x7f0000002e80)=""/216, 0xd8}], 0x4, &(0x7f0000002fc0)=""/8, 0x8, 0x4}}, {{&(0x7f0000003000)=@can={0x0, 0x0}, 0x80, &(0x7f0000004580)=[{&(0x7f0000003080)=""/242, 0xf2}, {&(0x7f0000003180)=""/191, 0xbf}, {&(0x7f0000003240)=""/48, 0x30}, {&(0x7f0000003280)=""/101, 0x65}, {&(0x7f0000003300)=""/120, 0x78}, {&(0x7f0000003380)=""/4096, 0x1000}, {&(0x7f0000004380)=""/147, 0x93}, {&(0x7f0000004440)=""/64, 0x40}, {&(0x7f0000004480)=""/113, 0x71}, {&(0x7f0000004500)=""/71, 0x47}], 0xa, 0x0, 0x0, 0x1}, 0x4}, {{&(0x7f0000004640)=@ethernet={0x0, @remote}, 0x80, &(0x7f00000058c0)=[{&(0x7f00000046c0)=""/235, 0xeb}, {&(0x7f00000047c0)=""/239, 0xef}, {&(0x7f00000048c0)=""/4096, 0x1000}], 0x3, &(0x7f0000005900)=""/75, 0x4b, 0x8}, 0x81}, {{&(0x7f0000005980)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000005a80)=[{&(0x7f0000005a00)=""/101, 0x65}], 0x1, &(0x7f0000005ac0)=""/70, 0x46, 0x8001}, 0xa8b6}], 0x6, 0x12100, &(0x7f0000005d00)={r1, r2+10000000}) recvfrom$packet(r0, &(0x7f0000000140)=""/168, 0xa8, 0x2002, &(0x7f0000005d40)={0x11, 0x1b, r3, 0x1, 0x20, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x14) open$dir(&(0x7f00000000c0)='./control/file0\x00', 0x101000, 0x20) perf_event_open(&(0x7f0000000000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000040)='./control/file0\x00', &(0x7f0000000100)='./control/file0\x00') [ 228.389629] RAX: ffffffffffffffda RBX: 00007fefc19586d4 RCX: 00000000004548b9 [ 228.396872] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 228.404116] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 228.411358] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 228.418600] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000026 [ 228.425931] cgroup: cgroup_addrm_files: failed to add max, err=-12 2018/03/30 10:21:41 executing program 1: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) bind$ipx(r0, &(0x7f0000000200)={0x4, 0x8, 0x8, "2df269e1efff", 0x8}, 0x10) io_setup(0x20, &(0x7f000086a000)=0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x8000, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x4, 0x80) ioctl$KVM_IOEVENTFD(r2, 0x4040ae79, &(0x7f00000001c0)={0x1, &(0x7f0000000140), 0x1, r3, 0x4}) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000240)={0x0, 0x8, 0x7, 0x589f, 0x3, 0x80000000, 0x2000, 0x1, {0x0, @in6={{0xa, 0x4e22, 0x3ff, @remote={0xfe, 0x80, [], 0xbb}, 0x7ff}}, 0x4, 0xffff, 0x4, 0x8, 0x1}}, &(0x7f0000000300)=0xb0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000340)={r4, @in6={{0xa, 0x4e22, 0x8, @remote={0xfe, 0x80, [], 0xbb}, 0xf07b}}, 0x2, 0x7}, 0x90) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f00000013c0)={'ip_vti0\x00', 0x0}) setsockopt$inet_mreqn(r3, 0x0, 0x23, &(0x7f0000001400)={@multicast2=0xe0000002, @multicast2=0xe0000002, r6}, 0xc) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x400000, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r7, 0x4048ae9b, &(0x7f0000000080)={0x0, 0x0, [0x0, 0x46, 0xd1, 0x82, 0x3f, 0x7fff, 0x9]}) io_submit(r1, 0x1, &(0x7f00001b2000)=[&(0x7f0000a42fc0)={0x0, 0x0, 0x0, 0x8, 0x0, r5, &(0x7f00000bcf3f)}]) open_by_handle_at(r5, &(0x7f0000000000)={0x1d, 0x7f, "c65634f9b9baa10271a0506034eb3ef306c643306e"}, 0x2001) 2018/03/30 10:21:41 executing program 6 (fault-call:3 fault-nth:40): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r0, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r0, &(0x7f0000000100)=""/65, 0x41) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) linkat(r0, &(0x7f0000000480)='./file1\x00', r1, &(0x7f00000004c0)='./file0\x00', 0x1000) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') unlink(&(0x7f00000000c0)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r0, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x12021) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000340)={0x8, 0x9, 0x4, 0x10000, 0x1, 0x7, 0x7fffffff, 0x0, 0x29, 0x0, 0x20}, 0xb) 2018/03/30 10:21:41 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x100000000106, 0x0) writev(r0, &(0x7f000036bfd0)=[{&(0x7f0000b51000)="eb", 0x1}], 0x1) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000040)=0x4000000058) read(r0, &(0x7f0000000140)=""/1, 0xfffffffffffffeb7) 2018/03/30 10:21:41 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x4a, &(0x7f00000000c0)={@random="a3ba15256ae5", @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "15d128", 0x14, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f0000000280)) r0 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x3ff, 0x80000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000180)={{{@in6, @in6=@ipv4={[], [], @remote}}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f00000002c0)=0xe8) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) ioctl$KVM_INTERRUPT(r1, 0x4004ae86, &(0x7f0000000080)=0x4) write$fuse(r1, &(0x7f00009eb000)={0x30, 0x6, 0x0, @fuse_notify_retrieve_out={0x0, 0x0, 0x7}}, 0x30) 2018/03/30 10:21:41 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x100000000106, 0x0) writev(r0, &(0x7f000036bfd0)=[{&(0x7f0000b51000)="eb", 0x1}], 0x1) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000040)=0x4000000058) read(r0, &(0x7f0000000140)=""/1, 0xfffffffffffffeb7) 2018/03/30 10:21:41 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000, 0x0, 0x4}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000d80)={r5, 0x13c, 0x7, 0xaa5, 0x1, 0x8001}, 0x14) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000dc0)={0xaa, 0x20}) pwrite64(r1, &(0x7f0000000e00)="7437032bd6e223b3a59d10357fc245a11551c76207ed30241886ce0ea1326aeac569322a47e5909770909834b26bf6b04af3b30656cbc3e07c3eed14ee7c472c2d276872498ef33618509e2049213b9664560dc77dd302976456a0392edd116b9816cbca183c77f192c4c3260a385cc483327645104ab9987888488ff6b8e163c2eddc4fc33b9f9ba13abbb021303c8d438d96b2da7c190f9cdc9f2242c2df22ccc63b779747bc9b54e299a407b4150450352ce672efd9fd7565ffb5f410dd66a2061984a92c2ca847eb65e95168372a9e92cc53f27151c36569714d1b2b2b2d26b0e9", 0xe3, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) 2018/03/30 10:21:41 executing program 1: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@dev={0xfe, 0x80}, 0x0, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f000089b000)=0xffffffffffffffff, 0x4) connect$inet6(r0, &(0x7f000000cfe4)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x13) sendmmsg(r0, &(0x7f0000005180)=[{{0x0, 0x0, &(0x7f0000001600)}}, {{&(0x7f00000016c0)=@in6={0xa, 0x4e21, 0x7fffffff}, 0x1c, &(0x7f0000001b80), 0x0, &(0x7f0000001c00)}}], 0x2, 0x0) 2018/03/30 10:21:41 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000007c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2, 0x10010, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000700)='/dev/vcs\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000740)="3a98cdd1836ba17b3ed7523afc420a6069d4c11889fb8fa5e2171c5328170df081f282f16a1b78a37066b0b7a84e050962c2c220f962d51d2dd46c29e41ed4b9417256f51e19d10c858b08ef0b93124b0b", 0x51) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000004000)={0x6, 0x4, 0x2106, 0x3, 0x0, r0, 0x0, [0xa]}, 0x2c) io_setup(0x7, &(0x7f0000000840)=0x0) io_getevents(r3, 0x6, 0x9, &(0x7f00000003c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000500)={0x77359400}) r4 = accept(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f0000000080)=0x80) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r5, 0x111, 0x1, 0xfff, 0x4) r6 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x6, 0x1) ioctl$KVM_INTERRUPT(r6, 0x4004ae86, &(0x7f0000000280)=0x7) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f00000005c0)={0x800, {{0xa, 0x4e23, 0x7, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x19}}, 0xfffffffffffffffe}}, {{0xa, 0x4e23, 0x8, @dev={0xfe, 0x80, [], 0x14}, 0xf9}}}, 0x108) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={r6, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={r7, 0x34, 0x18}, 0xc) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x115) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x0, @rand_addr}, @in={0x2, 0x4e24, @multicast2=0xe0000002}, @in={0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}, @in6={0xa, 0x4e23, 0x2, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}, @in6={0xa, 0x4e23, 0x7, @mcast1={0xff, 0x1, [], 0x1}}, @in={0x2, 0x4e20, @broadcast=0xffffffff}, @in6={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}, @in6={0xa, 0x4e22, 0x3, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, 0x100000001}], 0xc0) r8 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$sock_SIOCBRADDBR(r6, 0x89a0, &(0x7f0000000340)='gretap0\x00') r9 = syz_open_dev$urandom(&(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x80) r10 = getpid() r11 = geteuid() getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000800)={0x0, 0x0, 0x0}, &(0x7f0000001b00)=0xc) r13 = getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000001b40)={{{@in6=@mcast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001c40)=0xe8) getgroups(0x9, &(0x7f0000001c80)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0]) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000001cc0)=0x0) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000001d00)={{{@in=@broadcast, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001e00)=0xe8) lstat(&(0x7f0000001e40)='./file0\x00', &(0x7f0000001e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(r6, &(0x7f0000001f80)={&(0x7f0000000900)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000380)=[{&(0x7f0000000980)="3494bf79f8fdbccd7fd691dfa177dad486bda6a70e5f06a1a918abcfe669b55c6b15cff317b44b66a891e570bf3e8db3a943fb94086e3c30e2c0d714630e1baa8d33f782934aeea8db0e1bfddfbb9295b0ba352d0499e21020c026c56beef54ea7759b479a5cf388ebca81459e1eff0442e6c40b3425bcfb004ec4ca10b0", 0x7e}, {&(0x7f0000000a00)="02bc36f7616330eb8fca51ba5927c5446723070908f5f53923b5d3171a071bc61868ee222bc7c5f1b5f5e7a783ed8b896320e4c9b5f2b67f54c119cde93c2d0b8b6c190c2d6e9dba6f649b1440f16bf2dec7fd7628318cfccb192deadab7a347e872b47835fc41a972b60d4b9fcb4e25005aad58309ed13efeb92b36e8ecc95407d378959e41f04df069413b8ab14d2348e0f3cb64b65a036366085d8b4cbe998dc3fabee6715f9ccd6211a785c614990b30eb1b98fdc235b885a9703d62ff56b0dc709fd67ed82621b14ee6afea95ab70ac5e1ac0", 0xd5}, {&(0x7f0000000b00)="0c7dbc39fb6c654010b5156845d6e002fef30baaff3e7036176e22f5cc08c944d0b683aebbd080ea5dc6999aa6412d852fe604e0edb0c6d27faedb0eafba18c4de26d620ba1ecab024e26465cac75dfa6c899110f4c8e717efa7bcfd2fdea066dbf2493d3f1a74e392dfc4c060f787080de863a3f6c87592a0149352481e76cf5c762ba287af410868bcbcd103c31daf6ff4c795935bce625dc37b5eb27a1f06b5b45db023bdc675ca419d7f49db92a1ad034a9853259f085055e5b98467414ba761edf6036688a73d882c1ec88d794e0e656445b6b33ccbbf209b2494a30d098446527b62c765265fff7a95b26bcf165c28f8133d2bedbc907048d3cd9786683a57822df2429569ca402f2557177dd022e30e9cdb73463ac7cd5cbc77a5dc81ab169edb9168f3cda22c3d150d815330ec629cf36dfa5e3494a0c22ea2147d5e68f0be1844fbcb715fb2a65ea1f9a8c0a0ec41d4ff76b15f61de18926a63aa6e1a2cb0567ce2bd36be644303988bd22951a5748edc5e1a792678a4d0f586b482085cad2eb3a7904b955c4a8bb4ab4f625e27c8e6fcae75866f8cc4c5d9f8b956d324c7dfb09a76947ac5b29d8a794010bbab9b053310484fd9ea2566353b9112f56e1c17828f53ab93bc6ff2e7f305fbba0bfc0136f4d27a850486a246f919751928924f1f6e5783b432d5135990e5b67c3b549d1a2d168b27baacd3c5513c0e1516542ffc29f541c463e8de710e88d358a498beb8a38fb8b1aa33fb890d71803388eb6c272732e0c78bc81ba3e904784f0e284660577d8cd8d21858ae0b4388e8710c0d31cff9b4e47011610520eda47f193ea5c82e9077e10b11c01ea49cb53d5c263d4064b6c11576475e684a66a96126d7b095ed19d5a4e15a100c62cfa3dfd5542f5e5c48773fc0124a12220ce3690c3c9ade7a7910fa716afa45cc702e8935478205c65f9968d4f28e8d36f225e06435bba797b2663b36c3e17b2adf1b0305e8db20a8f4da2f9eab865ebc439efa591213e0f822f3c0260fb7105ec26272e6ad83b178fc3a3742d5896663a98869e1bd26aaedd0b4462f91878d79969a6bdaeb785ae1a3e1cdc43af5ae58f2ea115faea8549c314596a91d6d46b25a2f35469a9c24404bcd41ddc8fb88035c80e598cda21f63f3f20163af5cbeb0f389bfa28a8b0dc67edc8c5368cbc37e219fb1e08549391e8c89242d43def98b8928fc024730e75d985ab7103169d79c75be984cf901b1879e7d8f7233bf0345cc12c0ff01681889babb02e1f667915f92bc057cc8c22abc90dc1801eeb55f908074d327258095a9ebd9c3a0cf0cf3ed8d101bca0947f8b626c07881665cf238a40d5291bbb19d65cd70cb7f3a5c6d4e5331c17793c5393a211a53d36fa00c123e4cfaa787c5ba7143b84f0bb1c36360c021893acda93226fe6cc7fc07af821fba7dad31c06ec021824a7af9cc1b01cd89524606df1f88a2317dccf22b6f313f6ae8592d773138a748c402069b04604bae153a3148d090f6bbd0d2c87f0ef5a27976a878e7ed1076e7a724d67609eca4676fc5133fa5b82452a59739262d1c008c36b5061082722e6050ed0d0bb4ed815fe2cc95c0ffd476164905eb0cbb77491ca84684b82129e4686608578dd7a907bd1c20e84562bf9516938e1b39a572d4e87a2e1189f9922471744c2963f3d64c34008e12cceeaf2621cce5d560eeb18fa3ca6d41084aabaf783c37c0dfcfa658e105332941519fb63a7151258f46be3df1330616a7f22181b161db661e81c319f6a8593742663f34813e29b905f78fd38e4a56d1bdd27091c06740b98a95e575459ae2e2ed68057387be813eda4845e0e98d572fe2ffc87d7d601b7779892c75de64416b4058295b9b08eb11bdac6223ad21fce8b5f9498d31f212a851e6729f2ae357669e91dbe12b2dd6b55d0382833fd249b08b9a865c051f6ad12ed5850feb9d9664ae651ea474f6fa0a7b516747b194296631e4401f445726cde794bed3c902401427d8851dd669c9b8b34c879c917dbeaa7353293e72a2e7f6e6fd2394749a5bb35ac3181fad96a190085c7f5f753002d542b44c4780d8dd163e388a264e3c176743b9d24a2d07ae6b80e214736aa104359159da5a723d53488c20a651f9f7b0ced8d1aeb15eca63c91b7d11438dc9cf7eb8d7102b0d44def9c6f8e41ce4aa155f18b689965239e8a7157dcd8983982c9e948aced3e3523dbc9a48969912ab04ebf41b3aea98d0348a18859b6bc1d90cc931fbc96d13ea139dd4200d2344375bc991e72047faf8ee1a57d4052c1dd71418d45fb35d2ca526a3d15fd10bd685d929d0143db7d9d11295415f15f0f744cb0e96e70d666976fc960fdc9d155cecc67137c1dafbf0161fa6dcdd36374a727a2801384e6cc5fb403fc1a0f0ef0c5691fe4f2c777ce309db0d2303feb0ca2aa06c36cdf1786f9ba4ad44f5dede4241c5c2d5172a629185c4ead1b581a6cf95c0d0886c9d3ab1365f3c4229ead28f8b8a4a9851eff1ed00588cedfff48ecc270839c86bf62026aaf3c6bcf1ca46441cdc9c6d67fd31f8f31a3fe7778887e752eb1da9c46501d289f9c877bcd6af8fb7c16def334109453577cc03598588cd18c2acdd169deb4b7336520cdb9e91131a104e2f702f4aab3ca4189464f49c6d9b08199b0279e1af3ab279b03c4a4bc7ffb90181dad33a1cade301eb163fbb992eb4bb289992ba17f4498b1e6dd4f35439af0b66bf42a86f5488ba4372ff4a3658d47b6b804f0ced03be718c4e7c611aa2d819b9dc19799a9bb19e4343242fc155071d99d6897d9b4dda0ae3a912e94d618f4fd15471666f6aa51fffac3d8f736ba8f6a715376ebab853ab7e90894ba810a9e8a80d8974a37aee1388cac67b504e35fe9dc18f6194d4f63e8a1193692827db63fde08aa3b6c83bfc233b513f7746f21e50b9af7e0ad6095877719ed7c3ffb92ed77b0e930981f579aa8b2f405094ec53c7ca8db446987e04eda9aa7e7f7de79a7e8cc7fbb5af3c51d01d1f2c5be399c926409c3d8f8a366a117981d94683fa21cf2498cb1a97e2c8f67ec6cde3f39e4e8c50adb78d596a7e4a82b051679d19a9d762832a8b4c7f6111bad896cc6102e0072f2d559282f25ddb50954481922265638bc84905dc1e1646927b99392fbbac796c3a451fc03f82fd154ffbb49b7fd732d68d624faee31c6af899092d186f2536debbdbdc6c00b5fb9cc29a7b39dcdfb881102885da5e2f88b5c7d4bd2338ab20f6794e6fe4baafb378b9d2d1e14d852a143d736a70e2194288c15e93c9931130ef59fa3f5b7580f2011a93803c08c7367b1c4104cfc0db0ef8186d6c84cf419b75b6bfc968bd37a3955ebfccdade84a5b6bc7bb49f256c04e23876a688b7af0674aceea6a975f9439b646349377f063124719430a9c91de29a01692c31a0a4e535266b55145f5985cd2d5684a5608e81ce59f2ec05266dd7cf0b7d6a294af7bf744ecf9ec19f8c3db04cebb0ddb03251367ad992379a87c1d0ec03df8aacbd68dc6c7784b755cf5390de4299f3303c864ca756f203c22b993dd1e8296956a770c491a557983902893febee42dc24d5e578862a3065264427fbe6f9f350b5475f088efe2b444beb7e0517e276953df187397013ea2082fef3d8a87a28d8fee65bb492d9c1457ac6c354720fbf22186566a255c864e57b752c2f918dfe2933b0dd6dead6f9577a3f6b9843c17d156d774f25e95a3ab77b46026911ae0d01d97b463517504faadeaf7d974b619e81ebb490901863b7e1a6993594dadba93b56d0c0e0a27c6b3a02418f8171c568e5607720f4c82fed4a8e0ae5b50d7eea70f928580e829f8b6b0a1416824e8bfa51c4c883876f047eda136fa95cdca8ce49a6d772ed740a64c8a1ac0143aa3286daab7be200a7870e66804c4d1a5dc2353741bd8c340334b05d810cae498f388643122e0af4ef1cf1d7fa4abc61d5b84f45bd2c0512cd19ac22c20294bd3f688c15b618d3275193da4a5a927df99f50113142b65ec27e90d42aa27f1442d35d15a7b031bde916e187a461e5be5c5e9f282e474e43217d3234659a7711eeca0dc6db08ec31ed956fb0578703f4336c01e4b6c18d6ec974583ef5672fbebb3ce3905b87049084a982c132c420373ff6de2a32931ca3e98b57bf2d61989b4f285b18b2028c4bdc21a74b2b15113aa7eede4a3727fcecd6b49198aa8231a04374d958c8f59fde1589373eb0d70ef64ff8f514b201ca3c307516aef4d4560a0ebf25df4e50d7fbe482a4b42de6844602acd664277e90b1086cfc9c6ec005197a70e26796c6c28be627f03ad6ca59dcb9c7f961d03bd1a259c38dde906337fb084d869600770e637fec5f5047aa84d281c01ef238d31ef5409ed64b3019ad225c3c3943426ec9020518719397553bbce52bfdc66c4f21f54e8e6d7ac0a6eb24aa4aa17c4c042cc6ca4cad975aa9c172f7e8bd5e7c2368f4c0ebc1b3fc4306090b16e39621a848c6dfdd5f79c0f35b08673664bc8e41e3b8225d6ac73cf88774aa4eb5004297f9bff9b2ef3c3aa28dc72ddd27844b62dffa36b21afec66a81a97d686cf4b7ae7721d630ef4914f0849bb1f282db32443cd4f666d9e11c5f55a641b09777ff66925b54942df7548d0aebe5e96961361f10b89e60eedeb76f7505b8c814bcc59f9f85793759472a78a5ba27f85a5361be1ed10d86b25b44eae1db2b45c24a2698bf59125d4167f1000d94d8b11cd03dd7eafcd78a5028f2f3abc87cb447f99db4b51e9dc7ad3ccb7d66c7801e717185fffbfd063ac8ce15a403854b1eb140d99a5a15e46b8045750b634dfa639ae63978093f94e3f9d05a5c3e7fb26074d31495f68f4653c60b0d8ec100a85c2714d8d8060a456fb2891c40089edbc44c0c6cc0feccce04e40f2921b6e4d24976e44891da1a3d2be655d6b1b37c923aa4028d3894cd8fa5627286c95fb5167f4d23b5451c40952f6fe4b144af3fd79482dd6336d4c07d79270ba63c97949c20dbc90a1c0a7ce6ab535a59ec285a1341011c63c36aecda45ac19f4c8a91cf496134ce4c18c76390bd004c95c18e82f01512248009d345a44c4633352e130d42059744cf0d5efce280c363c480b1b53fe916b2015d3ce7f7c3e7e0e773aae7453186f772e65bd8b99631bfcd196e13762860837478ae125f6749f996f81bd4c4580827bab3db3d8724a11a8ad066c9a80f99a5e48db892bf333407adf2fbf40d152aca6328a362e1c9ef625bbb01d3ce2a06a83a1db0c23b70349df58fceec9d88bb95b8db54d5b3c7ea5b51446612e73c6c3e97557a467ebc341ff9824ab6550982025f52d55b951595eb68cd36bcbf9156ecbfd0bfc1df5a82fd80c4c17763b51111f46eef71de84063042eb141e352211e6003db032ed6e88efce6b456373bc54d7f43bda09ef543728476712785618acafa5be262a72855e4f54df7cadbb2dd836784d5949a3426e1c388f822e16b9759dade4b2984fc2060c34634f004bd5fc78a31cd712f6d5bf5ed837cf277890fde0e17b3def5e4e08e94a28cbed992b5e7c656189867d852b8897a4aac020e90a61b3a0450111ada3b12b541de1db75037724845b3137c1c263426a7ac7387caf0605b5127fedc596a738c82313bae5325697e9fe147ec8618eee2dd480c7b196554b5a39ab9db81f3b1196140c4c859003cf2b4eb8860bb1d9e3e18d60bd923adb51c8573a8805d66ec778c7bc7f30eee46d208516bcf7ec56fe0aa28dbc247bdd11e12bdfb02f76a84bb12838b5a3769af", 0x1000}], 0x3, &(0x7f0000001f00)=[@cred={0x20, 0x1, 0x2, r10, r11, r12}, @rights={0x20, 0x1, 0x1, [r8, r9, r5, r5]}, @cred={0x20, 0x1, 0x2, r13, r14, r15}, @cred={0x20, 0x1, 0x2, r16, r17, r18}], 0x80, 0x20000004}, 0x4) openat$cgroup_subtree(r0, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r8, 0x8955, &(0x7f0000000880)={{0x2, 0x4e22, @multicast1=0xe0000001}, {0x306, @random="b343edbad456"}, 0x30, {0x2, 0x4e20, @rand_addr=0xfffffffffffffffb}, 'ip6_vti0\x00'}) setsockopt$inet_sctp_SCTP_NODELAY(r5, 0x84, 0x3, &(0x7f0000000540)=0x30f8, 0x4) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x11, r5, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='rdma.current\x00', 0x0, 0x0) dup(r0) 2018/03/30 10:21:41 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000780)=[{&(0x7f0000000400)="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", 0xfc}], 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x200900, 0x103) connect$vsock_stream(r0, &(0x7f0000000600)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) r1 = socket$alg(0x26, 0x5, 0x0) rt_sigtimedwait(&(0x7f0000000140)={0xffffffff}, 0x0, &(0x7f0000000180), 0x8) bind$alg(r1, &(0x7f000073e000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(cbc-twofish-avx)\x00'}, 0x58) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000500)={&(0x7f00000005c0)=[0x0, 0x0, 0x0], 0x3}) nanosleep(&(0x7f0000d1e000)={0x0, 0x1c9c380}, &(0x7f0000000000)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r2, 0x118, 0x0, &(0x7f0000000100)=0x7, 0x4) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000000c0)={0x1, 0x1, 0x1, 0x1, 0x0, 0x6}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000280)={r3, @in={{0x2, 0x4e23, @multicast2=0xe0000002}}, [0x8000, 0x9, 0x80000000, 0x3, 0x80, 0x8001, 0x800, 0x100, 0xe0db, 0x0, 0x2000000000, 0x200, 0x68, 0x0, 0x8]}, &(0x7f0000000380)=0x100) r4 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000fb6000)=""/28, 0xfffffffffffffdfa) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port1\x00', 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r4, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r5 = gettid() r6 = syz_open_procfs(r5, &(0x7f00000002c0)='maps\x00') readv(r6, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/28, 0x65}], 0x1) exit(0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r6, &(0x7f000004ffe0)=[{&(0x7f0000000000)=""/128, 0xe6}], 0x222) r7 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) connect$ax25(r2, &(0x7f00000006c0)={0x3, {"fc5da504005009"}, 0x7fff}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) getsockopt$netrom_NETROM_T1(r7, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r4, 0x80045301, &(0x7f0000000700)) [ 228.705161] bond0 (unregistering): Released all slaves [ 229.425551] IPVS: ftp: loaded support on port[0] = 21 [ 229.710203] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 230.129055] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 230.135147] 8021q: adding VLAN 0 to HW filter on device bond0 [ 230.179670] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 230.223936] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 230.230109] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 230.238128] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 230.256827] FAULT_INJECTION: forcing a failure. [ 230.256827] name failslab, interval 1, probability 0, space 0, times 0 [ 230.268075] CPU: 1 PID: 28281 Comm: syz-executor6 Not tainted 4.16.0-rc7+ #371 [ 230.275417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 230.284745] Call Trace: [ 230.287312] dump_stack+0x194/0x24d [ 230.290919] ? arch_local_irq_restore+0x53/0x53 [ 230.295573] should_fail+0x8c0/0xa40 [ 230.299262] ? kstrdup+0x39/0x70 [ 230.302630] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 230.307707] ? cgroup_apply_control_enable+0x390/0xbc0 [ 230.312957] ? kernfs_iop_mkdir+0x153/0x1e0 [ 230.317252] ? vfs_mkdir+0x390/0x600 [ 230.320949] ? SyS_mkdirat+0x22b/0x2b0 [ 230.324813] ? do_syscall_64+0x281/0x940 [ 230.328848] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 230.334201] ? find_held_lock+0x35/0x1d0 [ 230.338243] ? find_held_lock+0x35/0x1d0 [ 230.342284] ? __lock_is_held+0xb6/0x140 [ 230.346339] ? check_same_owner+0x320/0x320 [ 230.350638] ? rcu_note_context_switch+0x710/0x710 [ 230.355544] ? rcu_read_lock_sched_held+0x108/0x120 [ 230.360542] should_failslab+0xec/0x120 [ 230.364493] kmem_cache_alloc+0x47/0x760 [ 230.368529] ? memcpy+0x45/0x50 [ 230.371785] ? kstrdup+0x59/0x70 [ 230.375129] __kernfs_new_node+0xe2/0x570 [ 230.379255] ? kernfs_dop_revalidate+0x380/0x380 [ 230.384000] ? snprintf+0xc0/0xf0 [ 230.387432] ? vsprintf+0x40/0x40 [ 230.390859] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 230.395769] ? cgroup_file_name+0x1d0/0x1d0 [ 230.400067] kernfs_new_node+0x80/0xe0 [ 230.403935] __kernfs_create_file+0x4b/0x320 [ 230.408325] cgroup_addrm_files+0x3c5/0xa70 [ 230.412637] ? cgroup_file_write+0x710/0x710 [ 230.417024] ? cpu_cgroup_css_alloc+0x30/0x30 [ 230.421511] ? __lock_is_held+0xb6/0x140 [ 230.425552] ? sched_online_group+0x4e0/0x4e0 [ 230.430022] ? cpu_cgroup_css_online+0x3a/0x50 [ 230.434581] ? online_css+0x224/0x2e0 [ 230.438360] css_populate_dir+0x198/0x420 [ 230.442488] cgroup_apply_control_enable+0x390/0xbc0 [ 230.447577] ? cgroup_propagate_control+0x570/0x570 [ 230.452577] ? css_populate_dir+0x289/0x420 [ 230.456881] cgroup_mkdir+0x56f/0xfc0 [ 230.460653] ? __lock_is_held+0xb6/0x140 [ 230.464696] ? cgroup_destroy_locked+0x750/0x750 [ 230.469428] ? rcu_read_lock_sched_held+0x108/0x120 [ 230.474418] ? kmem_cache_free+0x258/0x2a0 [ 230.478633] ? set_nlink+0xc1/0x160 [ 230.482236] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 230.487139] ? generic_permission+0x105/0x3c0 [ 230.491615] ? cgroup_destroy_locked+0x750/0x750 [ 230.496348] kernfs_iop_mkdir+0x153/0x1e0 [ 230.500473] vfs_mkdir+0x390/0x600 [ 230.503994] SyS_mkdirat+0x22b/0x2b0 [ 230.507691] ? SyS_mknod+0x480/0x480 [ 230.511380] ? trace_hardirqs_on+0xd/0x10 [ 230.515505] ? do_syscall_64+0xb7/0x940 [ 230.519457] ? SyS_mknod+0x480/0x480 [ 230.523149] do_syscall_64+0x281/0x940 [ 230.527009] ? __do_page_fault+0xc90/0xc90 [ 230.531226] ? finish_task_switch+0x1c1/0x7e0 [ 230.535694] ? syscall_return_slowpath+0x550/0x550 [ 230.540598] ? syscall_return_slowpath+0x2ac/0x550 [ 230.545506] ? prepare_exit_to_usermode+0x350/0x350 [ 230.550497] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 230.555838] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 230.560665] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 230.565828] RIP: 0033:0x4548b9 2018/03/30 10:21:43 executing program 5: socket(0x9, 0x803, 0xffffffffffffffff) 2018/03/30 10:21:43 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) bind(r0, &(0x7f00008a1f80)=@generic={0x42001e, "01030000000000b9000000004700000000a979f321b30c7bc8790405c7bad62e0a63a632ed4938d36d64fb8f8401a3ff59829a2b0afe7ce43a5b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31510000500000000000bdb9c8ea31000077aeb81c90001d6f7c980400000000f70dc136cb184a"}, 0x80) socket(0x1e, 0x1, 0x0) close(r0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) add_key$user(&(0x7f0000c24ffb)='user\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000200)="600001e3a255ec4a8d9d652d0527abdffd0587e50ec159997396abc344a7d9f542a3e3af2d90a5df424d68996f51a7b3f20108f152bfd57ac5a50be84a106249abbfc5b3f2e96bf3039474801001807fbf00000000000000000000000000000000", 0x61, r2) add_key$user(&(0x7f0000ef5000)='user\x00', &(0x7f00008fa000)={0x73, 0x79, 0x7a}, &(0x7f0000537ffd)="0003", 0x2, r2) add_key$user(&(0x7f0000688000)='user\x00', &(0x7f00008d9ffb)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000f19edc)="b33ab76079ebe0d14f729cd653e520d29ad7ef0000000000000044c249b544230b9387fb8bd6ed266ccf59ef70995bf2e8e0ecd3fff32853747eda22d2818d08ca27e0ec821620e365a0e6b9485f2d925493f62113e33e5f8c7eba67fc19a9497f5b07e5849d2e875b066cd6401d36616fe0f3c3002801b4627ee7597689525e8e81f750a86eb580fb4690ea52246bd3", 0x90, r2) request_key(&(0x7f0000a98ffb)='user\x00', &(0x7f0000626000)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)="2f6465612f7675746f66730719", r1) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'sit0\x00'}, 0xffffffffffffff09) socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$midi(&(0x7f0000000380)='/dev/midi#\x00', 0x20000000cdfb, 0x20020) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000035c0)={'teql0\x00'}) r3 = memfd_create(&(0x7f0000000080)='dev ', 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r3, 0x0, 0x0, 0x0) fchmod(r3, 0x0) r4 = syz_open_dev$tun(&(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) r5 = socket(0x0, 0x3, 0x0) recvmsg$netrom(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) write(r5, &(0x7f0000000080)="240000005a005f191415f507125a00000903210308001000fff708", 0x1b) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={"d202b999cf850000000000a8f301e710", 0x106}) r6 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x80000001) r7 = dup2(r6, r4) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000000)={'vlan0\x00', 0x400}) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000240)={@empty, @multicast1, @remote}, &(0x7f0000000280)=0xc) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 2018/03/30 10:21:43 executing program 7: clone(0x200, &(0x7f0000000100)="f0f7d70fc52207334efb558c957ea5882b23d85fa1659dc13aa7603b45aa407f02117308b1a8697bcf6617a98d145ec63b3cffa3123c2b94a42831af8d9bdb4b03d2954fdaa7e037f2c459a27e42921a924df6c5899ef4dbdb44bffbadd515d6024b7e3450b4ea54c55a229f4d694a292b270018a408b9ed54a0bc1929156ff004c1cf0b1728065c1ae04f4eeb552ff2420005e5ccb9400909127922c4a8e69ffbb96ca5bc95786113ae475b94c2c9a6a235276e2f1b7f01010000000000007a", &(0x7f0000000000), &(0x7f0000f8b000), &(0x7f00000d5000)) mknod(&(0x7f0000cd7000)='./file0\x00', 0x103a, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000340), &(0x7f000027a000)) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000080)={0x4, 0xffffffffffffff9c, 0x1}) bind$unix(r0, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) r1 = syz_open_procfs(0x0, &(0x7f000042cff4)='personality\x00') read(r1, &(0x7f0000f1bf7e)=""/130, 0xfffffdd8) dup3(r1, r1, 0x80002) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000240)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x9, 0x18}, 0xc) syz_open_dev$admmidi(&(0x7f0000000240)='/dev/admmidi#\x00', 0x7, 0x10000) open$dir(&(0x7f000050bff8)='./file0\x00', 0x2, 0x0) 2018/03/30 10:21:43 executing program 3: syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x200) r0 = syz_open_dev$tun(&(0x7f0000433ff3)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x2) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x14) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f000021f000)=r1) 2018/03/30 10:21:43 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x100000000106, 0x0) writev(r0, &(0x7f000036bfd0)=[{&(0x7f0000b51000)="eb", 0x1}], 0x1) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000040)) read(r0, &(0x7f0000000140)=""/1, 0xfffffffffffffeb7) 2018/03/30 10:21:43 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000, 0x0, 0x4}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000d80)={r5, 0x13c, 0x7, 0xaa5, 0x1, 0x8001}, 0x14) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000dc0)={0xaa, 0x20}) pwrite64(r1, &(0x7f0000000e00)="7437032bd6e223b3a59d10357fc245a11551c76207ed30241886ce0ea1326aeac569322a47e5909770909834b26bf6b04af3b30656cbc3e07c3eed14ee7c472c2d276872498ef33618509e2049213b9664560dc77dd302976456a0392edd116b9816cbca183c77f192c4c3260a385cc483327645104ab9987888488ff6b8e163c2eddc4fc33b9f9ba13abbb021303c8d438d96b2da7c190f9cdc9f2242c2df22ccc63b779747bc9b54e299a407b4150450352ce672efd9fd7565ffb5f410dd66a2061984a92c2ca847eb65e95168372a9e92cc53f27151c36569714d1b2b2b2d26b0e9", 0xe3, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) 2018/03/30 10:21:43 executing program 6 (fault-call:3 fault-nth:41): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r0, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r0, &(0x7f0000000100)=""/65, 0x41) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) linkat(r0, &(0x7f0000000480)='./file1\x00', r1, &(0x7f00000004c0)='./file0\x00', 0x1000) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') unlink(&(0x7f00000000c0)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r0, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x12021) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000340)={0x8, 0x9, 0x4, 0x10000, 0x1, 0x7, 0x7fffffff, 0x0, 0x29, 0x0, 0x20}, 0xb) 2018/03/30 10:21:43 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000780)=[{&(0x7f0000000400)="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", 0xfc}], 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x200900, 0x103) connect$vsock_stream(r0, &(0x7f0000000600)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) r1 = socket$alg(0x26, 0x5, 0x0) rt_sigtimedwait(&(0x7f0000000140)={0xffffffff}, 0x0, &(0x7f0000000180), 0x8) bind$alg(r1, &(0x7f000073e000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(cbc-twofish-avx)\x00'}, 0x58) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000500)={&(0x7f00000005c0)=[0x0, 0x0, 0x0], 0x3}) nanosleep(&(0x7f0000d1e000)={0x0, 0x1c9c380}, &(0x7f0000000000)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r2, 0x118, 0x0, &(0x7f0000000100)=0x7, 0x4) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000000c0)={0x1, 0x1, 0x1, 0x1, 0x0, 0x6}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000280)={r3, @in={{0x2, 0x4e23, @multicast2=0xe0000002}}, [0x8000, 0x9, 0x80000000, 0x3, 0x80, 0x8001, 0x800, 0x100, 0xe0db, 0x0, 0x2000000000, 0x200, 0x68, 0x0, 0x8]}, &(0x7f0000000380)=0x100) r4 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000fb6000)=""/28, 0xfffffffffffffdfa) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port1\x00', 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r4, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r5 = gettid() r6 = syz_open_procfs(r5, &(0x7f00000002c0)='maps\x00') readv(r6, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/28, 0x65}], 0x1) exit(0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r6, &(0x7f000004ffe0)=[{&(0x7f0000000000)=""/128, 0xe6}], 0x222) r7 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) connect$ax25(r2, &(0x7f00000006c0)={0x3, {"fc5da504005009"}, 0x7fff}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) getsockopt$netrom_NETROM_T1(r7, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r4, 0x80045301, &(0x7f0000000700)) [ 230.568991] RSP: 002b:00007f470803fc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 230.576674] RAX: ffffffffffffffda RBX: 00007f47080406d4 RCX: 00000000004548b9 [ 230.583917] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 230.591172] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 230.598415] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 230.605656] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000028 [ 230.613140] cgroup: cgroup_addrm_files: failed to add max, err=-12 2018/03/30 10:21:43 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x4031, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r1, 0x10, &(0x7f0000000140)={0x8}) ppoll(&(0x7f0000000040)=[{r0, 0x4000}, {r0, 0x80}, {r0}], 0x3, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)={0x4}, 0x8) futex(&(0x7f0000012ffc), 0x80, 0x0, &(0x7f0000060ff0), &(0x7f00003cfffc), 0x0) 2018/03/30 10:21:43 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x200200003e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, 0x1f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = syz_open_dev$sndmidi(&(0x7f0000000080)='/dev/snd/midiC#D#\x00', 0x9, 0x40000) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000200)={0x2, 'ip6_vti0\x00'}, 0x18) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r2, 0xc08c5336, &(0x7f0000000100)={0x200, 0x1, 0x4, 'queue0\x00', 0x7fff}) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f00000001c0)=0x5) sendmsg$nl_netfilter(r1, &(0x7f0000065fc8)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000fd1000)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000000b06ffff000000000000000000000000"], 0x14}, 0x1}, 0x0) ioctl$TIOCEXCL(r2, 0x540c) 2018/03/30 10:21:43 executing program 6 (fault-call:3 fault-nth:42): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r0, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r0, &(0x7f0000000100)=""/65, 0x41) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) linkat(r0, &(0x7f0000000480)='./file1\x00', r1, &(0x7f00000004c0)='./file0\x00', 0x1000) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') unlink(&(0x7f00000000c0)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r0, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x12021) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000340)={0x8, 0x9, 0x4, 0x10000, 0x1, 0x7, 0x7fffffff, 0x0, 0x29, 0x0, 0x20}, 0xb) [ 230.864875] bond0 (unregistering): Released all slaves [ 231.533949] IPVS: ftp: loaded support on port[0] = 21 [ 231.825349] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 232.245543] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 232.251645] 8021q: adding VLAN 0 to HW filter on device bond0 [ 232.297952] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 232.341150] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 232.347305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 232.354359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 232.371233] FAULT_INJECTION: forcing a failure. [ 232.371233] name failslab, interval 1, probability 0, space 0, times 0 [ 232.382497] CPU: 0 PID: 28485 Comm: syz-executor6 Not tainted 4.16.0-rc7+ #371 [ 232.389842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 232.399183] Call Trace: [ 232.401756] dump_stack+0x194/0x24d [ 232.405374] ? arch_local_irq_restore+0x53/0x53 [ 232.410027] should_fail+0x8c0/0xa40 [ 232.413716] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 232.418816] ? find_held_lock+0x35/0x1d0 [ 232.422866] ? __lock_is_held+0xb6/0x140 [ 232.426917] ? check_same_owner+0x320/0x320 [ 232.431217] ? rcu_note_context_switch+0x710/0x710 [ 232.436131] should_failslab+0xec/0x120 [ 232.440083] __kmalloc_track_caller+0x5f/0x760 [ 232.444645] ? string+0x180/0x200 [ 232.448074] ? kstrdup_const+0x39/0x50 [ 232.451940] kstrdup+0x39/0x70 [ 232.455107] kstrdup_const+0x39/0x50 [ 232.458799] __kernfs_new_node+0xa2/0x570 [ 232.462923] ? kernfs_dop_revalidate+0x380/0x380 [ 232.467651] ? delete_node+0x2db/0xbc0 [ 232.471522] ? snprintf+0xc0/0xf0 [ 232.474949] ? vsprintf+0x40/0x40 [ 232.478384] kernfs_new_node+0x80/0xe0 [ 232.482250] __kernfs_create_file+0x4b/0x320 [ 232.486643] cgroup_addrm_files+0x3c5/0xa70 [ 232.490952] ? cgroup_file_write+0x710/0x710 [ 232.495348] ? cgroup_idr_replace+0x3f/0x50 [ 232.499649] ? __lock_is_held+0xb6/0x140 [ 232.503691] ? __local_bh_enable_ip+0x121/0x230 [ 232.508337] ? online_css+0x224/0x2e0 [ 232.512117] css_populate_dir+0x198/0x420 [ 232.516244] cgroup_apply_control_enable+0x390/0xbc0 [ 232.521331] ? cgroup_propagate_control+0x570/0x570 [ 232.526331] ? css_populate_dir+0x289/0x420 [ 232.530657] cgroup_mkdir+0x56f/0xfc0 [ 232.534432] ? __lock_is_held+0xb6/0x140 [ 232.538476] ? cgroup_destroy_locked+0x750/0x750 [ 232.543207] ? rcu_read_lock_sched_held+0x108/0x120 [ 232.548198] ? kmem_cache_free+0x258/0x2a0 [ 232.552410] ? set_nlink+0xc1/0x160 [ 232.556020] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 232.560926] ? generic_permission+0x105/0x3c0 [ 232.565399] ? cgroup_destroy_locked+0x750/0x750 [ 232.570130] kernfs_iop_mkdir+0x153/0x1e0 [ 232.574259] vfs_mkdir+0x390/0x600 [ 232.577782] SyS_mkdirat+0x22b/0x2b0 [ 232.581476] ? SyS_mknod+0x480/0x480 [ 232.585160] ? trace_hardirqs_on+0xd/0x10 [ 232.589285] ? do_syscall_64+0xb7/0x940 [ 232.593235] ? SyS_mknod+0x480/0x480 [ 232.596928] do_syscall_64+0x281/0x940 [ 232.600790] ? __do_page_fault+0xc90/0xc90 [ 232.605000] ? _raw_spin_unlock_irq+0x27/0x70 [ 232.609474] ? finish_task_switch+0x1c1/0x7e0 [ 232.613946] ? syscall_return_slowpath+0x550/0x550 [ 232.618849] ? syscall_return_slowpath+0x2ac/0x550 [ 232.623754] ? prepare_exit_to_usermode+0x350/0x350 [ 232.628746] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 232.634089] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 232.638913] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 232.644074] RIP: 0033:0x4548b9 [ 232.647247] RSP: 002b:00007f5c9379fc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 232.654937] RAX: ffffffffffffffda RBX: 00007f5c937a06d4 RCX: 00000000004548b9 [ 232.662179] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 232.669425] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 232.676668] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 232.683910] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 000000000000002a 2018/03/30 10:21:45 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000, 0x0, 0x4}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000d80)={r5, 0x13c, 0x7, 0xaa5, 0x1, 0x8001}, 0x14) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000dc0)={0xaa, 0x20}) pwrite64(r1, &(0x7f0000000e00)="7437032bd6e223b3a59d10357fc245a11551c76207ed30241886ce0ea1326aeac569322a47e5909770909834b26bf6b04af3b30656cbc3e07c3eed14ee7c472c2d276872498ef33618509e2049213b9664560dc77dd302976456a0392edd116b9816cbca183c77f192c4c3260a385cc483327645104ab9987888488ff6b8e163c2eddc4fc33b9f9ba13abbb021303c8d438d96b2da7c190f9cdc9f2242c2df22ccc63b779747bc9b54e299a407b4150450352ce672efd9fd7565ffb5f410dd66a2061984a92c2ca847eb65e95168372a9e92cc53f27151c36569714d1b2b2b2d26b0e9668aa5042a767ab8", 0xeb, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) 2018/03/30 10:21:45 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000868ff3)='/dev/snd/seq\x00', 0x0, 0x8000040000105) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000040)={0x6, r0}) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f00000001c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="1f000900ce8bd0c46a189e007ca503c4c8d3bac14b29eef0c3dcbe05c48aeef2b863f8"], &(0x7f0000000200)=0x27) futimesat(r2, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={{}, {0x0, 0x2710}}) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000240)=@sack_info={r3, 0x2, 0x9d}, &(0x7f0000000280)=0xc) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000080)={0xbeeb, 0x4, 0x1, 0x7fffffff, 0x1, 0x7, 0x8, 0xfffffffffffffff7, 0x0}, &(0x7f00000000c0)=0x20) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000100)={r4, 0x5c, "fce2d55ca37971e0714fe72530675190e9b2ea0ea4ced077b18cc60f2f0326188f870740fcb5dbef1acccf59ef2225497b6e5ac6e00ae10951515a1393f367e5bf10f4696f3967a2bad7b180cd27124afc064d95e38b16eb90a98821"}, &(0x7f0000000180)=0x64) write$sndseq(r1, &(0x7f0000e6ffd0)=[{0x0, 0x0, 0x0, 0xfffffffffffffffe, @time={0x77359400}}], 0x30) 2018/03/30 10:21:45 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x100000000106, 0x0) writev(r0, &(0x7f000036bfd0)=[{&(0x7f0000b51000)="eb", 0x1}], 0x1) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000040)) read(r0, &(0x7f0000000140)=""/1, 0xfffffffffffffeb7) 2018/03/30 10:21:45 executing program 7: clone(0x200, &(0x7f0000000240)="f0f7d70fc52207334efb558c957ea5882b23d85fa1659dc13aa7603b45aa407f02117308b1a8697bcf6617a98d145ec63b3cffa3123c2b94a42831af8d9bdb4b03d2954fdaa7e037f2c459a27e42921a924df6c5899ef4dbdb44bffbadd515d6024b7e3450b4ea54c55a229f4d694a292b270018a408b9ed54a0bc1929156ff004c1cf0b1728065c1ae04f4eeb552ff2420005e5ccb9400909127922c4a8e69ffbb96ca5bc95786113ae475b94c2c9a6a235276e2f1b7f01010000000000007a", &(0x7f0000000000), &(0x7f0000f8b000), &(0x7f00000d5000)) r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xfff, 0x81) r1 = dup2(r0, r0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={r1, 0xffffffffffffff8f, &(0x7f00000003c0)}, 0x10) mknod(&(0x7f0000cd7000)='./file0\x00', 0x103a, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000340), &(0x7f000027a000)) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000080)={0x4, 0xffffffffffffff9c, 0x1}) bind$unix(r2, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) r3 = syz_open_procfs(0x0, &(0x7f000042cff4)='personality\x00') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r3, 0x0, 0x1000, 0x4f, &(0x7f0000000440)="422ab2a3a6c4ec573fb19726a1c0efbf3aa2371dfc54adfea8ecc4f203fc6f384bdd5c38eff6eb6e3adeba226a82fcbcfef78dcac5723f1a8feebac2a7ccd002a1230ee481c956716243147d52932a08ca6f553814b737c50895e930054f9777d9342e0fa7385b570d31582dbd6156ea6eff58d900a816574e556dac917b27b22e4df6acb7858f0df68b5def841f1783cd784cdf5a53f5e50d4f8d47d6f1f8b8bc6a5770afe0e866223c8498efb651c1257246679bb1c561fe39d060374e98fdcb756f4494f7c444b2c175b27a9d226263f13e142f7e8634a9a2d05f28d9fa626f96b726c94a665eaf4a5c14aacf2b75ca983b07e0574d3c558ac46426c62809c8f96e7e682d5473b5fbc3cd782fa81f3387ce9a99bab1b7791bc3a70f206928002bf96e07a3c42faf8ca3875c27a3b361a3b287cb6a76a7dde2a29d10b621a89a122b9df3aca301d12a423fffbdff0d150d776b97f7628b5cf4aa39e9d7ff25c28851b0656acf76a25bee68afce3630a80b0b34bd62f15812ad8dc89362ae9ac3a96b69cb6238daa1324890568f88fa15f9d46dc02233a4dcc4933cabb9a622e28142d9f52004ff5eb5593b8a420c01baa8af1c297c243d281901e37739e67cda4d257562aca5a05c6ad4f836599d1b4909caf0d1dc427bbc7a8663d389534b689afdb836e62ed220db49289d4f67d8e2438b5b27587df6b138ef6871a55e088e1891743c4be47df3758daad4aae13f2fbc66744b41daffe61298fa27667175696a99db12592dccfe057e88c76cf803815b721c2f1d7d35158c2b40a1d766dd2badb5a8e1e6812734e1c348475d5f6b7543616974b71f46fe50469d537feb4138c8b11d30834ea23df41a4bfad8963ac8f9a54d0412697862664df2651e06810e0443fa2aa9d02b37cdd0f74a901eac91517430db0a7dc8c85cf5ef5c26912a1e23de5637169496e8f042e6cfd5c1719237b957912ce50d9548e55e8a22bae536e9b7565484d4326e8047bf45cd24557b3327261d7804f3f5ca1665735d0bcb6940b5827660ea39061a6a0b82eb0d21c3b479570b2bcb3c22ae2220199507234339b43a3b0fbfa03235d0de1fc267837ad47f2c2601ace3b7c3d5c4f86ca7acb49e01fa6b10858cc05bc4139749c8d566a77fc85a998ed76ecf65a662c2ce689938823b67957c2c7f71a0d510cd4d307567b596002f22d6b1f846e90e70672764e4c1c997c92ad442c11dbfccfb9e1fc906624ad7e13bc7bd009c296b63019766c168adf1c942180405edaa1a08d16824c08c0e65a150ad0eda6be1ae6c38b8bfbdee68dd7e0b4ef20b9cf5ad5c34a737958f754d9aa2f18a932a2bbdcefa84f9e4e71ec161a2876984b0942cc15362f1411d75b846dde7dffb49da21f367e8ffe69cf2885653a5253d5a6cf5fb5721c53eae76a5aa05c6fe9a5615c4290eefa2058e6e77102b2af17be9ad622696c2ccf256ddb7604ce8ba34194818063f42d1a049e1d9cba1094d8cbb0b1e9588f1b57f8fd2d7ae8b410747be989deb94306f635fb5ae886cafb3b8f702f6c99bb0ab2594aa94e48c2d646fda117b6ed5dc4807dbf2e1e4ad154b3fa31a93f0b096e4ca590d0b71c810e7dbbb44253e71078a62e275a405ae39cd3b896395646683f2d8de97ca6eff57a42f468f8280e5fd15d9686df4e6c8848fd122b33f0dd7adfc2027631ffcc50a9e38a8ef74999d6c6fe8b2bff99b3cdfe6a4de24045309c37e9e32ec312ad905eeb67615b333426166343c481e897215b5b0f3936a3fa0f939731778fd051e1b011b2db79287257545a394e68d3940edb7408025eb869ba0275b5c209a5d1dc173d7da74d01c0cccac8449ab628b92bb6901f45e153c5bba75f8c6675addbf97d463f22f682961f1326b010533c1e8915c71524083aa0d58e5e9bb6be17ac58e5dd6d81098feeddeea6060d0b95484bf63354efad4e3f250b1c83302f38ec765d920049b863b9d6435e5c5c41d91fe886bacee538eed13d7af0a2a3c0e32dc1d0832e1eb2664cc00bb7414452d469b7ec94405565cd0b05b64cb70699d17bc7a7dd5ba3124a6353b91bee9be2c49d107cbbcf775ea13b86673d2338aa13463f9e082ce4a8705ea6f84e74b23b57343dd0bdc61901d859b6721f342a1e96e3680ef2191a100a2f85fb628dbf4f6085310269d10db13c62e5d0bd418e1802f2aca80e16c3df3e50b94850f7a1e813de58645236c0735237ffd0ecaf902f1407371b7b2db15517d255aa112ea4ebdad83e5d42fcfe72bc04b2630e0e1a6af3887e72bb287176a929aaf5e7357327b0da5b60a47833b362fc1b9d1403e1730063c3ef47c7e66001325c3f1fba90dce959715f1942c22300e2c52e4c5b79c73a8d305cf2a458b3e231e823b0ec0d9c57ae18fd50034d8b4c1147826501fa929ba7300eea45681c432acf96240bd514d4b2d08ba20ef4e21d43d1906eacbf52ff559b9e287011db35b1b43c95547d88f4f6e303469e664afee88dd48637e1692b4cbe70d516be3100382b1418a603787b2f3c55211d4d1afd84ff580de8bfaf1bc13f249cf8c8474b1339e46be94127dbc0e106e5f067091fda88933b7fcab485a42d33dbb391f3a7884e6314a12188b63552822ab464655f2765eceb88ae754dbc9840002e6626e503690c9c4c76ee0ef253e28acd7729e0533c10bbb94f29099ce188ee4bb535842fc6d3d1aeba1a3c2c2a53fe8da93a35ccd9bbbb76203ea8d2c6c78e4c4954c92005fbee6caea5e5c3a2f76226ac9364b7b036cf679a1548a093f65ad11cdd6a1a0ffd88620d8feae79d7363c9e2a64b6835dc19642b1df15b00629bebb7689be3972feccafe8862d7dc565d1da8f0ac733ca4df491560a6b6c776216550cc87bef44525ca8ac5c2d33942c13a7c8b3c15fe77cb1f4fe4f442d709a0c43f877e514e1b36a9cb844c3c3deae414577982c18a67179483546e0b5ee933daa8e767b6c2d707fdab11f8b384daf9f4c57a4d6e0a6d974ecfc87c1e44549b44d46e84d522d87aaad81f0a8ecef2210ddfa299dae4265e2a5479e0bbaa62094e9cb58a999b8d186d9152f7520133cfaebf177d7400a37361cdce117347a571bfd2c10c8b76eaea6061fb16d72019b48cbef5697b8303fa08d7a23e54366e1fd39d45bd0fbda77c329f5affa411386e9e948fc975a713f179e51df3aec6d53b4a39e3e8a7a74586ba31046762aa29b55e0ec84b6111d38b669229059334defaa5d18b2294a6ed80dce57d0ecfb417797ee09cdddf315957106d266cf2d223983946cfb60bac2273a0241497d4ce7918a5b64cdb4ff1acc7e5fcbad9d7ca665af5ef9d3b370e1fbb851d784b510ea5879a1597cfe59b491ef956c66ea73469e1b825c5b278721313aac74ae7a8736561e85fd1e3842d20b13a59f3d049a36bfaf9551ab5c3cf400f9f52203ac1c290526057ac80033cd6fcd31217072495dcf75192669fbbd71554a4fa840373f56259e61521f87278527398e5afb7af2730382aa3a408c2882f4070f6d6949246c12b86fd7da8e9207950bb5ba8e7d12cff8423d418af805978c2bb84113a2e02b552d4747fa0c26362cba6e8e9e72e3a3865feb2d7e8515cf0302a1c77fcb88aa6f5a7494642e2cb66552af22e2da2b60ef8864c5ab6ddccc9bb54a0480dfa6645fd7aef8227ebd7c596aebe256fa8375a54d00e4230627fee77b66e5f92b63e2783f3f69c0067dbdd58d0e5c43f12c7300ad8669d46b43ab11399cf19a9a7fa05946e4361eba0e04d32538fbb9dceb22439a17fce2331af63da7cbe96201e2497704272d7ec302ad6e482f3b03b99baf66afb47bf6352ea34d497f51ada8c0f9fc1bcdbefc49a296e54147d669257d890b73e44aa071b4af30d5ba7f03e86a1484e17cd4d8eece8d659a4ead7923ef4400fb84c7817346648d6e21e52fae914ec9e434b418cb033dcea9089a59471d3847525a5810b17bd4dc32da1ffc11747eeb524f41c537b55570907cc4acc23169a7a92fcf655f09a4798f485e1c23edb24ad8d0615d05df1ce33a06293f6d4dfa180375ec839df316e7fd7b3259819c1fcb8639859a34235fb4509ef73e2d78538dd658f2920a7556caa3e4df483e33a40aeeb75446c881d81c180c03c1c8bdb823edb2df97d97c363fd667827805c37cac9efee4b1e24de6749c737987dfa848f8d5fdfae1eea4fd66c01fb4f013a3f4290708317a4fe9bf93e2b6e63b21ef5e147f7728e5846bd4d091b6f651f05bd4a890700383e344bfc2d575f8839d1e29c41a33273015e3cf875abd5259954df56b06764dc8b441b631bf909157790c60c4e30a9eb0d53c58871e5149d2989e42d6a8a579df3837a30e6b8dd69aee847700968d8fceedb9aa5c7ffee60ed12f44221781095ef7669eaf2f49d7dc2ff2e6f587195b59629d6c479b7c1acc2099a2285f4a70f8a9d31fd1568b19a43c24237fb6b3b80baf04276256171dc3c7d7e8ad016abc20bec1dba97ac6c6b9749f222d6fb462c223941d8e661c8de3682c1c8fd1e6d55e5455d5a12ab8be7cfc7b68c9ad8321ead8e03461db826da4eac12088383ebe015eac7a8a751c63a51d87a3a1af71dd9dbdfafbf92fd45181bbc148a5f9b696e2f4883ef9098d6fd23c129f6ebf8d53369dd981678ebed8fa66e6952eeb48b1eb32c25117b696c00bf545b3a51f816c82f7588e00b1103d3a1772097c91a107e8536c229acff4bb6e4f22a9b6bbf345eb93e76778c8ea90be040309597d6a657d9d7b1f45aa2c770afe152f3fa7df027da55bf40cd01579866d7ebcca293c32265d9f6c155036d561e958e0f582b85a22747eb051ab76872a19ba0f75cef778f0c00574b7de1bc4e0f5317e91ddd0cf1c2a623b6bf1d8e3eaa727e9fbfdd11168a13f785794905cfa3063441f05be6a72516b3dd31c5d113f191c47ef03331d560d38948500d3c19a1d3e4ff6e02ad0c977b5761d6f5465a1d8c192925803b7a51e951713063296193e74e43657d84d6f5f2ac715608b067595b9bf3e6ca43e3584844e1edb0846b7a2aedf6b2ce629a08f302812376a87d4afe96ebbae51fbbb6bb7eb71b6974c5e29768789f4b9868b53273db450c545acc923ca3926bf76282f53a93deec16e2edc2dc7238ca59a7a606c027902fc860d57f38136b5f4a8b6be5b8db39c616df292ce439fd5c8ed0763b5278a6799086d002c2f889afc97925a178c1bdf811076af91bba6025dc566aa6b61f3b6c529950f39539612e62fc783c8126ab4c8b412dc8e1d7115592b73060e8714d3af5c7c93d38ba46a76b71445703c935e36024e633c9bfda2bc3ecd5a349aeb9c1d97887106eb50609d4b8f8a525ef1e3360eda40fbee0147bac6da3a3b237e2f9315ff455a03b61d2c37a2c535ccf2cd1e0802f1fe826dc18e8e1715b9e62aa148ac3179c23617aaeae7884c0abb9d2e9a10a45b528b1e2c8beeb9b667b11b4607180720721c80408a9c7a1492204741c09782bf69918ac67af51402b1ba38fcc6bbd415725cb36b3e90cd3db283b90fc3087b520b98a1b82276a00e4d5b3ec3da9c85659c4ad440dcb040748550f67f22075790a9e2ea7ce0e72a7ac290550570401479b8ea381168db62e1c9b00b1f2dcf27ab3f78fa761564d42377d5e3802e4e2291995847ad478088127224d74aa81146d473c80e5cc5982b92f6c2e70ae6611b0873b26af51bacffd2ceec790661fd8cb9f097c92130ba75f2c5bd4fc9c720b6022af7ecd35823671ab292b80e8c8d46628a7a0975879f880d0208", &(0x7f0000000140)=""/79, 0x100000000, 0x5df}, 0x28) read(r0, &(0x7f0000f1bf7e)=""/130, 0x82) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000240)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x9, 0x18}, 0xc) open$dir(&(0x7f000050bff8)='./file0\x00', 0x2, 0x0) 2018/03/30 10:21:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000f00000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000f8f000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) socketpair(0xb, 0x80807, 0x6, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x2, @local={0xfe, 0x80, [], 0xaa}, 0x3}}, 0x8, 0x3ff, 0x5, 0x9, 0x10}, &(0x7f00000000c0)=0x98) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000200)={r3, 0xd85}, &(0x7f0000000240)=0x8) ppoll(&(0x7f00009d9000)=[{r1}], 0x1, &(0x7f000081eff0)={0x77359400}, &(0x7f00003b8000), 0x8) write(r1, &(0x7f0000000100)='/', 0x1) init_module(&(0x7f0000000000)='cbc(aes-aesni)\x00', 0xf, &(0x7f0000000040)='\x00') 2018/03/30 10:21:45 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x17}}, 0x100000000}, 0x1c) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3ff, 0x200000) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000040)=0x5f9d, 0x4) mq_timedsend(r1, &(0x7f00000003c0)="487e0f91ed8687b6f84df5b2c7c38c7851c24875ddfe2d8a5f4d686e0c004ad726c0b9ed938043a8e81e5e50f7cf980346f385a33e73a110a683b0837eb6055a31a40be2ff445e123e94451cf9f3e0d2fb3ef826350f9f3c354feac7138d3b9aa92495e815d7", 0x66, 0x9, &(0x7f0000000200)={0x77359400}) getrusage(0xffffffffffffffff, &(0x7f0000000300)) perf_event_open(&(0x7f0000014f88)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x99c, 0x0, 0x0, 0x20000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000a1cff8)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r2, 0x400, 0x1) truncate(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x80404509, &(0x7f00000002c0)=""/48) memfd_create(&(0x7f0000000540)='\x00', 0x2) r4 = getpid() r5 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, r4, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r5, 0x2401, 0x0) pipe2(&(0x7f0000000080)={0x0, 0x0}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000decfe0)={0x10005, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) 2018/03/30 10:21:45 executing program 6 (fault-call:3 fault-nth:43): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r0, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r0, &(0x7f0000000100)=""/65, 0x41) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) linkat(r0, &(0x7f0000000480)='./file1\x00', r1, &(0x7f00000004c0)='./file0\x00', 0x1000) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') unlink(&(0x7f00000000c0)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r0, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x12021) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000340)={0x8, 0x9, 0x4, 0x10000, 0x1, 0x7, 0x7fffffff, 0x0, 0x29, 0x0, 0x20}, 0xb) 2018/03/30 10:21:45 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="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", 0xfc}], 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x200900, 0x103) connect$vsock_stream(r1, &(0x7f0000000600)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) r2 = socket$alg(0x26, 0x5, 0x0) rt_sigtimedwait(&(0x7f0000000140)={0xffffffff}, 0x0, &(0x7f0000000180), 0x8) bind$alg(r2, &(0x7f000073e000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(cbc-twofish-avx)\x00'}, 0x58) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000500)={&(0x7f00000005c0)=[0x0, 0x0, 0x0], 0x3}) nanosleep(&(0x7f0000d1e000)={0x0, 0x1c9c380}, &(0x7f0000000000)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r3, 0x118, 0x0, &(0x7f0000000100)=0x7, 0x4) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000000c0)={0x1, 0x1, 0x1, 0x1, 0x0, 0x6}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000280)={r4, @in={{0x2, 0x4e23, @multicast2=0xe0000002}}, [0x8000, 0x9, 0x80000000, 0x3, 0x80, 0x8001, 0x800, 0x100, 0xe0db, 0x0, 0x2000000000, 0x200, 0x68, 0x0, 0x8]}, &(0x7f0000000380)=0x100) r5 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0xfffffffffffffdfa) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r5, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port1\x00', 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r5, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r6 = gettid() r7 = syz_open_procfs(r6, &(0x7f00000002c0)='maps\x00') readv(r7, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/28, 0x65}], 0x1) exit(0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r7, &(0x7f000004ffe0)=[{&(0x7f0000000000)=""/128, 0xe6}], 0x222) r8 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) connect$ax25(r3, &(0x7f00000006c0)={0x3, {"fc5da504005009"}, 0x7fff}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) getsockopt$netrom_NETROM_T1(r8, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r5, 0x80045301, &(0x7f0000000700)) [ 232.691373] cgroup: cgroup_addrm_files: failed to add stat, err=-12 2018/03/30 10:21:45 executing program 5: socket$inet(0x2, 0x3, 0x2) r0 = request_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000280)='\x00', 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000140)="5a186b7721ab7fcb76134409cd0d0994d495d4232a86c5031e070fd677760ce69f2db3e9b9b26c896b87a212b44713049d40bfefde605fcfd61c9882ea247a6ff5eacb05dde24e36427d7269b97e5e8c352c369f5cb3e389cf6f7b9ea12e4706f99951978911861230000adf06f26681ae28852fb04330705bc9c6b669e689c7efd8aafbcd68735a578af000532859cc8d6cceffecf1690a474f257c97932249ec9349562942a4f5d244dd3902459deee247a78ab30957fe5d0e4eb9db69c4f13f1c99df8fa0ef39240073545d6fd58408e804", 0xd3, r0) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local={0x1, 0x80, 0xc2}, @random="7d73cf61100f", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast=0xffffffff}, @igmp={0x0, 0x0, 0x0, @multicast2=0xe0000002}}}}}, &(0x7f0000000000)) socket$netlink(0x10, 0x3, 0x13) 2018/03/30 10:21:45 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x100000000106, 0x0) writev(r0, &(0x7f000036bfd0)=[{&(0x7f0000b51000)="eb", 0x1}], 0x1) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000040)) read(r0, &(0x7f0000000140)=""/1, 0xfffffffffffffeb7) 2018/03/30 10:21:45 executing program 6 (fault-call:3 fault-nth:44): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r0, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r0, &(0x7f0000000100)=""/65, 0x41) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) linkat(r0, &(0x7f0000000480)='./file1\x00', r1, &(0x7f00000004c0)='./file0\x00', 0x1000) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') unlink(&(0x7f00000000c0)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r0, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x12021) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000340)={0x8, 0x9, 0x4, 0x10000, 0x1, 0x7, 0x7fffffff, 0x0, 0x29, 0x0, 0x20}, 0xb) 2018/03/30 10:21:45 executing program 3: r0 = socket$inet(0x2, 0x3, 0x2) capset(&(0x7f0000594ff8)={0x19980330}, &(0x7f0000244000)) r1 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x81, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000140)={0x6, 0x100, 0x3}) setsockopt$inet_int(r0, 0x0, 0x12, &(0x7f000003affc), 0x4) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x2, 0x10000) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r2, 0x402c5342, &(0x7f0000000080)={0x808, 0x40, 0x6, {r3, r4+10000000}, 0x6, 0x3}) 2018/03/30 10:21:45 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000, 0x0, 0x4}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000d80)={r5, 0x13c, 0x7, 0xaa5, 0x1, 0x8001}, 0x14) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000dc0)={0xaa, 0x20}) pwrite64(r1, &(0x7f0000000e00)="7437032bd6e223b3a59d10357fc245a11551c76207ed30241886ce0ea1326aeac569322a47e5909770909834b26bf6b04af3b30656cbc3e07c3eed14ee7c472c2d276872498ef33618509e2049213b9664560dc77dd302976456a0392edd116b9816cbca183c77f192c4c3260a385cc483327645104ab9987888488ff6b8e163c2eddc4fc33b9f9ba13abbb021303c8d438d96b2da7c190f9cdc9f2242c2df22ccc63b779747bc9b54e299a407b4150450352ce672efd9fd7565ffb5f410dd66a2061984a92c2ca847eb65e95168372a9e92cc53f27151c36569714d1b2b2b2d26b0e9668aa5042a767ab8", 0xeb, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) 2018/03/30 10:21:45 executing program 1: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000), 0x4) 2018/03/30 10:21:45 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x80000000000000) getsockopt(r0, 0x8, 0x7, &(0x7f0000000000)=""/51, &(0x7f0000000080)=0x33) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x2000, 0x0) ioctl$KVM_GET_NR_MMU_PAGES(r1, 0xae45, 0x3) getsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000001f11)=""/239, &(0x7f0000002ffc)=0xfffffdb1) 2018/03/30 10:21:45 executing program 7: clone(0x200, &(0x7f0000000100)="f0f7d70fc52207334efb558c957ea5882b23d85fa1659dc13aa7603b45aa407f02117308b1a8697bcf6617a98d145ec63b3cffa3123c2b94a42831af8d9bdb4b03d2954fdaa7e037f2c459a27e42921a924df6c5899ef4dbdb44bffbadd515d6024b7e3450b4ea54c55a229f4d694a292b270018a408b9ed54a0bc1929156ff004c1cf0b1728065c1ae04f4eeb552ff2420005e5ccb9400909127922c4a8e69ffbb96ca5bc95786113ae475b94c2c9a6a235276e2f1b7f01010000000000007a", &(0x7f0000000000), &(0x7f0000f8b000), &(0x7f00000d5000)) mknod(&(0x7f0000cd7000)='./file0\x00', 0x103a, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000340), &(0x7f000027a000)) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000080)={0x4, 0xffffffffffffff9c, 0x1}) bind$unix(r0, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) syz_open_procfs(0x0, &(0x7f000042cff4)='personality\x00') read(r0, &(0x7f0000000240)=""/130, 0x82) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000240)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x9, 0x18}, 0xc) open$dir(&(0x7f000050bff8)='./file0\x00', 0x2, 0x0) 2018/03/30 10:21:45 executing program 3: bind$inet(0xffffffffffffffff, &(0x7f0000001000)={0x2, 0x4e20, @broadcast=0xffffffff}, 0x10) ioctl(0xffffffffffffffff, 0x2283, &(0x7f0000001000)) 2018/03/30 10:21:45 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xffffffffffffff81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0xe, 0x800) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000100)=0x8) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000140), &(0x7f0000000180)=0x4) 2018/03/30 10:21:45 executing program 3: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0, 0x0}, &(0x7f0000000400)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) tgkill(0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000090d8b75e67e16b394342abb5158df87ea8984e79c93df7498b2b34796068700e29fbd789f9a031f23e16c96e30baed2961953b057f7a3222943acc4b8cfa4de553f8276731ddeb811efd44ea011e1a0db9074a28a826c88566b89c57cc3cca4aec41d37fa27c8daa19030d03139d0aea71d509d9a20ba7deceb656cc1308d9d1f111b6bd1595486f55e229923be4ed8cbfb78e86280b4cacf386bfa8840afb312a4c520a03b27f805d181bd09ea208931a36e888060a2d") ioctl$DRM_IOCTL_WAIT_VBLANK(r1, 0xc018643a, &(0x7f0000000500)={0x10000000, 0x0, 0x3}) getpeername(0xffffffffffffffff, &(0x7f0000002940)=@can={0x0, 0x0}, &(0x7f00000029c0)=0x80) connect$packet(r1, &(0x7f0000002a00)={0x11, 0x7, r2, 0x1, 0x4, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x15}}, 0x14) fsetxattr(r1, &(0x7f0000000140)=@known='user.syz\x00', &(0x7f0000000180)="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", 0x137, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000600)={0x1f, 0x100000001, 0x5, 0x8, 0x4, 0x3da, 0x0, 0xffffffff, 0x0}, &(0x7f00000007c0)=0x20) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000800)={0x7fff, 0xa, 0xf33, 0xe51c, r3}, 0x10) fremovexattr(r1, &(0x7f0000000000)=@known='user.syz\x00') ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000340)={0x9}) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r4, 0x540a, 0x0) unshare(0x28020000) r5 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r5, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "706f727431000200000000000000000000000000000000000000eb000000b2a587e2000000000000000000000000000101008e15e7af00", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r5, 0xc0505350, &(0x7f0000000140)={{}, {}, 0x100000000}) unshare(0x20020000) socket$vsock_stream(0x28, 0x1, 0x0) connect(0xffffffffffffffff, &(0x7f0000000740)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x80) keyctl$join(0x1, &(0x7f0000000880)={0x73, 0x79, 0x7a, 0x2}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000580)='IPVS\x00') syz_fuseblk_mount(&(0x7f00000004c0)='./file0\x00', &(0x7f00000005c0)='./file0\x00', 0xe000, 0x0, r0, 0x325e, 0x0, 0x2820080) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x0, 0x200, 0x0, 0x2}, &(0x7f0000000680)=0x10) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000006c0)={&(0x7f00000008c0)=ANY=[@ANYBLOB="9300000091d39b297d008fc03e408ee000310e16e8ff44b195358ad6b69030cb40e7f8649b5e69f24b3a6daf07bd04d9aed524eca5a532ee46cf99dc869f498fbe73187d366c51a4d622a561c7cd644999473f1081c0482a431b85ef56db7d658230200ebe9e61a1ab9f75b8328b877f7756e8b5fc43edad3f0192340dffe8d7fad134e6"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x40000) fcntl$getown(0xffffffffffffffff, 0x9) socket$packet(0x11, 0x3, 0x300) 2018/03/30 10:21:45 executing program 1: r0 = creat(&(0x7f0000000180)='./file1\x00', 0x0) mount(&(0x7f0000451ff8)='./file0\x00', &(0x7f000069cff8)='./file1\x00', &(0x7f0000847000)="07e372f2", 0x2003, &(0x7f000012c000)) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000000)={'irlan0\x00', {0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}) 2018/03/30 10:21:45 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000, 0x0, 0x4}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000d80)={r5, 0x13c, 0x7, 0xaa5, 0x1, 0x8001}, 0x14) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000dc0)={0xaa, 0x20}) pwrite64(r1, &(0x7f0000000e00)="7437032bd6e223b3a59d10357fc245a11551c76207ed30241886ce0ea1326aeac569322a47e5909770909834b26bf6b04af3b30656cbc3e07c3eed14ee7c472c2d276872498ef33618509e2049213b9664560dc77dd302976456a0392edd116b9816cbca183c77f192c4c3260a385cc483327645104ab9987888488ff6b8e163c2eddc4fc33b9f9ba13abbb021303c8d438d96b2da7c190f9cdc9f2242c2df22ccc63b779747bc9b54e299a407b4150450352ce672efd9fd7565ffb5f410dd66a2061984a92c2ca847eb65e95168372a9e92cc53f27151c36569714d1b2b2b2d26b0e9668aa5042a767ab8", 0xeb, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) 2018/03/30 10:21:45 executing program 5: r0 = syz_open_dev$sndmidi(&(0x7f0000653fee)='/dev/snd/midiC#D#\x00', 0x200, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000180)={0x5, 0x6, 0x101, 0x6, 0x0}, &(0x7f00000001c0)=0x10) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x9}, &(0x7f00000006c0)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x3) ustat(0x72ec2682, &(0x7f0000001680)) ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000840)={0x200}) bind$llc(r0, &(0x7f0000000740)={0x1a, 0xffff, 0xffff, 0xfffffffeffffffff, 0x9, 0x3, @link_local={0x1, 0x80, 0xc2}}, 0x10) r2 = getpgrp(0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r0, &(0x7f0000000300)={r0, r0}) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="66696c746572020000002c99000000000000000000000000000000000000000003000000115600000000000000b2000000000000000000000000000200000000000000000000000000000000000000000000000000000000000559858e838353573cbd059b940fbbdd440e19223942a0d58369e5e26a3abfdcf7f073694b335676bb0507f463975e64336c6ab3bf13420d0300000000000000000000000000"], 0x1) ppoll(&(0x7f0000000040)=[{}, {}], 0x2, &(0x7f00000000c0), &(0x7f0000000100), 0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f00000005c0)={0x1}, 0x1) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x2, 0x0) sendmsg$nfc_llcp(r3, &(0x7f0000000640)={&(0x7f0000000280)={0x27, 0x0, 0x4, 0x7, 0x1, 0x2, "22dd483f69cbb2f9ad614d307bde52bad1d1c11381cf5253d6cabfb29f3dffd4c28439e22c562434c708fcd1e045d4348cd982f6ceff6f05ae5c932f9d9c41", 0x36}, 0x60, &(0x7f0000000540), 0x0, &(0x7f0000000680)=ANY=[], 0x0, 0x20004000}, 0x80) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000580)={0x0, 0x17, &(0x7f0000000340)="1d9b8a1367db2ac42276d59e7325e4fa51464fb4c2879e"}) r4 = dup2(r3, r0) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000880)={{0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x40, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x18}}, 'yam0\x00'}) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000380)={0x0, 0x9, 0x30}, &(0x7f0000000600)=0x18) ioctl$KVM_ASSIGN_SET_INTX_MASK(r0, 0x4040aea4, &(0x7f0000000700)={0x55bf, 0x4db2b00000000000, 0x2, 0x2, 0x1000}) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f00000019c0)={0x0, 0x0, 0x10}, &(0x7f0000001a00)=0xc) sendmsg$inet_sctp(r3, &(0x7f0000001b40)={&(0x7f0000000200)=@in6={0xa, 0x4e24, 0x4000000000000, @remote={0xfe, 0x80, [], 0xbb}, 0x6}, 0x1c, &(0x7f0000001940)=[{&(0x7f0000000480)="58913d9f8977a9cb0b94b91b4762b066455ada6eca89a068559cc93697873db2292f0d095aef21c50a06bcf1e0a24dd39d62fb9108b033c3f8c60a0777393d08d813f8f470046c870440844012e323264dbe33c02696c14656692ddd14d5260d0db88446e8befda6ae496968b7eaa590c44d02b32366ca9bb3244472e693521fd724d4d646de1e24b20e7cfdb4b5b1db7ae0e18e72d76d210fbf212bc06a50bfbd485d9ba3d8d5a79d5294b81fc480536c43fe44df92377f430f839c03f0d847b892e2ac3a4a4328da3daa0d2e", 0xcd}], 0x1, &(0x7f0000001a40)=[@init={0x18, 0x84, 0x0, {0x1, 0x5, 0x3f, 0xfff}}, @sndrcv={0x30, 0x84, 0x1, {0x9700000000000000, 0x4, 0x206, 0x2, 0x6, 0x1f2ec637, 0x1000, 0x2d24ea3, r5}}], 0x60}, 0x0) ioctl$TIOCMBIS(r4, 0x5416, &(0x7f0000000680)=0x80000001) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000140)=0x5) mq_timedsend(r0, &(0x7f0000000780)="ff48b72695b1c00b2bfffc51ecabdaa18695084226f4f73c3cbdc56e67d01f063038b8eff3a3863604be874b6e30de6e37f6264f556ccc4b8d999bc9d616e3bde62f9793036b19c9c272", 0x4a, 0x6000000000000000, &(0x7f0000000800)={0x0, 0x989680}) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f0000000900)=0xd000) r6 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20202, 0x0) fallocate(r6, 0x11, 0x2e, 0x40205) bind$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x309, 0x9, 0x1, 0x9, 0xffffffffffff7fff}, 0x10) 2018/03/30 10:21:45 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x100000000106, 0x0) writev(r0, &(0x7f000036bfd0)=[{&(0x7f0000b51000)="eb", 0x1}], 0x1) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000040)=0x4000000058) read(0xffffffffffffffff, &(0x7f0000000140)=""/1, 0xfffffffffffffeb7) [ 232.985107] bond0 (unregistering): Released all slaves 2018/03/30 10:21:46 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="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", 0xfc}], 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x200900, 0x103) connect$vsock_stream(r1, &(0x7f0000000600)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) r2 = socket$alg(0x26, 0x5, 0x0) rt_sigtimedwait(&(0x7f0000000140)={0xffffffff}, 0x0, &(0x7f0000000180), 0x8) bind$alg(r2, &(0x7f000073e000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(cbc-twofish-avx)\x00'}, 0x58) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000500)={&(0x7f00000005c0)=[0x0, 0x0, 0x0], 0x3}) nanosleep(&(0x7f0000d1e000)={0x0, 0x1c9c380}, &(0x7f0000000000)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r3, 0x118, 0x0, &(0x7f0000000100)=0x7, 0x4) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000000c0)={0x1, 0x1, 0x1, 0x1, 0x0, 0x6}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000280)={r4, @in={{0x2, 0x4e23, @multicast2=0xe0000002}}, [0x8000, 0x9, 0x80000000, 0x3, 0x80, 0x8001, 0x800, 0x100, 0xe0db, 0x0, 0x2000000000, 0x200, 0x68, 0x0, 0x8]}, &(0x7f0000000380)=0x100) r5 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0xfffffffffffffdfa) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r5, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port1\x00', 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r5, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r6 = gettid() r7 = syz_open_procfs(r6, &(0x7f00000002c0)='maps\x00') readv(r7, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/28, 0x65}], 0x1) exit(0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r7, &(0x7f000004ffe0)=[{&(0x7f0000000000)=""/128, 0xe6}], 0x222) r8 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) connect$ax25(r3, &(0x7f00000006c0)={0x3, {"fc5da504005009"}, 0x7fff}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) getsockopt$netrom_NETROM_T1(r8, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r5, 0x80045301, &(0x7f0000000700)) 2018/03/30 10:21:46 executing program 1: execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000280)='%vboxnet1mime_typenodev\x00', &(0x7f00000002c0)='/dev/ptmx\x00', &(0x7f0000000300)='TPROXY\x00', &(0x7f0000000340)='/dev/ptmx\x00'], &(0x7f0000000540)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)='+}md5sum\x00', &(0x7f0000000440)='{\x00', &(0x7f0000000480)='}-\x00', &(0x7f00000004c0)='net/mcfilter6\x00']) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/mcfilter6\x00') getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) mmap(&(0x7f000053b000/0x2000)=nil, 0x2000, 0x1000004, 0x40000002871, 0xffffffffffffffff, 0x0) msgget(0x1, 0x1) mremap(&(0x7f00000cd000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f000053b000/0x2000)=nil) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x4000, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000080)) r2 = dup(0xffffffffffffffff) ioctl$TUNSETLINK(r2, 0x400454cd, 0x10e) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000008ff8)) r3 = socket$inet(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000c80)=@broute={'broute\x00', 0x20, 0x2, 0xa18, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000200], 0x0, &(0x7f0000000040), &(0x7f0000000200)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, '\x00', '\x00', '\x00', '\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa], 0xffffffffffffffff}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa], 0xffffffffffffffff}, [], 0x898, 0x898, 0x8c8, [@quota={'quota\x00', 0x18}, @u32={'u32\x00', 0x7c0}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, '\x00', '\x00', '\x00', '\x00', @random="46ca750fc811", [], @empty, [], 0x70, 0x70, 0xc0}}, @common=@log={'log\x00', 0x28, {{0x0, "19358fd7efa35ca2d7eb1767a4c43b69655391056303b97ef841b924cf71"}}}}]}]}, 0xa90) socket$inet(0xa, 0x2, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000200)) 2018/03/30 10:21:46 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000, 0x0, 0x4}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000d80)={r5, 0x13c, 0x7, 0xaa5, 0x1, 0x8001}, 0x14) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000dc0)={0xaa, 0x20}) pwrite64(r1, &(0x7f0000000e00)="7437032bd6e223b3a59d10357fc245a11551c76207ed30241886ce0ea1326aeac569322a47e5909770909834b26bf6b04af3b30656cbc3e07c3eed14ee7c472c2d276872498ef33618509e2049213b9664560dc77dd302976456a0392edd116b9816cbca183c77f192c4c3260a385cc483327645104ab9987888488ff6b8e163c2eddc4fc33b9f9ba13abbb021303c8d438d96b2da7c190f9cdc9f2242c2df22ccc63b779747bc9b54e299a407b4150450352ce672efd9fd7565ffb5f410dd66a2061984a92c2ca847eb65e95168372a9e92cc53f27151c36569714d1b2b2b2d26b0e9668aa5042a767ab88ad81f28", 0xef, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) [ 234.104109] IPVS: ftp: loaded support on port[0] = 21 [ 234.429313] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 234.853258] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 234.859349] 8021q: adding VLAN 0 to HW filter on device bond0 [ 234.904515] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 234.948547] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 234.954716] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 234.961792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 234.978090] FAULT_INJECTION: forcing a failure. [ 234.978090] name failslab, interval 1, probability 0, space 0, times 0 [ 234.989313] CPU: 1 PID: 28745 Comm: syz-executor6 Not tainted 4.16.0-rc7+ #371 [ 234.996647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 235.005977] Call Trace: [ 235.008542] dump_stack+0x194/0x24d [ 235.012153] ? arch_local_irq_restore+0x53/0x53 [ 235.016808] should_fail+0x8c0/0xa40 [ 235.020495] ? kstrdup+0x39/0x70 [ 235.023841] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 235.028921] ? cgroup_apply_control_enable+0x390/0xbc0 [ 235.034171] ? kernfs_iop_mkdir+0x153/0x1e0 [ 235.038464] ? vfs_mkdir+0x390/0x600 [ 235.042153] ? SyS_mkdirat+0x22b/0x2b0 [ 235.046016] ? do_syscall_64+0x281/0x940 [ 235.050054] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 235.055397] ? find_held_lock+0x35/0x1d0 [ 235.059439] ? find_held_lock+0x35/0x1d0 [ 235.063483] ? __lock_is_held+0xb6/0x140 [ 235.067534] ? check_same_owner+0x320/0x320 [ 235.071834] ? rcu_note_context_switch+0x710/0x710 [ 235.076740] ? rcu_read_lock_sched_held+0x108/0x120 [ 235.081738] should_failslab+0xec/0x120 [ 235.085690] kmem_cache_alloc+0x47/0x760 [ 235.089725] ? memcpy+0x45/0x50 [ 235.092984] ? kstrdup+0x59/0x70 [ 235.097029] __kernfs_new_node+0xe2/0x570 [ 235.101156] ? kernfs_dop_revalidate+0x380/0x380 [ 235.105888] ? delete_node+0x2db/0xbc0 [ 235.109762] ? snprintf+0xc0/0xf0 [ 235.113190] ? vsprintf+0x40/0x40 [ 235.116628] kernfs_new_node+0x80/0xe0 [ 235.120494] __kernfs_create_file+0x4b/0x320 [ 235.124881] cgroup_addrm_files+0x3c5/0xa70 [ 235.129190] ? cgroup_file_write+0x710/0x710 [ 235.133583] ? cgroup_idr_replace+0x3f/0x50 [ 235.137888] ? __lock_is_held+0xb6/0x140 [ 235.141934] ? __local_bh_enable_ip+0x121/0x230 [ 235.146581] ? online_css+0x224/0x2e0 [ 235.150365] css_populate_dir+0x198/0x420 [ 235.154495] cgroup_apply_control_enable+0x390/0xbc0 [ 235.159583] ? cgroup_propagate_control+0x570/0x570 [ 235.164582] ? css_populate_dir+0x289/0x420 [ 235.168884] cgroup_mkdir+0x56f/0xfc0 [ 235.172657] ? __lock_is_held+0xb6/0x140 [ 235.176702] ? cgroup_destroy_locked+0x750/0x750 [ 235.181433] ? rcu_read_lock_sched_held+0x108/0x120 [ 235.186427] ? kmem_cache_free+0x258/0x2a0 [ 235.190640] ? set_nlink+0xc1/0x160 [ 235.194245] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 235.199149] ? generic_permission+0x105/0x3c0 [ 235.203629] ? cgroup_destroy_locked+0x750/0x750 [ 235.208361] kernfs_iop_mkdir+0x153/0x1e0 [ 235.212491] vfs_mkdir+0x390/0x600 [ 235.216018] SyS_mkdirat+0x22b/0x2b0 [ 235.219713] ? SyS_mknod+0x480/0x480 [ 235.223399] ? trace_hardirqs_on+0xd/0x10 [ 235.227524] ? do_syscall_64+0xb7/0x940 [ 235.231484] ? SyS_mknod+0x480/0x480 [ 235.235176] do_syscall_64+0x281/0x940 [ 235.239038] ? __do_page_fault+0xc90/0xc90 [ 235.243260] ? _raw_spin_unlock_irq+0x27/0x70 [ 235.247730] ? finish_task_switch+0x1c1/0x7e0 [ 235.252202] ? syscall_return_slowpath+0x550/0x550 [ 235.257108] ? syscall_return_slowpath+0x2ac/0x550 [ 235.262024] ? prepare_exit_to_usermode+0x350/0x350 [ 235.267020] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 235.272366] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 235.277277] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 235.282439] RIP: 0033:0x4548b9 [ 235.285603] RSP: 002b:00007f214d995c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 2018/03/30 10:21:47 executing program 6 (fault-call:3 fault-nth:45): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r0, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r0, &(0x7f0000000100)=""/65, 0x41) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) linkat(r0, &(0x7f0000000480)='./file1\x00', r1, &(0x7f00000004c0)='./file0\x00', 0x1000) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') unlink(&(0x7f00000000c0)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r0, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x12021) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000340)={0x8, 0x9, 0x4, 0x10000, 0x1, 0x7, 0x7fffffff, 0x0, 0x29, 0x0, 0x20}, 0xb) 2018/03/30 10:21:47 executing program 7: clone(0x200, &(0x7f0000000100)="f0f7d70fc52207334efb558c957ea5882b23d85fa1659dc13aa7603b45aa407f02117308b1a8697bcf6617a98d145ec63b3cffa3123c2b94a42831af8d9bdb4b03d2954fdaa7e037f2c459a27e42921a924df6c5899ef4dbdb44bffbadd515d6024b7e3450b4ea54c55a229f4d694a292b270018a408b9ed54a0bc1929156ff004c1cf0b1728065c1ae04f4eeb552ff2420005e5ccb9400909127922c4a8e69ffbb96ca5bc95786113ae475b94c2c9a6a235276e2f1b7f01010000000000007a", &(0x7f0000000000), &(0x7f0000f8b000), &(0x7f00000d5000)) mknod(&(0x7f0000cd7000)='./file0\x00', 0x103a, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000340), &(0x7f000027a000)) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000540)='syz0\x00', 0x200002, 0x0) accept$alg(0xffffffffffffff9c, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000005c0)={0x5, 0x70, 0x10001, 0x3e9, 0x7, 0x3f, 0x0, 0x7, 0x80, 0x4, 0x6, 0x0, 0x4, 0x100000001, 0x2, 0x82, 0xfffffffffffffa63, 0xffffffff7fffffff, 0x3f, 0x3, 0xffffffff, 0xe6, 0x7218, 0x3, 0x7f, 0x6, 0x10001, 0x1ff, 0xfffffffffffffffd, 0x55b9, 0x7ff, 0x200, 0xfffffffffffffffb, 0x0, 0x20, 0x10001, 0x0, 0x603, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000580), 0xc}, 0x1190, 0x100, 0x1, 0x0, 0x2b9c0000000000, 0x6, 0x7fff}, 0xffffffffffffff9c, 0x9, 0xffffffffffffffff, 0x1) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc\x00', 0x10000, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000680)='/dev/snd/controlC#\x00', 0x8, 0x41) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000500)={0x4, r1}) bind$unix(r2, &(0x7f00000003c0)=@file={0x0, './file0\x00'}, 0xfffffffffffffd62) r3 = syz_open_procfs(0x0, &(0x7f000042cff4)='personality\x00') sendto$unix(r3, &(0x7f00000001c0)="dc76ddabe33ccfe443b308a53a271a2c752eee1fcb232fb02a7245ed21e1f1d4382d0f9a4fe33d3afd8b715316117204fc630af358f2421f11a1691a5c10acc41a", 0x41, 0x20000080, &(0x7f0000000440)=@abs={0x1, 0x0, 0x4e21}, 0x6e) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x18}, 0x10) setsockopt$RDS_FREE_MR(r4, 0x114, 0x3, &(0x7f0000000380)={{0x3, 0xcd7}, 0x30}, 0x10) read(r3, &(0x7f0000f1bf7e)=""/130, 0xfffffdd8) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000240)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x9, 0x18}, 0xc) open$dir(&(0x7f000050bff8)='./file0\x00', 0x2, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x1, 0x0) bind$unix(r3, &(0x7f0000000280)=@abs={0x0, 0x0, 0x4e20}, 0x6e) 2018/03/30 10:21:47 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000004fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) setsockopt$RDS_GET_MR(r0, 0x114, 0x2, &(0x7f0000000080)={{&(0x7f0000000000)=""/34, 0x22}, &(0x7f0000000040), 0x9}, 0x20) ioctl(r0, 0xc0884113, &(0x7f0000006000)) 2018/03/30 10:21:47 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) r1 = socket$netlink(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100080}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r2, 0x200, 0x70bd29, 0x25dfdbfd, {0x6}}, 0x14}, 0x1, 0x0, 0x0, 0x4000001}, 0x1) sendmmsg(r0, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000003c0)}}, {{&(0x7f00000004c0)=@in6={0xa, 0x4e22, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x80, &(0x7f0000000680), 0x0, &(0x7f0000000000)=[{0x18, 0x29, 0x4, "e29a"}], 0x18}}], 0x2, 0x0) 2018/03/30 10:21:47 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x100000000106, 0x0) writev(r0, &(0x7f000036bfd0)=[{&(0x7f0000b51000)="eb", 0x1}], 0x1) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000040)=0x4000000058) read(0xffffffffffffffff, &(0x7f0000000140)=""/1, 0xfffffffffffffeb7) 2018/03/30 10:21:47 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000, 0x0, 0x4}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000d80)={r5, 0x13c, 0x7, 0xaa5, 0x1, 0x8001}, 0x14) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000dc0)={0xaa, 0x20}) pwrite64(r1, &(0x7f0000000e00)="7437032bd6e223b3a59d10357fc245a11551c76207ed30241886ce0ea1326aeac569322a47e5909770909834b26bf6b04af3b30656cbc3e07c3eed14ee7c472c2d276872498ef33618509e2049213b9664560dc77dd302976456a0392edd116b9816cbca183c77f192c4c3260a385cc483327645104ab9987888488ff6b8e163c2eddc4fc33b9f9ba13abbb021303c8d438d96b2da7c190f9cdc9f2242c2df22ccc63b779747bc9b54e299a407b4150450352ce672efd9fd7565ffb5f410dd66a2061984a92c2ca847eb65e95168372a9e92cc53f27151c36569714d1b2b2b2d26b0e9668aa5042a767ab88ad81f28", 0xef, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) 2018/03/30 10:21:47 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x2200, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000100)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e22, @loopback=0x7f000001}, @in6={0xa, 0x4e22, 0x7, @mcast1={0xff, 0x1, [], 0x1}, 0x4}, @in6={0xa, 0x4e21, 0x1, @local={0xfe, 0x80, [], 0xaa}, 0x5}, @in6={0xa, 0x4e23, 0xfffffffeffffffff, @remote={0xfe, 0x80, [], 0xbb}, 0x2}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}], 0x94) getsockopt$inet6_tcp_buf(r0, 0x6, 0x16, &(0x7f00000001c0)=""/120, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) time(&(0x7f0000000000)) socketpair(0xa, 0x5, 0x6, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f0000000080)) inotify_init1(0x80000) 2018/03/30 10:21:47 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="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", 0xfc}], 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x200900, 0x103) connect$vsock_stream(r1, &(0x7f0000000600)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) r2 = socket$alg(0x26, 0x5, 0x0) rt_sigtimedwait(&(0x7f0000000140)={0xffffffff}, 0x0, &(0x7f0000000180), 0x8) bind$alg(r2, &(0x7f000073e000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(cbc-twofish-avx)\x00'}, 0x58) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000500)={&(0x7f00000005c0)=[0x0, 0x0, 0x0], 0x3}) nanosleep(&(0x7f0000d1e000)={0x0, 0x1c9c380}, &(0x7f0000000000)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r3, 0x118, 0x0, &(0x7f0000000100)=0x7, 0x4) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000000c0)={0x1, 0x1, 0x1, 0x1, 0x0, 0x6}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000280)={r4, @in={{0x2, 0x4e23, @multicast2=0xe0000002}}, [0x8000, 0x9, 0x80000000, 0x3, 0x80, 0x8001, 0x800, 0x100, 0xe0db, 0x0, 0x2000000000, 0x200, 0x68, 0x0, 0x8]}, &(0x7f0000000380)=0x100) r5 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0xfffffffffffffdfa) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r5, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port1\x00', 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r5, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r6 = gettid() r7 = syz_open_procfs(r6, &(0x7f00000002c0)='maps\x00') readv(r7, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/28, 0x65}], 0x1) exit(0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r7, &(0x7f000004ffe0)=[{&(0x7f0000000000)=""/128, 0xe6}], 0x222) r8 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) connect$ax25(r3, &(0x7f00000006c0)={0x3, {"fc5da504005009"}, 0x7fff}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) getsockopt$netrom_NETROM_T1(r8, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r5, 0x80045301, &(0x7f0000000700)) [ 235.293285] RAX: ffffffffffffffda RBX: 00007f214d9966d4 RCX: 00000000004548b9 [ 235.300531] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 235.307861] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 235.315102] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 235.322364] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 000000000000002c [ 235.329785] cgroup: cgroup_addrm_files: failed to add stat, err=-12 2018/03/30 10:21:48 executing program 3: r0 = open(&(0x7f0000000300)='./file0\x00', 0x2, 0x4) perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) unshare(0x20000) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)=0x0) r2 = syz_open_procfs(r1, &(0x7f00000003c0)="6e732f6d6e740077089d5475570ba400e5756418d9bae5b4d0b7e13f38b65692230260de869e31e55400709b225bebe4434f8060ab131dfc2d76e661d84f17c4de706501f8821fbcec24859915779583cda2c3") getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x4e24, 0x8, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, 0x5}}, 0x9f2, 0x9}, &(0x7f00000001c0)=0x90) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000340)={r3, 0x4, 0x2}, &(0x7f0000000500)=0x8) setns(r2, 0x4000000) clone(0x30000100, &(0x7f0000e69000), &(0x7f00009c4ffc), &(0x7f00001cc000), &(0x7f0000a46000)) mlock2(&(0x7f0000a91000/0x4000)=nil, 0x4000, 0x0) getrusage(0x1, &(0x7f0000000200)) 2018/03/30 10:21:48 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x100000000106, 0x0) writev(r0, &(0x7f000036bfd0)=[{&(0x7f0000b51000)="eb", 0x1}], 0x1) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000040)=0x4000000058) read(0xffffffffffffffff, &(0x7f0000000140)=""/1, 0xfffffffffffffeb7) 2018/03/30 10:21:48 executing program 6 (fault-call:3 fault-nth:46): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r0, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r0, &(0x7f0000000100)=""/65, 0x41) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) linkat(r0, &(0x7f0000000480)='./file1\x00', r1, &(0x7f00000004c0)='./file0\x00', 0x1000) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') unlink(&(0x7f00000000c0)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r0, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x12021) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000340)={0x8, 0x9, 0x4, 0x10000, 0x1, 0x7, 0x7fffffff, 0x0, 0x29, 0x0, 0x20}, 0xb) 2018/03/30 10:21:48 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000780)=[{&(0x7f0000000400)="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", 0xfc}], 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x200900, 0x103) connect$vsock_stream(r1, &(0x7f0000000600)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) r2 = socket$alg(0x26, 0x5, 0x0) rt_sigtimedwait(&(0x7f0000000140)={0xffffffff}, 0x0, &(0x7f0000000180), 0x8) bind$alg(r2, &(0x7f000073e000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(cbc-twofish-avx)\x00'}, 0x58) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000500)={&(0x7f00000005c0)=[0x0, 0x0, 0x0], 0x3}) nanosleep(&(0x7f0000d1e000)={0x0, 0x1c9c380}, &(0x7f0000000000)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r3, 0x118, 0x0, &(0x7f0000000100)=0x7, 0x4) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000000c0)={0x1, 0x1, 0x1, 0x1, 0x0, 0x6}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000280)={r4, @in={{0x2, 0x4e23, @multicast2=0xe0000002}}, [0x8000, 0x9, 0x80000000, 0x3, 0x80, 0x8001, 0x800, 0x100, 0xe0db, 0x0, 0x2000000000, 0x200, 0x68, 0x0, 0x8]}, &(0x7f0000000380)=0x100) r5 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0xfffffffffffffdfa) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r5, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port1\x00', 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r5, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r6 = gettid() r7 = syz_open_procfs(r6, &(0x7f00000002c0)='maps\x00') readv(r7, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/28, 0x65}], 0x1) exit(0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r7, &(0x7f000004ffe0)=[{&(0x7f0000000000)=""/128, 0xe6}], 0x222) r8 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) connect$ax25(r3, &(0x7f00000006c0)={0x3, {"fc5da504005009"}, 0x7fff}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) getsockopt$netrom_NETROM_T1(r8, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r5, 0x80045301, &(0x7f0000000700)) 2018/03/30 10:21:48 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000, 0x0, 0x4}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000d80)={r5, 0x13c, 0x7, 0xaa5, 0x1, 0x8001}, 0x14) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000dc0)={0xaa, 0x20}) pwrite64(r1, &(0x7f0000000e00)="7437032bd6e223b3a59d10357fc245a11551c76207ed30241886ce0ea1326aeac569322a47e5909770909834b26bf6b04af3b30656cbc3e07c3eed14ee7c472c2d276872498ef33618509e2049213b9664560dc77dd302976456a0392edd116b9816cbca183c77f192c4c3260a385cc483327645104ab9987888488ff6b8e163c2eddc4fc33b9f9ba13abbb021303c8d438d96b2da7c190f9cdc9f2242c2df22ccc63b779747bc9b54e299a407b4150450352ce672efd9fd7565ffb5f410dd66a2061984a92c2ca847eb65e95168372a9e92cc53f27151c36569714d1b2b2b2d26b0e9668aa5042a767ab88ad81f28", 0xef, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) 2018/03/30 10:21:48 executing program 0 (fault-call:1 fault-nth:0): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x100000000106, 0x0) writev(r0, &(0x7f000036bfd0)=[{&(0x7f0000b51000)="eb", 0x1}], 0x1) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000040)=0x4000000058) read(r0, &(0x7f0000000140)=""/1, 0xfffffffffffffeb7) 2018/03/30 10:21:48 executing program 7: clone(0x200, &(0x7f0000000100)="f0f7d70fc52207334efb558c957ea5882b23d85fa1659dc13aa7603b45aa407f02117308b1a8697bcf6617a98d145ec63b3cffa3123c2b94a42831af8d9bdb4b03d2954fdaa7e037f2c459a27e42921a924df6c5899ef4dbdb44bffbadd515d6024b7e3450b4ea54c55a229f4d694a292b270018a408b9ed54a0bc1929156ff004c1cf0b1728065c1ae04f4eeb552ff2420005e5ccb9400909127922c4a8e69ffbb96ca5bc95786113ae475b94c2c9a6a235276e2f1b7f01010000000000007a", &(0x7f0000000000), &(0x7f0000f8b000), &(0x7f00000d5000)) mknod(&(0x7f0000cd7000)='./file0\x00', 0x103a, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000340), &(0x7f000027a000)) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000080)={0x4, 0xffffffffffffff9c, 0x1}) bind$unix(r0, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) r1 = syz_open_procfs(0x0, &(0x7f000042cff4)='personality\x00') read(r1, &(0x7f0000f1bf7e)=""/130, 0xfffffdd8) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000240)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x9, 0x18}, 0xc) connect$l2tp(r1, &(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, r1, {0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x0, 0x2, 0x4, 0x2}}, 0x26) open$dir(&(0x7f000050bff8)='./file0\x00', 0x2, 0x0) 2018/03/30 10:21:48 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0xc4) ioctl$sock_ipx_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'ip_vti0\x00', {0x4, 0x8, 0x7, "463f89bb8832", 0x1}}) getcwd(&(0x7f0000000580)=""/76, 0x37daad7c72953e5a) 2018/03/30 10:21:48 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000600)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = syz_open_dev$midi(&(0x7f00000011c0)='/dev/midi#\x00', 0x0, 0xa4100) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f0000001240)={0x2}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) eventfd(0x0) pread64(r0, &(0x7f0000000900)=""/195, 0xc3, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f00000000c0)={r3}) ioctl$KVM_SET_GSI_ROUTING(r3, 0x4008ae6a, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) ftruncate(0xffffffffffffffff, 0xfffffffeffffffff) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000380)=0x17, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000080)) r5 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x16907a, 0x0) ioctl$KVM_GET_MSRS(r2, 0xc008ae88, &(0x7f0000000180)=ANY=[@ANYBLOB="07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000062bec9a00095d1741632a0a5000000000000000000000000"]) r6 = dup(0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r6, 0xc0505350, &(0x7f0000000200)={{0x6, 0x4}, {0x972, 0x6}, 0xe0, 0x2, 0x5}) setns(r0, 0x44000000) setsockopt$packet_tx_ring(r6, 0x107, 0xd, &(0x7f0000000100)=@req={0x6, 0x5d, 0x7d18, 0x6}, 0x10) setsockopt$inet_sctp_SCTP_RTOINFO(r5, 0x84, 0x0, &(0x7f0000001140)={0x0, 0x6, 0x0, 0x2}, 0x10) ftruncate(r4, 0x5) unlink(&(0x7f0000000140)='./file0\x00') pwritev(r5, &(0x7f0000001400)=[{&(0x7f0000001440)="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", 0xdbe}], 0x1, 0x0) 2018/03/30 10:21:48 executing program 1: syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYRES32], &(0x7f0000000080)) syz_extract_tcp_res(&(0x7f0000000040)={0x41424344}, 0x80000001, 0x8) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='autoZroup\x00') ioctl$KVM_X86_SET_MCE(r1, 0x4040ae9e, &(0x7f00000003c0)={0x4000000000000000, 0xf000, 0x5, 0x1, 0x1a}) syz_extract_tcp_res$synack(&(0x7f0000000400)={0x41424344}, 0x1, 0x0) syz_emit_ethernet(0x23a, &(0x7f0000000140)={@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x17}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x16}, [{[], {0x8100, 0x2, 0x1}}], {@ipv6={0x86dd, {0x9, 0x6, "6a154d", 0x200, 0x3a, 0x1, @remote={0xfe, 0x80, [], 0xbb}, @mcast2={0xff, 0x2, [], 0x1}, {[@fragment={0x33, 0x0, 0x10000, 0x2, 0x0, 0x8, 0x64}, @srh={0x7e, 0x14, 0x4, 0xa, 0x4, 0x1, 0x100, [@mcast2={0xff, 0x2, [], 0x1}, @remote={0xfe, 0x80, [], 0xbb}, @empty, @dev={0xfe, 0x80, [], 0x16}, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @empty, @local={0xfe, 0x80, [], 0xaa}, @remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, @mcast2={0xff, 0x2, [], 0x1}]}, @hopopts={0x5e, 0xe, [], [@generic={0xb5, 0x5c, "a61cbd22a3d51cca9d9c3c47a0acb3857523e62810eeaac8a793abc2525652832d4fdbafdc6442a9eab469eaccd7fa626fed0bdf14e86a56b2d5bf87834d36190cd2bfb8dfd2d72b13700a3d33cb71c1a52afcd842b1bc1a43f48f62"}, @ra={0x5, 0x2, 0x1ff}, @pad1={0x0, 0x1}, @ra={0x5, 0x2, 0x3}, @ra={0x5, 0x2, 0x2}, @pad1={0x0, 0x1}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}]}], @tcp={{0x4e23, 0x4e22, r0, r2, 0x3f, 0x0, 0x8, 0x9, 0x7, 0x0, 0x8001, {[@nop={0x1}, @timestamp={0x8, 0xa, 0x733, 0x10e000000000}]}}, {"ee84e8fda794097429460df5240b10a6543d691bd33e4b992f131e7ec1f94643a09cf58cba0e7807d6c5b9258ef7c4b1d973bcadedbac9af6d3c0dc0cc0b2450eb0c68df07ea480845e0cd94ed6e026bdbc54971c4f8f87d479e292eb2d4aac23cd89ba491a52b753f50ef411a18c113459a0503a21e9da8795014ce16d9eff6d8fa6eb78dbcf5e335778143e8161a529a99cf266737e68e013ee6848ac64a25ff15fb231e96373f0fa6285ee966eab2"}}}}}}}, &(0x7f00000000c0)={0x0, 0x1, [0xea5, 0xdd4, 0xa94, 0x32d]}) r3 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x2000) ioctl$KVM_GET_REG_LIST(r3, 0xc008aeb0, &(0x7f0000000540)=ANY=[@ANYBLOB="06000000000000000100000000000000000840000000000004617d32578c844b8fa0ad25ac000000000000000200000000000000ffff000000000000ffffffff00000000"]) syz_open_dev$sndpcmc(&(0x7f00000004c0)='/dev/snd/pcmC#D#c\x00', 0x100, 0x0) r4 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x2, 0x200040) lseek(r3, 0x0, 0x4) ioctl$KVM_SET_VAPIC_ADDR(r4, 0x4008ae93, &(0x7f0000000440)=0xd000) 2018/03/30 10:21:48 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r0, &(0x7f0000002500)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000024c0)={0xffffffff}, 0x106, 0x1009}}, 0x20) write$rdma_cm(r0, &(0x7f0000002580)=@set_option={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000980), r1, 0x0, 0x2, 0x4}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000100)={'ip_vti0\x00', r3}) 2018/03/30 10:21:48 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x0, 0x10000220) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') ioctl$fiemap(r1, 0x6609, &(0x7f00000011c0)=ANY=[]) r2 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r3, &(0x7f0000fb6000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r3, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r3, 0x4040534e, &(0x7f000019ffe9)={0xc1}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r3, 0xc0a85352, &(0x7f00000000c0)={{}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000000)={{}, 'port1\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r3, 0xc0a85320, &(0x7f0000000380)={{0x2, 0x3}, 'port1\x00', 0x0, 0x1005, 0x1, 0x5, 0x4, 0x2, 0x0, 0x0, 0x1, 0x80}) io_setup(0x80000001, &(0x7f00000001c0)=0x0) io_getevents(r4, 0xb7, 0x4, &(0x7f0000000200)=[{}, {}, {}, {}], &(0x7f0000000280)) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000fdbff0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r5, 0xc0a85320, &(0x7f00000002c0)={{0x6, 0x100}, 'port1\x00', 0x2, 0x40000, 0xd393, 0x400, 0x0, 0x0, 0x3, 0x0, 0x4, 0x100000000}) dup2(r2, r0) [ 235.611175] FAULT_INJECTION: forcing a failure. [ 235.611175] name failslab, interval 1, probability 0, space 0, times 0 [ 235.622849] CPU: 0 PID: 28803 Comm: syz-executor0 Not tainted 4.16.0-rc7+ #371 [ 235.630210] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 235.639555] Call Trace: [ 235.642129] dump_stack+0x194/0x24d [ 235.645739] ? arch_local_irq_restore+0x53/0x53 [ 235.650384] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 235.655568] should_fail+0x8c0/0xa40 [ 235.659269] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 235.664357] ? lock_acquire+0x1d5/0x580 [ 235.668315] ? trace_hardirqs_off+0x10/0x10 [ 235.672625] ? find_held_lock+0x35/0x1d0 [ 235.676669] ? __lock_is_held+0xb6/0x140 [ 235.680728] ? check_same_owner+0x320/0x320 [ 235.685035] ? rcu_note_context_switch+0x710/0x710 [ 235.690507] should_failslab+0xec/0x120 [ 235.694466] __kmalloc+0x63/0x760 [ 235.697903] ? tty_write+0x5ba/0x840 [ 235.701600] tty_write+0x5ba/0x840 [ 235.705121] ? security_file_permission+0x89/0x1e0 [ 235.710031] ? process_echoes+0x150/0x150 [ 235.714166] do_iter_write+0x3ca/0x540 [ 235.718033] ? dup_iter+0x260/0x260 [ 235.721651] vfs_writev+0x18a/0x340 [ 235.725260] ? vfs_iter_write+0xb0/0xb0 [ 235.729210] ? __mutex_unlock_slowpath+0xe9/0xac0 [ 235.734031] ? vfs_write+0x374/0x510 [ 235.737735] ? __lock_is_held+0xb6/0x140 [ 235.741780] ? __fdget_pos+0x130/0x190 [ 235.745645] ? __fdget_raw+0x20/0x20 [ 235.749347] do_writev+0xfc/0x2a0 [ 235.752773] ? do_writev+0xfc/0x2a0 [ 235.756382] ? vfs_writev+0x340/0x340 [ 235.760162] ? SyS_read+0x220/0x220 [ 235.763773] SyS_writev+0x27/0x30 [ 235.767202] ? SyS_readv+0x30/0x30 [ 235.770719] do_syscall_64+0x281/0x940 [ 235.774584] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 235.780101] ? syscall_return_slowpath+0x550/0x550 [ 235.785023] ? syscall_return_slowpath+0x2ac/0x550 [ 235.789936] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 235.795281] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 235.800107] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 235.805272] RIP: 0033:0x4548b9 [ 235.808436] RSP: 002b:00007f0719dabc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 235.816121] RAX: ffffffffffffffda RBX: 00007f0719dac6d4 RCX: 00000000004548b9 [ 235.823364] RDX: 0000000000000001 RSI: 000000002036bfd0 RDI: 0000000000000013 [ 235.830608] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 235.837853] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 235.845095] R13: 00000000000006b3 R14: 00000000006fc168 R15: 0000000000000000 [ 235.861843] bond0 (unregistering): Released all slaves [ 236.593823] IPVS: ftp: loaded support on port[0] = 21 [ 236.886085] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 237.305262] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 237.311356] 8021q: adding VLAN 0 to HW filter on device bond0 [ 237.356130] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 237.400345] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 237.406492] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 237.413459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 237.429822] FAULT_INJECTION: forcing a failure. [ 237.429822] name failslab, interval 1, probability 0, space 0, times 0 [ 237.441071] CPU: 1 PID: 28989 Comm: syz-executor6 Not tainted 4.16.0-rc7+ #371 [ 237.448414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 237.457755] Call Trace: [ 237.460325] dump_stack+0x194/0x24d [ 237.463931] ? arch_local_irq_restore+0x53/0x53 [ 237.468584] should_fail+0x8c0/0xa40 [ 237.472273] ? kstrdup+0x39/0x70 [ 237.475622] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 237.480702] ? cgroup_apply_control_enable+0x390/0xbc0 [ 237.485951] ? kernfs_iop_mkdir+0x153/0x1e0 [ 237.490246] ? vfs_mkdir+0x390/0x600 [ 237.493943] ? SyS_mkdirat+0x22b/0x2b0 [ 237.497804] ? do_syscall_64+0x281/0x940 [ 237.501838] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 237.507179] ? find_held_lock+0x35/0x1d0 [ 237.511222] ? find_held_lock+0x35/0x1d0 [ 237.515263] ? __lock_is_held+0xb6/0x140 [ 237.519318] ? check_same_owner+0x320/0x320 [ 237.524225] ? rcu_note_context_switch+0x710/0x710 [ 237.529131] ? rcu_read_lock_sched_held+0x108/0x120 [ 237.534133] should_failslab+0xec/0x120 [ 237.538083] kmem_cache_alloc+0x47/0x760 [ 237.542119] ? memcpy+0x45/0x50 [ 237.545378] ? kstrdup+0x59/0x70 [ 237.548735] __kernfs_new_node+0xe2/0x570 [ 237.552862] ? kernfs_dop_revalidate+0x380/0x380 [ 237.557606] ? snprintf+0xc0/0xf0 [ 237.561040] ? vsprintf+0x40/0x40 [ 237.564466] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 237.569373] ? cgroup_file_name+0x1d0/0x1d0 [ 237.573671] kernfs_new_node+0x80/0xe0 [ 237.577626] __kernfs_create_file+0x4b/0x320 [ 237.582023] cgroup_addrm_files+0x3c5/0xa70 [ 237.586338] ? cgroup_file_write+0x710/0x710 [ 237.590733] ? cgroup_idr_replace+0x3f/0x50 [ 237.595039] ? __lock_is_held+0xb6/0x140 [ 237.599084] ? __local_bh_enable_ip+0x121/0x230 [ 237.603729] ? online_css+0x224/0x2e0 [ 237.607510] css_populate_dir+0x198/0x420 [ 237.611637] cgroup_apply_control_enable+0x390/0xbc0 [ 237.616726] ? cgroup_propagate_control+0x570/0x570 [ 237.621726] ? css_populate_dir+0x289/0x420 [ 237.626036] cgroup_mkdir+0x56f/0xfc0 [ 237.629812] ? __lock_is_held+0xb6/0x140 [ 237.633857] ? cgroup_destroy_locked+0x750/0x750 [ 237.638589] ? rcu_read_lock_sched_held+0x108/0x120 [ 237.643578] ? kmem_cache_free+0x258/0x2a0 [ 237.647792] ? set_nlink+0xc1/0x160 [ 237.651394] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 237.656299] ? generic_permission+0x105/0x3c0 [ 237.660775] ? cgroup_destroy_locked+0x750/0x750 [ 237.665506] kernfs_iop_mkdir+0x153/0x1e0 [ 237.669638] vfs_mkdir+0x390/0x600 [ 237.673156] SyS_mkdirat+0x22b/0x2b0 [ 237.676849] ? SyS_mknod+0x480/0x480 [ 237.680536] ? trace_hardirqs_on+0xd/0x10 [ 237.684662] ? do_syscall_64+0xb7/0x940 [ 237.688621] ? SyS_mknod+0x480/0x480 [ 237.692316] do_syscall_64+0x281/0x940 [ 237.696178] ? __do_page_fault+0xc90/0xc90 [ 237.700385] ? _raw_spin_unlock_irq+0x27/0x70 [ 237.704854] ? finish_task_switch+0x1c1/0x7e0 [ 237.709323] ? syscall_return_slowpath+0x550/0x550 [ 237.714228] ? syscall_return_slowpath+0x2ac/0x550 [ 237.719133] ? prepare_exit_to_usermode+0x350/0x350 [ 237.724125] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 237.729468] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 237.734291] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 237.739451] RIP: 0033:0x4548b9 [ 237.742616] RSP: 002b:00007f6d52047c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 2018/03/30 10:21:50 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x3fd) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "706f727431000000000000000000000000000000000000000000eb000000b2a587e2000000000000020000000000000001008e15e7af00", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1, @time}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f00000002c0)={0x0, 0x0, 'client1\x00', 0x0, "f1c77f732d0264a2", "b6367d3d50f5b65606d4234e6f917ed4a46e28b693a6336d8330af254735861e"}) socketpair(0xb, 0x5, 0x80, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000140)={0x0, 0x0, 0x0, "7175657565300000000000000010000000000000000000000000000000000000000000000000000000000000000000000000b6c200"}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000600)='/dev/sequencer2\x00', 0x0, 0x0) 2018/03/30 10:21:50 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000, 0x0, 0x4}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000d80)={r5, 0x13c, 0x7, 0xaa5, 0x1, 0x8001}, 0x14) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000dc0)={0xaa, 0x20}) pwrite64(r1, &(0x7f0000000e00)="7437032bd6e223b3a59d10357fc245a11551c76207ed30241886ce0ea1326aeac569322a47e5909770909834b26bf6b04af3b30656cbc3e07c3eed14ee7c472c2d276872498ef33618509e2049213b9664560dc77dd302976456a0392edd116b9816cbca183c77f192c4c3260a385cc483327645104ab9987888488ff6b8e163c2eddc4fc33b9f9ba13abbb021303c8d438d96b2da7c190f9cdc9f2242c2df22ccc63b779747bc9b54e299a407b4150450352ce672efd9fd7565ffb5f410dd66a2061984a92c2ca847eb65e95168372a9e92cc53f27151c36569714d1b2b2b2d26b0e9668aa5042a767ab88ad81f2850ce", 0xf1, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) 2018/03/30 10:21:50 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/qat_adf_ctl\x00', 0x8000, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x2) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-serpent-avx2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="d179f2508fb13583", 0x8) r2 = accept$alg(r1, 0x0, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000680)={'bcsh0\x00', {0x2, 0x4e23, @rand_addr}}) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup\x00', 0x200002, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r6 = openat$cgroup_int(r5, &(0x7f0000000000)='memory.high\x00', 0x2, 0x0) fcntl$getflags(r3, 0x1) io_setup(0xffffffff, &(0x7f0000000380)=0x0) io_submit(r7, 0x0, &(0x7f00000004c0)) openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x200, 0x0) accept4$netrom(r2, &(0x7f0000000100), &(0x7f0000000140)=0x10, 0x800) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/hwrng\x00', 0x20000, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r8, 0x4068aea3, &(0x7f0000000400)={0x0, 0x0, [0x9, 0x7, 0x3ff, 0x401]}) sendfile(r6, r6, &(0x7f0000000040), 0x1) sendmmsg$alg(r2, &(0x7f0000002780)=[{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000015c0)="020670da3077f821ddf61b47af3b0114", 0x10}], 0x1, &(0x7f0000000100)}], 0x1, 0x0) recvmsg(r2, &(0x7f00001b0000)={&(0x7f00003a4fa0)=@nfc_llcp, 0x80, &(0x7f0000045000)=[{&(0x7f0000000300)=""/88, 0x58}], 0x1, &(0x7f00009f2000)=""/190, 0xbe}, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r8, 0x84, 0xf, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x13}}}, 0x0, 0x9e09, 0x9, 0x7ff, 0x1}, &(0x7f0000000540)=0x98) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r8, 0x84, 0x1a, &(0x7f0000000780)=ANY=[@ANYRES32=r9, @ANYBLOB="9e000000b0e77285c878a8c5788a4ca01fc127a65c65b4b92ff1cf43c6742eace6f5842d107a0ade6e36cf110d3ea709e629a8cab07a757c936576aebc6ee76a6641eaca431c56fbda3704975c60ee11700a56d11fdb0c007ab2000000000000000090788989689a90f13a08b48e181d5bc6ce1ade5827114412f05d673d7e9f28fff8e2e60334eef2b5335d2808cfb5849769924760be000d7a79505bbb881d"], &(0x7f0000000640)=0x2) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r8, 0x800442d3, &(0x7f00000006c0)={0xbe82, 0x0, 0x100, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 'bcsh0\x00'}) semget(0x1, 0x2, 0x404) setfsuid(0x0) sendmmsg$alg(r4, &(0x7f0000003ec0)=[{0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000840)="cc449f201eeb354eb51310872de4aa0490d6da5b1cd5088fb9a9d3947eebca0ed0e71af84aab09371b9a52181f52347af1416e5beef1df49da0c08ea0ba35312472a97d2fd7ae800f140a3cb7c51f3ed0aabc7c369212b758f17dd44f9a44455f0ab14ef66ddbdc790e3ee60cfda0ecd29b33233d34df5a6c7da27575e4720ce444841e5054c9788e7425a6f0656a9b15147cc0daab62e161383dee8767e0d3cc4ae1b25a81592f62dfa00f71226b8b538b6cab94deaa5513437e29e09381f2d35e6", 0xc2}], 0x1}, {0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000c00)="1dd60c020a58", 0x6}], 0x1, &(0x7f0000000d80)=[@assoc={0x18, 0x117, 0x4, 0x9f}], 0x18, 0x8001}, {0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000e80)="9545a3b5850ed612113d2ae8196c9ab72ec05256d0b6714dd7470e19d0b4a63d4bba65f11f76bb776a9b16911e3b889d5ccbfa3edf376ac76ae119bddd54a4887f496f8f4c162553c17d3ffcd625d44dc5ea10a7f354f526fe0fc48cfdd40d8e2b58aa57e8832f79a59cac58ec75f99044d51878bbd7476da6ddc25a063f1d76c0ba449e305df8875183f93919dc714f4f99df4bff07a9677a5f86cb59760e85a7b347128103ee8f5c0b0e7e84507c37191ce52cf2686a6fc31cc0484c8da221cbc11c", 0xc3}], 0x1, &(0x7f00000027c0)=ANY=[], 0x0, 0x4000090}, {0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000001140)}], 0x1, &(0x7f0000001200)=[@assoc={0x18, 0x117, 0x4, 0x1}, @assoc={0x18, 0x117, 0x4, 0x7}], 0x30, 0x24048845}, {0x0, 0x0, &(0x7f0000002680)=[{&(0x7f0000001280)="10ea200e71d0dcc1fd6c369d7cf85beb2ff53b6efb5f004986f6ec1c715750ed59f077c3d1be567ee97fb41875bd4a63ba4bdb28e2c4adc4d746cd92a674d9b6ade1bfdf6dd7863c7616d5753d6bd15df352214dd5285218d8d82aee087dc81158ff7ed736780fcb85468b687909", 0x6e}, {&(0x7f0000002600)="aa8dbf2ddd0a3c092e2529287752c58a6842f0f296f0646163814e27c750d5cc53a9a45aaf96d153dbf1262eed6d2533ad4f2722ebe427f022949f307f3507a7eae33eebc45af71a0616e93d", 0x4c}], 0x2, &(0x7f0000002700), 0x0, 0x20000000}, {0x0, 0x0, &(0x7f0000003b80)=[{&(0x7f0000003b00)="746d7dbe6eadba4a0c75627235f493162adbd99038023b8707d17c48d7a2ef8f7f41a795760756ab22ff81d9e964f8d7cafe3c27eebfbc8eb7cde0e677662a1402bd7e6817b5b1bbfbfad781afe2abf05cf69a7aef0c8edd7f", 0x59}], 0x1, &(0x7f0000003bc0)=[@op={0x18, 0x117, 0x3}, @op={0x18, 0x117, 0x3, 0x1}], 0x30}, {0x0, 0x0, &(0x7f0000003d80)=[{&(0x7f0000003c40)="e70c75dd4c417fd0a5223e80907669e133fb3af4d7b30af852975f7a85d84da57c66c13cbd7792ef7152b14a94c05ea1036ed074e2a72c2b66fa8faac53b9c8d8483a7ef471a472bb77d139993efca48a48adebc9f7dda62079e9607791b80879930dcdcba974b19e93ad8cc107d759bbd24838cdc853bb03c611644f42efd4c77b5f89f6300ee2f1200e6dce2e20cea3107617e9ab1b1558bbc20f1edde0d761f08e80ca35b1a599f7db06c5519a330688962551e6c0be28aa5c8ca0ba1e149792cabe81797d03041974581e2c3a6df7adec3e7f670a09f988cf3e28c1f75824d8e", 0xe2}], 0x1, &(0x7f0000003dc0), 0x0, 0x8000}], 0x7, 0x8004) 2018/03/30 10:21:50 executing program 0 (fault-call:1 fault-nth:1): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x100000000106, 0x0) writev(r0, &(0x7f000036bfd0)=[{&(0x7f0000b51000)="eb", 0x1}], 0x1) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000040)=0x4000000058) read(r0, &(0x7f0000000140)=""/1, 0xfffffffffffffeb7) 2018/03/30 10:21:50 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000780)=[{&(0x7f0000000400)="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", 0xfc}], 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x200900, 0x103) connect$vsock_stream(r1, &(0x7f0000000600)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) r2 = socket$alg(0x26, 0x5, 0x0) rt_sigtimedwait(&(0x7f0000000140)={0xffffffff}, 0x0, &(0x7f0000000180), 0x8) bind$alg(r2, &(0x7f000073e000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(cbc-twofish-avx)\x00'}, 0x58) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000500)={&(0x7f00000005c0)=[0x0, 0x0, 0x0], 0x3}) nanosleep(&(0x7f0000d1e000)={0x0, 0x1c9c380}, &(0x7f0000000000)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r3, 0x118, 0x0, &(0x7f0000000100)=0x7, 0x4) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000000c0)={0x1, 0x1, 0x1, 0x1, 0x0, 0x6}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000280)={r4, @in={{0x2, 0x4e23, @multicast2=0xe0000002}}, [0x8000, 0x9, 0x80000000, 0x3, 0x80, 0x8001, 0x800, 0x100, 0xe0db, 0x0, 0x2000000000, 0x200, 0x68, 0x0, 0x8]}, &(0x7f0000000380)=0x100) r5 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0xfffffffffffffdfa) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r5, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port1\x00', 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r5, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r6 = gettid() r7 = syz_open_procfs(r6, &(0x7f00000002c0)='maps\x00') readv(r7, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/28, 0x65}], 0x1) exit(0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r7, &(0x7f000004ffe0)=[{&(0x7f0000000000)=""/128, 0xe6}], 0x222) r8 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) connect$ax25(r3, &(0x7f00000006c0)={0x3, {"fc5da504005009"}, 0x7fff}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) getsockopt$netrom_NETROM_T1(r8, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r5, 0x80045301, &(0x7f0000000700)) 2018/03/30 10:21:50 executing program 7: clone(0x200, &(0x7f0000000100)="f0f7d70fc52207334efb558c957ea5882b23d85fa1659dc13aa7603b45aa407f02117308b1a8697bcf6617a98d145ec63b3cffa3123c2b94a42831af8d9bdb4b03d2954fdaa7e037f2c459a27e42921a924df6c5899ef4dbdb44bffbadd515d6024b7e3450b4ea54c55a229f4d694a292b270018a408b9ed54a0bc1929156ff004c1cf0b1728065c1ae04f4eeb552ff2420005e5ccb9400909127922c4a8e69ffbb96ca5bc95786113ae475b94c2c9a6a235276e2f1b7f01010000000000007a", &(0x7f0000000000), &(0x7f0000f8b000), &(0x7f00000d5000)) mknod(&(0x7f0000cd7000)='./file0\x00', 0x103a, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000340), &(0x7f000027a000)) r0 = syz_open_dev$sndpcmp(&(0x7f0000000240)='/dev/snd/pcmC#D#p\x00', 0x100, 0x8001) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000280), &(0x7f00000002c0)=0x4) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000080)={0x4, 0xffffffffffffff9c, 0x1}) bind$unix(r1, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) r2 = syz_open_procfs(0x0, &(0x7f000042cff4)='personality\x00') read(r2, &(0x7f0000f1bf7e)=""/130, 0xfffffdd8) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000240)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x9, 0x18}, 0xc) open$dir(&(0x7f000050bff8)='./file0\x00', 0x2, 0x0) 2018/03/30 10:21:50 executing program 6 (fault-call:3 fault-nth:47): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r0, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r0, &(0x7f0000000100)=""/65, 0x41) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) linkat(r0, &(0x7f0000000480)='./file1\x00', r1, &(0x7f00000004c0)='./file0\x00', 0x1000) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') unlink(&(0x7f00000000c0)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r0, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x12021) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000340)={0x8, 0x9, 0x4, 0x10000, 0x1, 0x7, 0x7fffffff, 0x0, 0x29, 0x0, 0x20}, 0xb) 2018/03/30 10:21:50 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000040)={0x0, 0x40, 0xffffffff80000000, 0x400, 0x81, 0x2, 0x0, 0x2, {0x0, @in6={{0xa, 0x4e23, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x9}}, 0xf4, 0x1f, 0x81, 0x9, 0x9}}, &(0x7f0000000100)=0xb0) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000200), &(0x7f00000002c0)=0x8) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffff9c, 0xc018620b, &(0x7f0000000340)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000380)={r3}) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={r1, @in6={{0xa, 0x4e23, 0x6e6, @loopback={0x0, 0x1}, 0x2}}, 0x0, 0x3d}, 0x90) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'bridge0\x00', 0x0}) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000280)={@mcast2={0xff, 0x2, [], 0x1}, r4}, 0x14) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x79, &(0x7f0000000000)={0x0, 0x0, 0x8102}, 0x8) [ 237.750302] RAX: ffffffffffffffda RBX: 00007f6d520486d4 RCX: 00000000004548b9 [ 237.757546] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 237.764789] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 237.772037] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 237.779281] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 000000000000002e [ 237.787089] cgroup: cgroup_addrm_files: failed to add max, err=-12 [ 237.817304] QAT: Invalid ioctl [ 237.859511] FAULT_INJECTION: forcing a failure. [ 237.859511] name failslab, interval 1, probability 0, space 0, times 0 [ 237.871197] CPU: 1 PID: 29007 Comm: syz-executor0 Not tainted 4.16.0-rc7+ #371 [ 237.878907] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 237.888253] Call Trace: [ 237.890828] dump_stack+0x194/0x24d [ 237.894442] ? arch_local_irq_restore+0x53/0x53 [ 237.899113] should_fail+0x8c0/0xa40 [ 237.902807] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 237.907888] ? lock_release+0xa40/0xa40 [ 237.911843] ? check_same_owner+0x320/0x320 [ 237.916152] ? __is_insn_slot_addr+0x1fc/0x330 [ 237.920709] ? rcu_note_context_switch+0x710/0x710 [ 237.925622] ? __might_sleep+0x95/0x190 [ 237.929573] ? n_tty_write+0xa7b/0xec0 [ 237.933456] ? __mutex_lock+0x16f/0x1a80 [ 237.937489] ? n_tty_write+0xa7b/0xec0 [ 237.941355] ? __lock_acquire+0x664/0x3e00 [ 237.945563] ? n_tty_write+0xa7b/0xec0 [ 237.949427] ? lock_downgrade+0x980/0x980 [ 237.953553] ? mutex_lock_io_nested+0x1900/0x1900 [ 237.958367] ? lock_release+0xa40/0xa40 [ 237.962336] ? trace_hardirqs_off+0x10/0x10 [ 237.966635] ? rcutorture_record_progress+0x10/0x10 [ 237.971638] ? llist_del_first+0x1bf/0x270 [ 237.975855] should_failslab+0xec/0x120 [ 237.979807] __kmalloc+0x63/0x760 [ 237.983239] ? print_irqtrace_events+0x270/0x270 [ 237.987970] ? __tty_buffer_request_room+0x265/0x710 [ 237.993054] __tty_buffer_request_room+0x265/0x710 [ 237.997954] ? add_wait_queue+0x1a9/0x290 [ 238.002079] ? flush_to_ldisc+0x590/0x590 [ 238.006201] ? lock_release+0xa40/0xa40 [ 238.010157] ? mark_held_locks+0xaf/0x100 [ 238.014284] ? _raw_spin_unlock_irqrestore+0x31/0xc0 [ 238.019361] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 238.024360] tty_insert_flip_string_fixed_flag+0x84/0x1c0 [ 238.029882] pty_write+0xc4/0x140 [ 238.033321] n_tty_write+0xab1/0xec0 [ 238.037030] ? __check_object_size+0x8b/0x530 [ 238.041507] ? process_echoes+0x150/0x150 [ 238.045629] ? __init_waitqueue_head+0x140/0x140 [ 238.050363] ? kasan_check_write+0x14/0x20 [ 238.054573] ? _copy_from_user+0x99/0x110 [ 238.058702] tty_write+0x3fa/0x840 [ 238.062220] ? process_echoes+0x150/0x150 [ 238.066348] do_iter_write+0x3ca/0x540 [ 238.070211] ? dup_iter+0x260/0x260 [ 238.073822] vfs_writev+0x18a/0x340 [ 238.077425] ? vfs_iter_write+0xb0/0xb0 [ 238.081373] ? __mutex_unlock_slowpath+0xe9/0xac0 [ 238.086190] ? vfs_write+0x374/0x510 [ 238.089888] ? __lock_is_held+0xb6/0x140 [ 238.093929] ? __fdget_pos+0x130/0x190 [ 238.097790] ? __fdget_raw+0x20/0x20 [ 238.101489] do_writev+0xfc/0x2a0 [ 238.104914] ? do_writev+0xfc/0x2a0 [ 238.108520] ? vfs_writev+0x340/0x340 [ 238.112299] ? SyS_read+0x220/0x220 [ 238.115908] SyS_writev+0x27/0x30 [ 238.119336] ? SyS_readv+0x30/0x30 [ 238.122852] do_syscall_64+0x281/0x940 [ 238.126715] ? __do_page_fault+0xc90/0xc90 [ 238.130921] ? _raw_spin_unlock_irq+0x27/0x70 [ 238.135391] ? finish_task_switch+0x1c1/0x7e0 [ 238.139862] ? syscall_return_slowpath+0x550/0x550 [ 238.144765] ? syscall_return_slowpath+0x2ac/0x550 [ 238.149671] ? prepare_exit_to_usermode+0x350/0x350 [ 238.154666] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 238.160011] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 238.164840] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 238.170005] RIP: 0033:0x4548b9 [ 238.173173] RSP: 002b:00007f0719dabc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 238.180854] RAX: ffffffffffffffda RBX: 00007f0719dac6d4 RCX: 00000000004548b9 [ 238.188098] RDX: 0000000000000001 RSI: 000000002036bfd0 RDI: 0000000000000013 [ 238.195340] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 238.202583] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 2018/03/30 10:21:50 executing program 6 (fault-call:3 fault-nth:48): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r0, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r0, &(0x7f0000000100)=""/65, 0x41) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) linkat(r0, &(0x7f0000000480)='./file1\x00', r1, &(0x7f00000004c0)='./file0\x00', 0x1000) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') unlink(&(0x7f00000000c0)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r0, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x12021) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000340)={0x8, 0x9, 0x4, 0x10000, 0x1, 0x7, 0x7fffffff, 0x0, 0x29, 0x0, 0x20}, 0xb) 2018/03/30 10:21:50 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000, 0x0, 0x4}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000d80)={r5, 0x13c, 0x7, 0xaa5, 0x1, 0x8001}, 0x14) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000dc0)={0xaa, 0x20}) pwrite64(r1, &(0x7f0000000e00)="7437032bd6e223b3a59d10357fc245a11551c76207ed30241886ce0ea1326aeac569322a47e5909770909834b26bf6b04af3b30656cbc3e07c3eed14ee7c472c2d276872498ef33618509e2049213b9664560dc77dd302976456a0392edd116b9816cbca183c77f192c4c3260a385cc483327645104ab9987888488ff6b8e163c2eddc4fc33b9f9ba13abbb021303c8d438d96b2da7c190f9cdc9f2242c2df22ccc63b779747bc9b54e299a407b4150450352ce672efd9fd7565ffb5f410dd66a2061984a92c2ca847eb65e95168372a9e92cc53f27151c36569714d1b2b2b2d26b0e9668aa5042a767ab88ad81f2850ce", 0xf1, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) 2018/03/30 10:21:50 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000002031900000007000000068100023b0509000100ab0100ff3ffe58", 0x1f}], 0x1) [ 238.209827] R13: 00000000000006b3 R14: 00000000006fc168 R15: 0000000000000001 2018/03/30 10:21:50 executing program 3: syslog(0x3, &(0x7f0000000000)=""/220, 0xdc) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x400000, 0x0) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000140)={0x101, 0x200, 0x0, 0x9269, 0x8, 0xffffffffffffff86, 0x5, 0x8001, 0x9, 0x1}) 2018/03/30 10:21:50 executing program 7: clone(0x200, &(0x7f0000000100)="f0f7d70fc52207334efb558c957ea5882b23d85fa1659dc13aa7603b45aa407f02117308b1a8697bcf6617a98d145ec63b3cffa3123c2b94a42831af8d9bdb4b03d2954fdaa7e037f2c459a27e42921a924df6c5899ef4dbdb44bffbadd515d6024b7e3450b4ea54c55a229f4d694a292b270018a408b9ed54a0bc1929156ff004c1cf0b1728065c1ae04f4eeb552ff2420005e5ccb9400909127922c4a8e69ffbb96ca5bc95786113ae475b94c2c9a6a235276e2f1b7f01010000000000007a", &(0x7f0000000000), &(0x7f0000f8b000), &(0x7f00000d5000)) mknod(&(0x7f0000cd7000)='./file0\x00', 0x103a, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000340), &(0x7f000027a000)) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000080)={0x4, 0xffffffffffffff9c, 0x1}) bind$unix(r0, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) ioctl$TIOCCBRK(r0, 0x5428) r1 = syz_open_procfs(0x0, &(0x7f000042cff4)='personality\x00') read(r1, &(0x7f0000f1bf7e)=""/130, 0xfffffdd8) lstat(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)) execve(&(0x7f00000017c0)='./file0\x00', &(0x7f00000000c0), &(0x7f0000001640)=[&(0x7f0000001780)='%trustedwlan1securityGPL^vboxnet1louser%[ppp0cpuset&[(,/{^\x00']) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x9, 0x18}, 0xc) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e21, 0x100, @remote={0xfe, 0x80, [], 0xbb}, 0x3}}, 0x3, 0x4}, &(0x7f0000000300)=0x90) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000340)={r2, 0xfe, "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"}, &(0x7f0000000480)=0x106) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f00000004c0)=ANY=[@ANYBLOB="6d616e676c65000000000000000000000000000000000000000000000000000000100000ea34b6b516e0de86e209436381ee59ca6d1f903e8a0b8632e747e2397456d2d553af965fd364570e0cedc3484f22cf3fe6b64559a89969259eefbe5bdd65a8debaced20f1148c5cee849d535c06714524916d4650fcb447ad00a87f89ed4bf6dc3046d44e98059b0f77be59004916663f2b131b122d75c24bacad2e8ae5d6253eae383699d171598f78d3d4e472f8660f5f7500a791c8fa529adba20b41901ccb9f7edf9deb9f76e47c055774a72beeab9a28c6b2f645df163123ef5de0b6701e1222fc5ae69b5de3795a1353b708f12580aa4e572fc93239d4bf76c71644292b14607a9a5761dc3868692072b3768c1864fdf704295792a5504fac0ef55af0a118030f313c7e6010032c2d2900a2653e24e16f1fbaa3ec012aafe068a684696d439e228be0d18693cfbf5155315b26ba4f1ee588f9e0dc5359aca57d7c6a8834da8a055222ee861205ed1eda2f53bd77a80cd59b67fbc6849208947f802dcb881355951b035cde1d86977d3013bcb73be4f8f1e0b5a98ffbdd252e771f2daca323a393de794a71e91b1e85d1f022842d9188245b13055e4636d73e1f80c482086e05c75949efd21e9312ebc2b4f67ee2954b19789f7b3473534a783bd92258e4b5b6dc07a15172a03379c80a21f0d9be3e51fdc43aafbf9c7be57f32002eb7554ead1e3e03529b534a5a8e29283ec99322ab7896b0199b36c0ef185b7578d6e10f05e9f88cbd4521ddbe10925814c54675678280116bdb9dfbd1d5943c738d6c1ef16d493f3bf59683f022487e3bf6e497fe0f0e6694f12b4d3cdc10da2358976527ca012df23c2bcceaac4178ff4332baf9ec659f4a4174dee0020b13216250c3135e43995069f728c830b3551cd4ad71274e45d3767b528bba3eb2ad3101f2354ae63826369a4ec801ba2094032c0807794e1d650ba450e4f0dc5c3c7e0e211ac27938d76fe3e2d38a233480c5e92375a456b40d818ce2c7129cc90eabc2bf297999b18e3a7abc31bc4ac1524f617407c0d9098d73ad2f5d5204bdd0572f87f664ebdf35943f387040c9e23a763e16ca4f54aff70da5362eec65dfc9450a690202395436270e074c2853bf8764146109c5b8d03e6bc38655cd0bf158d822e77971b2792b7f4f54f81f359c9d2d990e065d588d027175ca45fab7488c97571b451298566042dd59846daf8f87663bcd956c3bf368c0978c7b78f991ac79906b45ba3b28d40b7ef4a10c0902ad886f9742222308f7855194971920e737ce8a283ba3a32f176a0a4b01ed0f600dd3fb51011ad3e028f289e3fb6d8f268b2c47f6821cdb610beb2daa4df3db0bafe9f5b63de05dd134ade475eb77f9b3625c5e0c791acf6a10ebaf138a3452b085c5e7b7b82b5a5f5b0e2657e1502359eefee285279b9f52540f5cb83dd33404d06484c1001ab00ed493ea760fae605ab6bc7e9c2c81a89e8fd92c48490aaf1ac64827afa42b8ad8df6aaa6141c4543ce1e048ca27e5dd6a31b10c07002dc73df2228661397735fd28db1bbb4a674135cb5482e7bb148b6befadc4b014d423ef87462a89c6cdb948700b79ae389cc924f85e473ac37f54c8a0bdf2754a9c1b41b661c015d2c84a5c84bfa97ad6769035763ae47e88bf7b5244ed1bd584c9519f133ea322264aa209c408854777ddfde983666b6088cb2c01e2552e56de97bef825de5f02e07e727abb4d600c8a400eee2d024ab8c98c23e721aea51d4e1c2b5ed036f9cf23b750a2e09c3e2acdb8e70ff197b81cf2ae637085e54cfe69ab70b76d0af6fa0e75b9045df86031b91a2f6082de959f837953976ec876cdf032e2e120afeff4408345b6200cbbf36ae5d3bdb688f751194ddd09135a26dc1d9c85b68c5354509b00ff5addded0696904dba78511aa7cd625567b8158039c0c14597babf97b5d370fb4826984e3f3ac8aa3ed2491af3c9c0021ef6f7e02c5c68c5c40890ccf40f08c4f933474344832568d6419d9493987853165cbd414918a0c133d631f48eacbe13c8dc3baa761d04c11de367a49f834bea1125c916209b5176d854fcf23f0ccc4be94c289e1a9cfc8395b71c64994cd2b9756763a4201089352bc768ca99ceaec951b6c83333c267f03532d5a6f3562d6e6680cead74017cd28f4d3fce8b937c68e8c631fc9485be8d20be3b5018906e9e6b4ef8ba2ae359415cf5a7884c38fd15a8845534e5235f9f6453d7eac590f0fed6691cf104637bda669739e30af8c639d381749a2182c40f674b56ee88bec3a53435a3a971e4c9d09bc0c19e2ba9796243b0f6bce133a6c6f00382a9597eedfae445b95cd3d0e4b957a255c31535816e8f15a09ef548a2ac94e20d1d6f736cdf67144307b347609847f86904a72b0cd825a30e79f5ef8db31de91f5f6f40f574d1c2b987acc35f43b992450f410c5edf7111dd63f9aa67e4c55e386f9e770218d5f42c4ff2c35db09efcd31dc1c6d07782c161fa51887a8d8c8e75b0b224c564eea088858c7f5881e1681c07c857014e0aa7092324f2e15a6bc5b4f5d717463c860d19166a7e01ae0f7da32b7f1f7895492025f883cfe448242d1a5314e5fb3c87c26ea609c7e5158c67c374dd0005fa2cdf2dff9de0f2ecda7f12bbb334defe4231d64381bc3ad08538fbc68f705a53eb14bca7c50286c0d9c8a91a96623eb2d92f37639ce461d5d9fa0181ed61b2485de5117893822e2095c031cad4aa1352ffc4b70d5fcf10fd14591852262082628d45014a9e44941a11991311d10a8073913b24473ab634246edd80d433e03c3d9b6a11f8c1746e9d1502ad38d8010e7cd669f209c062702ced562b2d7fa73bfb4c1d3871d3172c33f13c9067b6391ae6d44002aa12f149ad64be83045d71388d40294afea391417564490dbc8b13411373d4bd29bf7668b9af67b7f402a3622f89aeac33b3660197662ce13d7751d9edfcacc545090c040f0f8df7b322c3af4df350f6a16970b71b47610eb6cb0a6e6c7bfb8ca2001ab281391a4e9d4e309dc7c5732e6ac83f495a8ec1881356fd0e86a1e3cfe68a1e44e3b68151f6539478e6362e641d86fc84c529b0e5c612de5f89b27ad615dc0f5c94b7cea33cc29be4e7d4735fd99024de78486b48a111e9c5b79830ee722e67152fdbd2383fba4a6cc32488f8057be17d2528f086d95221db208354c7e4c8a52dc53f6ac6c26e5a6f9d917607e851620e050ffb749ba0ec86a30f9024ecb833b0742c5b413892c312408ae2b9f89a9fa56797831ef34452e50a50fab1f6c202d4fa08aa594ec8e9f3b3255038b7d4265b2e18e7d7566b04bc3824b6fe9ef61017a0933a49a30447c95caf5ea716ce8399919e853daad7e8279ded7bd58321c1f299846469d60ecc587913841fb194e1751d46ee1025b5946d23d5de8998e8caee59d732ed0733cf9257a7c7dc52b66f666910d0d466db4ed100a9a5d56de46c11102dec24c2c717d98c68e07974f6cefb3713c98a5771a1992619aab6e095caf464b04331d7112c3db0cc54d7b475b528eef885edcea2f8fd46f25beb95eadcb6561f2a72733b056a390594cd5a66f6c5c38571359a6d82ad6f61498467b76260235f284d9bbb234f13e910dac2314c4ec10d406c13431337a37bae2af3aecec41344175851d38190807461f2726b30a0e9fdb5e33250d666c91d185af81945534885431557fda70008555c27d1b6224408dd24a200dd1e2e9d9cb109ba081831fd4f218a9b1b107668c7377a7914623756e29120f5ea4fe0cc4dd1aedf28fc9b2485fee212c918c4f7d281113cffea615585b96f65590cbd8f046c0ce65ebb7e76f70883f72a8b9cc4509f473ede9b8759723ca2efcd36845488f5827a8fa84f35516267d8870e685e9a47147f20de248225395788d41fb2df949b3b62d2ba98de6f4a7b40631adf3474577971916ea2e00705f185519b8f1cb3dcaaa969c38b7d9229adf835516a81e2c123158b96daa88ea7c95f8580dae743d883082a467c29944680275db0d65b2b74b4a5d42cf3ed04caf1ab72afa113d53b46bb1899f6e054c377528cc074f8402500ab5b284a6243f9deb644844b0f987a49df04669671641e5c35c4ef5eb88056aaa359ad7fc8806d14cfed001ac762782e3c7be85d3f013bdfe9dfdd03051d86888306832bb30c5c554e178550e8add01f084d168af48fcf5c73ac22686cedac82db69f74c1cfc35b25be051288a4025226900d0350bbddc12b0bc26af97d9a8a7165c04c5962361881c6df5313d3d24e0fd490e38fcb413418a57667759a671edf1d13923a9af44b0578f341a88d949c45ddea37ed0cc2cc8b89d2b27f7fd2d51a07764fa9f471c811e99cf77832b99a1b8df7ffa8becc07edb8bc231a63c1b8cf9bd533575af8115221f5bf6c9b716099e818b831317773e2cb0dce8a7a8a295adb2de5c7c51895de5d43a2fd642c58cb80dbb4ba98b919499d993973420733d7a2c5328a4b2d0319f48fb92da66aa4959721ec0c4e0d9bfe8507e818e2955eb996d1cd25af4e46e30c045a6211d777ea1c859ccb0f622b353f6178ea645d4a1d52b921f681831cf3992dbc0051ef7668af39bf59c3d86d0cd6b56baf0c1ba9f37cc3827179dded1fd009cf2fc698887cf13f7294b950674513531ec03bf4f60dfe7aa63bdb524789a9614f57cc5b2574bac4fb01ab1333cdae22cf96a282088a2f966fcf00c6f1c95ee2180b0ed7fa8e049c7994b01aef5092c022d12ca4019c197040220c4444952fa3ea1c541777d5fb35632a5bf2ac2783cff8f6a2030889b0d246b8a1808fc90c73ff99c83534cff703d5beea6ff8293363ebb129765da184ee863da5154f01a1ab37adb0ca47b68c1a87cbcea32f88f501e57bd4e1a4f1e85660bc58ed2843297f29256ca6f11033264fc271e6c36fbf0343ee7461e23daca13bc0faad5d8f7d7412726218eb3a63cc104838775669328f093405bc89bc038736476095255bdce851d1c68f0f71b1f297728537dc7b0da04a21083f10c8d533eaa36a7eb548bd6861999d4df57aef5729ff38c129825bdff80e328488ec143f96cac4f648e1c2c0bb63a904b8989732e71b9cc1f20d8bc9db95958949604e50f5ebdad89cb62fe5e406b36ab3d63cfd000b63305cea0b9729747362e684e99d7ffe1e9708252ad568868b4e58d663e8cf538b6e0c099bbef37f7c9d5f4c4646bdda20a271d1b62aec1e7ab381eb9984973509bcf2f7cdc4b59b6f6999d39bbf61e2c3dff5418ea46e80ed458b9d1a9087a223cccfe350f80993af9601cc3e18ee04db07c510b351f0b80acd3d6319516bc47a13f6fb18b6f7547995f08dff96466b654b915af8fbbcbfaeba5210ddef937454fc93aa63c5014467253896537f2846b0cc1ad88f68125c0870193d4e71feea1585b3e4aa3652c5e6e75b4834115dab7245c4b2a007d059fdb8fd3815c3895aa332032fa73e6fb78f52f8355c19a450f979e1c2175af9a22e2e064a9fc0e5af3c421da0194eb62ffba978b250d338db5daaca065b5afef5dfa8e7a159e49f2b114264b647ea7c0b1893d8787cc3a7d01a7d376afba3b9f247671b53d8bfdb7de51ff304a1e90c08c27c5f9b6bd9a6a3894e4222aba7d119b2e74f85190ed9bde560078901779b0083f5cf3c6f61493922b395cc675091c1d8d465f8d013d7d874d330f874af131a2e686eb2519f9f00d9c92598965054a82ec15c7ca887620020000000000000019153bc3a774eabec517d3fbd198cea6deb68357bcc93319a2d843bd9dbc34686cdeaadc5ee7a32f99763053168c"], &(0x7f0000001500)=0x1024) open$dir(&(0x7f000050bff8)='./file0\x00', 0x2, 0x0) 2018/03/30 10:21:50 executing program 5: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f000008cff4)='/dev/rfkill\x00', 0x0, 0x0) r1 = epoll_create1(0x4) getsockopt$inet6_opts(r0, 0x29, 0x3f, &(0x7f0000000140)=""/223, &(0x7f0000000100)=0xfffffd13) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00001b6ff4)) epoll_ctl$EPOLL_CTL_ADD(r1, 0xa000, r0, &(0x7f0000d56ff4)={0x30000001}) [ 238.378364] QAT: Invalid ioctl [ 238.404328] bond0 (unregistering): Released all slaves [ 239.109825] IPVS: ftp: loaded support on port[0] = 21 [ 239.393115] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 239.803907] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 239.810000] 8021q: adding VLAN 0 to HW filter on device bond0 [ 239.854201] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 239.897680] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 239.919206] FAULT_INJECTION: forcing a failure. [ 239.919206] name failslab, interval 1, probability 0, space 0, times 0 [ 239.930635] CPU: 1 PID: 29208 Comm: syz-executor6 Not tainted 4.16.0-rc7+ #371 [ 239.937976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 239.947308] Call Trace: [ 239.949872] dump_stack+0x194/0x24d [ 239.953484] ? arch_local_irq_restore+0x53/0x53 [ 239.958136] should_fail+0x8c0/0xa40 [ 239.961827] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 239.966906] ? rb_first_postorder+0xa0/0xa0 [ 239.971203] ? __mutex_lock+0x16f/0x1a80 [ 239.975239] ? save_stack+0x43/0xd0 [ 239.978836] ? kasan_kmalloc+0xad/0xe0 [ 239.982701] ? trace_hardirqs_off+0x10/0x10 [ 239.987007] ? find_held_lock+0x35/0x1d0 [ 239.991054] ? __lock_is_held+0xb6/0x140 [ 239.995103] ? check_same_owner+0x320/0x320 [ 239.999400] ? lock_downgrade+0x980/0x980 [ 240.003523] ? rcu_note_context_switch+0x710/0x710 [ 240.008437] should_failslab+0xec/0x120 [ 240.012390] __kmalloc_track_caller+0x5f/0x760 [ 240.016956] ? string+0x180/0x200 [ 240.020381] ? kstrdup_const+0x39/0x50 [ 240.024246] kstrdup+0x39/0x70 [ 240.027418] kstrdup_const+0x39/0x50 [ 240.031110] __kernfs_new_node+0xa2/0x570 [ 240.035238] ? kernfs_dop_revalidate+0x380/0x380 [ 240.039980] ? snprintf+0xc0/0xf0 [ 240.043407] ? vsprintf+0x40/0x40 [ 240.046839] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 240.051747] ? cgroup_file_name+0x1d0/0x1d0 [ 240.056045] kernfs_new_node+0x80/0xe0 [ 240.059912] __kernfs_create_file+0x4b/0x320 [ 240.064309] cgroup_addrm_files+0x3c5/0xa70 [ 240.068618] ? cgroup_file_write+0x710/0x710 [ 240.073020] ? cgroup_idr_replace+0x3f/0x50 [ 240.077322] ? __lock_is_held+0xb6/0x140 [ 240.081370] ? __local_bh_enable_ip+0x121/0x230 [ 240.086022] ? online_css+0x224/0x2e0 [ 240.089803] css_populate_dir+0x198/0x420 [ 240.093933] cgroup_apply_control_enable+0x390/0xbc0 [ 240.099029] ? cgroup_propagate_control+0x570/0x570 [ 240.104036] ? css_populate_dir+0x289/0x420 [ 240.108338] cgroup_mkdir+0x56f/0xfc0 [ 240.112110] ? __lock_is_held+0xb6/0x140 [ 240.116155] ? cgroup_destroy_locked+0x750/0x750 [ 240.120886] ? rcu_read_lock_sched_held+0x108/0x120 [ 240.125874] ? kmem_cache_free+0x258/0x2a0 [ 240.130085] ? set_nlink+0xc1/0x160 [ 240.133687] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 240.138589] ? generic_permission+0x105/0x3c0 [ 240.143061] ? cgroup_destroy_locked+0x750/0x750 [ 240.147793] kernfs_iop_mkdir+0x153/0x1e0 [ 240.151921] vfs_mkdir+0x390/0x600 [ 240.155446] SyS_mkdirat+0x22b/0x2b0 [ 240.159139] ? SyS_mknod+0x480/0x480 [ 240.162826] ? trace_hardirqs_on+0xd/0x10 [ 240.166952] ? do_syscall_64+0xb7/0x940 [ 240.170905] ? SyS_mknod+0x480/0x480 [ 240.174595] do_syscall_64+0x281/0x940 [ 240.178458] ? __do_page_fault+0xc90/0xc90 [ 240.182666] ? _raw_spin_unlock_irq+0x27/0x70 [ 240.187136] ? finish_task_switch+0x1c1/0x7e0 [ 240.191606] ? syscall_return_slowpath+0x550/0x550 [ 240.196510] ? syscall_return_slowpath+0x2ac/0x550 [ 240.201416] ? prepare_exit_to_usermode+0x350/0x350 [ 240.206409] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 240.211753] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 240.216578] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 240.221739] RIP: 0033:0x4548b9 [ 240.224901] RSP: 002b:00007f096417ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 240.232585] RAX: ffffffffffffffda RBX: 00007f096417b6d4 RCX: 00000000004548b9 [ 240.239827] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 2018/03/30 10:21:52 executing program 7: mknod(&(0x7f0000cd7000)='./file0\x00', 0x103a, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000340), &(0x7f000027a000)) socket$vsock_stream(0x28, 0x1, 0x0) socketpair$inet(0x2, 0x4, 0x6, &(0x7f0000000000)) socket$vsock_stream(0x28, 0x1, 0x0) bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) r0 = syz_open_procfs(0x0, &(0x7f000042cff4)='personality\x00') read(r0, &(0x7f0000f1bf7e)=""/130, 0xfffffdd8) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000240)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x9, 0x18}, 0xc) open$dir(&(0x7f000050bff8)='./file0\x00', 0x2, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYBLOB="5d1d63501eb30df3ac9395879672654b77", @ANYRES16=r1, @ANYBLOB="00012cbd7000fcdbdf250c0000000800060005000000080005000000000008000500070000000800060007000000"], 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x840) 2018/03/30 10:21:52 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x100000000106, 0x0) writev(r0, &(0x7f000036bfd0)=[{&(0x7f0000b51000)="eb", 0x1}], 0x1) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000040)=0x4000000058) read(r0, &(0x7f0000000140)=""/1, 0xfffffffffffffeb7) 2018/03/30 10:21:52 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x110) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000040)=[@in6={0xa, 0x4e21, 0x8000, @mcast2={0xff, 0x2, [], 0x1}, 0x9}, @in={0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @multicast2=0xe0000002}], 0x3c) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000ec6000)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000da6feb)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000501feb)='/proc/self/net/pfkey\x00', 0x0, 0x0) close(r1) 2018/03/30 10:21:52 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000, 0x0, 0x4}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000d80)={r5, 0x13c, 0x7, 0xaa5, 0x1, 0x8001}, 0x14) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000dc0)={0xaa, 0x20}) pwrite64(r1, &(0x7f0000000e00)="7437032bd6e223b3a59d10357fc245a11551c76207ed30241886ce0ea1326aeac569322a47e5909770909834b26bf6b04af3b30656cbc3e07c3eed14ee7c472c2d276872498ef33618509e2049213b9664560dc77dd302976456a0392edd116b9816cbca183c77f192c4c3260a385cc483327645104ab9987888488ff6b8e163c2eddc4fc33b9f9ba13abbb021303c8d438d96b2da7c190f9cdc9f2242c2df22ccc63b779747bc9b54e299a407b4150450352ce672efd9fd7565ffb5f410dd66a2061984a92c2ca847eb65e95168372a9e92cc53f27151c36569714d1b2b2b2d26b0e9668aa5042a767ab88ad81f2850ce", 0xf1, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) 2018/03/30 10:21:52 executing program 5: r0 = memfd_create(&(0x7f0000000540)='\x00', 0x1) r1 = perf_event_open(&(0x7f00000005c0)={0x7, 0x70, 0x8, 0x9, 0x81f6, 0x8, 0x0, 0xfffffffffffffe01, 0x0, 0x1, 0x0, 0x3, 0x6, 0x9, 0x4, 0x5, 0x100000000, 0x8, 0x6, 0x9, 0x1, 0x8, 0x0, 0x800, 0x74, 0xfff, 0x9, 0x0, 0x7, 0x0, 0x1, 0x800, 0x3ff, 0x0, 0x0, 0x1ff, 0x80000000, 0xffffffff00000001, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000580), 0x1}, 0x10000, 0xfd, 0xb6, 0x0, 0x6, 0x0, 0x976}, 0x0, 0x5, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = epoll_create1(0x80000) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) readlinkat(r0, &(0x7f0000000240)='./control\x00', &(0x7f0000000280)=""/243, 0xf3) r4 = userfaultfd(0x80800) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r5 = creat(&(0x7f0000000140)='./control/file0\x00', 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000000c0)='./control/file0\x00') ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000200)='vmnet1-#&user\\trusted!\x00') mount(&(0x7f00000003c0)='./file0\x00', &(0x7f00000007c0)='./control\x00', &(0x7f0000000500)='iso9660\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r5, 0x84, 0x76, &(0x7f0000000380)={0x0, 0x3cea}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000640)={r6, @in6={{0xa, 0x4e22, 0x3ff, @dev={0xfe, 0x80, [], 0xd}, 0x3}}}, 0x84) creat(&(0x7f0000000180)='./control/file0\x00', 0x0) r7 = fcntl$dupfd(r3, 0x0, r3) r8 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r8, 0x1, r7, &(0x7f000086fff4)) r9 = getpid() epoll_ctl$EPOLL_CTL_ADD(r8, 0x1, r3, &(0x7f0000000040)) kcmp$KCMP_EPOLL_TFD(0x0, r9, 0x7, r8, &(0x7f0000000000)={r8, r7}) fgetxattr(r2, &(0x7f0000000700)=ANY=[], &(0x7f0000000480)=""/96, 0x60) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xec5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8000, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r10 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x4, 0x84000) ioctl$LOOP_CHANGE_FD(r10, 0x4c06, 0xffffffffffffffff) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/03/30 10:21:52 executing program 6 (fault-call:3 fault-nth:49): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r0, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r0, &(0x7f0000000100)=""/65, 0x41) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) linkat(r0, &(0x7f0000000480)='./file1\x00', r1, &(0x7f00000004c0)='./file0\x00', 0x1000) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') unlink(&(0x7f00000000c0)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r0, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x12021) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000340)={0x8, 0x9, 0x4, 0x10000, 0x1, 0x7, 0x7fffffff, 0x0, 0x29, 0x0, 0x20}, 0xb) 2018/03/30 10:21:52 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt(r0, 0x0, 0x5, &(0x7f0000fe6000)=""/8, &(0x7f00000000c0)=0x8) 2018/03/30 10:21:52 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000780)=[{&(0x7f0000000400)="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", 0xfc}], 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x200900, 0x103) connect$vsock_stream(r1, &(0x7f0000000600)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) r2 = socket$alg(0x26, 0x5, 0x0) rt_sigtimedwait(&(0x7f0000000140)={0xffffffff}, 0x0, &(0x7f0000000180), 0x8) bind$alg(r2, &(0x7f000073e000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(cbc-twofish-avx)\x00'}, 0x58) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000500)={&(0x7f00000005c0)=[0x0, 0x0, 0x0], 0x3}) nanosleep(&(0x7f0000d1e000)={0x0, 0x1c9c380}, &(0x7f0000000000)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r3, 0x118, 0x0, &(0x7f0000000100)=0x7, 0x4) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000000c0)={0x1, 0x1, 0x1, 0x1, 0x0, 0x6}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000280)={r4, @in={{0x2, 0x4e23, @multicast2=0xe0000002}}, [0x8000, 0x9, 0x80000000, 0x3, 0x80, 0x8001, 0x800, 0x100, 0xe0db, 0x0, 0x2000000000, 0x200, 0x68, 0x0, 0x8]}, &(0x7f0000000380)=0x100) r5 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0xfffffffffffffdfa) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r5, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port1\x00', 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r5, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r6 = gettid() r7 = syz_open_procfs(r6, &(0x7f00000002c0)='maps\x00') readv(r7, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/28, 0x65}], 0x1) exit(0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r7, &(0x7f000004ffe0)=[{&(0x7f0000000000)=""/128, 0xe6}], 0x222) r8 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) connect$ax25(r3, &(0x7f00000006c0)={0x3, {"fc5da504005009"}, 0x7fff}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) getsockopt$netrom_NETROM_T1(r8, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r5, 0x80045301, &(0x7f0000000700)) 2018/03/30 10:21:52 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) getsockname$inet(r0, &(0x7f00000000c0)={0x0, 0x0, @local}, &(0x7f0000000080)=0x10) r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x0, 0x0) ioctl$PPPIOCGMRU(r1, 0x80047453, &(0x7f0000000100)) [ 240.247071] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 240.254317] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 240.261645] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000030 [ 240.269347] cgroup: cgroup_addrm_files: failed to add weight, err=-12 2018/03/30 10:21:52 executing program 7: clone(0x200, &(0x7f0000000100)="f0f7d70fc52207334efb558c957ea5882b23d85fa1659dc13aa7603b45aa407f02117308b1a8697bcf6617a98d145ec63b3cffa3123c2b94a42831af8d9bdb4b03d2954fdaa7e037f2c459a27e42921a924df6c5899ef4dbdb44bffbadd515d6024b7e3450b4ea54c55a229f4d694a292b270018a408b9ed54a0bc1929156ff004c1cf0b1728065c1ae04f4eeb552ff2420005e5ccb9400909127922c4a8e69ffbb96ca5bc95786113ae475b94c2c9a6a235276e2f1b7f01010000000000007a", &(0x7f0000000000), &(0x7f0000f8b000), &(0x7f00000d5000)) mknod(&(0x7f0000001440)='./file0\x00', 0x40, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000340), &(0x7f000027a000)) r0 = creat(&(0x7f00000026c0)='./file0\x00', 0x31) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000080)={0x4, 0xffffffffffffff9c, 0x1}) bind$unix(r1, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000002700)=0x1, 0x4) r2 = syz_open_procfs(0x0, &(0x7f000042cff4)='personality\x00') read(r2, &(0x7f0000f1bf7e)=""/130, 0xfffffdd8) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000240)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x9, 0x18}, 0xc) sendmsg$nfc_llcp(r2, &(0x7f0000002680)={&(0x7f0000000240)={0x27, 0x1, 0x0, 0x3, 0x6, 0x3, "a9a6dd7f85431ef61a0c5fb68dc38a36fd14742b4adec83a8c8db0bfd644ac61db1a41e3ab9a3dd0cda8516ba276548f6ccfedf51cea9b8d5355d17758a8bf", 0x30}, 0x60, &(0x7f0000002580)=[{&(0x7f00000002c0)="99ffa2d5bbfd1edac5de7000f6c8b3e65aebb514dbe0715c85f95ecace7bad5cbf34a96495038142813834efdc7d136e5096e79d614876c832cefd2eb199e3ef6a9b9b2bdaf56a65b28662316f47e4d084ff3b75c0898b76fde53864a80866a800a3e5c830f818c3f11ed16308c8e8f7728ef810ae1cb5aea67d1218d7a479e1b8b6f1fb06abf8056fbfcdb033f01ba202fa14c885dacc2ed592d66887b86599cb3de4f685ff6ea542b1b240481d4661d115c3cb23e8c05794d9ec37350f3aa106ab6647d49e19eda8bc9832f5a5a59f423ec9d34422e3232f3c9e1b3c2d701fa556482602bb6cd25c5786ee12ae05aff94e7e687109", 0xf6}, {&(0x7f00000003c0)="190ebdc81de901e84e8a84ce420b807c142650e90f5eccffecd165ca9e42bc6f790342f6dc941b782f248278a6037040e1d4d2b1f0b51b8fc1ad016b96e8efce8cf4240707922a14554318f1615927564fe0394ca1e7a5bbcc46a0dbaf4a83b4f1", 0x61}, {&(0x7f0000000440)="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", 0x1000}, {&(0x7f0000001440)}, {&(0x7f0000001480)="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", 0x1000}, {&(0x7f0000002480)="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", 0xfe}], 0x6, &(0x7f0000002600)={0x68, 0x0, 0x1, "014bb29706b96c156064e8bd470f78594253a57eada09ec468bde681a46620ba751a9ce5a7c8af4693364857549b47072f70afb163b8b45777d814d5388853fd2a306126ecfb84389e1e36d76f8f8799a35d4eb49e665d"}, 0x68, 0x40000}, 0x44041) open$dir(&(0x7f000050bff8)='./file0\x00', 0x2, 0x0) 2018/03/30 10:21:52 executing program 3: socket$inet6(0xa, 0x2, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000800)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000220000)={0x2, 0x70, 0x3e3, 0x0, 0xfffffffffffffbff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create1(0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) ioctl$KDGKBDIACR(r2, 0x4b4a, &(0x7f0000000740)=""/68) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000003ff4)) pipe2(&(0x7f0000000700)={0x0, 0x0}, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r6 = dup3(r5, r4, 0x0) io_setup(0xfff, &(0x7f00000002c0)=0x0) io_getevents(r7, 0x9, 0x7, &(0x7f0000000300)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f0000000400)={0x77359400}) clock_gettime(0x0, &(0x7f0000000000)) signalfd4(r4, &(0x7f0000000100)={0xfffffffffffff795}, 0x286, 0x80800) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000decfe0)={0x10005, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r4, 0x4040aea0, &(0x7f0000460fe4)={0x0, 0x7, 0x2, 0x0, 0x4, 0x8, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x805}) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000280)) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f0000000180)=""/211) ioctl$KVM_KVMCLOCK_CTRL(r4, 0xaead) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000440)=0x8001, 0x4) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f0000753000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f00000000c0)="0fc7280f080f20030f01727166ba4200b834000000ef66bad10466edb81da1fb500f23d00f21f835300000050f23f8c4c3194bfc360f20030fc76d08", 0x3c}], 0x1, 0x0, &(0x7f0000000380), 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r3, 0x400448c8, &(0x7f0000000540)={r4, r6, 0x5, 0x3, &(0x7f0000000480)="80ebe30cfeb91e48e6f71c1811280521369746d5174f8e94e381e07b40b9b558f5c04d5a0f08220a0335d0078fdb09879731", 0x3, 0x0, 0x101, 0x2, 0x7ff, 0x3, 0x40b, "94b08c59df7f03952e17a1bd5ab165cfe5a7880a5ca3db4a2f0a029dadb796c5c8075ebdde5ffc4cf21b9958e08b09f8970c7da55b7a4b4c1a6a06fb1d6201eaad"}) mincore(&(0x7f000076a000/0x1000)=nil, 0x1000, &(0x7f0000000640)=""/167) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000080)={0x0, 0x0, 0x100000001}) r8 = userfaultfd(0x0) ioctl$UFFDIO_API(r8, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x80}) mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) ioctl$KVM_RUN(r4, 0xae80, 0x0) 2018/03/30 10:21:52 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x100000000106, 0x0) writev(r0, &(0x7f000036bfd0)=[{&(0x7f0000b51000)="eb", 0x1}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x400000, 0x41) recvfrom$ipx(r1, &(0x7f0000000340)=""/11, 0xb, 0x2, &(0x7f0000000380)={0x4, 0x1f, 0x5, "dfde80e07bfd", 0x3}, 0x10) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000040)=0x4000000058) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000003c0)=0x5, &(0x7f0000000400)=0x4) read(r0, &(0x7f0000000140)=""/1, 0xfffffffffffffeb7) ioctl$KDENABIO(r0, 0x4b36) r2 = accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000000)=0x60, 0x800) r3 = dup2(r2, r2) getsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000440), &(0x7f0000000480)=0x4) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r3, 0x10e, 0x8, &(0x7f00000002c0)=0x1, 0x4) recvfrom$ipx(r3, &(0x7f00000001c0)=""/170, 0xaa, 0x0, &(0x7f0000000280)={0x4, 0x6, 0x3, "b58e1c1b98b2", 0x8}, 0x10) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={'bcsh0\x00', {0x2, 0x4e20}}) [ 240.349927] xprt_adjust_timeout: rq_timeout = 0! 2018/03/30 10:21:53 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000, 0x0, 0x4}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000d80)={r5, 0x13c, 0x7, 0xaa5, 0x1, 0x8001}, 0x14) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000dc0)={0xaa, 0x20}) pwrite64(r1, &(0x7f0000000e00)="7437032bd6e223b3a59d10357fc245a11551c76207ed30241886ce0ea1326aeac569322a47e5909770909834b26bf6b04af3b30656cbc3e07c3eed14ee7c472c2d276872498ef33618509e2049213b9664560dc77dd302976456a0392edd116b9816cbca183c77f192c4c3260a385cc483327645104ab9987888488ff6b8e163c2eddc4fc33b9f9ba13abbb021303c8d438d96b2da7c190f9cdc9f2242c2df22ccc63b779747bc9b54e299a407b4150450352ce672efd9fd7565ffb5f410dd66a2061984a92c2ca847eb65e95168372a9e92cc53f27151c36569714d1b2b2b2d26b0e9668aa5042a767ab88ad81f2850cef1", 0xf2, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) 2018/03/30 10:21:53 executing program 6 (fault-call:3 fault-nth:50): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r0, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r0, &(0x7f0000000100)=""/65, 0x41) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) linkat(r0, &(0x7f0000000480)='./file1\x00', r1, &(0x7f00000004c0)='./file0\x00', 0x1000) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') unlink(&(0x7f00000000c0)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r0, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x12021) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000340)={0x8, 0x9, 0x4, 0x10000, 0x1, 0x7, 0x7fffffff, 0x0, 0x29, 0x0, 0x20}, 0xb) [ 240.438237] xprt_adjust_timeout: rq_timeout = 0! 2018/03/30 10:21:53 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr\x00') ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0106401, &(0x7f0000000000)={0xe2, &(0x7f0000000100)=""/226}) writev(r0, &(0x7f0000000000), 0x1000000000000075) accept$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60) 2018/03/30 10:21:53 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x200900, 0x103) connect$vsock_stream(r1, &(0x7f0000000600)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) r2 = socket$alg(0x26, 0x5, 0x0) rt_sigtimedwait(&(0x7f0000000140)={0xffffffff}, 0x0, &(0x7f0000000180), 0x8) bind$alg(r2, &(0x7f000073e000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(cbc-twofish-avx)\x00'}, 0x58) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000500)={&(0x7f00000005c0)=[0x0, 0x0, 0x0], 0x3}) nanosleep(&(0x7f0000d1e000)={0x0, 0x1c9c380}, &(0x7f0000000000)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r3, 0x118, 0x0, &(0x7f0000000100)=0x7, 0x4) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000000c0)={0x1, 0x1, 0x1, 0x1, 0x0, 0x6}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000280)={r4, @in={{0x2, 0x4e23, @multicast2=0xe0000002}}, [0x8000, 0x9, 0x80000000, 0x3, 0x80, 0x8001, 0x800, 0x100, 0xe0db, 0x0, 0x2000000000, 0x200, 0x68, 0x0, 0x8]}, &(0x7f0000000380)=0x100) r5 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0xfffffffffffffdfa) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r5, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port1\x00', 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r5, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r6 = gettid() r7 = syz_open_procfs(r6, &(0x7f00000002c0)='maps\x00') readv(r7, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/28, 0x65}], 0x1) exit(0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r7, &(0x7f000004ffe0)=[{&(0x7f0000000000)=""/128, 0xe6}], 0x222) r8 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) connect$ax25(r3, &(0x7f00000006c0)={0x3, {"fc5da504005009"}, 0x7fff}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) getsockopt$netrom_NETROM_T1(r8, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r5, 0x80045301, &(0x7f0000000700)) [ 240.490130] syz-executor1 uses obsolete (PF_INET,SOCK_PACKET) 2018/03/30 10:21:53 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000, 0x0, 0x4}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000d80)={r5, 0x13c, 0x7, 0xaa5, 0x1, 0x8001}, 0x14) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000dc0)={0xaa, 0x20}) pwrite64(r1, &(0x7f0000000e00)="7437032bd6e223b3a59d10357fc245a11551c76207ed30241886ce0ea1326aeac569322a47e5909770909834b26bf6b04af3b30656cbc3e07c3eed14ee7c472c2d276872498ef33618509e2049213b9664560dc77dd302976456a0392edd116b9816cbca183c77f192c4c3260a385cc483327645104ab9987888488ff6b8e163c2eddc4fc33b9f9ba13abbb021303c8d438d96b2da7c190f9cdc9f2242c2df22ccc63b779747bc9b54e299a407b4150450352ce672efd9fd7565ffb5f410dd66a2061984a92c2ca847eb65e95168372a9e92cc53f27151c36569714d1b2b2b2d26b0e9668aa5042a767ab88ad81f2850cef1", 0xf2, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) [ 240.597177] bond0 (unregistering): Released all slaves [ 241.336303] IPVS: ftp: loaded support on port[0] = 21 [ 241.636328] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 242.065664] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 242.071793] 8021q: adding VLAN 0 to HW filter on device bond0 [ 242.117309] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 242.163440] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 242.186683] FAULT_INJECTION: forcing a failure. [ 242.186683] name failslab, interval 1, probability 0, space 0, times 0 [ 242.198009] CPU: 1 PID: 29429 Comm: syz-executor6 Not tainted 4.16.0-rc7+ #371 [ 242.205352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 242.214683] Call Trace: [ 242.217249] dump_stack+0x194/0x24d [ 242.220853] ? arch_local_irq_restore+0x53/0x53 [ 242.225509] should_fail+0x8c0/0xa40 [ 242.229196] ? kstrdup+0x39/0x70 [ 242.232541] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 242.237617] ? cgroup_apply_control_enable+0x390/0xbc0 [ 242.242880] ? kernfs_iop_mkdir+0x153/0x1e0 [ 242.247176] ? vfs_mkdir+0x390/0x600 [ 242.250864] ? SyS_mkdirat+0x22b/0x2b0 [ 242.254727] ? do_syscall_64+0x281/0x940 [ 242.258764] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 242.264109] ? find_held_lock+0x35/0x1d0 [ 242.268152] ? find_held_lock+0x35/0x1d0 [ 242.272212] ? __lock_is_held+0xb6/0x140 [ 242.276263] ? check_same_owner+0x320/0x320 [ 242.280562] ? rcu_note_context_switch+0x710/0x710 [ 242.285464] ? rcu_read_lock_sched_held+0x108/0x120 [ 242.290463] should_failslab+0xec/0x120 [ 242.294414] kmem_cache_alloc+0x47/0x760 [ 242.298448] ? memcpy+0x45/0x50 [ 242.301704] ? kstrdup+0x59/0x70 [ 242.305058] __kernfs_new_node+0xe2/0x570 [ 242.309185] ? kernfs_dop_revalidate+0x380/0x380 [ 242.313926] ? snprintf+0xc0/0xf0 [ 242.317441] ? vsprintf+0x40/0x40 [ 242.320869] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 242.325777] ? cgroup_file_name+0x1d0/0x1d0 [ 242.330078] kernfs_new_node+0x80/0xe0 [ 242.333942] __kernfs_create_file+0x4b/0x320 [ 242.338333] cgroup_addrm_files+0x3c5/0xa70 [ 242.342643] ? cgroup_file_write+0x710/0x710 [ 242.347038] ? cgroup_idr_replace+0x3f/0x50 [ 242.351340] ? __lock_is_held+0xb6/0x140 [ 242.355386] ? __local_bh_enable_ip+0x121/0x230 [ 242.360031] ? online_css+0x224/0x2e0 [ 242.363814] css_populate_dir+0x198/0x420 [ 242.367945] cgroup_apply_control_enable+0x390/0xbc0 [ 242.373036] ? cgroup_propagate_control+0x570/0x570 [ 242.378300] ? css_populate_dir+0x289/0x420 [ 242.382602] cgroup_mkdir+0x56f/0xfc0 [ 242.386380] ? __lock_is_held+0xb6/0x140 [ 242.390423] ? cgroup_destroy_locked+0x750/0x750 [ 242.395162] ? retint_kernel+0x10/0x10 [ 242.399037] ? kernfs_iop_mkdir+0xd4/0x1e0 [ 242.403246] ? cgroup_destroy_locked+0x750/0x750 [ 242.407976] kernfs_iop_mkdir+0x153/0x1e0 [ 242.412121] vfs_mkdir+0x390/0x600 [ 242.415643] SyS_mkdirat+0x22b/0x2b0 [ 242.419340] ? SyS_mknod+0x480/0x480 [ 242.423033] ? trace_hardirqs_on+0xd/0x10 [ 242.427157] ? do_syscall_64+0xb7/0x940 [ 242.431120] ? SyS_mknod+0x480/0x480 [ 242.434812] do_syscall_64+0x281/0x940 [ 242.438706] ? __do_page_fault+0xc90/0xc90 [ 242.442924] ? _raw_spin_unlock_irq+0x27/0x70 [ 242.447656] ? finish_task_switch+0x1c1/0x7e0 [ 242.452129] ? syscall_return_slowpath+0x550/0x550 [ 242.457037] ? syscall_return_slowpath+0x2ac/0x550 [ 242.461942] ? prepare_exit_to_usermode+0x350/0x350 [ 242.466935] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 242.472279] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 242.477104] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 242.482268] RIP: 0033:0x4548b9 [ 242.485432] RSP: 002b:00007f8840896c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 242.493114] RAX: ffffffffffffffda RBX: 00007f88408976d4 RCX: 00000000004548b9 [ 242.500361] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 242.507606] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 2018/03/30 10:21:55 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x4, 0x139a02) write$rdma_cm(0xffffffffffffffff, &(0x7f0000000680)=@create_id={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000640)={0xffffffff}, 0x13f, 0x2}}, 0x20) write$rdma_cm(r0, &(0x7f00000006c0)=@join_ip_mcast={0x10, 0x30, 0xfa00, {&(0x7f0000000100), 0x2, {0xa, 0x4e20, 0xff, @local={0xfe, 0x80, [], 0xaa}, 0x101}, r1}}, 0x38) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x4c033, 0xffffffffffffffff, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x8) openat$cgroup_type(r3, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) setsockopt(r2, 0x65, 0x1, &(0x7f0000000000)="5b4cd9494e24241dce54b2670000000062e50fa42f3f6947", 0x18) 2018/03/30 10:21:55 executing program 7: clone(0x200, &(0x7f0000000100)="f0f7d70fc52207334efb558c957ea5882b23d85fa1659dc13aa7603b45aa407f02117308b1a8697bcf6617a98d145ec63b3cffa3123c2b94a42831af8d9bdb4b03d2954fdaa7e037f2c459a27e42921a924df6c5899ef4dbdb44bffbadd515d6024b7e3450b4ea54c55a229f4d694a292b270018a408b9ed54a0bc1929156ff004c1cf0b1728065c1ae04f4eeb552ff2420005e5ccb9400909127922c4a8e69ffbb96ca5bc95786113ae475b94c2c9a6a235276e2f1b7f01010000000000007a", &(0x7f0000000000), &(0x7f0000f8b000), &(0x7f00000d5000)) mknod(&(0x7f0000000540)='./file0\x00', 0x1040, 0x614ef51d) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000340), &(0x7f000027a000)) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000080)={0x4, 0xffffffffffffff9c, 0x1}) bind$unix(r0, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) r1 = getpid() get_robust_list(r1, &(0x7f0000000640)=&(0x7f0000000600)={&(0x7f0000000300), 0x0, &(0x7f00000005c0)={&(0x7f0000000580)}}, &(0x7f0000000680)=0x18) r2 = syz_open_procfs(0x0, &(0x7f000042cff4)='personality\x00') r3 = creat(&(0x7f0000000240)='./file1\x00', 0x67) read(r2, &(0x7f0000f1bf7e)=""/130, 0xfffffdd8) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000240)) r4 = getpid() stat(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r0, &(0x7f0000000500)=[{&(0x7f0000000280)=@file={0x0, './file1\x00'}, 0x6e, &(0x7f0000000300), 0x0, &(0x7f0000000480)=[@rights={0x28, 0x1, 0x1, [r3, r2, r3, r2, r2]}, @cred={0x20, 0x1, 0x2, r4, r5, r6}], 0x48, 0x20000040}], 0x1, 0x8000) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x9, 0x18}, 0xc) open$dir(&(0x7f000050bff8)='./file0\x00', 0x2, 0x0) 2018/03/30 10:21:55 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000f7b000)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) 2018/03/30 10:21:55 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x100000000108, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000000)={0x0, 0x80000, r0}) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000080)={0x0, 0x0, 0xc000}) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f00000000c0)={r1, r2}) writev(r0, &(0x7f000036bfd0)=[{&(0x7f0000b51000)="eb", 0x1}], 0x1) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000040)=0x4000000058) r3 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x8, 0x40) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f00000001c0)={'raw\x00', 0x85, "6773fee3ed4bc6fe3837228fa87e310e608e33f45340deb79ff73aa3c9c1e3699edfe9cc5db6e8eafc9cff1d7ffe95efc05bda599fb3d2d6bc14ddbfb6f4fb69789cf3a3928b346be0b05fba009f094f04cb42a6d162172c0eb7594193cc8c58db4c448e88a3dc41f8062834221f694d7dadc67796ff943e1a76a2eaa78828c5d7b73641cc"}, &(0x7f0000000280)=0xa9) read(r0, &(0x7f0000000140)=""/1, 0xfffffffffffffeb7) 2018/03/30 10:21:55 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000540000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000000)={0x4, r0, 0x1}) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) membarrier(0x41, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r1, 0xc008551b, &(0x7f0000000040)={0x589bef61, 0xc, [0x1, 0x0, 0x7f]}) 2018/03/30 10:21:55 executing program 6 (fault-call:3 fault-nth:51): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r0, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r0, &(0x7f0000000100)=""/65, 0x41) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) linkat(r0, &(0x7f0000000480)='./file1\x00', r1, &(0x7f00000004c0)='./file0\x00', 0x1000) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') unlink(&(0x7f00000000c0)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r0, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x12021) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000340)={0x8, 0x9, 0x4, 0x10000, 0x1, 0x7, 0x7fffffff, 0x0, 0x29, 0x0, 0x20}, 0xb) 2018/03/30 10:21:55 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000, 0x0, 0x4}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000d80)={r5, 0x13c, 0x7, 0xaa5, 0x1, 0x8001}, 0x14) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000dc0)={0xaa, 0x20}) pwrite64(r1, &(0x7f0000000e00)="7437032bd6e223b3a59d10357fc245a11551c76207ed30241886ce0ea1326aeac569322a47e5909770909834b26bf6b04af3b30656cbc3e07c3eed14ee7c472c2d276872498ef33618509e2049213b9664560dc77dd302976456a0392edd116b9816cbca183c77f192c4c3260a385cc483327645104ab9987888488ff6b8e163c2eddc4fc33b9f9ba13abbb021303c8d438d96b2da7c190f9cdc9f2242c2df22ccc63b779747bc9b54e299a407b4150450352ce672efd9fd7565ffb5f410dd66a2061984a92c2ca847eb65e95168372a9e92cc53f27151c36569714d1b2b2b2d26b0e9668aa5042a767ab88ad81f2850cef1", 0xf2, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) 2018/03/30 10:21:55 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x200900, 0x103) connect$vsock_stream(r1, &(0x7f0000000600)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) r2 = socket$alg(0x26, 0x5, 0x0) rt_sigtimedwait(&(0x7f0000000140)={0xffffffff}, 0x0, &(0x7f0000000180), 0x8) bind$alg(r2, &(0x7f000073e000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(cbc-twofish-avx)\x00'}, 0x58) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000500)={&(0x7f00000005c0)=[0x0, 0x0, 0x0], 0x3}) nanosleep(&(0x7f0000d1e000)={0x0, 0x1c9c380}, &(0x7f0000000000)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r3, 0x118, 0x0, &(0x7f0000000100)=0x7, 0x4) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000000c0)={0x1, 0x1, 0x1, 0x1, 0x0, 0x6}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000280)={r4, @in={{0x2, 0x4e23, @multicast2=0xe0000002}}, [0x8000, 0x9, 0x80000000, 0x3, 0x80, 0x8001, 0x800, 0x100, 0xe0db, 0x0, 0x2000000000, 0x200, 0x68, 0x0, 0x8]}, &(0x7f0000000380)=0x100) r5 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0xfffffffffffffdfa) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r5, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port1\x00', 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r5, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r6 = gettid() r7 = syz_open_procfs(r6, &(0x7f00000002c0)='maps\x00') readv(r7, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/28, 0x65}], 0x1) exit(0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r7, &(0x7f000004ffe0)=[{&(0x7f0000000000)=""/128, 0xe6}], 0x222) r8 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) connect$ax25(r3, &(0x7f00000006c0)={0x3, {"fc5da504005009"}, 0x7fff}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) getsockopt$netrom_NETROM_T1(r8, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r5, 0x80045301, &(0x7f0000000700)) [ 242.514849] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 242.522095] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000032 [ 242.529437] cgroup: cgroup_addrm_files: failed to add bfq.weight, err=-12 2018/03/30 10:21:55 executing program 3: r0 = signalfd4(0xffffffffffffffff, &(0x7f000034d000), 0x8, 0x0) unshare(0x400) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) fcntl$setflags(r1, 0x2, 0x1) signalfd(r0, &(0x7f0000000000), 0x8) 2018/03/30 10:21:55 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x80}) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0xfffffffffffffffc, 0x10000) recvmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000140)=@sco, 0x80, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/36, 0x24}, {&(0x7f00000001c0)=""/36, 0xfffffffd}, {&(0x7f0000000480)=""/44, 0x2c}, {&(0x7f0000000400)=""/73, 0x49}], 0x4, &(0x7f0000000300)=""/103, 0x67}, 0x0) 2018/03/30 10:21:55 executing program 1: msgrcv(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000010000000000000000008ac7381c0000003978d19aae57cd9ec80891080b7bdca07b4b9a4d91"], 0x1a3, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000540)="dd83ab68cc22ae369edd94b4101cbffa98fbbafd3502c98e3b97bdc7d37ef62f4120dc5fe773aedd795c533eebba51a30ae324cc9414b59833ee265e89cdc15252a512e989ec4edbb553f32528740b273c9663a4cf1772dfb4c31467cccc7c5c6c19aeeaafb7ff6e71b7c1dd50e5b61085bbbc48af2d1f36a2fd3b9da814111e671c6176a5c897e717a834b8c789269faf48bd2c3399817ed01c99b528a3b4ebc933e50eb8d88400eac57f0410c514c092eb6532bdc4f0d3a4f3fc40dbcb01c3168360dcceb3454b43fa57e8dd9ab13aed02516fde5f2ab0d703c6462454a6895e9ccabb084c7518c1541bba546db79580387bf2d7c83b431efb621f7bcb60849ff8ab123b0016d0a2087a9988b6a255040000b4a1a84b153f3ab5370cc04d35bc861ee68a12e96bbd3ab1eca8a849cd7fcdf4f5a3fd8b58612a87de844abdc50932c311d6efb1f32da49f22d255de290fb53c8a61d25fb5169d5fadb6a36101367f6279c3103c27c43ded5051b536c75b90c30eb252", 0x1fffffffffffffc) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000000)) write(r0, &(0x7f0000000080)="16", 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f00000006c0)=""/4096, &(0x7f0000000140)=0x1000) mremap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3000, 0x2, &(0x7f0000003000/0x3000)=nil) msgsnd(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="03b5"], 0x1, 0x0) 2018/03/30 10:21:55 executing program 6 (fault-call:3 fault-nth:52): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r0, &(0x7f00000007c0)=""/250, 0x1015a) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) getdents(r0, &(0x7f0000000100)=""/65, 0x41) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x105600, 0x81) link(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00') renameat2(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) linkat(r0, &(0x7f0000000480)='./file1\x00', r1, &(0x7f00000004c0)='./file0\x00', 0x1000) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') unlink(&(0x7f00000000c0)='./file0\x00') symlinkat(&(0x7f0000000400)='./file0/file0\x00', r0, &(0x7f0000000440)='./file0/file0\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000640)=""/45, 0x2d, 0x206e}, 0x12021) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000340)={0x8, 0x9, 0x4, 0x10000, 0x1, 0x7, 0x7fffffff, 0x0, 0x29, 0x0, 0x20}, 0xb) 2018/03/30 10:21:55 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) r1 = accept$ax25(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) io_setup(0xd8e8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x7f, 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) io_setup(0x100, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)={0x1, r0}) getgid() sendto$ax25(r0, &(0x7f0000000340), 0x0, 0x4000001, &(0x7f0000000380)={0x3, {"e12c7d26e46523"}, 0x3}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000003c0)=0x5, 0x8) sendmsg$rds(r0, &(0x7f0000000bc0)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/135, 0x87}], 0x6, &(0x7f0000000ac0)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6}, &(0x7f0000000880)=0x8, &(0x7f00000008c0)=0x8, 0x0, 0x5, 0xff, 0x1, 0x8, 0x8000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000900)=""/210, 0xd2}, &(0x7f0000000a00), 0x24}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f0000000a40)=0x44aa, &(0x7f0000000a80)=0x8, 0x8000, 0x4f, 0x2, 0x8001, 0x40, 0x3d3}}], 0xe0, 0x80}, 0x4000) r4 = inotify_add_watch(r0, &(0x7f0000000c00)='./file0\x00', 0x3) inotify_rm_watch(r0, r4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000c40)='gretap0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xea, 0x1, 0x10000, 0x0, 0x4}, &(0x7f0000000d40)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000d80)={r5, 0x13c, 0x7, 0xaa5, 0x1, 0x8001}, 0x14) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000dc0)={0xaa, 0x20}) pwrite64(r1, &(0x7f0000000e00)="7437032bd6e223b3a59d10357fc245a11551c76207ed30241886ce0ea1326aeac569322a47e5909770909834b26bf6b04af3b30656cbc3e07c3eed14ee7c472c2d276872498ef33618509e2049213b9664560dc77dd302976456a0392edd116b9816cbca183c77f192c4c3260a385cc483327645104ab9987888488ff6b8e163c2eddc4fc33b9f9ba13abbb021303c8d438d96b2da7c190f9cdc9f2242c2df22ccc63b779747bc9b54e299a407b4150450352ce672efd9fd7565ffb5f410dd66a2061984a92c2ca847eb65e95168372a9e92cc53f27151c36569714d1b2b2b2d26b0e9668aa5042a767ab88ad81f2850cef1", 0xf2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002e40)={0x0, @local, @remote}, &(0x7f0000002e80)=0xc) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000002ec0)={@remote={0xfe, 0x80, [], 0xbb}, 0x40, r6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000002f00)={{0x1, 0x48ab, 0x80000000, 0x6, 0x1, 0x5}, 0x4}) getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000002fc0), &(0x7f0000003000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000003140)=0xe8) ioctl$TIOCCONS(r0, 0x541d) fcntl$addseals(r1, 0x409, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000003180)={0x0, 0x2710}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000031c0)={@loopback={0x0, 0x1}, 0x66, r7}) 2018/03/30 10:21:55 executing program 3: request_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f0000000040)="0ee4b34b0a6db96082d8dd8c21378893580dd3c4102bf7c78bf60ea27e0d565f7d36b228513312ad8621b208c4a71beb08d120d6278c97a2e66afd501b59e29b794764dea3b96b394b375a9e2f60e377a80cbb5a1d07ebefa3616eab1ad95bbc74efbbdd373e61dea30acd7c23f854ec3e8ed134c8cdc269cb08efbc2165dc321f7f7df9e812c7743f27b2c402b0615925f41db23bcdb37065d5cdb9bfc86d21754006", 0xfffffffffffffffe) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f0000000100)={{0x0, 0x0, 0x1, 0x3, 0x3}, 0x1, 0x7fffffff800, 'id1\x00', 'timer1\x00', 0x0, 0x8000, 0x1, 0x7, 0x6}) ioctl$KVM_ASSIGN_SET_INTX_MASK(r0, 0x4040aea4, &(0x7f0000000200)={0x3, 0x8, 0x1, 0x3, 0x10000}) 2018/03/30 10:21:55 executing program 0: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xd21, 0x0) fcntl$setsig(r0, 0xa, 0x13) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x100000000106, 0x0) writev(r1, &(0x7f0000000080)=[{&(0x7f0000b51000)="eb", 0x1}], 0x1) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000040)=0x4000000058) read(r1, &(0x7f0000000140)=""/1, 0xfffffffffffffeb7) 2018/03/30 10:21:55 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x200) mmap(&(0x7f00005c2000/0x1000)=nil, 0x1000, 0x2, 0x852, r0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000180)={'syzkaller1\x00', {0x2, 0x4e23, @broadcast=0xffffffff}}) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0505405, &(0x7f0000003000)={{}, 0x0, 0x0, 'id0\x00', 'timer0\x00'}) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x0, 0x0) ioctl$KVM_GET_CPUID2(0xffffffffffffffff, 0xc008ae91, &(0x7f0000000300)={0x1, 0x0, [{}]}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r3, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40004001}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0xa4, r4, 0x421, 0x70bd27, 0x25dfdbfe, {0x4}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ipddp0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback=0x7f000001}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote={0xac, 0x14, 0x14, 0xbb}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x7}]}, @IPVS_CMD_ATTR_DEST={0x58, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x3}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x400}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@loopback={0x0, 0x1}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x198000000}]}, 0xa4}, 0x1, 0x0, 0x0, 0x20048085}, 0x4000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000100)={0x3ff, 0x8d}) sendmsg$nl_generic(r3, &(0x7f0000b3dfc8)={&(0x7f0000001580)={0x10}, 0xc, &(0x7f00000015c0)={&(0x7f0000abf000)={0x18, 0x20, 0x109, 0x0, 0x0, {0x4}, [@nested={0x4, 0x12}]}, 0x18}, 0x1}, 0x0) syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x800, 0x1000002) r5 = socket(0x0, 0x0, 0x1) sendto$ax25(r5, &(0x7f0000000000)="f3f8c80ccff8ce1237787136cf23f5a49ee2139f37b3f9b4c6e17c6a4553d150434099dc9c9b2f6e8acac03bf7fab6c86bc8c77ff3f7fff1eead0fd4ad17bf4c41a06982b0df142647b7e20953f42b68704ef6b7c22ae78b9d6fc3a1e0aa28ec4c4bafbef692c90b645305c693562e27539a7bd47bf647295d65acee2f7f423db2c638139cc5f7db1a14e22626a628a92dd26525742dc54a2d40742ad2445e349c1c239b7b78a88f04d2b94fe897ff7fe7df607ee5c1f16ce2fc979bec5b2282d7d82da056ac3c236ea19256ac4a139cdfdd4da5c61e0be1e92240cbb920b7698d0e4689", 0xe4, 0x75adc4dc87af527, &(0x7f0000000140)={0x3, {"ddc39cd69943fd"}, 0x7f}, 0x10) 2018/03/30 10:21:55 executing program 1: ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000914ff0)={0x0, 0x1, &(0x7f0000000000)="e4"}) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0x9}, 0x14) r1 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x1c, 0x800) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000006c0)=@assoc_value={0x0, 0x5}, &(0x7f0000000700)=0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000740)={r2, 0xffffffffffffffe0}, &(0x7f0000000780)=0x8) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r0}, 0x2c) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f00000001c0)={0x3, r3}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000540)=ANY=[@ANYRES32=0x0, @ANYBLOB="2f13aadccc9df8dbd7da8fa677b1d40afd16d71d537667e547de0bd87241450ce643a4a662b0cd8a16cf9f6c95d7fc9fbd07d3534c6d47165e9807b778cc28bc6843cb4d441fdd17d7b7cd8164b25cb0c61f793bbb14d80349bcb8bc5a0b39748f7d1b4749f85ebcd22dcf4b0e2b6f6ae37fda67b9c62270588cdf0f6e12ea9206154d879e712f9c3e13c1e68a120cccda701dd26d6ff8d5854ed30452961a2db32d44dd82f2a3eaca"], &(0x7f0000000240)=0x2) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) r6 = memfd_create(&(0x7f0000000040)='\x00', 0x3) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in=@multicast2, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6}}, &(0x7f0000000400)=0xe8) r7 = syz_genetlink_get_family_id$fou(&(0x7f0000000840)='fou\x00') sendmsg$FOU_CMD_GET(r6, &(0x7f0000000900)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x30, r7, 0x100, 0x70bd2b, 0x25dfdbfc, {0x3}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e21}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4, 0x5}]}, 0x30}, 0x1, 0x0, 0x0, 0x4001}, 0x4000) setsockopt$inet_mreq(r4, 0x0, 0x20, &(0x7f0000000200)={@local={0xac, 0x14, 0x14, 0xaa}, @multicast2=0xe0000002}, 0x8) ioctl$sock_bt_bnep_BNEPCONNDEL(r6, 0x400442c9, &(0x7f0000000440)={0xffffffffffffffff}) accept4$inet(r6, 0x0, &(0x7f0000000100), 0x80000) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r6, 0x84, 0x16, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)=0x1) setsockopt$inet_sctp_SCTP_NODELAY(r6, 0x84, 0x3, &(0x7f0000000080)=0x6, 0x4) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000500)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000600)=""/129}, 0x18) 2018/03/30 10:21:55 executing program 7: clone(0x200, &(0x7f0000000100)="f0f7d70fc52207334efb558c957ea5882b23d85fa1659dc13aa7603b45aa407f02117308b1a8697bcf6617a98d145ec63b3cffa3123c2b94a42831af8d9bdb4b03d2954fdaa7e037f2c459a27e42921a924df6c5899ef4dbdb44bffbadd515d6024b7e3450b4ea54c55a229f4d694a292b270018a408b9ed54a0bc1929156ff004c1cf0b1728065c1ae04f4eeb552ff2420005e5ccb9400909127922c4a8e69ffbb96ca5bc95786113ae475b94c2c9a6a235276e2f1b7f01010000000000007a", &(0x7f0000000000), &(0x7f0000f8b000), &(0x7f00000d5000)) mknod(&(0x7f0000cd7000)='./file0\x00', 0x103a, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000340), &(0x7f000027a000)) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000080)={0x4, 0xffffffffffffff9c, 0x1}) bind$unix(r0, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) r1 = syz_open_procfs(0x0, &(0x7f000042cff4)='personality\x00') read(r1, &(0x7f0000f1bf7e)=""/130, 0xfffffdd8) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000240)) execve(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000280)='cpuseteth0:&+&\x00'], &(0x7f0000000480)=[&(0x7f0000000300)='%*\x00', &(0x7f0000000340)='GPL\x00', &(0x7f0000000380)="2fa740706f7369785f61636c5f61636365737300", &(0x7f00000003c0)='\\\'\x00', &(0x7f0000000400)='system$\x00', &(0x7f0000000440)='personality\x00']) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x9, 0x18}, 0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000500)={0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000640)={0x14, 0x0, &(0x7f0000000540)=[@acquire_done={0x40106309, r2, 0x3}], 0x87, 0x0, &(0x7f0000000580)="807f70ca0afb056cd9d436ca79b17874c9617102d9a830ec4a65c710de5798c5402fb110227743ab8e49a11c8793d6cb74a4eb866f21c481dd1f218aa6b1abec37b42c918199e792bee83204d2cbe88249676aaf6a31a9cf0a33fb807c40e665181f64186c266eb7120b217d539ddb1cdc6be51dabe75aa04024e7e8cc3b326ce8650dd8804f6a"}) connect$inet6(r0, &(0x7f00000004c0)={0xa, 0x4e21, 0xb91, @local={0xfe, 0x80, [], 0xaa}, 0x9}, 0x1c) open$dir(&(0x7f000050bff8)='./file0\x00', 0x2, 0x0) [ 242.832419] bond0 (unregistering): Released all slaves [ 243.512967] IPVS: ftp: loaded support on port[0] = 21 [ 243.797456] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 244.211601] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 244.217711] 8021q: adding VLAN 0 to HW filter on device bond0 [ 244.261970] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 244.306740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 244.325863] FAULT_INJECTION: forcing a failure. [ 244.325863] name failslab, interval 1, probability 0, space 0, times 0 [ 244.337117] CPU: 0 PID: 29651 Comm: syz-executor6 Not tainted 4.16.0-rc7+ #371 [ 244.344459] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 244.353786] Call Trace: [ 244.356355] dump_stack+0x194/0x24d [ 244.359957] ? arch_local_irq_restore+0x53/0x53 [ 244.364609] should_fail+0x8c0/0xa40 [ 244.368305] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 244.373385] ? rcu_read_lock_sched_held+0x108/0x120 [ 244.378404] ? find_held_lock+0x35/0x1d0 [ 244.382447] ? __lock_is_held+0xb6/0x140 [ 244.386496] ? check_same_owner+0x320/0x320 [ 244.390795] ? rcu_note_context_switch+0x710/0x710 [ 244.395711] should_failslab+0xec/0x120 [ 244.399661] kmem_cache_alloc_node_trace+0x5a/0x760 [ 244.404650] ? idr_alloc_u32+0x390/0x390 [ 244.408697] mem_cgroup_css_alloc+0x3b6/0x19c0 [ 244.413258] ? setup_cpu_cache+0x1c0/0x1c0 [ 244.417465] ? __kernfs_new_node+0x3f5/0x570 [ 244.421849] ? kernfs_dop_revalidate+0x380/0x380 [ 244.426585] ? trace_hardirqs_off+0x10/0x10 [ 244.430887] ? kernfs_link_sibling+0x27d/0x380 [ 244.435445] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 244.440353] ? cgroup_kn_set_ugid+0x2c7/0x370 [ 244.444824] ? cgroup_file_name+0x1d0/0x1d0 [ 244.449117] ? mutex_unlock+0xd/0x10 [ 244.452811] ? __lock_is_held+0xb6/0x140 [ 244.456858] ? cgroup_addrm_files+0x67f/0xa70 [ 244.461338] ? trace_hardirqs_off+0x10/0x10 [ 244.465633] ? cgroup_file_write+0x710/0x710 [ 244.470032] ? cgroup_idr_replace+0x3f/0x50 [ 244.474330] ? trace_hardirqs_off+0x10/0x10 [ 244.478626] ? __lock_is_held+0xb6/0x140 [ 244.482669] ? __local_bh_enable_ip+0x121/0x230 [ 244.487315] ? __lock_is_held+0xb6/0x140 [ 244.491365] cgroup_apply_control_enable+0x44d/0xbc0 [ 244.496452] ? cgroup_propagate_control+0x570/0x570 [ 244.501453] ? css_populate_dir+0x289/0x420 [ 244.505754] cgroup_mkdir+0x56f/0xfc0 [ 244.509546] ? __lock_is_held+0xb6/0x140 [ 244.513588] ? cgroup_destroy_locked+0x750/0x750 [ 244.518321] ? rcu_read_lock_sched_held+0x108/0x120 [ 244.523312] ? kmem_cache_free+0x258/0x2a0 [ 244.527523] ? set_nlink+0xc1/0x160 [ 244.531125] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 244.536032] ? generic_permission+0x105/0x3c0 [ 244.540507] ? cgroup_destroy_locked+0x750/0x750 [ 244.545238] kernfs_iop_mkdir+0x153/0x1e0 [ 244.549367] vfs_mkdir+0x390/0x600 [ 244.552890] SyS_mkdirat+0x22b/0x2b0 [ 244.556583] ? SyS_mknod+0x480/0x480 [ 244.560270] ? trace_hardirqs_on+0xd/0x10 [ 244.564401] ? do_syscall_64+0xb7/0x940 [ 244.568354] ? SyS_mknod+0x480/0x480 [ 244.572045] do_syscall_64+0x281/0x940 [ 244.575905] ? __do_page_fault+0xc90/0xc90 [ 244.580114] ? _raw_spin_unlock_irq+0x27/0x70 [ 244.584586] ? finish_task_switch+0x1c1/0x7e0 [ 244.589055] ? syscall_return_slowpath+0x550/0x550 [ 244.593961] ? syscall_return_slowpath+0x2ac/0x550 [ 244.598917] ? prepare_exit_to_usermode+0x350/0x350 [ 244.603910] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 244.609270] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 244.614117] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 244.619282] RIP: 0033:0x4548b9 [ 244.622446] RSP: 002b:00007f801bbc1c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 244.630130] RAX: ffffffffffffffda RBX: 00007f801bbc26d4 RCX: 00000000004548b9 [ 244.637373] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 244.644615] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 244.651856] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 244.659102] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000034 [ 244.666571] kasan: CONFIG_KASAN_INLINE enabled [ 244.671502] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 244.678904] general protection fault: 0000 [#1] SMP KASAN [ 244.684421] Dumping ftrace buffer: [ 244.687942] (ftrace buffer empty) [ 244.691628] Modules linked in: [ 244.694799] CPU: 0 PID: 29651 Comm: syz-executor6 Not tainted 4.16.0-rc7+ #371 [ 244.702127] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 244.711466] RIP: 0010:__mem_cgroup_free+0x71/0x110 [ 244.716371] RSP: 0018:ffff8801c77df5a8 EFLAGS: 00010206 [ 244.721709] RAX: 0000000000000011 RBX: 0000000000000000 RCX: ffffffff82b16fed [ 244.728948] RDX: 0000000000010000 RSI: ffffc90003bf1000 RDI: 0000000000000088 [ 244.736197] RBP: ffff8801c77df5c8 R08: 0000000000000000 R09: ffff8801c77df3a0 [ 244.743441] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 244.750682] R13: ffff8801b3a7c340 R14: dffffc0000000000 R15: ffff8801b3a7c340 [ 244.757929] FS: 00007f801bbc2700(0000) GS:ffff8801db200000(0000) knlGS:0000000000000000 [ 244.766132] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 244.771988] CR2: 00000000004d8104 CR3: 00000001d8531005 CR4: 00000000001606f0 [ 244.779250] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 244.786506] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 244.793750] Call Trace: [ 244.796316] mem_cgroup_css_alloc+0x403/0x19c0 [ 244.800870] ? setup_cpu_cache+0x1c0/0x1c0 [ 244.805076] ? __kernfs_new_node+0x3f5/0x570 [ 244.809454] ? kernfs_dop_revalidate+0x380/0x380 [ 244.814183] ? trace_hardirqs_off+0x10/0x10 [ 244.818476] ? kernfs_link_sibling+0x27d/0x380 [ 244.823031] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 244.827932] ? cgroup_kn_set_ugid+0x2c7/0x370 [ 244.832401] ? cgroup_file_name+0x1d0/0x1d0 [ 244.836693] ? mutex_unlock+0xd/0x10 [ 244.840381] ? __lock_is_held+0xb6/0x140 [ 244.844431] ? cgroup_addrm_files+0x67f/0xa70 [ 244.848902] ? trace_hardirqs_off+0x10/0x10 [ 244.853195] ? cgroup_file_write+0x710/0x710 [ 244.857578] ? cgroup_idr_replace+0x3f/0x50 [ 244.861868] ? trace_hardirqs_off+0x10/0x10 [ 244.866160] ? __lock_is_held+0xb6/0x140 [ 244.870195] ? __local_bh_enable_ip+0x121/0x230 [ 244.874838] ? __lock_is_held+0xb6/0x140 [ 244.878873] cgroup_apply_control_enable+0x44d/0xbc0 [ 244.883960] ? cgroup_propagate_control+0x570/0x570 [ 244.888951] ? css_populate_dir+0x289/0x420 [ 244.893245] cgroup_mkdir+0x56f/0xfc0 [ 244.897026] ? __lock_is_held+0xb6/0x140 [ 244.901063] ? cgroup_destroy_locked+0x750/0x750 [ 244.905801] ? rcu_read_lock_sched_held+0x108/0x120 [ 244.910793] ? kmem_cache_free+0x258/0x2a0 [ 244.914999] ? set_nlink+0xc1/0x160 [ 244.918601] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 244.923498] ? generic_permission+0x105/0x3c0 [ 244.927963] ? cgroup_destroy_locked+0x750/0x750 [ 244.932690] kernfs_iop_mkdir+0x153/0x1e0 [ 244.936810] vfs_mkdir+0x390/0x600 [ 244.940324] SyS_mkdirat+0x22b/0x2b0 [ 244.944018] ? SyS_mknod+0x480/0x480 [ 244.947704] ? trace_hardirqs_on+0xd/0x10 [ 244.951828] ? do_syscall_64+0xb7/0x940 [ 244.955771] ? SyS_mknod+0x480/0x480 [ 244.959456] do_syscall_64+0x281/0x940 [ 244.963315] ? __do_page_fault+0xc90/0xc90 [ 244.967521] ? _raw_spin_unlock_irq+0x27/0x70 [ 244.971989] ? finish_task_switch+0x1c1/0x7e0 [ 244.976455] ? syscall_return_slowpath+0x550/0x550 [ 244.981356] ? syscall_return_slowpath+0x2ac/0x550 [ 244.986256] ? prepare_exit_to_usermode+0x350/0x350 [ 244.991249] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 244.996590] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 245.001407] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 245.006566] RIP: 0033:0x4548b9 [ 245.009724] RSP: 002b:00007f801bbc1c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 245.017403] RAX: ffffffffffffffda RBX: 00007f801bbc26d4 RCX: 00000000004548b9 [ 245.024641] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000013 [ 245.031881] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 245.039120] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 245.046370] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000034 [ 245.053617] Code: 00 00 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 99 00 00 00 4f 8b a4 e5 f0 09 00 00 49 8d bc 24 88 00 00 00 48 89 f8 48 c1 e8 03 <42> 80 3c 30 00 0f 85 88 00 00 00 49 8b bc 24 88 00 00 00 e8 77 [ 245.072694] RIP: __mem_cgroup_free+0x71/0x110 RSP: ffff8801c77df5a8 [ 245.079171] ---[ end trace 4f60be615932226e ]--- [ 245.083931] Kernel panic - not syncing: Fatal exception [ 245.089721] Dumping ftrace buffer: [ 245.093239] (ftrace buffer empty) [ 245.096920] Kernel Offset: disabled [ 245.100517] Rebooting in 86400 seconds..