[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 28.994514] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 32.484286] random: sshd: uninitialized urandom read (32 bytes read) [ 32.788897] random: sshd: uninitialized urandom read (32 bytes read) [ 34.110609] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.7' (ECDSA) to the list of known hosts. [ 39.807201] random: sshd: uninitialized urandom read (32 bytes read) 2018/05/16 13:51:09 fuzzer started 2018/05/16 13:51:10 dialing manager at 10.128.0.26:36755 [ 62.094284] can: request_module (can-proto-0) failed. [ 62.105194] can: request_module (can-proto-0) failed. 2018/05/16 13:51:33 kcov=true, comps=false 2018/05/16 13:51:37 executing program 0: 2018/05/16 13:51:37 executing program 1: 2018/05/16 13:51:37 executing program 7: 2018/05/16 13:51:37 executing program 4: 2018/05/16 13:51:37 executing program 2: 2018/05/16 13:51:37 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf0141f66f") r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000000)) write$fuse(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYPTR64, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES16=r1]], 0x39c) 2018/05/16 13:51:37 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000840)='/dev/cuse\x00', 0x0, 0x0) 2018/05/16 13:51:37 executing program 6: process_vm_writev(0x0, &(0x7f0000000180), 0x10f, &(0x7f0000000440)=[{&(0x7f0000000280)=""/195, 0xc3}], 0x1, 0x0) madvise(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xa000000000008) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xf) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) [ 67.818317] IPVS: ftp: loaded support on port[0] = 21 [ 67.844776] IPVS: ftp: loaded support on port[0] = 21 [ 67.963663] IPVS: ftp: loaded support on port[0] = 21 [ 67.968260] IPVS: ftp: loaded support on port[0] = 21 [ 67.974772] IPVS: ftp: loaded support on port[0] = 21 [ 67.979753] IPVS: ftp: loaded support on port[0] = 21 [ 67.996241] IPVS: ftp: loaded support on port[0] = 21 [ 68.021765] IPVS: ftp: loaded support on port[0] = 21 [ 69.891344] ip (4693) used greatest stack depth: 54456 bytes left [ 70.538323] ip (4742) used greatest stack depth: 54408 bytes left [ 70.700144] ip (4756) used greatest stack depth: 54312 bytes left [ 70.970216] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.976794] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.008129] device bridge_slave_0 entered promiscuous mode [ 71.067363] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.073886] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.091392] device bridge_slave_0 entered promiscuous mode [ 71.191085] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.197553] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.243141] device bridge_slave_1 entered promiscuous mode [ 71.272173] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.278705] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.290299] device bridge_slave_0 entered promiscuous mode [ 71.314693] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.321144] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.345687] device bridge_slave_1 entered promiscuous mode [ 71.375277] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.381733] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.391475] device bridge_slave_0 entered promiscuous mode [ 71.408939] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 71.431595] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.438097] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.489111] device bridge_slave_0 entered promiscuous mode [ 71.513418] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.519905] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.542124] device bridge_slave_1 entered promiscuous mode [ 71.556471] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 71.564158] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.570606] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.588764] device bridge_slave_0 entered promiscuous mode [ 71.616289] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.622773] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.655302] device bridge_slave_0 entered promiscuous mode [ 71.663755] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.670191] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.678145] device bridge_slave_0 entered promiscuous mode [ 71.685716] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 71.693169] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.699614] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.716152] device bridge_slave_1 entered promiscuous mode [ 71.735504] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.741957] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.766277] device bridge_slave_1 entered promiscuous mode [ 71.786413] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 71.794358] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.800769] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.823167] device bridge_slave_1 entered promiscuous mode [ 71.836784] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 71.846521] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.852928] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.876577] device bridge_slave_1 entered promiscuous mode [ 71.896179] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 71.909082] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.915526] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.948236] device bridge_slave_1 entered promiscuous mode [ 71.972328] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 71.979853] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 71.988308] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 72.036796] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 72.048441] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 72.175597] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 72.193797] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 72.213981] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 72.239386] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 72.364443] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 72.396856] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 72.496682] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 72.550388] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 72.600693] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 72.677818] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 72.737991] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 72.772308] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 72.786089] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 72.803429] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 72.817147] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 72.871558] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 72.917724] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 72.933896] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 73.020948] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 73.036491] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 73.044692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 73.067400] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 73.103473] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 73.127171] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 73.134362] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 73.151936] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 73.158887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 73.186375] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 73.193614] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 73.208185] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 73.266134] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 73.326951] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 73.333941] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 73.371843] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 73.379839] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 73.390775] ip (4953) used greatest stack depth: 53784 bytes left [ 73.409611] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 73.440753] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 73.466829] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 73.473793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 73.494876] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 73.505230] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 73.580499] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 73.587490] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 73.643182] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 73.664390] team0: Port device team_slave_0 added [ 73.691534] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 73.704241] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 73.737627] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 73.745941] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 73.755749] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 73.782824] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 73.800613] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 73.819736] team0: Port device team_slave_0 added [ 73.851720] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 73.865609] team0: Port device team_slave_1 added [ 73.977701] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 74.008221] team0: Port device team_slave_0 added [ 74.032289] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 74.063822] team0: Port device team_slave_1 added [ 74.090430] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 74.103259] team0: Port device team_slave_0 added [ 74.138273] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 74.145243] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 74.159300] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 74.192518] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 74.226872] team0: Port device team_slave_1 added [ 74.253276] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 74.260272] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 74.271768] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 74.325902] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 74.343811] team0: Port device team_slave_1 added [ 74.358063] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 74.372764] team0: Port device team_slave_0 added [ 74.382452] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 74.404759] team0: Port device team_slave_0 added [ 74.417431] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 74.427154] team0: Port device team_slave_0 added [ 74.447962] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 74.460921] team0: Port device team_slave_0 added [ 74.476201] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 74.486301] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 74.494925] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 74.501884] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 74.522598] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 74.554558] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 74.581980] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 74.604639] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 74.619831] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 74.628436] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 74.649880] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 74.660490] team0: Port device team_slave_1 added [ 74.666356] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 74.675352] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 74.691420] team0: Port device team_slave_1 added [ 74.698233] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 74.708653] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 74.727620] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 74.744337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 74.766327] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 74.774171] team0: Port device team_slave_1 added [ 74.784540] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 74.799663] team0: Port device team_slave_1 added [ 74.817934] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 74.829003] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 74.838108] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 74.849011] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 74.875402] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 74.907302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 74.921985] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 74.935708] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 74.946618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 74.958498] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 74.966698] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 74.980626] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 74.992285] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 75.003240] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 75.014844] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 75.037830] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 75.055344] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 75.066285] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 75.078186] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 75.086125] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 75.095232] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 75.106762] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 75.142662] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 75.161573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 75.181360] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 75.194553] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 75.202656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 75.210623] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 75.225632] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 75.232579] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 75.242439] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 75.260910] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 75.272190] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 75.290303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 75.301324] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 75.308996] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 75.316089] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 75.329391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 75.345106] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 75.361388] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 75.382879] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 75.389891] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 75.402428] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 75.412408] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 75.436860] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 75.456206] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 75.479240] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 75.490943] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 75.499084] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 75.507913] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 75.540765] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 75.576892] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 75.612123] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 75.631719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 75.640500] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 75.659849] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 75.667590] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 75.676294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 75.692162] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 75.710373] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 75.728736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 75.758787] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 75.766739] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 75.776267] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 75.796359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 75.832261] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 75.866233] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 75.913084] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 75.923301] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 75.941717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 75.965377] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 75.981590] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 76.000897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 77.637190] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.643653] bridge0: port 2(bridge_slave_1) entered forwarding state [ 77.650462] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.656884] bridge0: port 1(bridge_slave_0) entered forwarding state [ 77.688293] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 77.699129] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.705565] bridge0: port 2(bridge_slave_1) entered forwarding state [ 77.712358] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.719320] bridge0: port 1(bridge_slave_0) entered forwarding state [ 77.728953] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 77.736977] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 77.744595] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 77.787988] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.794423] bridge0: port 2(bridge_slave_1) entered forwarding state [ 77.801224] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.807640] bridge0: port 1(bridge_slave_0) entered forwarding state [ 77.842808] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 77.911990] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.918451] bridge0: port 2(bridge_slave_1) entered forwarding state [ 77.925266] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.931692] bridge0: port 1(bridge_slave_0) entered forwarding state [ 77.988433] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 78.012765] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.019188] bridge0: port 2(bridge_slave_1) entered forwarding state [ 78.025976] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.032391] bridge0: port 1(bridge_slave_0) entered forwarding state [ 78.059789] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 78.222476] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.228925] bridge0: port 2(bridge_slave_1) entered forwarding state [ 78.235720] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.242140] bridge0: port 1(bridge_slave_0) entered forwarding state [ 78.257103] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 78.284968] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.291418] bridge0: port 2(bridge_slave_1) entered forwarding state [ 78.298233] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.304651] bridge0: port 1(bridge_slave_0) entered forwarding state [ 78.350937] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 78.439688] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.446150] bridge0: port 2(bridge_slave_1) entered forwarding state [ 78.452969] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.459442] bridge0: port 1(bridge_slave_0) entered forwarding state [ 78.524870] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 78.753832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 78.766079] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 78.798131] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 78.826327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 78.855744] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 78.875095] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 85.937697] 8021q: adding VLAN 0 to HW filter on device bond0 [ 85.971783] 8021q: adding VLAN 0 to HW filter on device bond0 [ 86.081978] 8021q: adding VLAN 0 to HW filter on device bond0 [ 86.174009] 8021q: adding VLAN 0 to HW filter on device bond0 [ 86.490952] 8021q: adding VLAN 0 to HW filter on device bond0 [ 86.565719] 8021q: adding VLAN 0 to HW filter on device bond0 [ 86.706625] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 86.767138] 8021q: adding VLAN 0 to HW filter on device bond0 [ 86.797334] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 86.861226] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 86.931325] 8021q: adding VLAN 0 to HW filter on device bond0 [ 86.968864] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 87.290869] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 87.344861] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 87.458868] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 87.465181] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 87.479106] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 87.532221] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 87.538906] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 87.558717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 87.581819] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 87.768013] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 87.774394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 87.786450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 87.813162] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 87.821259] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 87.835816] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 87.858558] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 88.153770] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 88.160207] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 88.170840] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 88.229552] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 88.235988] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 88.255188] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 88.281904] 8021q: adding VLAN 0 to HW filter on device team0 [ 88.307781] 8021q: adding VLAN 0 to HW filter on device team0 [ 88.402106] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 88.408443] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 88.419818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 88.488357] 8021q: adding VLAN 0 to HW filter on device team0 [ 88.634273] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 88.640553] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 88.651880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 88.793640] 8021q: adding VLAN 0 to HW filter on device team0 [ 88.942789] 8021q: adding VLAN 0 to HW filter on device team0 [ 89.080684] 8021q: adding VLAN 0 to HW filter on device team0 [ 89.225864] 8021q: adding VLAN 0 to HW filter on device team0 [ 89.549837] 8021q: adding VLAN 0 to HW filter on device team0 2018/05/16 13:52:03 executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000003c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000400)=ANY=[@ANYBLOB="280000001200010a7b6757194ea12ccfc164de53", @ANYBLOB="000000000000000008001d0000000000"], 0x2}, 0x1}, 0x0) 2018/05/16 13:52:03 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf0141f66f") r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000000)) write$fuse(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="f072094557132315210d78d957b94c277a3da05c4234a2b0d213e018444f60fa691ee1144179d1fea2ff0bf95d4adb487ef5f3b4d61e6c36987e9ebaf9a75b3d5b20c8b9857f881545bf4a5156df035a4766b6de997955883dd22ec1d10984212711f762ef67f139982dbc3b9c386e425ee53b6c33bc47af8703e66719ca94e195f56bdf7c7b21eca22e470c2a7197f13322b8acc855ae6aa6e0e19cddc1e3eb0b1bcc9e4ee6812bfaf869479e406a850d52795068648ac34d1fcf001ec3dcd94068ca0b9c69522a2e85a132098a774930efee33c8e97de5759fe03b3b830f8313f3cb2a05cd65f65c1e368bd8c8712cf605a6a4c56aa4966636b752f68cd100654adaac3132924f3e0cdd2043bd9ace6d93b84874fe31deb0194ae288b2d87ce6461009f99713aa6f0ccaeb6ffdf676818accd070fc5ccd468f167b16bc99fd7363e9d0c579835c21d017da09045af1b69121c8daac6b02b90220827e27942cc11c992fefc9c8931d060727cc7c4444e35329327cc36a6ab74e490134306c2fc84d4df95e9a97a64318dcd86214530dde1e7bc728409e82c2211e79e41211c45882584f6701b958e5a62f01f64d4ce006963cd5dd4558e08bcf72babe867d9c730a702533369d3c3035de1a78d80b6d14219ba4c4f969b3aa3bc24c928bd8408707e671ad62950f6b5cbfe1857999f1b1cdab2e5394c84f7f714175b66070d16e2111647f74da4f78c1752dd3818b629801780d203422cb1de336a98efbf2e1a037dfbff3f6f83f7b35fde4eb5c92579bed62592da526d436d27acd658b3eb7333c22566b443e90887cd68ec1d93d9adf388fa73bc8ebc5908f46b072617c4a64c0d779dbfdc18d1031db783cca4e0e6a6179db6492799ba7fd1e4b762d77ae62c5686aac4dc10d69c247a74c0f79ea25bc012418cbd03024e2d3d67fbe51af2ea6d70147b055e3420d727559e76c592a0e61f2c8bc89f62a1368010b7a6e74f1fdf82b3dcf7ef10d470a0ff22dc8dc81ae76a3e27be52440169cf8e50cb9a0627f00171fe5e60be2f247edbe297d0b633fb4aec75ccc3cef4df99da36965a50c7e6bf915d4c0c248e9b8dfb521e67d24e7717ac80a38286f48c293f0af5bccca620d1576735f5051bf163f33064522d18e6aa8a971dc6edf5b713867fbdfa64b67186826929c82f36d5e5396d7b735bcdae1e7c10fdba5c63fcecc1b92daa2e4b9e4c0dace1729d26eb0896e0d30eadd1c084b770ddb71a65a14642a144734557b6b7273783de8a871e98e", @ANYPTR64, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES16=r1]], 0x39c) 2018/05/16 13:52:03 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6}]}, 0x10) 2018/05/16 13:52:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000e95fe0)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(0xffffffffffffffff, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/87, 0x57}], 0x1, 0x0) socket(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) preadv(r1, &(0x7f0000000140), 0x391, 0x0) 2018/05/16 13:52:03 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000c67000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x1000008000) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000002580)}, 0x0) r3 = accept4(r0, &(0x7f00000001c0)=@in={0x0, 0x0, @local}, &(0x7f0000000280)=0x80, 0x0) recvmmsg(r3, &(0x7f0000009fc0)=[{{&(0x7f0000009980)=@alg, 0x80, &(0x7f0000009e40), 0x0, &(0x7f0000009ec0)=""/202, 0xca}}], 0x1, 0x0, &(0x7f000000a1c0)) 2018/05/16 13:52:03 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000100)) 2018/05/16 13:52:03 executing program 6: process_vm_writev(0x0, &(0x7f0000000180), 0x10f, &(0x7f0000000440)=[{&(0x7f0000000280)=""/195, 0xc3}], 0x1, 0x0) madvise(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xa000000000008) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xf) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) 2018/05/16 13:52:03 executing program 2: r0 = socket(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") sendto$inet6(r0, &(0x7f0000000280), 0x0, 0x0, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x20}, 0x1c) 2018/05/16 13:52:03 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000140)={{0x2, 0x0, @broadcast=0xffffffff}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x0, {0x2}, 'veth1_to_team\x00'}) r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup2(r1, r0) 2018/05/16 13:52:03 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000013e95), 0x4) close(0xffffffffffffffff) mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) wait4(0x0, &(0x7f0000000180), 0xa0000000, &(0x7f00000001c0)) 2018/05/16 13:52:03 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x1, 0x7f, 0xc}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000ba000)={r0, &(0x7f0000000040), &(0x7f0000000380)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000040), &(0x7f0000000180)=""/221}, 0x18) 2018/05/16 13:52:04 executing program 6: process_vm_writev(0x0, &(0x7f0000000180), 0x10f, &(0x7f0000000440)=[{&(0x7f0000000280)=""/195, 0xc3}], 0x1, 0x0) madvise(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xa000000000008) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xf) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) 2018/05/16 13:52:04 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8911, &(0x7f0000000040)="4cce26506e1150baca00000000000000fc993a233531786cb68523bf012c") ioprio_get$uid(0x3, 0x0) llistxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=""/214, 0xd6) 2018/05/16 13:52:04 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000c67000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x1000008000) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000002580)}, 0x0) r3 = accept4(r0, &(0x7f00000001c0)=@in={0x0, 0x0, @local}, &(0x7f0000000280)=0x80, 0x0) recvmmsg(r3, &(0x7f0000009fc0)=[{{&(0x7f0000009980)=@alg, 0x80, &(0x7f0000009e40), 0x0, &(0x7f0000009ec0)=""/202, 0xca}}], 0x1, 0x0, &(0x7f000000a1c0)) 2018/05/16 13:52:04 executing program 7: mmap(&(0x7f000064a000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) socketpair(0x1, 0x2, 0x7, &(0x7f0000000100)={0xffffffffffffffff}) perf_event_open$cgroup(&(0x7f0000000080)={0x7, 0x70, 0x3f, 0x7, 0xffffffff80000001, 0xfffffffffffff001, 0x0, 0x7, 0x8000, 0x1, 0x5, 0x10000, 0x100000000, 0x4, 0x7, 0x9, 0x2, 0x4, 0x7, 0x1000, 0x50b, 0x4, 0x1, 0x8, 0x100, 0x7ff, 0xfffffffffffff436, 0x3, 0x5a61, 0x1, 0x0, 0x8, 0x6, 0x3213, 0x10000, 0x9, 0x0, 0x9, 0x0, 0xe580000, 0x4, @perf_bp={&(0x7f0000000000), 0xe}, 0x1005, 0x3ff, 0x2, 0x0, 0x5, 0x9, 0xfffffffeffffffff}, r0, 0x2, r1, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x50, &(0x7f0000000140)}, 0x10) unshare(0x10c00) 2018/05/16 13:52:04 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf0141f66f") r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000000)) write$fuse(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYPTR64, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES16=r1]], 0x39c) 2018/05/16 13:52:04 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000013e95), 0x4) close(0xffffffffffffffff) mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) wait4(0x0, &(0x7f0000000180), 0xa0000000, &(0x7f00000001c0)) 2018/05/16 13:52:04 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000080)=0x5, 0x4) setsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f0000000300)='i', 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f00000f7000)=""/106, &(0x7f0000000000)=0x12) 2018/05/16 13:52:04 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x2}, 0x60962d2c18e7e0db) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000140), 0x8) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) 2018/05/16 13:52:04 executing program 7: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8916, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r1, &(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, 0x0) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000080)="06a495bb4613ab6cb9581d226a9161bd") 2018/05/16 13:52:04 executing program 6: process_vm_writev(0x0, &(0x7f0000000180), 0x10f, &(0x7f0000000440)=[{&(0x7f0000000280)=""/195, 0xc3}], 0x1, 0x0) madvise(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xa000000000008) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xf) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) 2018/05/16 13:52:04 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000c67000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x1000008000) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000002580)}, 0x0) r3 = accept4(r0, &(0x7f00000001c0)=@in={0x0, 0x0, @local}, &(0x7f0000000280)=0x80, 0x0) recvmmsg(r3, &(0x7f0000009fc0)=[{{&(0x7f0000009980)=@alg, 0x80, &(0x7f0000009e40), 0x0, &(0x7f0000009ec0)=""/202, 0xca}}], 0x1, 0x0, &(0x7f000000a1c0)) 2018/05/16 13:52:04 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000013e95), 0x4) close(0xffffffffffffffff) mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) wait4(0x0, &(0x7f0000000180), 0xa0000000, &(0x7f00000001c0)) 2018/05/16 13:52:04 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf0141f66f") r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000000)) write$fuse(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYPTR64, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES16=r1]], 0x39c) 2018/05/16 13:52:04 executing program 5: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}], 0x1c) socketpair$inet6(0xa, 0x800, 0xac, &(0x7f00000001c0)) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e21, @rand_addr=0xe5dc}}}, &(0x7f0000000000)=0x84) syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x10400) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={r1, 0x10040000}, 0x8) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0xfffffffffffffffd, @local={0xfe, 0x80, [], 0xaa}, 0x40000000000000}, 0xb) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYBLOB="899a020000000000"], 0xc) setsockopt$inet6_int(r0, 0x29, 0x13, &(0x7f0000000180)=0x4, 0x4) 2018/05/16 13:52:04 executing program 7: open(&(0x7f0000000180)='./file0\x00', 0x80000000004540, 0x18949a110a2dd6f4) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') execve(&(0x7f0000000080)='./file0\x00', &(0x7f00000002c0), &(0x7f0000000300)) 2018/05/16 13:52:04 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000c67000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x1000008000) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000002580)}, 0x0) r3 = accept4(r0, &(0x7f00000001c0)=@in={0x0, 0x0, @local}, &(0x7f0000000280)=0x80, 0x0) recvmmsg(r3, &(0x7f0000009fc0)=[{{&(0x7f0000009980)=@alg, 0x80, &(0x7f0000009e40), 0x0, &(0x7f0000009ec0)=""/202, 0xca}}], 0x1, 0x0, &(0x7f000000a1c0)) 2018/05/16 13:52:04 executing program 6: process_vm_writev(0x0, &(0x7f0000000180), 0x10f, &(0x7f0000000440)=[{&(0x7f0000000280)=""/195, 0xc3}], 0x1, 0x0) madvise(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xa000000000008) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) 2018/05/16 13:52:04 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf0141f66f") r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x2) write$fuse(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYPTR64, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES16=r1]], 0x39c) 2018/05/16 13:52:04 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000013e95), 0x4) close(0xffffffffffffffff) mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) wait4(0x0, &(0x7f0000000180), 0xa0000000, &(0x7f00000001c0)) 2018/05/16 13:52:04 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f00000001c0), 0x4) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x400, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) bind$inet6(r0, &(0x7f00001c1000)={0xa, 0x4e20}, 0x1c) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet6(r0, &(0x7f0000b31000)="f9", 0x1, 0x0, &(0x7f00009e1000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x87) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f00000002c0)=0x9, 0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f0000000080)={0x3fb, 0x2, 0x1, 0x7, 0x1, 0xffffffff80000001, 0x1, 0x1, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000140)={r3, 0xc733}, 0x8) r4 = accept(r0, &(0x7f0000000000)=@rc, &(0x7f0000918000)=0x80) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r4, 0x84, 0x73, &(0x7f00000000c0)={r3, 0x0, 0x20, 0x200000000000, 0x74de}, &(0x7f0000000240)=0x49) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x4e23, 0x15, @empty, 0x8}, 0xffffffffffffff9b) 2018/05/16 13:52:04 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000013e95), 0x4) close(0xffffffffffffffff) mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) wait4(0x0, &(0x7f0000000180), 0xa0000000, &(0x7f00000001c0)) 2018/05/16 13:52:04 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000c67000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x1000008000) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000002580)}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000009fc0)=[{{&(0x7f0000009980)=@alg, 0x80, &(0x7f0000009e40), 0x0, &(0x7f0000009ec0)=""/202, 0xca}}], 0x1, 0x0, &(0x7f000000a1c0)) 2018/05/16 13:52:04 executing program 6: process_vm_writev(0x0, &(0x7f0000000180), 0x10f, &(0x7f0000000440)=[{&(0x7f0000000280)=""/195, 0xc3}], 0x1, 0x0) madvise(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xa000000000008) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) 2018/05/16 13:52:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000140)={@ipv4={[], [], @dev}, 0x0}, &(0x7f0000000180)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'bridge_slave_0\x00', r1}) writev(r0, &(0x7f0000c4fff0)=[{&(0x7f0000000000)="390000001300094700bb61e1c3050000070010000200000045000000007f000019001a000d003f000000000300000000000000060400006700", 0x39}], 0x1) 2018/05/16 13:52:05 executing program 7: io_setup(0x80000001, &(0x7f0000000040)) r0 = memfd_create(&(0x7f0000000000)='mime_type4cpusetppp0trusted#lo\'\x00', 0x3) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f00000001c0)=0x10001, &(0x7f0000000200)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000080)={{{@in, @in=@rand_addr}}, {{@in6}, 0x0, @in=@local}}, &(0x7f0000000180)=0xe8) 2018/05/16 13:52:05 executing program 6: process_vm_writev(0x0, &(0x7f0000000180), 0x10f, &(0x7f0000000440)=[{&(0x7f0000000280)=""/195, 0xc3}], 0x1, 0x0) madvise(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xa000000000008) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) 2018/05/16 13:52:05 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000c67000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x1000008000) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r3 = accept4(r0, &(0x7f00000001c0)=@in={0x0, 0x0, @local}, &(0x7f0000000280)=0x80, 0x0) recvmmsg(r3, &(0x7f0000009fc0)=[{{&(0x7f0000009980)=@alg, 0x80, &(0x7f0000009e40), 0x0, &(0x7f0000009ec0)=""/202, 0xca}}], 0x1, 0x0, &(0x7f000000a1c0)) 2018/05/16 13:52:05 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000013e95), 0x4) close(0xffffffffffffffff) mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) wait4(0x0, &(0x7f0000000180), 0xa0000000, &(0x7f00000001c0)) 2018/05/16 13:52:05 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf0141f66f") r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x2) write$fuse(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYPTR64, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES16=r1]], 0x39c) 2018/05/16 13:52:05 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000013e95), 0x4) close(0xffffffffffffffff) mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) wait4(0x0, &(0x7f0000000180), 0xa0000000, &(0x7f00000001c0)) 2018/05/16 13:52:05 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f00000001c0), 0x4) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x400, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) bind$inet6(r0, &(0x7f00001c1000)={0xa, 0x4e20}, 0x1c) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet6(r0, &(0x7f0000b31000)="f9", 0x1, 0x0, &(0x7f00009e1000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x87) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f00000002c0)=0x9, 0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f0000000080)={0x3fb, 0x2, 0x1, 0x7, 0x1, 0xffffffff80000001, 0x1, 0x1, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000140)={r3, 0xc733}, 0x8) r4 = accept(r0, &(0x7f0000000000)=@rc, &(0x7f0000918000)=0x80) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r4, 0x84, 0x73, &(0x7f00000000c0)={r3, 0x0, 0x20, 0x200000000000, 0x74de}, &(0x7f0000000240)=0x49) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x4e23, 0x15, @empty, 0x8}, 0xffffffffffffff9b) 2018/05/16 13:52:05 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000100)={0x0, 0x200}, 0xffffffffffffffc2) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x40000) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000000)="7645457bf40cff9e93c1f9ea975ff23e24e00597a5b542d0846cd45325b203469281358b1560019930dc905f8b7eec13e547db50ec7f23f123cabd095c3fb36575b7510840f46e9764aabd87c467d3df354187c9", 0x54}, {&(0x7f0000000180)="54eea3e3a8ae8d4e93a24559213f15d9a91a81767a340d1e847bb72d5e261868f5c7eaecc92695caea08d024fd6849fd4eabe65abee343e9c409ec30b9eb03d32981e8727226e9240e9b2d1324bc05332f0bc248086fb2113a1a73d1ac2a5d90633fe7a2b2db611e310a308cccea1cf2d204a3259745889421b356c9dfdf83", 0x7f}, {&(0x7f0000000200)="b7ebb5da5ec0c5ff81f18374b097b265c573571ec8fe64d5b4fedab972986958ed28ea9f113c03bea60ade467ee58d0bd5f07fafd2595672078006344091dae4efcc298e9cd80b542910b4d6695e1fa9dc88fced6ac93559c9fdedc105c65a9c15557b7e0a2db22a141120f37874d3f93ff2c7c4b137cd6366c44da6b8d23ea2700b37dce8e973a9ae94fbcc6d6e10353dd9287d6b3e9ea01acbddc5fb8d8f7527b6d4bb4f883c479b8000df5b2421e87f0cbe67f1e14dbfbc9ef7af56d796e34b47", 0xc2}, {&(0x7f0000000300)="1705b1848b27c4dd6fb214a80baa2b5d1ecf2f148cec2a7cb46b2a5ebdd2946e2864c8f3cfc3f15e5d24f6cb2eeeb4ca50f9f631cd4b49daf4304baab6f315df06f61286f86c2f0d7c5f4d26d40c470ff906b73fad4eb7d6a8f0f3d1d92ba84fdb4e99aef4e450e8e64d21624decea90c132b937c74fb5f27d84ac288e4bfd96a3727ddea859279d5c32d364db09c2adc71366045e2f42b23ae1e27162499505120b8698e9951ad208dbe51c56e97d5e51e1d2a51f46d8d474e2cc81af36f2567f11d721d9ac", 0xc6}, {&(0x7f0000000400)="9bc4d1dd353204217348dcb1cd8e99927222b0e0baa9ae7ba31e42e4329c0168db5b8f28a503463346ce75502de25b51ccdb48120c49c9c7c33095b33574f0ffef4b452d47f505c68b7fd991bacdae8dc5ef06024bef53d9ea6c63d259e60d69928d1544e0334dc87b47e943aafc211877c619bdb61bb7db601ae4ff02f148b123f27ff79111b1f822f0ba1b7329261a115088cf0f477f6df81d15526cc17374dcdb1fff9422341802ec88b421c5917b4576b16149ef9ec6f2df63c368541ca00e7056b0cbb3e2431f", 0xc9}, {&(0x7f0000000500)="30357238062078f58b4f90e4206e8d13e8f6e2a3f349ec47a8e5ba685d0477e03b96c34f8c6a7234d24540888f9a559f79affd8c56b902eda2712fe5c4afd684dfa2dfe04a5a75a9c1a95fc0a1fa7f9d05c2826503f192cb8d69b6961845d8770be1205d062e35f7a47e21825160f9f889614dd5d4c5a0d48705d40e7afe9093fb78831ba8d22eedb6387fd2eeaffe288825b69a", 0x94}, {&(0x7f00000005c0)="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", 0x1000}, {&(0x7f00000015c0)="a9da3ca057d4250c1b077f9f8489e909ae9a2c0ca85b410c960992f49471e50d02cb3f13762c3ea647a841539c6180ad9c3a8fa923715a3e1a448b38a3617350f066a93c43ded1f28d305c1dec5588758ca1e91cc60eb4b6a7876dfc4cd65316aeed8ddbcb42c54254a363c495ddbab10c98e6075e45c5de8907aab04fbf1e28c2f40fc1cbdb2b3c837b3c43630f8d", 0x8f}], 0x8, &(0x7f0000001700)=[{0xe0, 0x1ff, 0x6, "a5f8119cf7b989a03a9abe9248a34340a379401672cefc4d546ff5196e65f100723c52d15e41b2635545a906b7d58f704a10a4ce2ee571001c2876b6c238dcd485f32a380b59ca3628f7db0b5745b32aabdcaec8d453de5780e477676d1a89e05d80a602cc3febe0cb959078df4dc6d5e140a94a041afc5dd22f251337a0ac80afd7c0ee9571fe1c60e3deb8112bdd9d538ecad103bd265f2c24f65967b4f22c0000afb5fa09ee883e15e38058d0946e0c16cd23c2a55174ef8affe4a3885cd18fb58742c31117b1f3cb5ca04890"}, {0xf0, 0x1, 0x5, "c8619dce816b5a7f637fe3a6a79146102e3973c9dcf12054f69776b4a3c44d888ad0c60de10e25e54feb643ee097d8eaa3e1d1ed83a86d8dae4f700c07fda3205785b1319ec98094fc4bff0513d057f382a3f8e587091775dd56b34f491fe678204a3fdc596ac2609663e5f2240c08d5087f7fe98451bc1718f4f3cf0f22d8c676dac9db0f19ee6fdb279a259b0b03cf0704869ee2abc073172b7399e27b9aaba48fac8e17e4fa22c58a0b84370b51658921c7c6160e5f6d28beaabd080bb9312ef255baaacc2f13e988062559bac6d543c46e8edd9f7d5b9ecca52c10"}, {0xe8, 0x107, 0x4, "f0a576fefe46a84815971aec2327e15b78be35ddf01ebf0c35d8f3a9da855d85974937e7759e53f5a0431529acae1cc4009043e221f033a093b1e4217d58f8580ac7a5096d8acc69a1b99b126a42d1a474dacb8180f5b1b19588940a1569da85a287baf58a7eec9a4bf386422d442ad906b012acb75e51c768d76f8eb4c8c59c74db123e2fa743fb767c5fd4a705c3a5f048115c405365567ae27e422d8abc100590c6c9ab780110995c23b35c2e125467b0986907502377faa00c479cc0e5537e45f8242dfe00e939b345ed736b6dd52fdab2"}, {0x48, 0x116, 0x0, "f31ce8e3c862d5ef5a25ce6011f08059bfc537cffaad991e55283cd6fcf8295eb91e73a7f84f2e735a261fb30c0560dae1057c3b"}], 0x300, 0x80}, 0x10) setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000140)=@int=0x3, 0x4) 2018/05/16 13:52:05 executing program 7: r0 = socket(0x10, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, &(0x7f0000000040)=""/168, &(0x7f0000000100)=0xa8) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='\x00\x00\x00\x00\x00\x00@\t') fcntl$notify(r1, 0x402, 0x3e) dup3(r0, r1, 0x0) 2018/05/16 13:52:05 executing program 6: process_vm_writev(0x0, &(0x7f0000000180), 0x10f, &(0x7f0000000440)=[{&(0x7f0000000280)=""/195, 0xc3}], 0x1, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xf) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) 2018/05/16 13:52:05 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000013e95), 0x4) close(0xffffffffffffffff) mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) wait4(0x0, &(0x7f0000000180), 0xa0000000, &(0x7f00000001c0)) 2018/05/16 13:52:05 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000013e95), 0x4) close(0xffffffffffffffff) mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) 2018/05/16 13:52:05 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(&(0x7f0000000840)='./file0/file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f00000008c0)='proc\x00', 0x0, 0x0) clock_nanosleep(0x7, 0x1, &(0x7f0000000000), 0x0) 2018/05/16 13:52:05 executing program 7: clone(0x0, &(0x7f0000000080), &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) r0 = accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80000) pwrite64(r0, &(0x7f0000000040)="baf63a34203eaac256a3db778dc8db5ec47244a9783dc7ecfbb9b748a2e9da143419bb5dce9570c82a9da0cea5b652c914e76e72574b78bac770779c4826f430f7a884cafe2d857d9849d9d5ea90651aa1cf5c7a687d3ebf912a14f6e75476a2f32f1f0600a1557744a31f15bb3d8d9816d65ddecac4fdc54f6f16ebb912c73b5425b05713e47239be1f46db14b1f81ca2496ec382fc", 0x96, 0x13) getpriority(0x1, 0x0) 2018/05/16 13:52:05 executing program 6: process_vm_writev(0x0, &(0x7f0000000180), 0x10f, &(0x7f0000000440)=[{&(0x7f0000000280)=""/195, 0xc3}], 0x1, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xf) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) 2018/05/16 13:52:06 executing program 5: unshare(0x2000400) rt_sigsuspend(&(0x7f0000000080)={0x6}, 0x8) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x90) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000100)=@hopopts={0x8, 0x13, [], [@ra={0x5, 0x2, 0x5}, @calipso={0x7, 0x10, {0x4, 0x2, 0x7ff, 0x3, [0x10001]}}, @calipso={0x7, 0x18, {0x100, 0x4, 0xfff, 0xfffffffffffffc01, [0x7, 0x9]}}, @calipso={0x7, 0x48, {0x9, 0x10, 0x1, 0x0, [0x4, 0x10000, 0x2, 0xffffffff, 0x40, 0x3, 0x9, 0x1]}}, @hao={0xc9, 0x10}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @ra={0x5, 0x2, 0x8}]}, 0xa8) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(r1, 0x5204, &(0x7f0000000000)) 2018/05/16 13:52:06 executing program 6: process_vm_writev(0x0, &(0x7f0000000180), 0x10f, &(0x7f0000000440)=[{&(0x7f0000000280)=""/195, 0xc3}], 0x1, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xf) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) 2018/05/16 13:52:06 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0xfffffffffffffb3b, &(0x7f00000004c0)="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") clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) setitimer(0x2, &(0x7f0000000080)={{0x0, 0x2710}, {0x0, r1/1000+10000}}, &(0x7f00000000c0)) getitimer(0x2, &(0x7f0000000100)) 2018/05/16 13:52:07 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf0141f66f") r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x2) write$fuse(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYPTR64, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES16=r1]], 0x39c) 2018/05/16 13:52:07 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000013e95), 0x4) close(0xffffffffffffffff) mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/4096, 0x1000) 2018/05/16 13:52:07 executing program 6: madvise(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xa000000000008) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xf) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) 2018/05/16 13:52:07 executing program 7: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000013e95), 0x4) close(0xffffffffffffffff) mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) 2018/05/16 13:52:07 executing program 1: r0 = socket$inet(0x15, 0x80009, 0xffff) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @broadcast=0xffffffff}, 0x10) modify_ldt$write(0x1, &(0x7f0000000000)={0x101, 0x0, 0x1000, 0x7, 0x2, 0x5, 0x39, 0x491, 0x6, 0x6}, 0x10) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x114, 0x8, &(0x7f0000000740)={{{@in6, @in6=@dev={0xfe, 0x80}}}, {{@in6=@loopback={0x0, 0x1}}, 0x0, @in=@multicast2=0xe0000002}}, 0xe8) 2018/05/16 13:52:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x7}, {0x6, 0xffffffffffffffff}]}) 2018/05/16 13:52:07 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000c67000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x1000008000) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r3 = accept4(r0, &(0x7f00000001c0)=@in={0x0, 0x0, @local}, &(0x7f0000000280)=0x80, 0x0) recvmmsg(r3, &(0x7f0000009fc0)=[{{&(0x7f0000009980)=@alg, 0x80, &(0x7f0000009e40), 0x0, &(0x7f0000009ec0)=""/202, 0xca}}], 0x1, 0x0, &(0x7f000000a1c0)) 2018/05/16 13:52:07 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000013e95), 0x4) close(0xffffffffffffffff) mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) wait4(0x0, &(0x7f0000000180), 0xa0000000, &(0x7f00000001c0)) [ 97.083762] audit: type=1326 audit(1526478727.082:3): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6842 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a09 code=0x0 2018/05/16 13:52:07 executing program 6: madvise(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xa000000000008) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xf) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) 2018/05/16 13:52:07 executing program 1: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = getpgrp(0xffffffffffffffff) rt_tgsigqueueinfo(r0, r0, 0x12, &(0x7f0000000000)={0x14, 0xdd000000000000, 0x9136, 0x1000}) move_pages(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000f4000/0x2000)=nil], &(0x7f0000000040)=[0x7, 0x3, 0x3f, 0x9, 0x8], &(0x7f0000000100), 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r1, 0xc058534f, &(0x7f00000000c0)={{0x1, 0x9}, 0x1, 0x0, 0xff, {0xfffffffffffffff8, 0x5}, 0x932b, 0x800}) socket$netlink(0x10, 0x3, 0x400000000000023) 2018/05/16 13:52:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x7}, {0x6, 0xffffffffffffffff}]}) 2018/05/16 13:52:07 executing program 6: madvise(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xa000000000008) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xf) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) [ 97.367930] audit: type=1326 audit(1526478727.366:4): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6867 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a09 code=0x0 2018/05/16 13:52:07 executing program 7: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000013e95), 0x4) close(0xffffffffffffffff) mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) 2018/05/16 13:52:07 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000013e95), 0x4) close(0xffffffffffffffff) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) 2018/05/16 13:52:07 executing program 1: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = getpgrp(0xffffffffffffffff) rt_tgsigqueueinfo(r0, r0, 0x12, &(0x7f0000000000)={0x14, 0xdd000000000000, 0x9136, 0x1000}) move_pages(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000f4000/0x2000)=nil], &(0x7f0000000040)=[0x7, 0x3, 0x3f, 0x9, 0x8], &(0x7f0000000100), 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r1, 0xc058534f, &(0x7f00000000c0)={{0x1, 0x9}, 0x1, 0x0, 0xff, {0xfffffffffffffff8, 0x5}, 0x932b, 0x800}) socket$netlink(0x10, 0x3, 0x400000000000023) 2018/05/16 13:52:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x7}, {0x6, 0xffffffffffffffff}]}) 2018/05/16 13:52:07 executing program 6: process_vm_writev(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000440), 0x0, 0x0) madvise(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xa000000000008) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xf) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) 2018/05/16 13:52:07 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000013e95), 0x4) close(0xffffffffffffffff) mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) wait4(0x0, &(0x7f0000000180), 0xa0000000, &(0x7f00000001c0)) 2018/05/16 13:52:07 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000c67000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x1000008000) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r3 = accept4(r0, &(0x7f00000001c0)=@in={0x0, 0x0, @local}, &(0x7f0000000280)=0x80, 0x0) recvmmsg(r3, &(0x7f0000009fc0)=[{{&(0x7f0000009980)=@alg, 0x80, &(0x7f0000009e40), 0x0, &(0x7f0000009ec0)=""/202, 0xca}}], 0x1, 0x0, &(0x7f000000a1c0)) 2018/05/16 13:52:07 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf0141f66f") ioctl$int_in(0xffffffffffffffff, 0x800000c004500a, &(0x7f0000000000)) write$fuse(0xffffffffffffffff, &(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYPTR64, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES16]], 0x39c) [ 97.886527] audit: type=1326 audit(1526478727.885:5): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6889 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a09 code=0x0 2018/05/16 13:52:08 executing program 6: process_vm_writev(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000440), 0x0, 0x0) madvise(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xa000000000008) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xf) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) 2018/05/16 13:52:08 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) bind$inet6(r0, &(0x7f00001c1000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f00009f1000)='G', 0x1, 0x0, &(0x7f0000108fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}}}, &(0x7f00000000c0)=0x98) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000240)={r1}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000000)={0x6fb1, 0x800, 0x8004, 0x9, 0x1, 0x7fffffff, 0xfffffffeffffffff, 0x7, r1}, &(0x7f0000000040)=0x20) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000380)={r1, @in={{0x2, 0x4e21}}}, &(0x7f0000000140)=0xffffffffffffff4e) 2018/05/16 13:52:08 executing program 3: socket(0xa, 0x1, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000000)) write$fuse(r0, &(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYPTR64, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES16=r0]], 0x39c) 2018/05/16 13:52:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x7}, {0x6, 0xffffffffffffffff}]}) 2018/05/16 13:52:08 executing program 6: process_vm_writev(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000440), 0x0, 0x0) madvise(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xa000000000008) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xf) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) 2018/05/16 13:52:08 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000013e95), 0x4) close(0xffffffffffffffff) mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/4096, 0x1000) wait4(0x0, &(0x7f0000000180), 0xa0000000, &(0x7f00000001c0)) 2018/05/16 13:52:08 executing program 7: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000013e95), 0x4) close(0xffffffffffffffff) mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) 2018/05/16 13:52:08 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000c67000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x1000008000) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000002580)}, 0x0) r3 = accept4(r0, &(0x7f00000001c0)=@in={0x0, 0x0, @local}, &(0x7f0000000280)=0x80, 0x0) recvmmsg(r3, &(0x7f0000009fc0)=[{{&(0x7f0000009980)=@alg, 0x80, &(0x7f0000009e40), 0x0, &(0x7f0000009ec0)=""/202, 0xca}}], 0x1, 0x0, &(0x7f000000a1c0)) 2018/05/16 13:52:08 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000013e95), 0x4) close(0xffffffffffffffff) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) 2018/05/16 13:52:08 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000001280)='cgroup.procs\x00', 0x2, 0x0) r2 = epoll_create1(0x4) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000000c0)) read(r1, &(0x7f00000022c0)=""/4096, 0x366) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r1, &(0x7f0000000140)={0x3}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) pwrite64(r3, &(0x7f0000000180)="23e285ab2638256d79a3775e37df9c838cf3dec67c6710b21b27977cd1b41217bb1c5f29dbf860494ad0b51b28de9551f63e2763fe1b5aad488cca4945f2a4778bdf9880fc3a8a973f5a76818bd9f98158436e602a173fd79ac68ff6b0424dba795e75fa48e692ddea01c31bebe995c8bb1e827d1a058426f95ccf879081163063bf90b2f502dcea2c6fdfa9e6b77bf817", 0x91, 0x0) epoll_wait(r2, &(0x7f0000000080)=[{}], 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) [ 98.794644] audit: type=1326 audit(1526478728.793:6): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6925 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a09 code=0x0 2018/05/16 13:52:08 executing program 6: process_vm_writev(0x0, &(0x7f0000000180), 0x10f, &(0x7f0000000440)=[{&(0x7f0000000280)=""/195, 0xc3}], 0x1, 0x0) madvise(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xf) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) 2018/05/16 13:52:08 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x7}, {0x6, 0xffffffffffffffff}]}) 2018/05/16 13:52:08 executing program 1: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x1, 0x141080) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x2c, &(0x7f0000000080)=[@in6={0xa, 0x4e24, 0x2, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}, 0x6}, @in={0x2, 0x4e21, @rand_addr=0xfffffffffffffffc}]}, &(0x7f0000000200)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000240)={r1, 0x5}, 0x8) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000002c0)={r1, @in6={{0xa, 0x4e20, 0x8ffd, @dev={0xfe, 0x80, [], 0x17}, 0x8}}, 0x6, 0xfffffffffffffff8}, 0x90) lgetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@known='security.selinux\x00', &(0x7f0000000180)=""/125, 0x7d) mbind(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x8000, &(0x7f0000000280)=0x15a, 0x9, 0x3) 2018/05/16 13:52:09 executing program 3: socket(0xa, 0x1, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000000)) write$fuse(r0, &(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYPTR64, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES16=r0]], 0x39c) 2018/05/16 13:52:09 executing program 7: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000013e95), 0x4) close(0xffffffffffffffff) mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/4096, 0x1000) 2018/05/16 13:52:09 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000013e95), 0x4) close(0xffffffffffffffff) mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/4096, 0x1000) wait4(0x0, &(0x7f0000000180), 0xa0000000, &(0x7f00000001c0)) 2018/05/16 13:52:09 executing program 6: process_vm_writev(0x0, &(0x7f0000000180), 0x10f, &(0x7f0000000440)=[{&(0x7f0000000280)=""/195, 0xc3}], 0x1, 0x0) madvise(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xf) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) 2018/05/16 13:52:09 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000013e95), 0x4) close(0xffffffffffffffff) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) 2018/05/16 13:52:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0xffffffffffffffff}]}) 2018/05/16 13:52:09 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x1, 0x4) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") r1 = socket$inet(0x2, 0x3, 0xfa) sendmmsg$inet_sctp(r1, &(0x7f0000004340)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10, &(0x7f0000000040), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="3000000000000000840000000180000000000000000000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) [ 99.249176] audit: type=1326 audit(1526478729.247:7): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6978 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a09 code=0x0 2018/05/16 13:52:09 executing program 3: socket(0xa, 0x1, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000000)) write$fuse(r0, &(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYPTR64, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES16=r0]], 0x39c) 2018/05/16 13:52:09 executing program 6: process_vm_writev(0x0, &(0x7f0000000180), 0x10f, &(0x7f0000000440)=[{&(0x7f0000000280)=""/195, 0xc3}], 0x1, 0x0) madvise(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xf) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) 2018/05/16 13:52:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0xffffffffffffffff}]}) [ 99.492719] audit: type=1326 audit(1526478729.491:8): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7003 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a09 code=0x0 2018/05/16 13:52:09 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000013e95), 0x4) close(0xffffffffffffffff) mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/4096, 0x1000) wait4(0x0, &(0x7f0000000180), 0xa0000000, &(0x7f00000001c0)) 2018/05/16 13:52:09 executing program 7: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000013e95), 0x4) close(0xffffffffffffffff) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) 2018/05/16 13:52:09 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000013e95), 0x4) mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) 2018/05/16 13:52:09 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000c67000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x1000008000) r1 = socket$inet_dccp(0x2, 0x6, 0x0) socket(0xa, 0x1, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000002580)}, 0x0) r2 = accept4(r0, &(0x7f00000001c0)=@in={0x0, 0x0, @local}, &(0x7f0000000280)=0x80, 0x0) recvmmsg(r2, &(0x7f0000009fc0)=[{{&(0x7f0000009980)=@alg, 0x80, &(0x7f0000009e40), 0x0, &(0x7f0000009ec0)=""/202, 0xca}}], 0x1, 0x0, &(0x7f000000a1c0)) 2018/05/16 13:52:09 executing program 3: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf0141f66f") r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000000)) write$fuse(r0, &(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYPTR64, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES16=r0]], 0x39c) 2018/05/16 13:52:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0xffffffffffffffff}]}) 2018/05/16 13:52:09 executing program 6: process_vm_writev(0x0, &(0x7f0000000180), 0x10f, &(0x7f0000000440)=[{&(0x7f0000000280)=""/195, 0xc3}], 0x1, 0x0) madvise(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xa000000000008) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) 2018/05/16 13:52:09 executing program 1: socket(0xa, 0x1, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000000)) write$fuse(r0, &(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYPTR64, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES16=r0]], 0x39c) [ 99.801945] audit: type=1326 audit(1526478729.800:9): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7021 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a09 code=0x0 2018/05/16 13:52:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{}, {0x6, 0xffffffffffffffff}]}) 2018/05/16 13:52:10 executing program 6: socket(0xa, 0x1, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000000)) write$fuse(r0, &(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYPTR64, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES16=r0]], 0x39c) 2018/05/16 13:52:10 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000013e95), 0x4) close(0xffffffffffffffff) mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/4096, 0x1000) 2018/05/16 13:52:10 executing program 3: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf0141f66f") r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000000)) write$fuse(r0, &(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYPTR64, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES16=r0]], 0x39c) [ 99.991249] audit: type=1326 audit(1526478729.989:10): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7043 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a09 code=0x0 2018/05/16 13:52:10 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000c67000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x1000008000) r1 = socket$inet_dccp(0x2, 0x6, 0x0) socket(0xa, 0x1, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000002580)}, 0x0) r2 = accept4(r0, &(0x7f00000001c0)=@in={0x0, 0x0, @local}, &(0x7f0000000280)=0x80, 0x0) recvmmsg(r2, &(0x7f0000009fc0)=[{{&(0x7f0000009980)=@alg, 0x80, &(0x7f0000009e40), 0x0, &(0x7f0000009ec0)=""/202, 0xca}}], 0x1, 0x0, &(0x7f000000a1c0)) 2018/05/16 13:52:10 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) socket$inet6_sctp(0xa, 0x0, 0x84) mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) 2018/05/16 13:52:10 executing program 7: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000013e95), 0x4) close(0xffffffffffffffff) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) 2018/05/16 13:52:10 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{}, {0x6, 0xffffffffffffffff}]}) 2018/05/16 13:52:10 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000013e95), 0x4) close(0xffffffffffffffff) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) wait4(0x0, &(0x7f0000000180), 0xa0000000, &(0x7f00000001c0)) 2018/05/16 13:52:10 executing program 1 (fault-call:3 fault-nth:0): process_vm_writev(0x0, &(0x7f0000000180), 0x10f, &(0x7f0000000440)=[{&(0x7f0000000280)=""/195, 0xc3}], 0x1, 0x0) madvise(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xa000000000008) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xf) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) 2018/05/16 13:52:10 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000c67000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x1000008000) r1 = socket$inet_dccp(0x2, 0x6, 0x0) socket(0xa, 0x1, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000002580)}, 0x0) r2 = accept4(r0, &(0x7f00000001c0)=@in={0x0, 0x0, @local}, &(0x7f0000000280)=0x80, 0x0) recvmmsg(r2, &(0x7f0000009fc0)=[{{&(0x7f0000009980)=@alg, 0x80, &(0x7f0000009e40), 0x0, &(0x7f0000009ec0)=""/202, 0xca}}], 0x1, 0x0, &(0x7f000000a1c0)) 2018/05/16 13:52:10 executing program 6: socket(0xa, 0x1, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000000)) write$fuse(r0, &(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYPTR64, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES16=r0]], 0x39c) 2018/05/16 13:52:10 executing program 7: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000013e95), 0x4) close(0xffffffffffffffff) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) 2018/05/16 13:52:10 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) 2018/05/16 13:52:10 executing program 3: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf0141f66f") r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000000)) write$fuse(r0, &(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYPTR64, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES16=r0]], 0x39c) [ 100.534550] audit: type=1326 audit(1526478730.533:11): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7086 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a09 code=0x0 [ 100.577119] FAULT_INJECTION: forcing a failure. [ 100.577119] name failslab, interval 1, probability 0, space 0, times 1 [ 100.588539] CPU: 0 PID: 7088 Comm: syz-executor1 Not tainted 4.17.0-rc5+ #95 [ 100.595758] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 100.605142] Call Trace: [ 100.607773] dump_stack+0x185/0x1d0 [ 100.611446] should_fail+0x87b/0xab0 [ 100.615227] __should_failslab+0x278/0x2a0 [ 100.619606] should_failslab+0x29/0x70 [ 100.623535] kmem_cache_alloc+0x12e/0xb90 [ 100.627735] ? __split_vma+0x1d5/0xcd0 [ 100.631672] ? vma_merge+0x4c3/0x1f90 [ 100.635532] ? __split_vma+0x163/0xcd0 [ 100.639467] __split_vma+0x1d5/0xcd0 [ 100.643230] split_vma+0x10f/0x170 [ 100.646810] mlock_fixup+0xc0e/0xc70 [ 100.650592] apply_vma_lock_flags+0x419/0x680 [ 100.655166] do_mlock+0x94c/0xb20 [ 100.658685] ? syscall_return_slowpath+0xe9/0x700 [ 100.663590] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 100.669037] ? fput+0x25c/0x2e0 [ 100.672389] __x64_sys_mlock2+0x144/0x1a0 [ 100.676582] do_syscall_64+0x154/0x220 [ 100.680511] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 100.685726] RIP: 0033:0x455a09 [ 100.688932] RSP: 002b:00007efcd7cc8c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000145 [ 100.696692] RAX: ffffffffffffffda RBX: 00007efcd7cc96d4 RCX: 0000000000455a09 [ 100.704016] RDX: 0000000000000000 RSI: 0000000000002000 RDI: 0000000020000000 [ 100.711318] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 100.718613] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 2018/05/16 13:52:10 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{}, {0x6, 0xffffffffffffffff}]}) [ 100.725910] R13: 000000000000049d R14: 00000000006faf58 R15: 0000000000000000 2018/05/16 13:52:10 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000c67000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x1000008000) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000002580)}, 0x0) r2 = accept4(r0, &(0x7f00000001c0)=@in={0x0, 0x0, @local}, &(0x7f0000000280)=0x80, 0x0) recvmmsg(r2, &(0x7f0000009fc0)=[{{&(0x7f0000009980)=@alg, 0x80, &(0x7f0000009e40), 0x0, &(0x7f0000009ec0)=""/202, 0xca}}], 0x1, 0x0, &(0x7f000000a1c0)) 2018/05/16 13:52:10 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000009940)=[{{&(0x7f0000000280)=@hci={0x1f}, 0x80, &(0x7f0000001900)}}, {{&(0x7f0000001940)=@un=@abs, 0x80, &(0x7f0000001c80), 0x0, &(0x7f0000001cc0)=[{0x18, 0x1, 0x1, "fdae"}], 0x18}}], 0x2, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x8, 0x5, 0x5, 0x6, 0x0, 0x401, 0x3, 0x6, 0xc9f, 0xffff, 0x4bf}, 0xb) [ 100.802154] audit: type=1326 audit(1526478730.800:12): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7108 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a09 code=0x0 2018/05/16 13:52:10 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) 2018/05/16 13:52:10 executing program 3: r0 = socket(0x0, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf0141f66f") r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000000)) write$fuse(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYPTR64, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES16=r1]], 0x39c) 2018/05/16 13:52:10 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x7}]}) 2018/05/16 13:52:10 executing program 1 (fault-call:3 fault-nth:1): process_vm_writev(0x0, &(0x7f0000000180), 0x10f, &(0x7f0000000440)=[{&(0x7f0000000280)=""/195, 0xc3}], 0x1, 0x0) madvise(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xa000000000008) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xf) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) 2018/05/16 13:52:11 executing program 7: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000013e95), 0x4) mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) 2018/05/16 13:52:11 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000013e95), 0x4) close(0xffffffffffffffff) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) wait4(0x0, &(0x7f0000000180), 0xa0000000, &(0x7f00000001c0)) [ 101.129524] FAULT_INJECTION: forcing a failure. [ 101.129524] name failslab, interval 1, probability 0, space 0, times 0 [ 101.140975] CPU: 1 PID: 7134 Comm: syz-executor1 Not tainted 4.17.0-rc5+ #95 [ 101.148208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 101.157593] Call Trace: [ 101.160229] dump_stack+0x185/0x1d0 [ 101.163907] should_fail+0x87b/0xab0 [ 101.167667] __should_failslab+0x278/0x2a0 [ 101.171971] should_failslab+0x29/0x70 [ 101.175896] kmem_cache_alloc+0x12e/0xb90 [ 101.180089] ? anon_vma_clone+0x15c/0xbf0 [ 101.184312] ? memcg_kmem_put_cache+0x40/0x280 [ 101.188950] ? kmem_cache_alloc+0x7c4/0xb90 [ 101.193330] anon_vma_clone+0x15c/0xbf0 [ 101.197371] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 101.202859] ? vma_dup_policy+0x12f/0x1a0 [ 101.207060] __split_vma+0x50e/0xcd0 [ 101.210820] split_vma+0x10f/0x170 [ 101.214398] mlock_fixup+0xc0e/0xc70 [ 101.218190] apply_vma_lock_flags+0x419/0x680 [ 101.222820] do_mlock+0x94c/0xb20 [ 101.226365] ? syscall_return_slowpath+0xe9/0x700 [ 101.231279] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 101.236705] ? fput+0x25c/0x2e0 [ 101.240048] __x64_sys_mlock2+0x144/0x1a0 [ 101.244235] do_syscall_64+0x154/0x220 [ 101.248170] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 101.253383] RIP: 0033:0x455a09 [ 101.256595] RSP: 002b:00007efcd7cc8c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000145 [ 101.264350] RAX: ffffffffffffffda RBX: 00007efcd7cc96d4 RCX: 0000000000455a09 [ 101.271649] RDX: 0000000000000000 RSI: 0000000000002000 RDI: 0000000020000000 [ 101.278940] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 101.286229] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 101.293520] R13: 000000000000049d R14: 00000000006faf58 R15: 0000000000000001 2018/05/16 13:52:11 executing program 7: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) socket$inet6_sctp(0xa, 0x0, 0x84) mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) 2018/05/16 13:52:11 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000c67000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x1000008000) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000002580)}, 0x0) r2 = accept4(r0, &(0x7f00000001c0)=@in={0x0, 0x0, @local}, &(0x7f0000000280)=0x80, 0x0) recvmmsg(r2, &(0x7f0000009fc0)=[{{&(0x7f0000009980)=@alg, 0x80, &(0x7f0000009e40), 0x0, &(0x7f0000009ec0)=""/202, 0xca}}], 0x1, 0x0, &(0x7f000000a1c0)) 2018/05/16 13:52:11 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) 2018/05/16 13:52:11 executing program 6: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf0141f66f") r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000000)) write$fuse(r0, &(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYPTR64, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES16=r0]], 0x39c) 2018/05/16 13:52:11 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x7}, {0x0, 0xffffffffffffffff}]}) 2018/05/16 13:52:11 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000013e95), 0x4) close(0xffffffffffffffff) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) wait4(0x0, &(0x7f0000000180), 0xa0000000, &(0x7f00000001c0)) 2018/05/16 13:52:11 executing program 3: r0 = socket(0x0, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf0141f66f") r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000000)) write$fuse(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYPTR64, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES16=r1]], 0x39c) 2018/05/16 13:52:11 executing program 1 (fault-call:3 fault-nth:2): process_vm_writev(0x0, &(0x7f0000000180), 0x10f, &(0x7f0000000440)=[{&(0x7f0000000280)=""/195, 0xc3}], 0x1, 0x0) madvise(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xa000000000008) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xf) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) 2018/05/16 13:52:11 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x7}, {0x6}]}) 2018/05/16 13:52:11 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000c67000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x1000008000) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000002580)}, 0x0) r2 = accept4(r0, &(0x7f00000001c0)=@in={0x0, 0x0, @local}, &(0x7f0000000280)=0x80, 0x0) recvmmsg(r2, &(0x7f0000009fc0)=[{{&(0x7f0000009980)=@alg, 0x80, &(0x7f0000009e40), 0x0, &(0x7f0000009ec0)=""/202, 0xca}}], 0x1, 0x0, &(0x7f000000a1c0)) 2018/05/16 13:52:11 executing program 1: process_vm_writev(0x0, &(0x7f0000000180), 0x10f, &(0x7f0000000440)=[{&(0x7f0000000280)=""/195, 0xc3}], 0x1, 0x0) madvise(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xa000000000008) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xf) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/psched\x00') getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f00000001c0)={0x0, 0x7}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e24, 0x100000001, @local={0xfe, 0x80, [], 0xaa}, 0xffffffff}}, 0x1, 0x0, 0x0, 0x10001, 0x1ff}, &(0x7f0000000240)=0x98) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) setreuid(r2, r3) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000500)={r0, 0x0, 0x1, 0x3, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) 2018/05/16 13:52:11 executing program 6: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf0141f66f") r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000000)) write$fuse(r0, &(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYPTR64, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES16=r0]], 0x39c) 2018/05/16 13:52:11 executing program 3: r0 = socket(0x0, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf0141f66f") r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000000)) write$fuse(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYPTR64, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES16=r1]], 0x39c) 2018/05/16 13:52:11 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) 2018/05/16 13:52:11 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000013e95), 0x4) mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) wait4(0x0, &(0x7f0000000180), 0xa0000000, &(0x7f00000001c0)) 2018/05/16 13:52:12 executing program 1: process_vm_writev(0x0, &(0x7f0000000000), 0x10c5, &(0x7f0000000440), 0x0, 0x0) madvise(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xa000000000008) r0 = fcntl$getown(0xffffffffffffff9c, 0x9) getpriority(0x3, r0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) 2018/05/16 13:52:12 executing program 7: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) 2018/05/16 13:52:12 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) socket$inet6_sctp(0xa, 0x0, 0x84) mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) wait4(0x0, &(0x7f0000000180), 0xa0000000, &(0x7f00000001c0)) 2018/05/16 13:52:12 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) socket(0xa, 0x1, 0x0) mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 2018/05/16 13:52:12 executing program 6: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) socket$inet6_sctp(0xa, 0x0, 0x84) mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) 2018/05/16 13:52:12 executing program 3: r0 = socket(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf0141f66f") r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000000)) write$fuse(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="f072094557132315210d78d957b94c277a3da05c4234a2b0d213e018444f60fa691ee1144179d1fea2ff0bf95d4adb487ef5f3b4d61e6c36987e9ebaf9a75b3d5b20c8b9857f881545bf4a5156df035a4766b6de997955883dd22ec1d10984212711f762ef67f139982dbc3b9c386e425ee53b6c33bc47af8703e66719ca94e195f56bdf7c7b21eca22e470c2a7197f13322b8acc855ae6aa6e0e19cddc1e3eb0b1bcc9e4ee6812bfaf869479e406a850d52795068648ac34d1fcf001ec3dcd94068ca0b9c69522a2e85a132098a774930efee33c8e97de5759fe03b3b830f8313f3cb2a05cd65f65c1e368bd8c8712cf605a6a4c56aa4966636b752f68cd100654adaac3132924f3e0cdd2043bd9ace6d93b84874fe31deb0194ae288b2d87ce6461009f99713aa6f0ccaeb6ffdf676818accd070fc5ccd468f167b16bc99fd7363e9d0c579835c21d017da09045af1b69121c8daac6b02b90220827e27942cc11c992fefc9c8931d060727cc7c4444e35329327cc36a6ab74e490134306c2fc84d4df95e9a97a64318dcd86214530dde1e7bc728409e82c2211e79e41211c45882584f6701b958e5a62f01f64d4ce006963cd5dd4558e08bcf72babe867d9c730a702533369d3c3035de1a78d80b6d14219ba4c4f969b3aa3bc24c928bd8408707e671ad62950f6b5cbfe1857999f1b1cdab2e5394c84f7f714175b66070d16e2111647f74da4f78c1752dd3818b629801780d203422cb1de336a98efbf2e1a037dfbff3f6f83f7b35fde4eb5c92579bed62592da526d436d27acd658b3eb7333c22566b443e90887cd68ec1d93d9adf388fa73bc8ebc5908f46b072617c4a64c0d779dbfdc18d1031db783cca4e0e6a6179db6492799ba7fd1e4b762d77ae62c5686aac4dc10d69c247a74c0f79ea25bc012418cbd03024e2d3d67fbe51af2ea6d70147b055e3420d727559e76c592a0e61f2c8bc89f62a1368010b7a6e74f1fdf82b3dcf7ef10d470a0ff22dc8dc81ae76a3e27be52440169cf8e50cb9a0627f00171fe5e60be2f247edbe297d0b633fb4aec75ccc3cef4df99da36965a50c7e6bf915d4c0c248e9b8dfb521e67d24e7717ac80a38286f48c293f0af5bccca620d1576735f5051bf163f33064522d18e6aa8a971dc6edf5b713867fbdfa64b67186826929c82f36d5e5396d7b735bcdae1e7c10fdba5c63fcecc1b92daa2e4b9e4c0dace1729d26eb0896e0d30eadd1c084b770ddb71a65a14642a144734557b6b7273783de8a871e98e", @ANYPTR64, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES16=r1]], 0x39c) 2018/05/16 13:52:12 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000c67000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x1000008000) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000002580)}, 0x0) r2 = accept4(r0, &(0x7f00000001c0)=@in={0x0, 0x0, @local}, &(0x7f0000000280)=0x80, 0x0) recvmmsg(r2, &(0x7f0000009fc0)=[{{&(0x7f0000009980)=@alg, 0x80, &(0x7f0000009e40), 0x0, &(0x7f0000009ec0)=""/202, 0xca}}], 0x1, 0x0, &(0x7f000000a1c0)) 2018/05/16 13:52:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x7}, {0x6}]}) [ 102.191660] kauditd_printk_skb: 1 callbacks suppressed [ 102.191680] audit: type=1326 audit(1526478732.190:14): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7223 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a09 code=0x0 2018/05/16 13:52:12 executing program 5 (fault-call:0 fault-nth:0): seccomp(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x7}, {0x6}]}) 2018/05/16 13:52:12 executing program 1: process_vm_writev(0x0, &(0x7f0000000180), 0x10f, &(0x7f0000000440)=[{&(0x7f0000000280)=""/195, 0xc3}], 0x1, 0x0) madvise(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xa000000000008) r0 = shmget(0x3, 0x4000, 0x20, &(0x7f0000000000/0x4000)=nil) shmat(r0, &(0x7f0000001000/0x3000)=nil, 0x4000) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x8000, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xf) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) clock_adjtime(0x5, &(0x7f0000000040)={0x9, 0x0, 0xeb2, 0x9, 0x37, 0x1, 0x5, 0x3, 0x401, 0x81, 0x7, 0x0, 0x7ff, 0x3, 0x100, 0xfffffffffffffffd, 0x0, 0x8, 0x10001, 0x9, 0x21, 0x400, 0xca5, 0x3, 0x5, 0x7}) [ 102.420399] FAULT_INJECTION: forcing a failure. [ 102.420399] name failslab, interval 1, probability 0, space 0, times 0 [ 102.431852] CPU: 0 PID: 7256 Comm: syz-executor5 Not tainted 4.17.0-rc5+ #95 [ 102.439073] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 102.448452] Call Trace: [ 102.451086] dump_stack+0x185/0x1d0 [ 102.454770] should_fail+0x87b/0xab0 [ 102.458533] __should_failslab+0x278/0x2a0 [ 102.462829] should_failslab+0x29/0x70 [ 102.466748] __kmalloc+0xc5/0x350 [ 102.470234] ? do_seccomp+0xa27/0x2060 [ 102.474158] do_seccomp+0xa27/0x2060 [ 102.477927] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 102.483349] __x64_sys_seccomp+0xdb/0x120 [ 102.487536] do_syscall_64+0x154/0x220 [ 102.491472] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 102.496684] RIP: 0033:0x455a09 [ 102.499886] RSP: 002b:00007f373aac4c68 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 102.507650] RAX: ffffffffffffffda RBX: 00007f373aac56d4 RCX: 0000000000455a09 2018/05/16 13:52:12 executing program 7: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) 2018/05/16 13:52:12 executing program 3: r0 = socket(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf0141f66f") r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000000)) write$fuse(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="f072094557132315210d78d957b94c277a3da05c4234a2b0d213e018444f60fa691ee1144179d1fea2ff0bf95d4adb487ef5f3b4d61e6c36987e9ebaf9a75b3d5b20c8b9857f881545bf4a5156df035a4766b6de997955883dd22ec1d10984212711f762ef67f139982dbc3b9c386e425ee53b6c33bc47af8703e66719ca94e195f56bdf7c7b21eca22e470c2a7197f13322b8acc855ae6aa6e0e19cddc1e3eb0b1bcc9e4ee6812bfaf869479e406a850d52795068648ac34d1fcf001ec3dcd94068ca0b9c69522a2e85a132098a774930efee33c8e97de5759fe03b3b830f8313f3cb2a05cd65f65c1e368bd8c8712cf605a6a4c56aa4966636b752f68cd100654adaac3132924f3e0cdd2043bd9ace6d93b84874fe31deb0194ae288b2d87ce6461009f99713aa6f0ccaeb6ffdf676818accd070fc5ccd468f167b16bc99fd7363e9d0c579835c21d017da09045af1b69121c8daac6b02b90220827e27942cc11c992fefc9c8931d060727cc7c4444e35329327cc36a6ab74e490134306c2fc84d4df95e9a97a64318dcd86214530dde1e7bc728409e82c2211e79e41211c45882584f6701b958e5a62f01f64d4ce006963cd5dd4558e08bcf72babe867d9c730a702533369d3c3035de1a78d80b6d14219ba4c4f969b3aa3bc24c928bd8408707e671ad62950f6b5cbfe1857999f1b1cdab2e5394c84f7f714175b66070d16e2111647f74da4f78c1752dd3818b629801780d203422cb1de336a98efbf2e1a037dfbff3f6f83f7b35fde4eb5c92579bed62592da526d436d27acd658b3eb7333c22566b443e90887cd68ec1d93d9adf388fa73bc8ebc5908f46b072617c4a64c0d779dbfdc18d1031db783cca4e0e6a6179db6492799ba7fd1e4b762d77ae62c5686aac4dc10d69c247a74c0f79ea25bc012418cbd03024e2d3d67fbe51af2ea6d70147b055e3420d727559e76c592a0e61f2c8bc89f62a1368010b7a6e74f1fdf82b3dcf7ef10d470a0ff22dc8dc81ae76a3e27be52440169cf8e50cb9a0627f00171fe5e60be2f247edbe297d0b633fb4aec75ccc3cef4df99da36965a50c7e6bf915d4c0c248e9b8dfb521e67d24e7717ac80a38286f48c293f0af5bccca620d1576735f5051bf163f33064522d18e6aa8a971dc6edf5b713867fbdfa64b67186826929c82f36d5e5396d7b735bcdae1e7c10fdba5c63fcecc1b92daa2e4b9e4c0dace1729d26eb0896e0d30eadd1c084b770ddb71a65a14642a144734557b6b7273783de8a871e98e", @ANYPTR64, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES16=r1]], 0x39c) 2018/05/16 13:52:12 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) socket(0xa, 0x1, 0x0) mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) [ 102.514940] RDX: 0000000020000080 RSI: 0000000000000000 RDI: 0000000000000001 [ 102.522239] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 102.529572] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 102.536879] R13: 0000000000000566 R14: 00000000006fc230 R15: 0000000000000000 2018/05/16 13:52:12 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) wait4(0x0, &(0x7f0000000180), 0xa0000000, &(0x7f00000001c0)) 2018/05/16 13:52:12 executing program 6: r0 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") sync_file_range(r1, 0x4, 0xfc, 0x2) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'\x00', 0x106}) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000140)={0x2}, 0x4) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'syzkaller1\x00', 0x100000000000400}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000000)={0x0, &(0x7f0000000140)}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000280)={0x0, @empty, @rand_addr}, &(0x7f00000002c0)=0xc) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond_slave_0\x00', r2}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'yam0\x00', 0x600}) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000180)) 2018/05/16 13:52:13 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000c67000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000002580)}, 0x0) r3 = accept4(r0, &(0x7f00000001c0)=@in={0x0, 0x0, @local}, &(0x7f0000000280)=0x80, 0x0) recvmmsg(r3, &(0x7f0000009fc0)=[{{&(0x7f0000009980)=@alg, 0x80, &(0x7f0000009e40), 0x0, &(0x7f0000009ec0)=""/202, 0xca}}], 0x1, 0x0, &(0x7f000000a1c0)) 2018/05/16 13:52:13 executing program 3: r0 = socket(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf0141f66f") r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000000)) write$fuse(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYPTR64, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES16=r1]], 0x39c) 2018/05/16 13:52:13 executing program 7: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) 2018/05/16 13:52:13 executing program 1: process_vm_writev(0x0, &(0x7f0000000180), 0x10000248, &(0x7f00000007c0)=[{&(0x7f0000000280)=""/195, 0xc3}], 0xfffffffffffffe72, 0x0) madvise(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xa000000000008) r0 = gettid() process_vm_writev(r0, &(0x7f0000000380)=[{&(0x7f0000000100)=""/25, 0x19}, {&(0x7f0000000140)=""/72, 0x48}, {&(0x7f0000000480)=""/228, 0xe4}, {&(0x7f00000001c0)=""/134, 0x86}], 0x4, &(0x7f0000000740)=[{&(0x7f00000003c0)=""/125, 0x7d}, {&(0x7f0000000580)=""/73, 0x49}, {&(0x7f0000000600)=""/45, 0x2d}, {&(0x7f0000000640)=""/71, 0x47}, {&(0x7f00000006c0)=""/97, 0x61}], 0x5, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xf) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x8000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000080)={0x2, 0x40, 0x10000}) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) ioctl$UFFDIO_WAKE(r1, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000002000/0x4000)=nil, 0x4000}) 2018/05/16 13:52:13 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) wait4(0x0, &(0x7f0000000180), 0xa0000000, &(0x7f00000001c0)) 2018/05/16 13:52:13 executing program 6: r0 = syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x4bbe623c, 0x80041) fcntl$setpipe(r0, 0x407, 0x82b) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x8, 0x4010, r0, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) accept4$packet(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000080)=0x14, 0x800) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@mcast2={0xff, 0x2, [], 0x1}, @in6, 0x4e23, 0x1, 0x4e20, 0x0, 0xa, 0x0, 0x20, 0x67, r2, r3}, {0x330000, 0x9, 0x8001, 0x5, 0x0, 0xfffffffffffffff8, 0x66, 0xfc}, {0x4, 0x4, 0x5, 0x6}, 0x0, 0x6e6bb6, 0x2, 0x0, 0x2, 0x2}, {{@in=@dev={0xac, 0x14, 0x14, 0xa}, 0x4d2, 0xff}, 0x8d8ef7a52a330669, @in6=@mcast2={0xff, 0x2, [], 0x1}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8000, 0x10000}}, 0xe8) pwrite64(r1, &(0x7f0000000100), 0x0, 0x0) 2018/05/16 13:52:13 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) socket(0xa, 0x1, 0x0) mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 2018/05/16 13:52:13 executing program 5 (fault-call:0 fault-nth:1): seccomp(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x7}, {0x6}]}) [ 103.147369] FAULT_INJECTION: forcing a failure. [ 103.147369] name failslab, interval 1, probability 0, space 0, times 0 [ 103.158818] CPU: 1 PID: 7304 Comm: syz-executor5 Not tainted 4.17.0-rc5+ #95 [ 103.166033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 103.175412] Call Trace: [ 103.178042] dump_stack+0x185/0x1d0 [ 103.180606] Unknown ioctl 1078743882 [ 103.181714] should_fail+0x87b/0xab0 [ 103.181756] __should_failslab+0x278/0x2a0 [ 103.181795] should_failslab+0x29/0x70 [ 103.181833] __kmalloc_node+0x236/0x11f0 [ 103.201420] ? kmsan_set_origin_inline+0x6b/0x120 [ 103.206302] ? __get_vm_area_node+0x28e/0x810 [ 103.210863] __get_vm_area_node+0x28e/0x810 [ 103.215224] __vmalloc_node_range+0x2a7/0x1170 [ 103.219842] ? bpf_prog_alloc+0xe0/0x500 [ 103.221149] Unknown ioctl -2146391550 [ 103.223980] __vmalloc+0xe2/0x100 [ 103.224018] ? bpf_prog_alloc+0xe0/0x500 [ 103.224052] bpf_prog_alloc+0xe0/0x500 [ 103.224109] bpf_prog_create_from_user+0x181/0x8c0 [ 103.244218] ? seccomp_log+0x460/0x460 [ 103.248154] do_seccomp+0xaa5/0x2060 [ 103.251924] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 103.257349] __x64_sys_seccomp+0xdb/0x120 [ 103.261535] do_syscall_64+0x154/0x220 [ 103.262425] Unknown ioctl 1078743882 [ 103.265464] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 103.265489] RIP: 0033:0x455a09 [ 103.265504] RSP: 002b:00007f373aac4c68 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 103.265538] RAX: ffffffffffffffda RBX: 00007f373aac56d4 RCX: 0000000000455a09 2018/05/16 13:52:13 executing program 6: r0 = socket$pptp(0x18, 0x1, 0x2) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000100)=""/10, &(0x7f0000000140)=0xa) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x3}, 0x1c) r3 = fcntl$dupfd(r2, 0x0, r2) setsockopt$IP_VS_SO_SET_EDITDEST(r1, 0x0, 0x489, &(0x7f0000000080)={{0x33, @multicast2=0xe0000002, 0x4e23, 0x4, 'nq\x00', 0x8, 0x5, 0x41}, {@empty, 0x4e20, 0x0, 0x9, 0x1, 0x8}}, 0x44) sendmmsg$unix(r3, &(0x7f0000000000)=[{&(0x7f0000000280)=@file={0x2, './file1\x00'}, 0x6e, &(0x7f0000000580), 0x0, &(0x7f0000000300)=[@cred={0x20, 0x1, 0x2}], 0x20}], 0x1, 0x0) [ 103.265554] RDX: 0000000020000080 RSI: 0000000000000000 RDI: 0000000000000001 [ 103.265579] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 103.291006] Unknown ioctl -2146391550 [ 103.292887] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 103.292906] R13: 0000000000000566 R14: 00000000006fc230 R15: 0000000000000001 [ 103.293325] syz-executor5: vmalloc: allocation failure: 4096 bytes, mode:0x14080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) [ 103.337665] syz-executor5 cpuset=syz5 mems_allowed=0 [ 103.342920] CPU: 1 PID: 7304 Comm: syz-executor5 Not tainted 4.17.0-rc5+ #95 [ 103.350120] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 103.359490] Call Trace: [ 103.362128] dump_stack+0x185/0x1d0 [ 103.365796] warn_alloc+0x3fc/0x660 [ 103.369521] __vmalloc_node_range+0xa9e/0x1170 [ 103.374162] __vmalloc+0xe2/0x100 [ 103.377654] ? bpf_prog_alloc+0xe0/0x500 [ 103.381767] bpf_prog_alloc+0xe0/0x500 [ 103.385711] bpf_prog_create_from_user+0x181/0x8c0 [ 103.390686] ? seccomp_log+0x460/0x460 [ 103.394623] do_seccomp+0xaa5/0x2060 2018/05/16 13:52:13 executing program 1: process_vm_writev(0x0, &(0x7f0000000180)=[{&(0x7f0000000040)=""/47, 0x265}, {&(0x7f0000000080)=""/52, 0x26a}, {&(0x7f00000000c0)=""/172, 0xff48}], 0x0, &(0x7f0000000440)=[{&(0x7f0000000280)=""/195, 0xfffffffffffffeae}], 0x100000000000006c, 0x0) madvise(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xa000000000008) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xf) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) [ 103.398397] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 103.402877] IPVS: set_ctl: invalid protocol: 51 224.0.0.2:20003 nq [ 103.403815] __x64_sys_seccomp+0xdb/0x120 [ 103.403850] do_syscall_64+0x154/0x220 [ 103.403889] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 103.403910] RIP: 0033:0x455a09 [ 103.403926] RSP: 002b:00007f373aac4c68 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 103.403959] RAX: ffffffffffffffda RBX: 00007f373aac56d4 RCX: 0000000000455a09 [ 103.403974] RDX: 0000000020000080 RSI: 0000000000000000 RDI: 0000000000000001 [ 103.404001] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 103.456215] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 103.457380] IPVS: set_ctl: invalid protocol: 51 224.0.0.2:20003 nq [ 103.463504] R13: 0000000000000566 R14: 00000000006fc230 R15: 0000000000000001 [ 103.463618] Mem-Info: [ 103.463701] active_anon:78549 inactive_anon:77 isolated_anon:0 [ 103.463701] active_file:3472 inactive_file:8913 isolated_file:0 [ 103.463701] unevictable:0 dirty:56 writeback:0 unstable:0 [ 103.463701] slab_reclaimable:3456 slab_unreclaimable:9231 [ 103.463701] mapped:74169 shmem:84 pagetables:1070 bounce:0 [ 103.463701] free:1044165 free_pcp:273 free_cma:0 [ 103.463766] Node 0 active_anon:314196kB inactive_anon:308kB active_file:13888kB inactive_file:35652kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:296676kB dirty:224kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 126976kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 103.463776] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 103.463855] lowmem_reserve[]: 0 2817 7244 7244 [ 103.463897] Node 0 DMA32 free:2888680kB min:26228kB low:32784kB high:39340kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129292kB managed:2889512kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:832kB local_pcp:740kB free_cma:0kB [ 103.463974] lowmem_reserve[]: 0 0 4426 4426 [ 103.464053] Node 0 Normal free:1272076kB min:41208kB low:51508kB high:61808kB active_anon:314196kB inactive_anon:308kB active_file:13888kB inactive_file:35652kB unevictable:0kB writepending:224kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:10560kB pagetables:4280kB bounce:0kB free_pcp:260kB local_pcp:68kB free_cma:0kB [ 103.464129] lowmem_reserve[]: 0 0 0 0 [ 103.464165] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 103.464321] Node 0 DMA32: 2*4kB (M) 2*8kB (M) 3*16kB (M) 3*32kB (M) 1*64kB (M) 2*128kB (M) 4*256kB (M) 1*512kB (M) 3*1024kB (M) 2*2048kB (M) 703*4096kB (M) = 2888680kB [ 103.464504] Node 0 Normal: 37*4kB (UME) 57*8kB (UME) 49*16kB (UME) 30*32kB (UME) 15*64kB (UME) 11*128kB (UM) 9*256kB (UME) 11*512kB (UME) 12*1024kB (M) 1*2048kB (M) 304*4096kB (UM) = 1272172kB [ 103.464713] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 103.464722] 12468 total pagecache pages 2018/05/16 13:52:13 executing program 5 (fault-call:0 fault-nth:2): seccomp(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x7}, {0x6}]}) 2018/05/16 13:52:13 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) listen(r0, 0x1000008000) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000002580)}, 0x0) r3 = accept4(r0, &(0x7f00000001c0)=@in={0x0, 0x0, @local}, &(0x7f0000000280)=0x80, 0x0) recvmmsg(r3, &(0x7f0000009fc0)=[{{&(0x7f0000009980)=@alg, 0x80, &(0x7f0000009e40), 0x0, &(0x7f0000009ec0)=""/202, 0xca}}], 0x1, 0x0, &(0x7f000000a1c0)) 2018/05/16 13:52:13 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) wait4(0x0, &(0x7f0000000180), 0xa0000000, &(0x7f00000001c0)) [ 103.464733] 0 pages in swap cache [ 103.464750] Swap cache stats: add 0, delete 0, find 0/0 [ 103.464757] Free swap = 0kB [ 103.464766] Total swap = 0kB [ 103.464774] 1965969 pages RAM [ 103.464781] 0 pages HighMem/MovableOnly [ 103.464789] 106315 pages reserved [ 103.743378] FAULT_INJECTION: forcing a failure. [ 103.743378] name failslab, interval 1, probability 0, space 0, times 0 [ 103.754856] CPU: 1 PID: 7326 Comm: syz-executor5 Not tainted 4.17.0-rc5+ #95 [ 103.762070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 103.771447] Call Trace: [ 103.774076] dump_stack+0x185/0x1d0 [ 103.777752] should_fail+0x87b/0xab0 [ 103.781504] __should_failslab+0x278/0x2a0 [ 103.785783] should_failslab+0x29/0x70 [ 103.789708] __kmalloc_node+0x236/0x11f0 [ 103.793803] ? rcu_all_qs+0x32/0x1f0 [ 103.797572] ? alloc_vmap_area+0x1e6/0x15a0 [ 103.801952] ? rcu_all_qs+0x32/0x1f0 [ 103.805712] alloc_vmap_area+0x1e6/0x15a0 [ 103.809899] ? __kmalloc_node+0xe25/0x11f0 [ 103.814199] ? __get_vm_area_node+0x28e/0x810 [ 103.818755] __get_vm_area_node+0x3ab/0x810 [ 103.823118] __vmalloc_node_range+0x2a7/0x1170 [ 103.827754] ? bpf_prog_alloc+0xe0/0x500 [ 103.831883] __vmalloc+0xe2/0x100 [ 103.835378] ? bpf_prog_alloc+0xe0/0x500 [ 103.839480] bpf_prog_alloc+0xe0/0x500 [ 103.843444] bpf_prog_create_from_user+0x181/0x8c0 [ 103.848453] ? seccomp_log+0x460/0x460 [ 103.852387] do_seccomp+0xaa5/0x2060 [ 103.856160] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 103.861586] __x64_sys_seccomp+0xdb/0x120 [ 103.865771] do_syscall_64+0x154/0x220 [ 103.869704] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 103.874919] RIP: 0033:0x455a09 [ 103.878124] RSP: 002b:00007f373aac4c68 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 103.885867] RAX: ffffffffffffffda RBX: 00007f373aac56d4 RCX: 0000000000455a09 [ 103.893161] RDX: 0000000020000080 RSI: 0000000000000000 RDI: 0000000000000001 [ 103.900458] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 103.907748] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 103.915042] R13: 0000000000000566 R14: 00000000006fc230 R15: 0000000000000002 [ 103.923128] syz-executor5: vmalloc: allocation failure: 4096 bytes, mode:0x14080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) [ 103.934393] syz-executor5 cpuset=syz5 mems_allowed=0 2018/05/16 13:52:13 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x60002, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000040)={'mangle\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) process_vm_writev(0x0, &(0x7f0000000180), 0x10f, &(0x7f0000000440)=[{&(0x7f0000000280)=""/195, 0xc3}], 0x1, 0x0) madvise(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xa000000000008) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xf) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) r1 = msgget(0x2, 0x30) msgrcv(r1, &(0x7f0000000480)={0x0, ""/4096}, 0x1008, 0x2, 0x1800) 2018/05/16 13:52:13 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 2018/05/16 13:52:13 executing program 7: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) [ 103.939652] CPU: 1 PID: 7326 Comm: syz-executor5 Not tainted 4.17.0-rc5+ #95 [ 103.946862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 103.956237] Call Trace: [ 103.958863] dump_stack+0x185/0x1d0 [ 103.962532] warn_alloc+0x3fc/0x660 [ 103.966275] __vmalloc_node_range+0xa9e/0x1170 [ 103.970910] __vmalloc+0xe2/0x100 [ 103.974404] ? bpf_prog_alloc+0xe0/0x500 [ 103.978503] bpf_prog_alloc+0xe0/0x500 [ 103.982453] bpf_prog_create_from_user+0x181/0x8c0 [ 103.987438] ? seccomp_log+0x460/0x460 2018/05/16 13:52:14 executing program 1: process_vm_writev(0x0, &(0x7f0000000180), 0x10f, &(0x7f0000000440)=[{&(0x7f0000000280)=""/195, 0xc3}], 0x1, 0x0) madvise(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xa000000000008) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xf) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) socketpair$inet(0x2, 0x2, 0x4ee, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) flistxattr(r0, &(0x7f0000000040)=""/79, 0x4f) [ 103.991370] do_seccomp+0xaa5/0x2060 [ 103.995136] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 104.000559] __x64_sys_seccomp+0xdb/0x120 [ 104.004747] do_syscall_64+0x154/0x220 [ 104.008673] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 104.013885] RIP: 0033:0x455a09 [ 104.017092] RSP: 002b:00007f373aac4c68 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 104.024836] RAX: ffffffffffffffda RBX: 00007f373aac56d4 RCX: 0000000000455a09 [ 104.032132] RDX: 0000000020000080 RSI: 0000000000000000 RDI: 0000000000000001 [ 104.039426] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 104.046725] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 104.054022] R13: 0000000000000566 R14: 00000000006fc230 R15: 0000000000000002 2018/05/16 13:52:14 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf0141f66f") r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000000)) write$fuse(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYPTR64, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES16=r1]], 0x39c) 2018/05/16 13:52:14 executing program 6: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) socket(0xa, 0x1, 0x0) mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 2018/05/16 13:52:14 executing program 1: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x100000001, 0x80) setsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000040)="03bf5a97b009051cf1c605579a8fd7723e2982b2ebc57667055ffa5b3273c1de61d805bffc750e578caca4f3ffb9032089a6f81d84d6b0e3d963dcfa2ca36c500b0e37cb6ac6436c", 0x48) process_vm_writev(0x0, &(0x7f0000000180), 0x10f, &(0x7f0000000440)=[{&(0x7f0000000280)=""/195, 0xc3}], 0x1, 0x0) madvise(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xa000000000008) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xf) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) 2018/05/16 13:52:14 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) wait4(0x0, &(0x7f0000000180), 0xa0000000, &(0x7f00000001c0)) 2018/05/16 13:52:14 executing program 5 (fault-call:0 fault-nth:3): seccomp(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x7}, {0x6}]}) 2018/05/16 13:52:14 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 2018/05/16 13:52:14 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) socket(0xa, 0x1, 0x0) mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) wait4(0x0, &(0x7f0000000180), 0xa0000000, &(0x7f00000001c0)) 2018/05/16 13:52:14 executing program 7: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) socket(0xa, 0x1, 0x0) mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 2018/05/16 13:52:14 executing program 4: bind$inet6(0xffffffffffffffff, &(0x7f0000c67000)={0xa, 0x4e20}, 0x1c) listen(0xffffffffffffffff, 0x1000008000) r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000002580)}, 0x0) r2 = accept4(0xffffffffffffffff, &(0x7f00000001c0)=@in={0x0, 0x0, @local}, &(0x7f0000000280)=0x80, 0x0) recvmmsg(r2, &(0x7f0000009fc0)=[{{&(0x7f0000009980)=@alg, 0x80, &(0x7f0000009e40), 0x0, &(0x7f0000009ec0)=""/202, 0xca}}], 0x1, 0x0, &(0x7f000000a1c0)) 2018/05/16 13:52:14 executing program 1: mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) r0 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000000)=@full, &(0x7f0000000080)=0x48, 0x80800) getpeername$netrom(r0, &(0x7f00000000c0)=@full, &(0x7f0000000140)=0x48) 2018/05/16 13:52:14 executing program 6: process_vm_writev(0x0, &(0x7f0000000180), 0x10000248, &(0x7f00000007c0)=[{&(0x7f0000000280)=""/195, 0xc3}], 0xfffffffffffffe72, 0x0) madvise(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xa000000000008) r0 = gettid() process_vm_writev(r0, &(0x7f0000000380)=[{&(0x7f0000000100)=""/25, 0x19}, {&(0x7f0000000140)=""/72, 0x48}, {&(0x7f0000000480)=""/228, 0xe4}, {&(0x7f00000001c0)=""/134, 0x86}], 0x4, &(0x7f0000000740)=[{&(0x7f00000003c0)=""/125, 0x7d}, {&(0x7f0000000580)=""/73, 0x49}, {&(0x7f0000000600)=""/45, 0x2d}, {&(0x7f0000000640)=""/71, 0x47}, {&(0x7f00000006c0)=""/97, 0x61}], 0x5, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xf) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x8000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000080)={0x2, 0x40, 0x10000}) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) ioctl$UFFDIO_WAKE(r1, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000002000/0x4000)=nil, 0x4000}) 2018/05/16 13:52:14 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf0141f66f") r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000000)) write$fuse(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="f072094557132315210d78d957b94c277a3da05c4234a2b0d213e018444f60fa691ee1144179d1fea2ff0bf95d4adb487ef5f3b4d61e6c36987e9ebaf9a75b3d5b20c8b9857f881545bf4a5156df035a4766b6de997955883dd22ec1d10984212711f762ef67f139982dbc3b9c386e425ee53b6c33bc47af8703e66719ca94e195f56bdf7c7b21eca22e470c2a7197f13322b8acc855ae6aa6e0e19cddc1e3eb0b1bcc9e4ee6812bfaf869479e406a850d52795068648ac34d1fcf001ec3dcd94068ca0b9c69522a2e85a132098a774930efee33c8e97de5759fe03b3b830f8313f3cb2a05cd65f65c1e368bd8c8712cf605a6a4c56aa4966636b752f68cd100654adaac3132924f3e0cdd2043bd9ace6d93b84874fe31deb0194ae288b2d87ce6461009f99713aa6f0ccaeb6ffdf676818accd070fc5ccd468f167b16bc99fd7363e9d0c579835c21d017da09045af1b69121c8daac6b02b90220827e27942cc11c992fefc9c8931d060727cc7c4444e35329327cc36a6ab74e490134306c2fc84d4df95e9a97a64318dcd86214530dde1e7bc728409e82c2211e79e41211c45882584f6701b958e5a62f01f64d4ce006963cd5dd4558e08bcf72babe867d9c730a702533369d3c3035de1a78d80b6d14219ba4c4f969b3aa3bc24c928bd8408707e671ad62950f6b5cbfe1857999f1b1cdab2e5394c84f7f714175b66070d16e2111647f74da4f78c1752dd3818b629801780d203422cb1de336a98efbf2e1a037dfbff3f6f83f7b35fde4eb5c92579bed62592da526d436d27acd658b3eb7333c22566b443e90887cd68ec1d93d9adf388fa73bc8ebc5908f46b072617c4a64c0d779dbfdc18d1031db783cca4e0e6a6179db6492799ba7fd1e4b762d77ae62c5686aac4dc10d69c247a74c0f79ea25bc012418cbd03024e2d3d67fbe51af2ea6d70147b055e3420d727559e76c592a0e61f2c8bc89f62a1368010b7a6e74f1fdf82b3dcf7ef10d470a0ff22dc8dc81ae76a3e27be52440169cf8e50cb9a0627f00171fe5e60be2f247edbe297d0b633fb4aec75ccc3cef4df99da36965a50c7e6bf915d4c0c248e9b8dfb521e67d24e7717ac80a38286f48c293f0af5bccca620d1576735f5051bf163f33064522d18e6aa8a971dc6edf5b713867fbdfa64b67186826929c82f36d5e5396d7b735bcdae1e7c10fdba5c63fcecc1b92daa2e4b9e4c0dace1729d26eb0896e0d30eadd1c084b770ddb71a65a14642a144734557b6b7273783de8a871e98e", @ANYPTR64, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES16=r1]], 0x39c) [ 104.708553] FAULT_INJECTION: forcing a failure. [ 104.708553] name failslab, interval 1, probability 0, space 0, times 0 [ 104.720098] CPU: 0 PID: 7395 Comm: syz-executor5 Not tainted 4.17.0-rc5+ #95 [ 104.727312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 104.736695] Call Trace: [ 104.739324] dump_stack+0x185/0x1d0 [ 104.742994] should_fail+0x87b/0xab0 [ 104.746774] __should_failslab+0x278/0x2a0 [ 104.751055] should_failslab+0x29/0x70 [ 104.754980] __kmalloc_node+0x236/0x11f0 [ 104.759074] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 104.764572] ? __get_vm_area_node+0x600/0x810 [ 104.769095] ? __vmalloc_node_range+0x611/0x1170 [ 104.773888] __vmalloc_node_range+0x611/0x1170 [ 104.778528] __vmalloc+0xe2/0x100 [ 104.782018] ? bpf_prog_alloc+0xe0/0x500 [ 104.786115] bpf_prog_alloc+0xe0/0x500 [ 104.790060] bpf_prog_create_from_user+0x181/0x8c0 [ 104.795042] ? seccomp_log+0x460/0x460 [ 104.798970] do_seccomp+0xaa5/0x2060 [ 104.802741] ? __msan_metadata_ptr_for_load_1+0x10/0x20 2018/05/16 13:52:14 executing program 1: process_vm_writev(0x0, &(0x7f0000000180), 0x10f, &(0x7f0000000440)=[{&(0x7f0000000280)=""/195, 0xc3}], 0x1, 0x0) madvise(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xa000000000008) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)=0x0) process_vm_writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000040)=""/58, 0x3a}, {&(0x7f0000000080)=""/242, 0xf2}, {&(0x7f0000000180)=""/202, 0xca}, {&(0x7f0000000380)}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000480)=""/125, 0x7d}, {&(0x7f0000000400)=""/4, 0x4}], 0x2, 0x0) mlock(&(0x7f0000002000/0x4000)=nil, 0x4000) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xf) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) [ 104.808164] __x64_sys_seccomp+0xdb/0x120 [ 104.812349] do_syscall_64+0x154/0x220 [ 104.816275] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 104.821486] RIP: 0033:0x455a09 [ 104.824691] RSP: 002b:00007f373aac4c68 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 104.832434] RAX: ffffffffffffffda RBX: 00007f373aac56d4 RCX: 0000000000455a09 [ 104.839728] RDX: 0000000020000080 RSI: 0000000000000000 RDI: 0000000000000001 [ 104.847025] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 104.854323] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 104.858135] Unknown ioctl 1078743882 [ 104.861613] R13: 0000000000000566 R14: 00000000006fc230 R15: 0000000000000003 [ 104.885603] Unknown ioctl -2146391550 2018/05/16 13:52:14 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) socket(0xa, 0x1, 0x0) mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) wait4(0x0, &(0x7f0000000180), 0xa0000000, &(0x7f00000001c0)) 2018/05/16 13:52:14 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f0000c67000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x1000008000) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000002580)}, 0x0) r3 = accept4(r0, &(0x7f00000001c0)=@in={0x0, 0x0, @local}, &(0x7f0000000280)=0x80, 0x0) recvmmsg(r3, &(0x7f0000009fc0)=[{{&(0x7f0000009980)=@alg, 0x80, &(0x7f0000009e40), 0x0, &(0x7f0000009ec0)=""/202, 0xca}}], 0x1, 0x0, &(0x7f000000a1c0)) 2018/05/16 13:52:14 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 2018/05/16 13:52:14 executing program 1: process_vm_writev(0x0, &(0x7f0000000180), 0x10f, &(0x7f0000000440)=[{&(0x7f0000000280)=""/195, 0xc3}], 0x1, 0x0) madvise(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xa000000000008) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x400000, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000001000/0x3000)=nil, 0x3000}, 0x1}) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xf) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) 2018/05/16 13:52:15 executing program 1: process_vm_writev(0x0, &(0x7f0000000180), 0x10f, &(0x7f0000000440)=[{&(0x7f0000000280)=""/195, 0xc3}], 0x1, 0x0) madvise(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xa000000000008) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x24f7b427, 0x101480) getpeername$packet(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x14) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xf) mlock2(&(0x7f00003db000/0x600000)=nil, 0x600000, 0x1) 2018/05/16 13:52:15 executing program 6: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) socket(0xa, 0x1, 0x0) mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) wait4(0x0, &(0x7f0000000180), 0xa0000000, &(0x7f00000001c0)) 2018/05/16 13:52:15 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf0141f66f") r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000000)) write$fuse(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="f072094557132315210d78d957b94c277a3da05c4234a2b0d213e018444f60fa691ee1144179d1fea2ff0bf95d4adb487ef5f3b4d61e6c36987e9ebaf9a75b3d5b20c8b9857f881545bf4a5156df035a4766b6de997955883dd22ec1d10984212711f762ef67f139982dbc3b9c386e425ee53b6c33bc47af8703e66719ca94e195f56bdf7c7b21eca22e470c2a7197f13322b8acc855ae6aa6e0e19cddc1e3eb0b1bcc9e4ee6812bfaf869479e406a850d52795068648ac34d1fcf001ec3dcd94068ca0b9c69522a2e85a132098a774930efee33c8e97de5759fe03b3b830f8313f3cb2a05cd65f65c1e368bd8c8712cf605a6a4c56aa4966636b752f68cd100654adaac3132924f3e0cdd2043bd9ace6d93b84874fe31deb0194ae288b2d87ce6461009f99713aa6f0ccaeb6ffdf676818accd070fc5ccd468f167b16bc99fd7363e9d0c579835c21d017da09045af1b69121c8daac6b02b90220827e27942cc11c992fefc9c8931d060727cc7c4444e35329327cc36a6ab74e490134306c2fc84d4df95e9a97a64318dcd86214530dde1e7bc728409e82c2211e79e41211c45882584f6701b958e5a62f01f64d4ce006963cd5dd4558e08bcf72babe867d9c730a702533369d3c3035de1a78d80b6d14219ba4c4f969b3aa3bc24c928bd8408707e671ad62950f6b5cbfe1857999f1b1cdab2e5394c84f7f714175b66070d16e2111647f74da4f78c1752dd3818b629801780d203422cb1de336a98efbf2e1a037dfbff3f6f83f7b35fde4eb5c92579bed62592da526d436d27acd658b3eb7333c22566b443e90887cd68ec1d93d9adf388fa73bc8ebc5908f46b072617c4a64c0d779dbfdc18d1031db783cca4e0e6a6179db6492799ba7fd1e4b762d77ae62c5686aac4dc10d69c247a74c0f79ea25bc012418cbd03024e2d3d67fbe51af2ea6d70147b055e3420d727559e76c592a0e61f2c8bc89f62a1368010b7a6e74f1fdf82b3dcf7ef10d470a0ff22dc8dc81ae76a3e27be52440169cf8e50cb9a0627f00171fe5e60be2f247edbe297d0b633fb4aec75ccc3cef4df99da36965a50c7e6bf915d4c0c248e9b8dfb521e67d24e7717ac80a38286f48c293f0af5bccca620d1576735f5051bf163f33064522d18e6aa8a971dc6edf5b713867fbdfa64b67186826929c82f36d5e5396d7b735bcdae1e7c10fdba5c63fcecc1b92daa2e4b9e4c0dace1729d26eb0896e0d30eadd1c084b770ddb71a65a14642a144734557b6b7273783de8a871e98e", @ANYPTR64, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES16=r1]], 0x39c) 2018/05/16 13:52:15 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000c67000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x1000008000) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000002580)}, 0x0) r3 = accept4(r0, &(0x7f00000001c0)=@in={0x0, 0x0, @local}, &(0x7f0000000280)=0x80, 0x0) recvmmsg(r3, &(0x7f0000009fc0)=[{{&(0x7f0000009980)=@alg, 0x80, &(0x7f0000009e40), 0x0, &(0x7f0000009ec0)=""/202, 0xca}}], 0x1, 0x0, &(0x7f000000a1c0)) 2018/05/16 13:52:15 executing program 7: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) socket(0xa, 0x1, 0x0) mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 2018/05/16 13:52:15 executing program 5 (fault-call:0 fault-nth:4): seccomp(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x7}, {0x6}]}) 2018/05/16 13:52:15 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) socket(0xa, 0x1, 0x0) mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) wait4(0x0, &(0x7f0000000180), 0xa0000000, &(0x7f00000001c0)) 2018/05/16 13:52:15 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) [ 105.404251] FAULT_INJECTION: forcing a failure. [ 105.404251] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 105.416315] CPU: 0 PID: 7459 Comm: syz-executor5 Not tainted 4.17.0-rc5+ #95 [ 105.423528] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 105.432910] Call Trace: [ 105.435539] dump_stack+0x185/0x1d0 [ 105.439218] should_fail+0x87b/0xab0 [ 105.442980] __alloc_pages_nodemask+0x61c/0x5dd0 [ 105.447770] ? kmsan_set_origin_inline+0x6b/0x120 [ 105.452667] ? __msan_poison_alloca+0x15c/0x1d0 [ 105.457397] ? __should_failslab+0x278/0x2a0 [ 105.461848] ? should_fail+0x57/0xab0 [ 105.465680] ? __should_failslab+0x278/0x2a0 [ 105.470139] ? kmsan_set_origin_inline+0x6b/0x120 [ 105.475015] ? __msan_poison_alloca+0x15c/0x1d0 [ 105.479743] ? kmsan_set_origin+0x9e/0x160 [ 105.484027] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 105.489520] alloc_pages_current+0x6b5/0x970 [ 105.493971] __vmalloc_node_range+0x83c/0x1170 [ 105.498611] __vmalloc+0xe2/0x100 2018/05/16 13:52:15 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) 2018/05/16 13:52:15 executing program 1: process_vm_writev(0x0, &(0x7f0000000180), 0x10f, &(0x7f0000000440)=[{&(0x7f0000000280)=""/195, 0xc3}], 0x1, 0x0) madvise(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xa000000000008) r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x1, 0x4000) recvfrom$inet(r0, &(0x7f0000000040)=""/219, 0xdb, 0x2001, 0x0, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x11) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) [ 105.502101] ? bpf_prog_alloc+0xe0/0x500 [ 105.506200] bpf_prog_alloc+0xe0/0x500 [ 105.510140] bpf_prog_create_from_user+0x181/0x8c0 [ 105.515118] ? seccomp_log+0x460/0x460 [ 105.519042] do_seccomp+0xaa5/0x2060 [ 105.522810] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 105.528238] __x64_sys_seccomp+0xdb/0x120 [ 105.532440] do_syscall_64+0x154/0x220 [ 105.536371] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 105.541582] RIP: 0033:0x455a09 [ 105.544789] RSP: 002b:00007f373aac4c68 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 105.552533] RAX: ffffffffffffffda RBX: 00007f373aac56d4 RCX: 0000000000455a09 [ 105.559825] RDX: 0000000020000080 RSI: 0000000000000000 RDI: 0000000000000001 [ 105.567114] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 105.574407] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 105.581699] R13: 0000000000000566 R14: 00000000006fc230 R15: 0000000000000004 [ 105.590300] syz-executor5: vmalloc: allocation failure, allocated 0 of 8192 bytes, mode:0x14080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) 2018/05/16 13:52:15 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) wait4(0x0, &(0x7f0000000180), 0xa0000000, &(0x7f00000001c0)) [ 105.602861] syz-executor5 cpuset=syz5 mems_allowed=0 [ 105.608139] CPU: 0 PID: 7459 Comm: syz-executor5 Not tainted 4.17.0-rc5+ #95 [ 105.615371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 105.624766] Call Trace: [ 105.627416] dump_stack+0x185/0x1d0 [ 105.631091] warn_alloc+0x3fc/0x660 [ 105.634812] __vmalloc_node_range+0xeda/0x1170 [ 105.639468] __vmalloc+0xe2/0x100 [ 105.642960] ? bpf_prog_alloc+0xe0/0x500 [ 105.647064] bpf_prog_alloc+0xe0/0x500 2018/05/16 13:52:15 executing program 6: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) socket(0xa, 0x1, 0x0) mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) [ 105.651010] bpf_prog_create_from_user+0x181/0x8c0 [ 105.655992] ? seccomp_log+0x460/0x460 [ 105.659924] do_seccomp+0xaa5/0x2060 [ 105.663692] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 105.669113] __x64_sys_seccomp+0xdb/0x120 [ 105.673298] do_syscall_64+0x154/0x220 [ 105.677225] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 105.682434] RIP: 0033:0x455a09 [ 105.685643] RSP: 002b:00007f373aac4c68 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 105.693394] RAX: ffffffffffffffda RBX: 00007f373aac56d4 RCX: 0000000000455a09 2018/05/16 13:52:15 executing program 7: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) socket(0xa, 0x1, 0x0) mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) [ 105.700683] RDX: 0000000020000080 RSI: 0000000000000000 RDI: 0000000000000001 [ 105.707974] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 105.715265] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 105.722979] R13: 0000000000000566 R14: 00000000006fc230 R15: 0000000000000004 [ 105.730368] warn_alloc_show_mem: 1 callbacks suppressed [ 105.730376] Mem-Info: [ 105.738338] active_anon:78265 inactive_anon:77 isolated_anon:0 [ 105.738338] active_file:3475 inactive_file:8924 isolated_file:0 [ 105.738338] unevictable:5 dirty:73 writeback:0 unstable:0 2018/05/16 13:52:15 executing program 1: process_vm_writev(0x0, &(0x7f0000000180), 0x10f, &(0x7f0000000440)=[{&(0x7f0000000280)=""/195, 0xc3}], 0x1, 0x0) madvise(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x4) sigaltstack(&(0x7f0000002000/0x3000)=nil, &(0x7f0000000000)) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x40, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) [ 105.738338] slab_reclaimable:3459 slab_unreclaimable:9264 [ 105.738338] mapped:74096 shmem:84 pagetables:985 bounce:0 [ 105.738338] free:1036644 free_pcp:566 free_cma:0 [ 105.771677] Node 0 active_anon:313060kB inactive_anon:308kB active_file:13900kB inactive_file:35696kB unevictable:20kB isolated(anon):0kB isolated(file):0kB mapped:296384kB dirty:292kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 133120kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no 2018/05/16 13:52:15 executing program 1: process_vm_writev(0x0, &(0x7f0000000180), 0x10f, &(0x7f0000000440)=[{&(0x7f0000000280)=""/195, 0xc3}], 0x1, 0x0) madvise(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xa000000000008) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xf) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) socket(0x15, 0x8000a, 0xd5) [ 105.799970] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 105.826316] lowmem_reserve[]: 0 2817 7244 7244 [ 105.831092] Node 0 DMA32 free:2888680kB min:26228kB low:32784kB high:39340kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129292kB managed:2889512kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:832kB local_pcp:92kB free_cma:0kB [ 105.858845] lowmem_reserve[]: 0 0 4426 4426 [ 105.863311] Node 0 Normal free:1241844kB min:41208kB low:51508kB high:61808kB active_anon:313076kB inactive_anon:296kB active_file:13900kB inactive_file:35720kB unevictable:20kB writepending:304kB present:4718592kB managed:4533200kB mlocked:24kB kernel_stack:9984kB pagetables:3856kB bounce:0kB free_pcp:996kB local_pcp:656kB free_cma:0kB [ 105.893416] lowmem_reserve[]: 0 0 0 0 2018/05/16 13:52:15 executing program 1: process_vm_writev(0x0, &(0x7f0000000180), 0x10f, &(0x7f0000000440)=[{&(0x7f0000000280)=""/195, 0xc3}], 0x1, 0x0) madvise(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xa000000000008) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xf) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x40000, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000040)={0x2, 0x8a, "10eb91eb4d7ba3c6705ddce3ed6df38aebe9d74866a987659e1688dace2a2c72e8efa2e88544091d36d63a0feb2fd2361110afedcdc8c306fe32a78d63eabf3a2d83c518d90018005e30da05d0ee17ec25a97bdda9132fc61eacc3c732617382b0d6abd99646bcc276644f858eee1a3512b1f94856fb76afc12837dec94629a2aefd06a2b76f5b4fcfb1"}) [ 105.897341] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 105.910802] Node 0 DMA32: 2*4kB (M) 2*8kB (M) 3*16kB (M) 3*32kB (M) 1*64kB (M) 2*128kB (M) 4*256kB (M) 1*512kB (M) 3*1024kB (M) 2*2048kB (M) 703*4096kB (M) = 2888680kB [ 105.926279] Node 0 Normal: 367*4kB (UME) 228*8kB (UME) 60*16kB (UME) 35*32kB (UME) 59*64kB (UME) 27*128kB (UM) 17*256kB (UME) 18*512kB (ME) 21*1024kB (M) 7*2048kB (UM) 287*4096kB (UM) = 1237564kB [ 105.944176] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 105.952832] 12485 total pagecache pages 2018/05/16 13:52:16 executing program 5 (fault-call:0 fault-nth:5): seccomp(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x7}, {0x6}]}) [ 105.956915] 0 pages in swap cache [ 105.960449] Swap cache stats: add 0, delete 0, find 0/0 [ 105.965900] Free swap = 0kB [ 105.968986] Total swap = 0kB [ 105.972093] 1965969 pages RAM [ 105.975264] 0 pages HighMem/MovableOnly [ 105.979329] 106315 pages reserved [ 106.112917] FAULT_INJECTION: forcing a failure. [ 106.112917] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 106.124756] CPU: 0 PID: 7490 Comm: syz-executor5 Not tainted 4.17.0-rc5+ #95 [ 106.131944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 106.141304] Call Trace: [ 106.143898] dump_stack+0x185/0x1d0 [ 106.147534] should_fail+0x87b/0xab0 [ 106.151260] __alloc_pages_nodemask+0x61c/0x5dd0 [ 106.156040] ? kernel_poison_pages+0x40/0x360 [ 106.160537] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 106.165905] ? kernel_poison_pages+0x1a0/0x360 [ 106.170492] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 106.175941] ? get_page_from_freelist+0xab28/0xb600 [ 106.180956] ? __kernel_text_address+0x34/0xe0 [ 106.185537] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 106.190982] ? __save_stack_trace+0x90d/0xb00 [ 106.195490] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 106.200422] ? kmsan_internal_poison_shadow+0xb8/0x1b0 [ 106.205700] ? __kmalloc_node+0xe25/0x11f0 [ 106.209936] ? do_seccomp+0xaa5/0x2060 [ 106.213821] ? __x64_sys_seccomp+0xdb/0x120 [ 106.218138] ? do_syscall_64+0x154/0x220 [ 106.222207] ? kmsan_set_origin_inline+0x6b/0x120 [ 106.227051] ? __msan_poison_alloca+0x15c/0x1d0 [ 106.231718] ? __should_failslab+0x278/0x2a0 [ 106.236129] ? kmsan_set_origin_inline+0x6b/0x120 [ 106.240965] ? __alloc_pages_nodemask+0xb09/0x5dd0 [ 106.245881] kmsan_alloc_page+0x82/0xe0 [ 106.249837] __alloc_pages_nodemask+0xf8e/0x5dd0 [ 106.254570] ? kmsan_set_origin_inline+0x6b/0x120 [ 106.259390] ? __msan_poison_alloca+0x15c/0x1d0 [ 106.264046] ? __should_failslab+0x278/0x2a0 [ 106.268445] ? should_fail+0x57/0xab0 [ 106.272229] ? __should_failslab+0x278/0x2a0 [ 106.276623] ? kmsan_set_origin_inline+0x6b/0x120 [ 106.281456] ? __msan_poison_alloca+0x15c/0x1d0 [ 106.286107] ? kmsan_set_origin+0x9e/0x160 [ 106.290327] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 106.295769] alloc_pages_current+0x6b5/0x970 [ 106.300176] __vmalloc_node_range+0x83c/0x1170 [ 106.304766] __vmalloc+0xe2/0x100 [ 106.308221] ? bpf_prog_alloc+0xe0/0x500 [ 106.312270] bpf_prog_alloc+0xe0/0x500 [ 106.316140] bpf_prog_create_from_user+0x181/0x8c0 [ 106.321056] ? seccomp_log+0x460/0x460 [ 106.324928] do_seccomp+0xaa5/0x2060 [ 106.328632] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 106.333990] __x64_sys_seccomp+0xdb/0x120 [ 106.338123] do_syscall_64+0x154/0x220 [ 106.341990] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 106.347157] RIP: 0033:0x455a09 [ 106.350324] RSP: 002b:00007f373aac4c68 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 106.358015] RAX: ffffffffffffffda RBX: 00007f373aac56d4 RCX: 0000000000455a09 [ 106.365275] RDX: 0000000020000080 RSI: 0000000000000000 RDI: 0000000000000001 [ 106.372530] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 106.379779] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 106.387031] R13: 0000000000000566 R14: 00000000006fc230 R15: 0000000000000005 [ 106.394571] syz-executor5: vmalloc: allocation failure, allocated 0 of 8192 bytes, mode:0x14080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) [ 106.407216] syz-executor5 cpuset=syz5 mems_allowed=0 [ 106.412485] CPU: 0 PID: 7490 Comm: syz-executor5 Not tainted 4.17.0-rc5+ #95 [ 106.419695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 106.429068] Call Trace: [ 106.431693] dump_stack+0x185/0x1d0 [ 106.435355] warn_alloc+0x3fc/0x660 [ 106.439050] __vmalloc_node_range+0xeda/0x1170 [ 106.443693] __vmalloc+0xe2/0x100 [ 106.447184] ? bpf_prog_alloc+0xe0/0x500 [ 106.451292] bpf_prog_alloc+0xe0/0x500 [ 106.455248] bpf_prog_create_from_user+0x181/0x8c0 [ 106.460230] ? seccomp_log+0x460/0x460 [ 106.464155] do_seccomp+0xaa5/0x2060 [ 106.467920] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 106.473341] __x64_sys_seccomp+0xdb/0x120 [ 106.477522] do_syscall_64+0x154/0x220 [ 106.481448] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 106.486657] RIP: 0033:0x455a09 [ 106.489863] RSP: 002b:00007f373aac4c68 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 106.497607] RAX: ffffffffffffffda RBX: 00007f373aac56d4 RCX: 0000000000455a09 [ 106.504898] RDX: 0000000020000080 RSI: 0000000000000000 RDI: 0000000000000001 2018/05/16 13:52:16 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000c67000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x1000008000) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000002580)}, 0x0) r3 = accept4(r0, &(0x7f00000001c0)=@in={0x0, 0x0, @local}, &(0x7f0000000280)=0x80, 0x0) recvmmsg(r3, &(0x7f0000009fc0)=[{{&(0x7f0000009980)=@alg, 0x80, &(0x7f0000009e40), 0x0, &(0x7f0000009ec0)=""/202, 0xca}}], 0x1, 0x0, &(0x7f000000a1c0)) 2018/05/16 13:52:16 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x0, &(0x7f0000000240)="c626262c8523bf0141f66f") r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000000)) write$fuse(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYPTR64, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES16=r1]], 0x39c) 2018/05/16 13:52:16 executing program 1: r0 = socket(0x15, 0x6, 0xff) process_vm_writev(0x0, &(0x7f0000000180), 0x10f, &(0x7f0000000440)=[{&(0x7f0000000280)=""/195, 0xc3}], 0x1, 0x0) madvise(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xa000000000008) r1 = request_key(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000100)='em0--systemGPL#mime_typesystemvmnet1[lo-\\keyring}cgroup\x00', 0xfffffffffffffffa) r2 = add_key(&(0x7f0000000140)='rxrpc_s\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000001c0)="05f7be5ae336ec74816e5b382709d59d4a7d23b9e15bf9888f00175b2959679c94e931e8858f3acdad5b626564edfafe8b54d6797a4b14f5eacea2c2e82ff3cb82dd881b276fb4e0e340985f418babd54b22550e9ee8951297bbd317836d1237c102c84adcc5e2fb482300565f41d1d761284d3b30415cfdbbf1d4446253129a42de7efb3071913e4020bc352934f403da376b652e38552bb0a03bcfd0182d5fbd7b83db20b062cec081edb33d721b2f03e188077c0245203c2b71cf7d1066fc", 0xc0, 0xfffffffffffffffe) keyctl$link(0x8, r1, r2) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xe) getsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000000)=0xa6, &(0x7f0000000040)=0x2) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) [ 106.512199] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 106.519492] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 106.526785] R13: 0000000000000566 R14: 00000000006fc230 R15: 0000000000000005 2018/05/16 13:52:17 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) 2018/05/16 13:52:17 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000c67000)={0xa}, 0x1c) listen(r0, 0x1000008000) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000002580)}, 0x0) r3 = accept4(r0, &(0x7f00000001c0)=@in={0x0, 0x0, @local}, &(0x7f0000000280)=0x80, 0x0) recvmmsg(r3, &(0x7f0000009fc0)=[{{&(0x7f0000009980)=@alg, 0x80, &(0x7f0000009e40), 0x0, &(0x7f0000009ec0)=""/202, 0xca}}], 0x1, 0x0, &(0x7f000000a1c0)) 2018/05/16 13:52:17 executing program 6: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) socket(0xa, 0x1, 0x0) mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) wait4(0x0, &(0x7f0000000180), 0xa0000000, &(0x7f00000001c0)) 2018/05/16 13:52:17 executing program 5 (fault-call:0 fault-nth:6): seccomp(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x7}, {0x6}]}) 2018/05/16 13:52:17 executing program 7: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 2018/05/16 13:52:17 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) wait4(0x0, &(0x7f0000000180), 0xa0000000, &(0x7f00000001c0)) 2018/05/16 13:52:17 executing program 1: process_vm_writev(0x0, &(0x7f0000000180), 0x10f, &(0x7f0000000440)=[{&(0x7f0000000280)=""/195, 0xc3}], 0x1, 0x0) madvise(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xa000000000008) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xf) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x121000, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x101}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={r1, 0x3}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000500)=ANY=[], &(0x7f00000000c0)) 2018/05/16 13:52:17 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x0, &(0x7f0000000240)="c626262c8523bf0141f66f") r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000000)) write$fuse(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYPTR64, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES16=r1]], 0x39c) [ 107.522433] FAULT_INJECTION: forcing a failure. [ 107.522433] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 107.534264] CPU: 0 PID: 7532 Comm: syz-executor5 Not tainted 4.17.0-rc5+ #95 [ 107.541447] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 107.550806] Call Trace: [ 107.553399] dump_stack+0x185/0x1d0 [ 107.557034] should_fail+0x87b/0xab0 [ 107.560766] __alloc_pages_nodemask+0x61c/0x5dd0 [ 107.565520] ? kernel_poison_pages+0x40/0x360 [ 107.570016] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 107.575376] ? kernel_poison_pages+0x1a0/0x360 [ 107.579962] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 107.585411] ? get_page_from_freelist+0xab28/0xb600 [ 107.590430] ? __kernel_text_address+0x34/0xe0 [ 107.595015] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 107.600467] ? __save_stack_trace+0x90d/0xb00 [ 107.604978] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 107.609996] ? kmsan_internal_poison_shadow+0xb8/0x1b0 [ 107.615273] ? __kmalloc_node+0xe25/0x11f0 [ 107.619510] ? do_seccomp+0xaa5/0x2060 [ 107.623398] ? __x64_sys_seccomp+0xdb/0x120 [ 107.627716] ? do_syscall_64+0x154/0x220 [ 107.631777] ? kmsan_set_origin_inline+0x6b/0x120 [ 107.636635] ? __msan_poison_alloca+0x15c/0x1d0 [ 107.641303] ? __should_failslab+0x278/0x2a0 [ 107.645716] ? kmsan_set_origin_inline+0x6b/0x120 [ 107.650565] ? __alloc_pages_nodemask+0xb09/0x5dd0 [ 107.655502] kmsan_alloc_page+0x82/0xe0 [ 107.659480] __alloc_pages_nodemask+0xf8e/0x5dd0 [ 107.664237] ? kmsan_set_origin_inline+0x6b/0x120 2018/05/16 13:52:17 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) 2018/05/16 13:52:17 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x10001, 0x400000) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000040)=@in6={0xa, 0x4e22, 0x7, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c, &(0x7f0000001680)=[{&(0x7f0000000080)="be169bfd65934ed732aa2f96d6e3ac8be78e828a06f93fc7eefdcd4c0ebaea206c0953595d1d4e1c9dd9c227055d3657c371e9613c36773e604803003c03bc022461c7e46155a056d3463dfdcf7423c6f7", 0x51}, {&(0x7f0000000100)="422b1609de9d3b1d698b28f22b071e117840294cb14e69b2635c653f554e214c1fd58d84bbc02545a42356962cf31068f6d2058507ddc69a4dac0bba41942ac87f62074a8f8d7e396cf33d14c9a852972a1d2e163249b3d43eb1ad787f40fb04c35cb0f3dd138dacd9852cc4aa0a2a0de093ea0b3ebb73942ab8252fabb024c09e00b02ec02205d37fd7715c5cf575f5c62247a971200c31a3ae3c5a27b5ec6c3747e6929269387a46ef98616b1d6f3a5d09406acaf7a5d241a6c05b35eb45c530473b7a2c1ba8e8113463098cba70b896ae60d382ff1014", 0xd8}, {&(0x7f0000000480)="e540eb7540617313103de910ca37cce43c833df79e1cf21b355638bf955098bb07d566e655eca5c687504bc589c624fe20d7646dca8c2678110fa00e9342226d852162da29a431dcca6888eca7eb26042f7d09167e6ddfd8d6d903557766f5c7a74597c96a0b150840dabcfe9e88b9879d9b2a25d729219b7fedc08d0fbbc3015f350dc4d26462ac7db0279f02460188135dcd4f555a852eb901f89137542cb96c1d7c78b17f4de1627981d00e8a55f01336339a7d8d8e49ed48a415e1d20c55b67f269591fb084fc9ba0ba256abfc941978f2205ea99b68bd8846f9cf", 0xdd}, {&(0x7f0000000580)="d4be8465e8d155171f2147cd73bc91f7d0365d530898c5e77e15dd8093dc83118f6bcf6cd1a31a69a504523d700f0eb2958321dec0b9e9db5ed72e6b4f9cd80751d77ee22e626af4143dfe3b242798915f8a59937d81535138145f83f6f5209d08ababbff2f054931fb7d8fd9edbe051dd58a68e6c2d82024e2ae70661aecff1843a86417bffe0aa155015394b5878a3f983a969f9914e6d6ba897ae033b9c582eaa6392a5fd195537a55d8afbab7947ebf38a3d2cd64aa48bf82ffe905166a267c768abef9c752f13b274c21ed7dc77835098118ce1a75253676957486a5c3660ab55cb5e62fc", 0xe7}, {&(0x7f0000000380)="947dd6234f4dc54a698028782dbb183666fc03bf76955ca90d98b8ee2422064b5b9b9cd3a6a9d31499688f8ff6b2e9022b5f034007e7491dffe20e77c937c698acd50086675b5b83ebc8c4e2c76a3db04f767349a1b3bdefefabd7ca2cf131c1f06a98a3c9e3c7a0b3439c5268bf73347e07f6e0f7683f51bbc045d942b29b8db3417a2bdf0654011238662fab8602f3f239d70eb3", 0x95}, {&(0x7f0000000680)="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", 0x1000}, {&(0x7f0000000200)="bc87c300881662f746d62d4816da139bdddbfe3d3034e15e84e9f21320c42314dfa5a8083de04683cef319c75ed36c82c6bc0e3f", 0x34}], 0x7, 0x0, 0x0, 0x4000}, 0x800) process_vm_writev(0x0, &(0x7f0000000180), 0x10f, &(0x7f0000000440)=[{&(0x7f0000000280)=""/195, 0xc3}], 0x1, 0x0) madvise(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xa000000000008) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xf) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) [ 107.669077] ? __msan_poison_alloca+0x15c/0x1d0 [ 107.673738] ? __should_failslab+0x278/0x2a0 [ 107.678146] ? should_fail+0x57/0xab0 [ 107.681941] ? __should_failslab+0x278/0x2a0 [ 107.686343] ? kmsan_set_origin_inline+0x6b/0x120 [ 107.691185] ? __msan_poison_alloca+0x15c/0x1d0 [ 107.695859] ? kmsan_set_origin+0x9e/0x160 [ 107.700101] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 107.705571] alloc_pages_current+0x6b5/0x970 [ 107.709982] __vmalloc_node_range+0x83c/0x1170 [ 107.714570] __vmalloc+0xe2/0x100 [ 107.718490] ? bpf_prog_alloc+0xe0/0x500 [ 107.722560] bpf_prog_alloc+0xe0/0x500 [ 107.726457] bpf_prog_create_from_user+0x181/0x8c0 [ 107.731387] ? seccomp_log+0x460/0x460 [ 107.735282] do_seccomp+0xaa5/0x2060 [ 107.739000] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 107.744366] __x64_sys_seccomp+0xdb/0x120 [ 107.748514] do_syscall_64+0x154/0x220 [ 107.752405] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 107.757594] RIP: 0033:0x455a09 [ 107.760784] RSP: 002b:00007f373aac4c68 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 107.768494] RAX: ffffffffffffffda RBX: 00007f373aac56d4 RCX: 0000000000455a09 [ 107.775758] RDX: 0000000020000080 RSI: 0000000000000000 RDI: 0000000000000001 [ 107.783026] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 107.790291] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 107.797570] R13: 0000000000000566 R14: 00000000006fc230 R15: 0000000000000006 [ 107.805167] syz-executor5: vmalloc: allocation failure, allocated 0 of 8192 bytes, mode:0x14080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) [ 107.817735] syz-executor5 cpuset=syz5 mems_allowed=0 2018/05/16 13:52:17 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) wait4(0x0, &(0x7f0000000180), 0xa0000000, &(0x7f00000001c0)) [ 107.822977] CPU: 0 PID: 7532 Comm: syz-executor5 Not tainted 4.17.0-rc5+ #95 [ 107.830192] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 107.839567] Call Trace: [ 107.842202] dump_stack+0x185/0x1d0 [ 107.845871] warn_alloc+0x3fc/0x660 [ 107.849576] __vmalloc_node_range+0xeda/0x1170 [ 107.854224] __vmalloc+0xe2/0x100 [ 107.857718] ? bpf_prog_alloc+0xe0/0x500 [ 107.861850] bpf_prog_alloc+0xe0/0x500 [ 107.865818] bpf_prog_create_from_user+0x181/0x8c0 2018/05/16 13:52:17 executing program 1: process_vm_writev(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/195, 0xc3}], 0x1, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x8001, 0x0) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x86) madvise(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xa000000000008) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={r1, @in={{0x2, 0x4e24, @multicast2=0xe0000002}}}, &(0x7f00000002c0)=0x84) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) [ 107.870797] ? seccomp_log+0x460/0x460 [ 107.874726] do_seccomp+0xaa5/0x2060 [ 107.878490] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 107.883908] __x64_sys_seccomp+0xdb/0x120 [ 107.888088] do_syscall_64+0x154/0x220 [ 107.892014] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 107.897230] RIP: 0033:0x455a09 [ 107.900438] RSP: 002b:00007f373aac4c68 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 107.908185] RAX: ffffffffffffffda RBX: 00007f373aac56d4 RCX: 0000000000455a09 [ 107.915496] RDX: 0000000020000080 RSI: 0000000000000000 RDI: 0000000000000001 [ 107.922791] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 107.930085] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 107.937376] R13: 0000000000000566 R14: 00000000006fc230 R15: 0000000000000006 [ 107.944760] warn_alloc_show_mem: 1 callbacks suppressed [ 107.944767] Mem-Info: [ 107.952722] active_anon:79445 inactive_anon:76 isolated_anon:0 [ 107.952722] active_file:3475 inactive_file:8939 isolated_file:0 [ 107.952722] unevictable:0 dirty:88 writeback:0 unstable:0 [ 107.952722] slab_reclaimable:3462 slab_unreclaimable:9305 [ 107.952722] mapped:74075 shmem:84 pagetables:1025 bounce:0 [ 107.952722] free:1027647 free_pcp:428 free_cma:0 [ 107.986111] Node 0 active_anon:315924kB inactive_anon:304kB active_file:13900kB inactive_file:35756kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:296416kB dirty:352kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 129024kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 108.014306] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 108.040606] lowmem_reserve[]: 0 2817 7244 7244 [ 108.045310] Node 0 DMA32 free:2888680kB min:26228kB low:32784kB high:39340kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129292kB managed:2889512kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:832kB local_pcp:92kB free_cma:0kB [ 108.073084] lowmem_reserve[]: 0 0 4426 4426 [ 108.077554] Node 0 Normal free:1215892kB min:41208kB low:51508kB high:61808kB active_anon:313704kB inactive_anon:304kB active_file:13900kB inactive_file:35756kB unevictable:0kB writepending:352kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:9920kB pagetables:3756kB bounce:0kB free_pcp:472kB local_pcp:324kB free_cma:0kB [ 108.107486] lowmem_reserve[]: 0 0 0 0 [ 108.111386] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 108.124782] Node 0 DMA32: 2*4kB (M) 2*8kB (M) 3*16kB (M) 3*32kB (M) 1*64kB (M) 2*128kB (M) 4*256kB (M) 1*512kB (M) 3*1024kB (M) 2*2048kB (M) 703*4096kB (M) = 2888680kB [ 108.140329] Node 0 Normal: 299*4kB (UM) 158*8kB (UME) 78*16kB (UME) 55*32kB (UME) 69*64kB (UME) 30*128kB (UM) 15*256kB (ME) 23*512kB (ME) 25*1024kB (M) 7*2048kB (UM) 280*4096kB (M) = 1216156kB [ 108.157973] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 108.166590] 12497 total pagecache pages [ 108.170641] 0 pages in swap cache [ 108.174156] Swap cache stats: add 0, delete 0, find 0/0 [ 108.179568] Free swap = 0kB [ 108.182626] Total swap = 0kB [ 108.185678] 1965969 pages RAM [ 108.188847] 0 pages HighMem/MovableOnly [ 108.192867] 106315 pages reserved 2018/05/16 13:52:18 executing program 7: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 2018/05/16 13:52:18 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x100000001, 0x80) setsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000040)="03bf5a97b009051cf1c605579a8fd7723e2982b2ebc57667055ffa5b3273c1de61d805bffc750e578caca4f3ffb9032089a6f81d84d6b0e3d963dcfa2ca36c500b0e37cb6ac6436c", 0x48) process_vm_writev(0x0, &(0x7f0000000180), 0x10f, &(0x7f0000000440)=[{&(0x7f0000000280)=""/195, 0xc3}], 0x1, 0x0) madvise(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xa000000000008) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xf) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) 2018/05/16 13:52:18 executing program 1: process_vm_writev(0x0, &(0x7f0000000180), 0x10f, &(0x7f0000000440)=[{&(0x7f0000000280)=""/195, 0xc3}], 0x1, 0x0) madvise(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xa000000000008) r0 = dup(0xffffffffffffff9c) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000100)=0x100) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x7fffffff, 0x101040) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000000c0)={r2, 0x3ff, 0x5, [0x5, 0x3, 0x1000, 0xb1d, 0x8000]}, 0x12) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xf) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 2018/05/16 13:52:18 executing program 5 (fault-call:0 fault-nth:7): seccomp(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x7}, {0x6}]}) 2018/05/16 13:52:18 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x0, &(0x7f0000000240)="c626262c8523bf0141f66f") r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000000)) write$fuse(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYPTR64, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES16=r1]], 0x39c) 2018/05/16 13:52:18 executing program 2: clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) 2018/05/16 13:52:18 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000c67000)={0xa, 0x4e20}, 0x1c) listen(0xffffffffffffffff, 0x1000008000) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000002580)}, 0x0) r3 = accept4(r0, &(0x7f00000001c0)=@in={0x0, 0x0, @local}, &(0x7f0000000280)=0x80, 0x0) recvmmsg(r3, &(0x7f0000009fc0)=[{{&(0x7f0000009980)=@alg, 0x80, &(0x7f0000009e40), 0x0, &(0x7f0000009ec0)=""/202, 0xca}}], 0x1, 0x0, &(0x7f000000a1c0)) 2018/05/16 13:52:18 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) wait4(0x0, &(0x7f0000000180), 0xa0000000, &(0x7f00000001c0)) [ 108.464247] FAULT_INJECTION: forcing a failure. [ 108.464247] name failslab, interval 1, probability 0, space 0, times 0 [ 108.475610] CPU: 0 PID: 7574 Comm: syz-executor5 Not tainted 4.17.0-rc5+ #95 [ 108.482821] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 108.492200] Call Trace: [ 108.494829] dump_stack+0x185/0x1d0 [ 108.498504] should_fail+0x87b/0xab0 [ 108.502265] __should_failslab+0x278/0x2a0 [ 108.506567] should_failslab+0x29/0x70 [ 108.510509] __kmalloc+0xc5/0x350 2018/05/16 13:52:18 executing program 6: r0 = getpgrp(0x0) r1 = gettid() mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) getpriority(0x1, r1) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) process_vm_writev(r1, &(0x7f0000000180)=[{&(0x7f0000000040)=""/159, 0x9f}, {&(0x7f0000000100)=""/111, 0x6f}], 0x2, &(0x7f0000000440)=[{&(0x7f00000001c0)=""/76, 0x4c}, {&(0x7f0000000240)=""/58, 0x3a}, {&(0x7f0000000280)=""/216, 0xd8}, {&(0x7f0000000380)=""/181, 0xb5}], 0x4, 0x0) rt_tgsigqueueinfo(r0, r1, 0x4, &(0x7f0000000000)={0x0, 0x0, 0x100000001}) rt_sigtimedwait(&(0x7f0000001ff8)={0x3ffff}, &(0x7f0000f0aff0), &(0x7f0000fbcff0)={0xffffd, 0x989680}, 0x8) [ 108.514003] ? bpf_prog_alloc+0xe0/0x500 [ 108.518100] ? bpf_prog_alloc+0x14c/0x500 [ 108.522308] bpf_prog_alloc+0x14c/0x500 [ 108.526337] bpf_prog_create_from_user+0x181/0x8c0 [ 108.531315] ? seccomp_log+0x460/0x460 [ 108.535250] do_seccomp+0xaa5/0x2060 [ 108.539014] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 108.544432] __x64_sys_seccomp+0xdb/0x120 [ 108.548615] do_syscall_64+0x154/0x220 [ 108.552546] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 108.557757] RIP: 0033:0x455a09 [ 108.560967] RSP: 002b:00007f373aac4c68 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 108.568713] RAX: ffffffffffffffda RBX: 00007f373aac56d4 RCX: 0000000000455a09 [ 108.576006] RDX: 0000000020000080 RSI: 0000000000000000 RDI: 0000000000000001 [ 108.583296] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 108.590586] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 108.597877] R13: 0000000000000566 R14: 00000000006fc230 R15: 0000000000000007 2018/05/16 13:52:18 executing program 7: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) socket(0x0, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 2018/05/16 13:52:18 executing program 7: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) 2018/05/16 13:52:18 executing program 1: process_vm_writev(0x0, &(0x7f0000000180), 0x10000023, &(0x7f0000000480)=[{&(0x7f0000000040)=""/190, 0xbe}, {&(0x7f00000004c0)=""/219, 0xdb}, {&(0x7f00000003c0)=""/113, 0xffffffffffffff0f}], 0x0, 0x0) madvise(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xa000000000008) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xf) r0 = getpgid(0x0) prctl$setptracer(0x59616d61, r0) mlock2(&(0x7f0000000000/0x11000)=nil, 0x11000, 0x3) r1 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) ioctl$BLKSECDISCARD(r1, 0x127d, &(0x7f0000000000)=0x5) 2018/05/16 13:52:18 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)) r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000000)) write$fuse(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="f072094557132315210d78d957b94c277a3da05c4234a2b0d213e018444f60fa691ee1144179d1fea2ff0bf95d4adb487ef5f3b4d61e6c36987e9ebaf9a75b3d5b20c8b9857f881545bf4a5156df035a4766b6de997955883dd22ec1d10984212711f762ef67f139982dbc3b9c386e425ee53b6c33bc47af8703e66719ca94e195f56bdf7c7b21eca22e470c2a7197f13322b8acc855ae6aa6e0e19cddc1e3eb0b1bcc9e4ee6812bfaf869479e406a850d52795068648ac34d1fcf001ec3dcd94068ca0b9c69522a2e85a132098a774930efee33c8e97de5759fe03b3b830f8313f3cb2a05cd65f65c1e368bd8c8712cf605a6a4c56aa4966636b752f68cd100654adaac3132924f3e0cdd2043bd9ace6d93b84874fe31deb0194ae288b2d87ce6461009f99713aa6f0ccaeb6ffdf676818accd070fc5ccd468f167b16bc99fd7363e9d0c579835c21d017da09045af1b69121c8daac6b02b90220827e27942cc11c992fefc9c8931d060727cc7c4444e35329327cc36a6ab74e490134306c2fc84d4df95e9a97a64318dcd86214530dde1e7bc728409e82c2211e79e41211c45882584f6701b958e5a62f01f64d4ce006963cd5dd4558e08bcf72babe867d9c730a702533369d3c3035de1a78d80b6d14219ba4c4f969b3aa3bc24c928bd8408707e671ad62950f6b5cbfe1857999f1b1cdab2e5394c84f7f714175b66070d16e2111647f74da4f78c1752dd3818b629801780d203422cb1de336a98efbf2e1a037dfbff3f6f83f7b35fde4eb5c92579bed62592da526d436d27acd658b3eb7333c22566b443e90887cd68ec1d93d9adf388fa73bc8ebc5908f46b072617c4a64c0d779dbfdc18d1031db783cca4e0e6a6179db6492799ba7fd1e4b762d77ae62c5686aac4dc10d69c247a74c0f79ea25bc012418cbd03024e2d3d67fbe51af2ea6d70147b055e3420d727559e76c592a0e61f2c8bc89f62a1368010b7a6e74f1fdf82b3dcf7ef10d470a0ff22dc8dc81ae76a3e27be52440169cf8e50cb9a0627f00171fe5e60be2f247edbe297d0b633fb4aec75ccc3cef4df99da36965a50c7e6bf915d4c0c248e9b8dfb521e67d24e7717ac80a38286f48c293f0af5bccca620d1576735f5051bf163f33064522d18e6aa8a971dc6edf5b713867fbdfa64b67186826929c82f36d5e5396d7b735bcdae1e7c10fdba5c63fcecc1b92daa2e4b9e4c0dace1729d26eb0896e0d30eadd1c084b770ddb71a65a14642a144734557b6b7273783de8a871e98e", @ANYPTR64, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES16=r1]], 0x39c) 2018/05/16 13:52:18 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000c67000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000002580)}, 0x0) r3 = accept4(r0, &(0x7f00000001c0)=@in={0x0, 0x0, @local}, &(0x7f0000000280)=0x80, 0x0) recvmmsg(r3, &(0x7f0000009fc0)=[{{&(0x7f0000009980)=@alg, 0x80, &(0x7f0000009e40), 0x0, &(0x7f0000009ec0)=""/202, 0xca}}], 0x1, 0x0, &(0x7f000000a1c0)) 2018/05/16 13:52:18 executing program 5 (fault-call:0 fault-nth:8): seccomp(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x7}, {0x6}]}) 2018/05/16 13:52:18 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) r0 = socket(0x0, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) 2018/05/16 13:52:18 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) wait4(0x0, &(0x7f0000000180), 0xa0000000, &(0x7f00000001c0)) [ 108.940475] FAULT_INJECTION: forcing a failure. [ 108.940475] name failslab, interval 1, probability 0, space 0, times 0 [ 108.951812] CPU: 1 PID: 7610 Comm: syz-executor5 Not tainted 4.17.0-rc5+ #95 [ 108.959022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 108.968399] Call Trace: [ 108.971034] dump_stack+0x185/0x1d0 [ 108.974723] should_fail+0x87b/0xab0 [ 108.978482] __should_failslab+0x278/0x2a0 [ 108.982765] should_failslab+0x29/0x70 [ 108.986688] __kmalloc+0xc5/0x350 [ 108.990196] ? bpf_prepare_filter+0x81/0x1b10 [ 108.994725] ? bpf_prepare_filter+0x84e/0x1b10 [ 108.999356] bpf_prepare_filter+0x84e/0x1b10 [ 109.003801] ? seccomp_log+0x460/0x460 [ 109.007744] ? kmsan_set_origin+0x9e/0x160 [ 109.012037] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 109.017462] bpf_prog_create_from_user+0x598/0x8c0 [ 109.022441] ? seccomp_log+0x460/0x460 [ 109.026378] do_seccomp+0xaa5/0x2060 [ 109.030144] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 109.035568] __x64_sys_seccomp+0xdb/0x120 [ 109.039753] do_syscall_64+0x154/0x220 [ 109.043686] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 109.048903] RIP: 0033:0x455a09 [ 109.052108] RSP: 002b:00007f373aac4c68 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 109.059853] RAX: ffffffffffffffda RBX: 00007f373aac56d4 RCX: 0000000000455a09 [ 109.067145] RDX: 0000000020000080 RSI: 0000000000000000 RDI: 0000000000000001 [ 109.074437] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 109.081732] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 2018/05/16 13:52:18 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xf, 0x6, &(0x7f0000000200)=@raw=[@call={0x85, 0x0, 0x0, 0x12}, @jmp={0x5, 0xffffffffffff7729, 0xf, 0xa, 0x6, 0xfffffffc, 0xfffffffffffffffd}, @exit={0x95}], &(0x7f0000000300)='syzkaller\x00', 0x0, 0xc8, &(0x7f0000000340)=""/200, 0x40f00, 0x1}, 0x48) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) sendto(r0, &(0x7f00000004c0)="a9bfc1867336595d73c8d835e68dbf064507a98a7af44024eeab73773e9823e814dad5febf50a8b7532e4505344a8d3f4575233fb0c444bf6bc171aff74648611a7b865b8d20233bd7b7354faf3a0cca9ed1f2522026470886f3ae23dbede19a5bed3b53bcca8f", 0x67, 0x8004, &(0x7f0000000540)=@in={0x2, 0x4e24, @multicast1=0xe0000001}, 0xffffffffffffffa7) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={@ipv4={[], [0xff, 0xff]}, 0x66, r2}) getsockopt$packet_int(r1, 0x107, 0xc, &(0x7f0000000000), &(0x7f0000000100)=0x4) recvfrom$inet(r0, &(0x7f0000000040)=""/64, 0x40, 0x20, &(0x7f0000000080)={0x2, 0x4e24, @loopback=0x7f000001}, 0xfffffffffffffd27) 2018/05/16 13:52:19 executing program 0: clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) wait4(0x0, &(0x7f0000000180), 0xa0000000, &(0x7f00000001c0)) [ 109.089022] R13: 0000000000000566 R14: 00000000006fc230 R15: 0000000000000008 2018/05/16 13:52:19 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)) r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000000)) write$fuse(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="f072094557132315210d78d957b94c277a3da05c4234a2b0d213e018444f60fa691ee1144179d1fea2ff0bf95d4adb487ef5f3b4d61e6c36987e9ebaf9a75b3d5b20c8b9857f881545bf4a5156df035a4766b6de997955883dd22ec1d10984212711f762ef67f139982dbc3b9c386e425ee53b6c33bc47af8703e66719ca94e195f56bdf7c7b21eca22e470c2a7197f13322b8acc855ae6aa6e0e19cddc1e3eb0b1bcc9e4ee6812bfaf869479e406a850d52795068648ac34d1fcf001ec3dcd94068ca0b9c69522a2e85a132098a774930efee33c8e97de5759fe03b3b830f8313f3cb2a05cd65f65c1e368bd8c8712cf605a6a4c56aa4966636b752f68cd100654adaac3132924f3e0cdd2043bd9ace6d93b84874fe31deb0194ae288b2d87ce6461009f99713aa6f0ccaeb6ffdf676818accd070fc5ccd468f167b16bc99fd7363e9d0c579835c21d017da09045af1b69121c8daac6b02b90220827e27942cc11c992fefc9c8931d060727cc7c4444e35329327cc36a6ab74e490134306c2fc84d4df95e9a97a64318dcd86214530dde1e7bc728409e82c2211e79e41211c45882584f6701b958e5a62f01f64d4ce006963cd5dd4558e08bcf72babe867d9c730a702533369d3c3035de1a78d80b6d14219ba4c4f969b3aa3bc24c928bd8408707e671ad62950f6b5cbfe1857999f1b1cdab2e5394c84f7f714175b66070d16e2111647f74da4f78c1752dd3818b629801780d203422cb1de336a98efbf2e1a037dfbff3f6f83f7b35fde4eb5c92579bed62592da526d436d27acd658b3eb7333c22566b443e90887cd68ec1d93d9adf388fa73bc8ebc5908f46b072617c4a64c0d779dbfdc18d1031db783cca4e0e6a6179db6492799ba7fd1e4b762d77ae62c5686aac4dc10d69c247a74c0f79ea25bc012418cbd03024e2d3d67fbe51af2ea6d70147b055e3420d727559e76c592a0e61f2c8bc89f62a1368010b7a6e74f1fdf82b3dcf7ef10d470a0ff22dc8dc81ae76a3e27be52440169cf8e50cb9a0627f00171fe5e60be2f247edbe297d0b633fb4aec75ccc3cef4df99da36965a50c7e6bf915d4c0c248e9b8dfb521e67d24e7717ac80a38286f48c293f0af5bccca620d1576735f5051bf163f33064522d18e6aa8a971dc6edf5b713867fbdfa64b67186826929c82f36d5e5396d7b735bcdae1e7c10fdba5c63fcecc1b92daa2e4b9e4c0dace1729d26eb0896e0d30eadd1c084b770ddb71a65a14642a144734557b6b7273783de8a871e98e", @ANYPTR64, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES16=r1]], 0x39c) 2018/05/16 13:52:19 executing program 1: process_vm_writev(0x0, &(0x7f0000000180), 0x10f, &(0x7f0000000440)=[{&(0x7f0000000280)=""/195, 0xc3}], 0x1, 0x0) madvise(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xa000000000008) mprotect(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x13) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) 2018/05/16 13:52:19 executing program 6: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f0000000340)={0x4, 0xa, 0x0, 0x100000000, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xd1, &(0x7f0000000000)={{0xfe, 0x0, 0x0, @dev={0xfe, 0x80}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, 0x4) 2018/05/16 13:52:19 executing program 7: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) 2018/05/16 13:52:19 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) r0 = socket(0x0, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) 2018/05/16 13:52:19 executing program 5 (fault-call:0 fault-nth:9): seccomp(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x7}, {0x6}]}) [ 109.428560] FAULT_INJECTION: forcing a failure. [ 109.428560] name failslab, interval 1, probability 0, space 0, times 0 [ 109.440034] CPU: 0 PID: 7647 Comm: syz-executor5 Not tainted 4.17.0-rc5+ #95 [ 109.447245] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 109.456624] Call Trace: [ 109.459255] dump_stack+0x185/0x1d0 [ 109.462929] should_fail+0x87b/0xab0 [ 109.466688] __should_failslab+0x278/0x2a0 [ 109.470982] should_failslab+0x29/0x70 2018/05/16 13:52:19 executing program 6: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) r0 = socket(0x0, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) 2018/05/16 13:52:19 executing program 1: process_vm_writev(0x0, &(0x7f0000000180), 0x10f, &(0x7f0000000440)=[{&(0x7f0000000280)=""/195, 0xc3}], 0x1, 0x0) madvise(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xa000000000008) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f00000000c0)='/dev/snd/midiC#D#\x00', 0x0, 0x14000) r1 = accept$unix(r0, &(0x7f0000000100), &(0x7f0000000080)=0xfffffffffffffd32) fcntl$setsig(r1, 0xa, 0x32) 2018/05/16 13:52:19 executing program 0: clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) wait4(0x0, &(0x7f0000000180), 0xa0000000, &(0x7f00000001c0)) 2018/05/16 13:52:19 executing program 7: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) [ 109.474909] __kmalloc_track_caller+0x209/0xcd0 [ 109.479630] ? bpf_prepare_filter+0x140e/0x1b10 [ 109.484336] ? trace_kmalloc+0xb6/0x2b0 [ 109.488359] ? seccomp_check_filter+0x85/0x450 [ 109.492996] kmemdup+0x95/0x140 [ 109.496333] bpf_prepare_filter+0x140e/0x1b10 [ 109.500864] ? seccomp_log+0x460/0x460 [ 109.504800] ? kmsan_set_origin+0x9e/0x160 [ 109.509098] bpf_prog_create_from_user+0x598/0x8c0 [ 109.514072] ? seccomp_log+0x460/0x460 [ 109.517999] do_seccomp+0xaa5/0x2060 [ 109.521770] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 109.527193] __x64_sys_seccomp+0xdb/0x120 [ 109.531394] do_syscall_64+0x154/0x220 [ 109.535326] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 109.540632] RIP: 0033:0x455a09 [ 109.543842] RSP: 002b:00007f373aac4c68 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 109.551584] RAX: ffffffffffffffda RBX: 00007f373aac56d4 RCX: 0000000000455a09 [ 109.558873] RDX: 0000000020000080 RSI: 0000000000000000 RDI: 0000000000000001 [ 109.566163] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 109.573455] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 109.580744] R13: 0000000000000566 R14: 00000000006fc230 R15: 0000000000000009 2018/05/16 13:52:19 executing program 5 (fault-call:0 fault-nth:10): seccomp(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x7}, {0x6}]}) 2018/05/16 13:52:19 executing program 1: process_vm_writev(0x0, &(0x7f0000000300)=[{&(0x7f0000000340)=""/85}], 0x1000000000000149, &(0x7f00000002c0)=[{&(0x7f0000000040)=""/185, 0xfffffffffffffea9}], 0x100000cb, 0x0) madvise(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xa000000000008) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xf) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) 2018/05/16 13:52:19 executing program 0: clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) wait4(0x0, &(0x7f0000000180), 0xa0000000, &(0x7f00000001c0)) 2018/05/16 13:52:19 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000c67000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x1000008000) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = socket(0x0, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000002580)}, 0x0) r3 = accept4(r0, &(0x7f00000001c0)=@in={0x0, 0x0, @local}, &(0x7f0000000280)=0x80, 0x0) recvmmsg(r3, &(0x7f0000009fc0)=[{{&(0x7f0000009980)=@alg, 0x80, &(0x7f0000009e40), 0x0, &(0x7f0000009ec0)=""/202, 0xca}}], 0x1, 0x0, &(0x7f000000a1c0)) 2018/05/16 13:52:19 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)) r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000000)) write$fuse(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="f072094557132315210d78d957b94c277a3da05c4234a2b0d213e018444f60fa691ee1144179d1fea2ff0bf95d4adb487ef5f3b4d61e6c36987e9ebaf9a75b3d5b20c8b9857f881545bf4a5156df035a4766b6de997955883dd22ec1d10984212711f762ef67f139982dbc3b9c386e425ee53b6c33bc47af8703e66719ca94e195f56bdf7c7b21eca22e470c2a7197f13322b8acc855ae6aa6e0e19cddc1e3eb0b1bcc9e4ee6812bfaf869479e406a850d52795068648ac34d1fcf001ec3dcd94068ca0b9c69522a2e85a132098a774930efee33c8e97de5759fe03b3b830f8313f3cb2a05cd65f65c1e368bd8c8712cf605a6a4c56aa4966636b752f68cd100654adaac3132924f3e0cdd2043bd9ace6d93b84874fe31deb0194ae288b2d87ce6461009f99713aa6f0ccaeb6ffdf676818accd070fc5ccd468f167b16bc99fd7363e9d0c579835c21d017da09045af1b69121c8daac6b02b90220827e27942cc11c992fefc9c8931d060727cc7c4444e35329327cc36a6ab74e490134306c2fc84d4df95e9a97a64318dcd86214530dde1e7bc728409e82c2211e79e41211c45882584f6701b958e5a62f01f64d4ce006963cd5dd4558e08bcf72babe867d9c730a702533369d3c3035de1a78d80b6d14219ba4c4f969b3aa3bc24c928bd8408707e671ad62950f6b5cbfe1857999f1b1cdab2e5394c84f7f714175b66070d16e2111647f74da4f78c1752dd3818b629801780d203422cb1de336a98efbf2e1a037dfbff3f6f83f7b35fde4eb5c92579bed62592da526d436d27acd658b3eb7333c22566b443e90887cd68ec1d93d9adf388fa73bc8ebc5908f46b072617c4a64c0d779dbfdc18d1031db783cca4e0e6a6179db6492799ba7fd1e4b762d77ae62c5686aac4dc10d69c247a74c0f79ea25bc012418cbd03024e2d3d67fbe51af2ea6d70147b055e3420d727559e76c592a0e61f2c8bc89f62a1368010b7a6e74f1fdf82b3dcf7ef10d470a0ff22dc8dc81ae76a3e27be52440169cf8e50cb9a0627f00171fe5e60be2f247edbe297d0b633fb4aec75ccc3cef4df99da36965a50c7e6bf915d4c0c248e9b8dfb521e67d24e7717ac80a38286f48c293f0af5bccca620d1576735f5051bf163f33064522d18e6aa8a971dc6edf5b713867fbdfa64b67186826929c82f36d5e5396d7b735bcdae1e7c10fdba5c63fcecc1b92daa2e4b9e4c0dace1729d26eb0896e0d30eadd1c084b770ddb71a65a14642a144734557b6b7273783de8a871e98e", @ANYPTR64, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES16=r1]], 0x39c) 2018/05/16 13:52:19 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)) r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000000)) write$fuse(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYPTR64, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES16=r1]], 0x39c) 2018/05/16 13:52:19 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) r0 = socket(0x0, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) 2018/05/16 13:52:19 executing program 7: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) 2018/05/16 13:52:19 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x5, 0x400000) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x18000}, 0xc, &(0x7f0000000380)={&(0x7f0000000200)=ANY=[@ANYBLOB="4400001b", @ANYRES16=r1, @ANYBLOB="030026bd7000fedbdf250300000004000500040005000800020000000000080001004e21000008000400020000000800030000000000080002000a000000"], 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x40) openat$uinput(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/uinput\x00', 0x210000, 0x0) process_vm_writev(0x0, &(0x7f0000000180), 0x10f, &(0x7f0000000440)=[{&(0x7f0000000280)=""/195, 0xc3}], 0x1, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x1018bd, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="5800000070dbb7cb0ffee707000000000000800125196f78fdc14c8b925776aa9673daca92ec8994a793cd3ec6e8b26cd343a843898d5bd58999e648c5f20800c9196c14c5f779efbebaa6a497a3b70000000000470f00002509c000"], &(0x7f00000000c0)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000100)={r3, 0xc53}, 0x8) mlock2(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x1) madvise(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xa000000000008) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xf) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r2, 0x800448d2, &(0x7f0000000400)={0x9, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}, {}, {}]}) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) 2018/05/16 13:52:20 executing program 7: clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) 2018/05/16 13:52:20 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) r0 = socket(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) [ 110.019312] FAULT_INJECTION: forcing a failure. [ 110.019312] name failslab, interval 1, probability 0, space 0, times 0 [ 110.030799] CPU: 1 PID: 7687 Comm: syz-executor5 Not tainted 4.17.0-rc5+ #95 [ 110.038019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 110.047407] Call Trace: [ 110.050046] dump_stack+0x185/0x1d0 [ 110.053724] should_fail+0x87b/0xab0 [ 110.057487] __should_failslab+0x278/0x2a0 [ 110.061785] should_failslab+0x29/0x70 [ 110.065717] __kmalloc+0xc5/0x350 2018/05/16 13:52:20 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x437, &(0x7f000000cf3d)=""/195}, 0x21) semget$private(0x0, 0xada44de627c14b5a, 0xa1) r0 = memfd_create(&(0x7f0000000080)='%keyringwlan0\x00', 0x3) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e20, 0x4, @remote={0xfe, 0x80, [], 0xbb}, 0x1}}, 0x5, 0x7fffffff, 0xfffffffffffffffd, 0x6, 0x89}, &(0x7f0000000180)=0x98) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f00000001c0)={r1, 0x1}, 0x8) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x111000, 0x0) connect$ax25(r2, &(0x7f0000000040)={0x3, {"6007f4c15e8862"}, 0x6}, 0x10) 2018/05/16 13:52:20 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000c67000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x1000008000) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = socket(0x0, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000002580)}, 0x0) r3 = accept4(r0, &(0x7f00000001c0)=@in={0x0, 0x0, @local}, &(0x7f0000000280)=0x80, 0x0) recvmmsg(r3, &(0x7f0000009fc0)=[{{&(0x7f0000009980)=@alg, 0x80, &(0x7f0000009e40), 0x0, &(0x7f0000009ec0)=""/202, 0xca}}], 0x1, 0x0, &(0x7f000000a1c0)) [ 110.069216] ? bpf_convert_filter+0xaf/0x3390 [ 110.073753] ? bpf_convert_filter+0x1a8/0x3390 [ 110.078378] ? bpf_convert_filter+0x3285/0x3390 [ 110.083089] bpf_convert_filter+0x1a8/0x3390 [ 110.087565] ? kmsan_set_origin+0x9e/0x160 [ 110.091842] ? __msan_metadata_ptr_for_load_2+0x10/0x20 [ 110.097247] ? bpf_prog_realloc+0x184/0x540 [ 110.101630] bpf_prepare_filter+0x18e9/0x1b10 [ 110.106163] ? seccomp_log+0x460/0x460 [ 110.110111] bpf_prog_create_from_user+0x598/0x8c0 [ 110.115089] ? seccomp_log+0x460/0x460 2018/05/16 13:52:20 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) r0 = socket(0x0, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) wait4(0x0, &(0x7f0000000180), 0xa0000000, &(0x7f00000001c0)) [ 110.119023] do_seccomp+0xaa5/0x2060 [ 110.122793] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 110.128217] __x64_sys_seccomp+0xdb/0x120 [ 110.132409] do_syscall_64+0x154/0x220 [ 110.136339] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 110.141640] RIP: 0033:0x455a09 [ 110.144846] RSP: 002b:00007f373aac4c68 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 110.152589] RAX: ffffffffffffffda RBX: 00007f373aac56d4 RCX: 0000000000455a09 [ 110.159881] RDX: 0000000020000080 RSI: 0000000000000000 RDI: 0000000000000001 [ 110.167171] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 110.174464] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 110.181756] R13: 0000000000000566 R14: 00000000006fc230 R15: 000000000000000a 2018/05/16 13:52:20 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523") r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000000)) write$fuse(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYPTR64, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES16=r1]], 0x39c) 2018/05/16 13:52:20 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) r0 = socket(0x0, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) wait4(0x0, &(0x7f0000000180), 0xa0000000, &(0x7f00000001c0)) 2018/05/16 13:52:20 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000c67000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x1000008000) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = socket(0x0, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000002580)}, 0x0) r3 = accept4(r0, &(0x7f00000001c0)=@in={0x0, 0x0, @local}, &(0x7f0000000280)=0x80, 0x0) recvmmsg(r3, &(0x7f0000009fc0)=[{{&(0x7f0000009980)=@alg, 0x80, &(0x7f0000009e40), 0x0, &(0x7f0000009ec0)=""/202, 0xca}}], 0x1, 0x0, &(0x7f000000a1c0)) 2018/05/16 13:52:20 executing program 7: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) r0 = socket(0x0, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) 2018/05/16 13:52:20 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) r0 = socket(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) 2018/05/16 13:52:20 executing program 1: process_vm_writev(0x0, &(0x7f0000000180), 0x10f, &(0x7f0000000440)=[{&(0x7f0000000280)=""/195, 0xc3}], 0x1, 0x0) madvise(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xa000000000008) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xf) mlock2(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x3ffffffbffffffc) 2018/05/16 13:52:20 executing program 5 (fault-call:0 fault-nth:11): seccomp(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x7}, {0x6}]}) 2018/05/16 13:52:20 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523") r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000000)) write$fuse(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYPTR64, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES16=r1]], 0x39c) 2018/05/16 13:52:20 executing program 6: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x644041, 0x0) ioctl$sock_bt_bnep_BNEPCONNDEL(r0, 0x400442c9, &(0x7f00000004c0)={0x8001, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f00000002c0)={'filter\x00', 0x92, "9d971feb8a8a33007fdd8c3df92e9da5089bdbed0b034ff32170fa22ba9059b9e8073a75104fe46a5120d2ac83a7b0d125ecd1957dbe6624c878abdaa21a693d6cb7a6025a34b1273154b6179c4c6afdd94e417a6087979ff84d349cbe65b1e9024da8782cb4bb1be343ed74ac08449f8581ec2c1722836184c86f69e5271d70010d4a1ebf5c6e0d15d6998d7b44ca0f56a4"}, &(0x7f0000000380)=0xb6) getrusage(0x1, &(0x7f00000003c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in=@multicast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000240)=0xe8) connect$can_bcm(r0, &(0x7f0000000280)={0x1d, r2}, 0x10) r3 = dup2(r1, r1) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f0000000480)={0xa6fc}, 0x4) close(r3) [ 110.664168] FAULT_INJECTION: forcing a failure. [ 110.664168] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 110.676237] CPU: 1 PID: 7753 Comm: syz-executor5 Not tainted 4.17.0-rc5+ #95 [ 110.683450] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 110.692829] Call Trace: [ 110.695459] dump_stack+0x185/0x1d0 [ 110.699134] should_fail+0x87b/0xab0 [ 110.702894] __alloc_pages_nodemask+0x61c/0x5dd0 [ 110.707692] ? __kernel_text_address+0x34/0xe0 2018/05/16 13:52:20 executing program 6: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x644041, 0x0) ioctl$sock_bt_bnep_BNEPCONNDEL(r0, 0x400442c9, &(0x7f00000004c0)={0x8001, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f00000002c0)={'filter\x00', 0x92, "9d971feb8a8a33007fdd8c3df92e9da5089bdbed0b034ff32170fa22ba9059b9e8073a75104fe46a5120d2ac83a7b0d125ecd1957dbe6624c878abdaa21a693d6cb7a6025a34b1273154b6179c4c6afdd94e417a6087979ff84d349cbe65b1e9024da8782cb4bb1be343ed74ac08449f8581ec2c1722836184c86f69e5271d70010d4a1ebf5c6e0d15d6998d7b44ca0f56a4"}, &(0x7f0000000380)=0xb6) getrusage(0x1, &(0x7f00000003c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in=@multicast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000240)=0xe8) connect$can_bcm(r0, &(0x7f0000000280)={0x1d, r2}, 0x10) r3 = dup2(r1, r1) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f0000000480)={0xa6fc}, 0x4) close(r3) [ 110.712321] ? __save_stack_trace+0x90d/0xb00 [ 110.716876] ? __alloc_pages_nodemask+0xf8e/0x5dd0 [ 110.721850] alloc_pages_current+0x6b5/0x970 [ 110.726301] __change_page_attr_set_clr+0x1904/0x5de0 [ 110.731545] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 110.736966] ? update_load_avg+0x21fe/0x2d00 [ 110.741454] __change_page_attr_set_clr+0x4f86/0x5de0 [ 110.746674] ? rcu_segcblist_enqueue+0x189/0x2d0 [ 110.751472] ? kmsan_set_origin_inline+0x6b/0x120 [ 110.756347] ? __msan_poison_alloca+0x15c/0x1d0 [ 110.761057] ? __purge_vmap_area_lazy+0x2f0/0x3b0 [ 110.765947] ? __purge_vmap_area_lazy+0x2f0/0x3b0 [ 110.770833] ? __purge_vmap_area_lazy+0x369/0x3b0 [ 110.775748] ? mutex_unlock+0x15/0x80 [ 110.779603] change_page_attr_set_clr+0x8ea/0x1e00 [ 110.784605] set_memory_ro+0xd0/0x100 [ 110.788462] bpf_prog_select_runtime+0x3a5/0xa40 [ 110.793286] bpf_prepare_filter+0x1a96/0x1b10 [ 110.797818] ? seccomp_log+0x460/0x460 [ 110.801774] bpf_prog_create_from_user+0x598/0x8c0 [ 110.806754] ? seccomp_log+0x460/0x460 [ 110.810711] do_seccomp+0xaa5/0x2060 2018/05/16 13:52:20 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) r0 = socket(0x0, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) wait4(0x0, &(0x7f0000000180), 0xa0000000, &(0x7f00000001c0)) [ 110.814480] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 110.819903] __x64_sys_seccomp+0xdb/0x120 [ 110.824088] do_syscall_64+0x154/0x220 [ 110.828020] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 110.833241] RIP: 0033:0x455a09 [ 110.836449] RSP: 002b:00007f373aac4c68 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 110.844195] RAX: ffffffffffffffda RBX: 00007f373aac56d4 RCX: 0000000000455a09 [ 110.851492] RDX: 0000000020000080 RSI: 0000000000000000 RDI: 0000000000000001 2018/05/16 13:52:20 executing program 7: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) r0 = socket(0x0, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) [ 110.858785] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 110.866078] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 110.873398] R13: 0000000000000566 R14: 00000000006fc230 R15: 000000000000000b [ 110.881060] WARNING: CPU: 1 PID: 7753 at ./include/linux/filter.h:651 bpf_prog_select_runtime+0x95b/0xa40 [ 110.890788] Kernel panic - not syncing: panic_on_warn set ... [ 110.890788] [ 110.898196] CPU: 1 PID: 7753 Comm: syz-executor5 Not tainted 4.17.0-rc5+ #95 [ 110.905395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 2018/05/16 13:52:20 executing program 6: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) r0 = socket(0x0, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mount(&(0x7f0000001440)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) [ 110.914764] Call Trace: [ 110.917388] dump_stack+0x185/0x1d0 [ 110.921054] panic+0x39d/0x940 [ 110.924312] ? trace_raw_output_i2c_write+0x33b/0x410 [ 110.929539] ? disable_trace_on_warning+0x18/0xd0 [ 110.934421] __warn+0x40f/0x580 [ 110.937735] ? bpf_prog_select_runtime+0x95b/0xa40 [ 110.942713] report_bug+0x72a/0x880 [ 110.946372] ? bpf_prog_select_runtime+0x95b/0xa40 [ 110.951360] do_error_trap+0x1cc/0x620 [ 110.955304] ? change_page_attr_set_clr+0xb1c/0x1e00 [ 110.960481] do_invalid_op+0x46/0x50 2018/05/16 13:52:20 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000c67000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x1000008000) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = socket(0xa, 0x0, 0x0) ioctl(r2, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000002580)}, 0x0) r3 = accept4(r0, &(0x7f00000001c0)=@in={0x0, 0x0, @local}, &(0x7f0000000280)=0x80, 0x0) recvmmsg(r3, &(0x7f0000009fc0)=[{{&(0x7f0000009980)=@alg, 0x80, &(0x7f0000009e40), 0x0, &(0x7f0000009ec0)=""/202, 0xca}}], 0x1, 0x0, &(0x7f000000a1c0)) 2018/05/16 13:52:20 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523") r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000000)) write$fuse(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="f072094557132315210d78d957b94c277a3da05c4234a2b0d213e018444f60fa691ee1144179d1fea2ff0bf95d4adb487ef5f3b4d61e6c36987e9ebaf9a75b3d5b20c8b9857f881545bf4a5156df035a4766b6de997955883dd22ec1d10984212711f762ef67f139982dbc3b9c386e425ee53b6c33bc47af8703e66719ca94e195f56bdf7c7b21eca22e470c2a7197f13322b8acc855ae6aa6e0e19cddc1e3eb0b1bcc9e4ee6812bfaf869479e406a850d52795068648ac34d1fcf001ec3dcd94068ca0b9c69522a2e85a132098a774930efee33c8e97de5759fe03b3b830f8313f3cb2a05cd65f65c1e368bd8c8712cf605a6a4c56aa4966636b752f68cd100654adaac3132924f3e0cdd2043bd9ace6d93b84874fe31deb0194ae288b2d87ce6461009f99713aa6f0ccaeb6ffdf676818accd070fc5ccd468f167b16bc99fd7363e9d0c579835c21d017da09045af1b69121c8daac6b02b90220827e27942cc11c992fefc9c8931d060727cc7c4444e35329327cc36a6ab74e490134306c2fc84d4df95e9a97a64318dcd86214530dde1e7bc728409e82c2211e79e41211c45882584f6701b958e5a62f01f64d4ce006963cd5dd4558e08bcf72babe867d9c730a702533369d3c3035de1a78d80b6d14219ba4c4f969b3aa3bc24c928bd8408707e671ad62950f6b5cbfe1857999f1b1cdab2e5394c84f7f714175b66070d16e2111647f74da4f78c1752dd3818b629801780d203422cb1de336a98efbf2e1a037dfbff3f6f83f7b35fde4eb5c92579bed62592da526d436d27acd658b3eb7333c22566b443e90887cd68ec1d93d9adf388fa73bc8ebc5908f46b072617c4a64c0d779dbfdc18d1031db783cca4e0e6a6179db6492799ba7fd1e4b762d77ae62c5686aac4dc10d69c247a74c0f79ea25bc012418cbd03024e2d3d67fbe51af2ea6d70147b055e3420d727559e76c592a0e61f2c8bc89f62a1368010b7a6e74f1fdf82b3dcf7ef10d470a0ff22dc8dc81ae76a3e27be52440169cf8e50cb9a0627f00171fe5e60be2f247edbe297d0b633fb4aec75ccc3cef4df99da36965a50c7e6bf915d4c0c248e9b8dfb521e67d24e7717ac80a38286f48c293f0af5bccca620d1576735f5051bf163f33064522d18e6aa8a971dc6edf5b713867fbdfa64b67186826929c82f36d5e5396d7b735bcdae1e7c10fdba5c63fcecc1b92daa2e4b9e4c0dace1729d26eb0896e0d30eadd1c084b770ddb71a65a14642a144734557b6b7273783de8a871e98e", @ANYPTR64, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES16=r1]], 0x39c) [ 110.964252] invalid_op+0x14/0x20 [ 110.967757] RIP: 0010:bpf_prog_select_runtime+0x95b/0xa40 [ 110.973311] RSP: 0018:ffff88014417fae0 EFLAGS: 00010287 [ 110.978706] RAX: ffffffff8176dc5b RBX: ffff880150582618 RCX: 0000000000040000 [ 110.985997] RDX: ffffc90002ba2000 RSI: 000000000001a9b3 RDI: 000000000001a9b4 [ 110.993295] RBP: ffff88014417fbb0 R08: 00000000000000db R09: ffff88014418f880 [ 111.000590] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 111.007885] R13: 0000000000000004 R14: 00000000fffffff4 R15: ffffc900123c7000 [ 111.015205] ? bpf_prog_select_runtime+0x95b/0xa40 [ 111.020212] bpf_prepare_filter+0x1a96/0x1b10 [ 111.024753] ? seccomp_log+0x460/0x460 [ 111.028716] bpf_prog_create_from_user+0x598/0x8c0 [ 111.033703] ? seccomp_log+0x460/0x460 [ 111.037714] do_seccomp+0xaa5/0x2060 [ 111.041491] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 111.046922] __x64_sys_seccomp+0xdb/0x120 [ 111.051114] do_syscall_64+0x154/0x220 [ 111.055048] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 111.060263] RIP: 0033:0x455a09 [ 111.063471] RSP: 002b:00007f373aac4c68 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 111.071208] RAX: ffffffffffffffda RBX: 00007f373aac56d4 RCX: 0000000000455a09 [ 111.078498] RDX: 0000000020000080 RSI: 0000000000000000 RDI: 0000000000000001 [ 111.085791] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 111.093086] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 111.100381] R13: 0000000000000566 R14: 00000000006fc230 R15: 000000000000000b [ 111.108176] Dumping ftrace buffer: [ 111.111719] (ftrace buffer empty) [ 111.115412] Kernel Offset: disabled [ 111.119036] Rebooting in 86400 seconds..