f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:25:31 executing program 2 (fault-call:10 fault-nth:5): r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="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", 0xfc}], 0x1, 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r2 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) ioctl$sock_ipx_SIOCAIPXPRISLT(r2, 0x89e1, &(0x7f0000000280)=0x3f) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f0000000200)={0x80, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23}, 0x0, 0x7, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000300)={r3, 0x1c9}, 0x8) r4 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e44ee") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x40, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000c40)={r3, 0x2}, &(0x7f0000000c80)=0xffffffffffffff39) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000540)=0x2, 0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000340)) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000d40)={0x7433, {{0x2, 0x4e21, @broadcast=0xffffffff}}, 0x1, 0x1, [{{0x2, 0x4e20}}]}, 0x110) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f, r3}, 0x20) [ 841.125876] FAULT_INJECTION: forcing a failure. [ 841.125876] name failslab, interval 1, probability 0, space 0, times 0 [ 841.137199] CPU: 1 PID: 21161 Comm: syz-executor2 Not tainted 4.16.0-rc7+ #373 [ 841.144568] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 841.153930] Call Trace: [ 841.156549] dump_stack+0x194/0x24d [ 841.160197] ? arch_local_irq_restore+0x53/0x53 [ 841.164877] ? is_bpf_text_address+0xa4/0x120 [ 841.169379] ? kernel_text_address+0xd1/0xe0 [ 841.173802] ? __unwind_start+0x169/0x330 [ 841.177972] should_fail+0x8c0/0xa40 [ 841.181707] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 841.186831] ? save_stack+0xa3/0xd0 [ 841.190479] ? save_stack+0x43/0xd0 [ 841.194124] ? kasan_kmalloc+0xad/0xe0 [ 841.198052] ? kmem_cache_alloc_trace+0x136/0x740 [ 841.202930] ? find_held_lock+0x35/0x1d0 [ 841.207026] ? check_same_owner+0x320/0x320 [ 841.211369] ? rcu_note_context_switch+0x710/0x710 [ 841.216322] should_failslab+0xec/0x120 [ 841.220299] kmem_cache_alloc_node_trace+0x5a/0x760 [ 841.225317] ? alloc_fdtable+0x7f/0x280 [ 841.229288] __kmalloc_node+0x33/0x70 [ 841.233085] kvmalloc_node+0x99/0xd0 [ 841.236792] alloc_fdtable+0xcf/0x280 [ 841.240580] dup_fd+0x8b8/0xdf0 [ 841.243851] ? __fdget+0x20/0x20 [ 841.247206] ? perf_event_init_task+0x1ce/0x890 [ 841.251861] ? sched_fork+0x476/0xc10 [ 841.255644] ? ktime_get_with_offset+0x2c1/0x420 [ 841.260565] ? copy_semundo+0xb5/0x320 [ 841.264436] ? SyS_semop+0x30/0x30 [ 841.267961] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 841.272961] ? __lockdep_init_map+0xe4/0x650 [ 841.277349] ? security_task_alloc+0x81/0xb0 [ 841.281747] copy_process.part.38+0x20c4/0x4bd0 [ 841.286413] ? __cleanup_sighand+0x40/0x40 [ 841.290644] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 841.295822] ? __lock_acquire+0x664/0x3e00 [ 841.300045] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 841.305220] ? environ_open+0x80/0x80 [ 841.309028] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 841.314198] ? __lock_acquire+0x664/0x3e00 [ 841.318414] ? mntput_no_expire+0x130/0xa90 [ 841.322721] ? print_irqtrace_events+0x270/0x270 [ 841.327458] ? trace_hardirqs_off+0x10/0x10 [ 841.331767] ? lock_acquire+0x1d5/0x580 [ 841.335722] ? trace_hardirqs_off+0x10/0x10 [ 841.340030] ? trace_hardirqs_off+0x10/0x10 [ 841.344338] ? __lock_acquire+0x664/0x3e00 [ 841.348554] ? check_same_owner+0x320/0x320 [ 841.352865] ? find_held_lock+0x35/0x1d0 [ 841.356913] ? _parse_integer+0xe9/0x140 [ 841.360959] ? trace_hardirqs_off+0x10/0x10 [ 841.365261] ? _parse_integer+0x140/0x140 [ 841.369395] ? trace_hardirqs_off+0x10/0x10 [ 841.373703] ? get_pid_task+0x93/0x140 [ 841.377576] ? lock_downgrade+0x980/0x980 [ 841.381713] ? find_held_lock+0x35/0x1d0 [ 841.385763] ? __f_unlock_pos+0x19/0x20 [ 841.389722] ? lock_downgrade+0x980/0x980 [ 841.394199] ? get_pid_task+0xbc/0x140 [ 841.398066] ? proc_fail_nth_write+0x9b/0x1d0 [ 841.402544] ? map_files_get_link+0x3a0/0x3a0 [ 841.407032] ? handle_mm_fault+0x35b/0xb10 [ 841.411255] _do_fork+0x1f7/0xf70 [ 841.414694] ? fork_idle+0x2d0/0x2d0 [ 841.418393] ? wait_for_completion+0x770/0x770 [ 841.422967] ? __lock_is_held+0xb6/0x140 [ 841.427294] ? __sb_end_write+0xa0/0xd0 [ 841.431264] ? fput+0xd2/0x140 [ 841.434442] ? SyS_write+0x184/0x220 [ 841.438139] ? SyS_read+0x220/0x220 [ 841.441752] SyS_clone+0x37/0x50 [ 841.445100] ? sys_vfork+0x30/0x30 [ 841.448624] do_syscall_64+0x281/0x940 [ 841.452497] ? vmalloc_sync_all+0x30/0x30 [ 841.456627] ? _raw_spin_unlock_irq+0x27/0x70 [ 841.461105] ? finish_task_switch+0x1c1/0x7e0 [ 841.465586] ? syscall_return_slowpath+0x550/0x550 [ 841.470498] ? syscall_return_slowpath+0x2ac/0x550 [ 841.475414] ? prepare_exit_to_usermode+0x350/0x350 [ 841.480415] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 841.485769] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 841.490605] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 841.495778] RIP: 0033:0x454e79 [ 841.498949] RSP: 002b:00007f935ae4bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 841.506731] RAX: ffffffffffffffda RBX: 00007f935ae4c6d4 RCX: 0000000000454e79 [ 841.514001] RDX: 00000000200008c0 RSI: 0000000020000800 RDI: 000000002000c100 2018/03/31 12:25:31 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'pids', 0x20}]}, 0x6) write$cgroup_subtree(r1, &(0x7f0000000100)={[{0x2d, 'pids', 0x20}]}, 0x6) 2018/03/31 12:25:31 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x80404532, &(0x7f0000000080)=""/43) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x4e21, 0x3, @loopback={0x0, 0x1}, 0xbea}, 0x1c) 2018/03/31 12:25:31 executing program 6: r0 = geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0, 0x0}, &(0x7f00000002c0)=0xc) chown(&(0x7f0000000100)='./file0\x00', r0, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dsp\x00', 0x400000, 0x0) ioctl$KDGKBLED(r4, 0x4b64, &(0x7f0000000480)) r5 = openat$cgroup_ro(r2, &(0x7f0000000000)='memory.events\x00', 0x0, 0x0) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000004c0)) statx(r5, &(0x7f0000000080)='./file0\x00', 0x1000, 0x80, &(0x7f0000000180)) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2b, 'pids', 0x20}]}, 0x6) syz_mount_image$reiserfs(&(0x7f0000000300)='reiserfs\x00', &(0x7f0000000340)='./file0\x00', 0x6, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000380)="aaa95ee874", 0x5, 0xfffffffffffffff8}], 0x800, &(0x7f0000000400)={[{@nolargeio='nolargeio', 0x2c}, {@notail='notail', 0x2c}, {@usrjquota='usrjquota', 0x2c}, {@hash_r5='hash=r5', 0x2c}, {@resize={'resize', 0x3d, [0x39, 0x0, 0x36]}, 0x2c}]}) 2018/03/31 12:25:31 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) [ 841.521260] RBP: 000000000072bea0 R08: 0000000020000940 R09: 0000000000000000 [ 841.528513] R10: 0000000020000900 R11: 0000000000000246 R12: 0000000000000014 [ 841.535767] R13: 0000000000000051 R14: 00000000006f2838 R15: 0000000000000005 2018/03/31 12:25:31 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x3c}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x7, 0x101000) mq_timedreceive(r1, &(0x7f0000000100)=""/81, 0x51, 0x7ff, &(0x7f0000000080)={0x77359400}) getgid() 2018/03/31 12:25:32 executing program 3: r0 = getpid() ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r1, 0x4, 0x0) getpeername$packet(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r1, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r2}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r5, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r1, &(0x7f0000000200), 0xfffffe08) [ 841.608588] IPVS: ftp: loaded support on port[0] = 21 2018/03/31 12:25:32 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000040)={0x5}, 0x1) getsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000080)={@loopback}, &(0x7f0000000100)=0x14) 2018/03/31 12:25:32 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x1, 0x40) getsockopt$nfc_llcp(r2, 0x118, 0x3, &(0x7f0000000200)=""/107, 0x6b) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'pids', 0x20}]}, 0x6) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x400, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x100, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000180)={r4}) write$cgroup_subtree(r1, &(0x7f0000000100)={[{0x2d, 'pids', 0x20}]}, 0x6) 2018/03/31 12:25:32 executing program 3: r0 = getpid() ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r1, 0x4, 0x0) getpeername$packet(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r1, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r2}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r5, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r1, &(0x7f0000000200), 0xfffffe08) [ 841.739343] QAT: Invalid ioctl [ 841.762827] QAT: Invalid ioctl 2018/03/31 12:25:32 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty, 0x2}, 0xffffff0e) 2018/03/31 12:25:32 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000380)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ipx\x00') getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}, [0x95bd, 0x1, 0x7, 0x1, 0x7, 0x1c, 0x5, 0x1ff, 0x0, 0x2, 0x2b2, 0x7fffffff, 0x2, 0x3]}, &(0x7f0000000080)=0x100) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000100)={0x743cf45e, 0x8004, 0x6, 0xffffffffffffffe0, r3}, &(0x7f00000002c0)=0x10) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'pids', 0x20}]}, 0x6) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="2d706964732064f444fa60b3764fdfb9cb3b2bad073c6d713219f044"], 0x6) 2018/03/31 12:25:32 executing program 2 (fault-call:10 fault-nth:6): r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="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", 0xfc}], 0x1, 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r2 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) ioctl$sock_ipx_SIOCAIPXPRISLT(r2, 0x89e1, &(0x7f0000000280)=0x3f) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f0000000200)={0x80, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23}, 0x0, 0x7, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000300)={r3, 0x1c9}, 0x8) r4 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e44ee") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x40, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000c40)={r3, 0x2}, &(0x7f0000000c80)=0xffffffffffffff39) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000540)=0x2, 0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000340)) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000d40)={0x7433, {{0x2, 0x4e21, @broadcast=0xffffffff}}, 0x1, 0x1, [{{0x2, 0x4e20}}]}, 0x110) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f, r3}, 0x20) 2018/03/31 12:25:32 executing program 1: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:25:32 executing program 3: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, 0x0, 0x40000005, r0, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r1, 0x4, 0x0) getpeername$packet(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r1, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r2}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r5, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r1, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:25:32 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x80, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000080)=0x4, 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f00000000c0)={0xfff, 0x9, 0x401, 'queue0\x00', 0x6}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0xfffffd74}], 0x1) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x7, 0x8000, 0x1000, 0x7d0, 0x0, 0xffffffff00000000, 0x0, 0x5, 0x9, 0x6, 0x1, 0x81, 0x5, 0x10000, 0x1, 0x7, 0xffffffffffffffff, 0xeda, 0x5, 0x0, 0x91, 0x10001, 0xffffffffffff0001, 0xc384, 0x8, 0xffffffffffffffe0, 0x0, 0x4, 0xffff, 0x80, 0x7, 0x2, 0x1, 0x0, 0x30, 0x3, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffff0f9, 0x8}, 0x20403, 0xcae, 0x9, 0x7, 0x0, 0xfff, 0x7}, r1, 0x0, r0, 0x2) 2018/03/31 12:25:32 executing program 5: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:25:32 executing program 7: socket$inet6(0xa, 0x6, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f00003fefff)=""/1, 0x1) r2 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r3, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r3, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r4}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)) r5 = dup2(r3, r4) fcntl$setown(r5, 0x8, r2) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r2, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0xe6, 0x2, {0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, 0xb64, 0x9, 0x9b, 0x5, 0xffff}}, &(0x7f0000000580)=0xb0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) [ 842.265538] FAULT_INJECTION: forcing a failure. [ 842.265538] name failslab, interval 1, probability 0, space 0, times 0 [ 842.276908] CPU: 0 PID: 21234 Comm: syz-executor2 Not tainted 4.16.0-rc7+ #373 [ 842.284291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 842.293663] Call Trace: [ 842.296265] dump_stack+0x194/0x24d [ 842.299916] ? arch_local_irq_restore+0x53/0x53 [ 842.304610] should_fail+0x8c0/0xa40 [ 842.308340] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 842.313476] ? save_stack+0xa3/0xd0 [ 842.317126] ? find_held_lock+0x35/0x1d0 [ 842.321220] ? check_same_owner+0x320/0x320 [ 842.325553] ? rcu_note_context_switch+0x710/0x710 [ 842.330499] should_failslab+0xec/0x120 [ 842.334479] kmem_cache_alloc_node_trace+0x5a/0x760 [ 842.339506] ? kasan_unpoison_shadow+0x35/0x50 [ 842.344108] __kmalloc_node+0x33/0x70 [ 842.347924] kvmalloc_node+0x99/0xd0 [ 842.351649] alloc_fdtable+0x13b/0x280 [ 842.355548] dup_fd+0x8b8/0xdf0 [ 842.358840] ? __fdget+0x20/0x20 [ 842.362217] ? perf_event_init_task+0x1ce/0x890 [ 842.366895] ? sched_fork+0x476/0xc10 [ 842.370707] ? ktime_get_with_offset+0x2c1/0x420 [ 842.375484] ? copy_semundo+0xb5/0x320 [ 842.379381] ? SyS_semop+0x30/0x30 [ 842.383027] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 842.388143] ? __lockdep_init_map+0xe4/0x650 [ 842.392561] ? security_task_alloc+0x81/0xb0 [ 842.396975] copy_process.part.38+0x20c4/0x4bd0 [ 842.401658] ? __cleanup_sighand+0x40/0x40 [ 842.405911] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 842.411112] ? __lock_acquire+0x664/0x3e00 [ 842.415359] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 842.420560] ? perf_trace_lock+0xd6/0x900 [ 842.424732] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 842.429933] ? perf_trace_lock+0xd6/0x900 [ 842.434093] ? mntput_no_expire+0x130/0xa90 [ 842.438438] ? trace_event_raw_event_lock+0x340/0x340 [ 842.443633] ? perf_trace_lock+0xd6/0x900 [ 842.447796] ? lock_acquire+0x1d5/0x580 [ 842.451789] ? trace_hardirqs_off+0x10/0x10 [ 842.456122] ? perf_trace_lock+0xd6/0x900 [ 842.460373] ? find_held_lock+0x35/0x1d0 [ 842.464460] ? perf_trace_lock+0xd6/0x900 [ 842.468617] ? trace_event_raw_event_lock+0x340/0x340 [ 842.473815] ? _parse_integer+0x140/0x140 [ 842.477974] ? trace_hardirqs_off+0x10/0x10 [ 842.482314] ? get_pid_task+0x93/0x140 [ 842.486210] ? perf_trace_lock+0xd6/0x900 [ 842.490375] ? find_held_lock+0x35/0x1d0 [ 842.494459] ? __f_unlock_pos+0x19/0x20 [ 842.498453] ? lock_downgrade+0x980/0x980 [ 842.502604] ? get_pid_task+0xbc/0x140 [ 842.506498] ? proc_fail_nth_write+0x9b/0x1d0 [ 842.511002] ? map_files_get_link+0x3a0/0x3a0 [ 842.515501] ? handle_mm_fault+0x35b/0xb10 [ 842.519742] _do_fork+0x1f7/0xf70 [ 842.523206] ? fork_idle+0x2d0/0x2d0 [ 842.526933] ? wait_for_completion+0x770/0x770 [ 842.531548] ? __sb_end_write+0xa0/0xd0 [ 842.535622] ? fput+0xd2/0x140 [ 842.538824] ? SyS_write+0x184/0x220 [ 842.542549] ? SyS_read+0x220/0x220 [ 842.546966] SyS_clone+0x37/0x50 [ 842.550338] ? sys_vfork+0x30/0x30 [ 842.553885] do_syscall_64+0x281/0x940 [ 842.557785] ? vmalloc_sync_all+0x30/0x30 [ 842.561942] ? _raw_spin_unlock_irq+0x27/0x70 [ 842.566452] ? finish_task_switch+0x1c1/0x7e0 [ 842.570959] ? syscall_return_slowpath+0x550/0x550 [ 842.575900] ? syscall_return_slowpath+0x2ac/0x550 [ 842.580841] ? prepare_exit_to_usermode+0x350/0x350 [ 842.585874] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 842.591249] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 842.596115] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 842.601308] RIP: 0033:0x454e79 [ 842.604499] RSP: 002b:00007f935ae4bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 2018/03/31 12:25:32 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000080)=0xe8) r2 = geteuid() setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback={0x0, 0x1}, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x4e22, 0x5, 0x4e23, 0xfffffffffffffffe, 0xa, 0x20, 0xa0, 0x2d, r1, r2}, {0x8, 0x2, 0xfffffffffffffff7, 0x1ff, 0x7fff, 0x81, 0x7, 0x1242c0000}, {0x3, 0x0, 0x10000, 0xd70}, 0x7ff, 0x0, 0x2, 0x1, 0x2, 0x1}, {{@in=@multicast1=0xe0000001, 0x4d3, 0x33}, 0x2, @in6=@mcast1={0xff, 0x1, [], 0x1}, 0x3505, 0x2, 0x0, 0xc6, 0xffffffffffffffff, 0xa33, 0x3}}, 0xe8) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x90000, 0x0) ioctl$KVM_GET_XSAVE(r3, 0x9000aea4, &(0x7f00000005c0)) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 2018/03/31 12:25:32 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x400000) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000040)) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x0, 0x84a02) socketpair$inet6(0xa, 0x2, 0xfffffffffffffffc, &(0x7f0000000300)) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty, 0x1}, 0x15) 2018/03/31 12:25:32 executing program 4: connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in6=@mcast1={0xff, 0x1, [], 0x1}, 0x0, 0x0, 0x0, 0x90}}, 0xfa) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x200000, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa}, 0x1c) 2018/03/31 12:25:32 executing program 4: r0 = socket$inet(0x2, 0x80003, 0xe83) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000140)=0xd4, 0x4) r1 = socket$inet6(0xa, 0x80803, 0x2f) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x7, 0x400000000000066, 0x4}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000fbb000)={r2, &(0x7f0000811000), &(0x7f0000fbbf1a)=""/230}, 0x18) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r1, &(0x7f00000000c0)={0xa}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipx\x00') ioctl$sock_netrom_SIOCGSTAMPNS(r3, 0x8907, &(0x7f0000000180)) connect(r3, &(0x7f0000000780)=@nl=@unspec, 0x80) setsockopt$RDS_RECVERR(r3, 0x114, 0x5, &(0x7f0000000100), 0x4) r4 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x5, 0x101800) ioctl$KVM_SET_XSAVE(r4, 0x5000aea5, &(0x7f00000002c0)={"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"}) open_by_handle_at(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="8d000000050000006ecd22b64fc97321af42e21805f4822ed353d85fe10539a8116edb81cac31ba19d1c5ca53d490fc9b820d76db3bbdb38ff93b7f4ba81964d02a0b506752abe01ea8b536bdfd6ac27c952c9b1be4a4757201f90ae87bc3eabcbd826596a89a013150fad2eee6f76578028b5c536fd8b08000000665b1a7e852e0b83ef56c0045a4a852e2fdf6ffe4b575f6538133dc73e9cb6ac000000000000007f38d71bfbbc329954df0222fed6c9a94ffa6be2b785a27bcc297b14908cb43acff8150492008322eab046d677bcd9dea0d4694e7355cf8b2ce47c139f44ff91fd7ed4d6619613d2ee66e08afbf2a0ee3144e4263e30cd59170b441e537efc4b950835b538e5c7ba89136a0ded38b4a2dd970e7ab443935d2395a08a56b5df9da90b18e460d6e18ed274b2e7149d9dd3121dd9601e18dd8a18b1b3ef7bc8888d6f3f3a4bbdeb7b4956f024e06015187da5fb0ad21a5d86b8b78e29d577d532f6d2f0e4bb8211cb4a109f729041111285b001506d25e5b717ec42c0abb12aa5128a7d1c56e41cf376bedc0c228370245efe4e5a48de4c9fdaa18851ad1b06b7a611cd3c"], 0x8000) 2018/03/31 12:25:32 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {0x3}, 0x4, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x4d3, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x4, 0x0, 0x90}}, 0xe8) r1 = request_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000180)='.%/\x00', 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, r1) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x1000000000000000}, 0x1c) 2018/03/31 12:25:32 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000740)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in6, 0x0, 0x0, 0x0, 0x90}}, 0xe8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x1ff) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000780), &(0x7f00000007c0)=0xb) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) sendmsg(r0, &(0x7f0000000180)={&(0x7f0000000100)=@ax25={0x3, {"79f3662b99fd2f"}, 0xc0}, 0x80, &(0x7f00000006c0)=[{&(0x7f00000002c0)="3eb0cdd2d3b8c317446be4352f3fdb72dfef513316394a417c784c3febc5a46e4dd383d8a7cd103baeba83ff9270a19dc80a15ed9a6b5d25ae20bf308189dc302ad86b8c41d2157271cc2fa18166167b84315630d3b21ab75adcbb75506666f1e29135dd423e21ff305e760bae31fd6a1366e7f309b8524080a7ebe9b9332114078d815012474c44127626b8624a2d0fc44039a36149aa2635019399b7cd754fc0b330f0c817665eab4a577238c0b51bfafab784c2b17141918b486d5f610e955d1f981780c8588d53a08c", 0xcb}, {&(0x7f00000003c0)="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", 0xfa}, {&(0x7f00000004c0)="f5164cb0046a50bf4ecca75087138f1655576e62fc013fc8768f628ad9bb03708c1b1e39c826f8cb564c417cc3aa87245a45b683f0a8b3461ffcda48200995992b02bc7be4bcff2005ca8826c3aeef5ebe0f14b0ec8ff5c303957248f343834df0ff92ea6987c216a341e5f12d982d4113a6b329a65537a57abc4e2dc2c24b29af3c2b7be2f5f5ade8547af4aadc71209914a40aa15fe6665e1bc401da71c7344721c4f70a6386401876330bc46a1fb7e4fadd9a9863ae4447d49688a6347b0557a6c718a41eeaeb3a83121e9b4005e590f23a874b995f4aedb8b40b7d71fcd91e65", 0xe2}, {&(0x7f0000000080)="e0684c7bbcd92fdf34d68094042ec11d5fa7fe61cc7c420eec69cf1782d3ff3f16b4a159695198b5f1464c65cedfcf80d218", 0x32}, {&(0x7f00000005c0)="419fdeef9dcb25063d0db9b98f0bc57f0219f1ac3400f0040326d3ebaf18e7acfb461459e32155d17bcd7e76390ca2aefda4bf8bb9629b21e199611e8979191eb81d4a507e51028fea6709ca4827b37a86980e2f475b493528c584287966f31705ceb0cd402a6bec6ead4b04c5c0b19dc2f1f399e392b9c59f1848bdf5bfc3428fb5609eeccbedf1616a4ab1f66ef87e2f3732b60d1b855735338e63871c8a9e153164d35879b98868e5dda6f74c4cb15a5e0a62ea56fa8075ba4302945ea113cc31fe7fffac4cc8a3edf6cf2f012aa83b36cf0d8f47d4e86ed69414d8", 0xdd}], 0x5, &(0x7f0000002a40)=ANY=[@ANYBLOB="10100000000000001901000000000000d922b77fd06afb5088133cdb373d774b2ad58061f7da38d11b8fb20cb6170e1fcc4d38b5449a9e507a07dd7aaabbe9a709d8a781d9716edb2f3310d2ec49aa75bb1e88077faf86accb117ef89b2c1c228ae6c9042c8e003dfa42c557774591372d496689d93968eb606ed1640e6857e658c905cb87f02a0ae822e7eb4accd55146fe4c4e72324963474b7377c84ec53224313cad7807d19a9c3a14a2792ce5c75b942d79f4dfc80d17db244ddc2aab01761a3641eb32fc14a17f25f991687656c71df7ea4a322ddffb22916b86bacd2e1b0f84fc2ef1c76ea98ccc25367faabca13525f88a0b89684625a95b70cde6dc48f7972e156789c40037aa7f577b1b0a32ce9f775e724705cb9a17c4a12a53356273ba1b2e14b2cfe710b971563c951e1343799f4be314bbe43a2bf2129ba801595498d2158f87570486854f7683da4ecb3bb810ce552d480b0e68e752804dd837d97d2f06e17c03efd9fde7c8b2aeef21cafc7ea686f752d5b0330ba3dd137007ad1b7efbb77a08c9500b9d8914a565a01259109106f243fb9457e7dc4fd0fb2431ad64361e2e9078a12e95cc9aca92b09b6b494f2705755927f3773e9a0d7e297a1da7931397e6576859754f6b14130a40625ef466b89422d0c78143c7913bdbf0975ede6138fc90c863bcd772297a7a20d444aeccb3b961426f5fdefb1ec3055e2ae5bbcd9a3fc9e5127548622e5026faee06279497c0f7b645c605aeb04f999656bb02fd8778699ef2907e29923912096a0767df6f10da49fb0f6bd7b24f6115d8d7405fb046ba6339d83fda3e95f728839afdbecabd261215cc235ff2b1e2df14ea3f5dedbb9b6490db568d0526fbee584d9a013204162bb4352540fed9c4a22bf458df5813e187bcea23b2fcdfbd3f635f189908f50fa7cab55872bcae3d4893338100e221770c66443186c48b19ad392d14bccbf9a1f79ac9c2e9bc547979a097d7506400b81e7f6bbccfd13bc78f03f7e0fbfff85429cc67dda7526ddd100cea4e1e71a0b70abb124e1818d73a283e099028c58047033f2b0a9ca44eabb7cd4d4c7f6650f376e5e88bc4c37a5732d81fc484dab21aed32ee9ff464a46b5d3bda3823a838401db0d62f7b05786d9181a0ed30dd839bfb0a784b4b58ae48960599f82e4d189ca76e328f16935485870e62e2cac7f66c63beaaa525b7868d8e5799018682caf5d1916d483f6a257f8156735c8662b855b3293205aac3689ab60986624cd11a15cf9c0b72ba5e111d3d4277d76d9b3c4e0d7acf85cbb35533561278eea0f00c7b95f6413932c087eaf6586188af48ed30dff4b9c47e5efc6596dd3f0f90c0bbd39fdf637c70d8de1f75f7471ecfa23ab0ec292348cf3fd9e8e30dfeae5b03c84860c6567c820cf37f36219df041626c350ff197611e143d09e78d7428beb83e2176980cc6d42f55ea16001d7451f4bf78e7ee23829843edf575da6b335c6a311b7362825ab4086ee5cdbb2f40f0b8cb09079ef49dc0b6e06804ef5f02262c6d4bfeb7e1eb74c6d3ce1cdbb365abe8af5b0c064d2eaed998b3b06cc92f7d0990dc7ed9070dd376dd807b947f2d99477a813a97961cf98e04bbd53c5970e4ffcc574843a75b98e3d57204bd7166d25dab6411df08e2250ac027f51582d687b355a087e5b9aac461ab7eb7f00f37b95e171f91611aa12be4a366ffe098bf756ae452c1bb4b47caa55aebbde477414295d7e687d404a37a4a9d814a69502676e284c16dd64cd544affd194c422698b750137013151ec83831493b136aa39dd263da799c53231d26aa2dea4215a131f3b75a35bb3f5af58329a8cf8aaed76dd952acdef752aaf354d30a7cf86cba673354bf5ae7db3f2aad21e57ff1b80a4eb1916fd5c51aed0cb697f009a70e7f88c8a674708b2ac27e90c3728a9c692732ccfcdb2640f49212f12830cb8bd0314e0930247e0f6d78fc7178e13bbb56cda2d6d187973210c6112171fc953c762a894d679ac861c18ff3b4462b6c779db5a0b3ebfa52d3436e1e76798f483557f74d9e7e1fb95f328adf614bee3ad650f295b98453e8b0feaa5a0c516324bd723c1f222ebf977bf3c0f50a333f10f54347c4125caba7839346bf028c67dbc3c241bdc1b330913c3d5b18899ae3542bc531c788c3cca867544f5189c01c3f9475f252e6c093b96d5617a17c220fc4c7822432f2ae8bf9141ebccbcd61481ec7d2cca610130298081a9a7a332dbcee8af71b166bfc9d1f213e57c236a0a11ca18ea84bb01ec77fc75d7b0b20f3a0d8961c363e4006c7ea0997f096aee6ad888abadd79278c74c31464772b55de1da5a5f6048db93b4b98e192c82c04e05daff6eb96bd5aa2db8f3526ae87c802da01849c7951b5bab3998043ac04b9871548472b0361886346065921711cf80e2c3fb4ff8775572f5a9e9266405e553fcc6acf557e8bdc33068e80471aa3e9100c386117e3211eee8507db234f59d9e0a544cd66aa1921bdc1bc868c766cc9c3b35df04698c9701753b877f5e7207934199a453afcea25a0e35d0a82f67b362c271b202d3468bdcb125475b99ee247d70ecda93fc367c8c99512ce19c236166be3938817f8438994d5706f54f0df2a30460930b08fd2667e6cb03540068ff480dcb586442c7baf8a9863d2ea7aa2b64edee3ee374e29f69b3c832a648d73bf57b538376228b7cbd36a6c15bf57cbff605b1612605d37e27896337321bc754ee9604e670139484fca78a0a92233641eb90b810f042441f72a2b3ec442c13dc72b11b2b16e5ecf5d648a86faeb33634528dab710e54d90a57bad6a0b0b62b1d6377a88c19cf8555d64ca389f47593c15e5a548af8ca03188b8b6e7c86a16039f044c1de282065e041b109400f5abece5590be8b4e894374790d1b2ea01d5486b686fefeb38d0b66e7989945cb4dc02cc9951e48d5d4c57977c628e4836aea81587e70311f003d5c3737019a615d9c5c27e46a655c9d5baf7b92611adca6d7a790d8572ce627818963227d3058592905010c0712a7997133c424406b9ea8cf7c5c513a565136a40d8819551a2e6305bd508757d0a040938cace6c7287b0398af9bc4ee50e2d76c9337f98b771cae3f316ef0501dd104dea67164a3ffd252e5458bf91a19e45426548bf1435d6b4d8702374b49c6c8fe8855bd2279eea7217894263ce7fae147306ccf0138efcd437679234e67173575a53f838f3005f4dce223eefe62ae428dd56eb3b52362a756ed08bb44c9448e5e48fc14a2169b57111a3fb1199bfe83b5eeb66a22e63192a602a8838d33e456ac4adea750709db7658c512d8d2b2fb717e6a451c843eb2978f8789baccb46abb0925938430f7a51c81a28876db36ecee9245d14b729d0795ebe6af92a8cbadcb4c9db979903255fb00c8bc772be09e5fe154de4e97b9bf57cdd4ced393bce5287a32096e94636a641c46c6b89bfd94034892cda03fdbc7778f63bb40c57f969e00dd479f2fcef7785ad774f2a48c460a8bfc74007a1d2a78c7e4a336a280d9ec6f390084433e99642898c7d9acecfe9446b459c63e3c5d413e16e99d7ae1df0c4b557f622487afb8498550f2834d72ada0a91e70d99c2392b2eddb4a71f62e0969d580177a1678ecb236fb9d66fe03a6b541f34bd11c55e9d457ccd5c9a9a535cc0367130d3a6f7cdc366102c094db3ec02111b5ada75035b36dabb821813f9ca20623fc044da9c89b2e8cd6d7ae3771190e41a31930ec510967fc935f901f8125dad6a2fe5d9fdcde574e1e8294037d81bb17420dece732fecc610e5cb93eeab678d141dddfef6e00e25bb5d6a4ade8fe3da57a873a794329dfc40c5ff0c769be3f4cf4b2eca634f1097140b294e10eb797106f7334538908aae83464cf05dd1dc73fb9063307b66f8caab6dc0893432c47ba95d6e525c9bffea03d56b7f007cc1183c538c5ed97cc37d23882880e56d57ed4181a955293ab5f7556f4615dbf9708c068afd6c152e70bac6dec0f3b716eb294944c51cb515cd6aab039d38deb2b11131aeabb8e6c7216ba9b5477bd183c99f47ba2090ea6e36f6b487434ec3591b85a05b50df41f57f25d92e206a91cf28e4275332fc3189926e3d96a20941b00da58620ccea1fdf40478955347cb7d6c8c7d05061787ff07668f215dc8fec82b6b301f4be9633ff711a534c0572abc55fc95567f8f777ef68a9d286a415fb70e91c2d6712d57fae6b156a0434cdf5aaf908abe92b981911ba19c190c5f5f2eac7011a0a2c9305451c5221415022fe731fb16d672c68bd48b3e5f3d73c1310d7636b54ef9404a421085b73b3aeaba38999ab1c2a1003d7dfb877898b719270f341d1e04e6120dac6b1f521ae23a6be9bc0c083a85da4e89378a414fedc5fcaaaa6f37d7d3e5b6f4ea24af579c3767d4a084d7525748fdcc825cb4347c3483096ebbfb180252c1582c3461ef96e6e18cdfaf2834a1d99fa70c323cce88100f13f173a5bd8cac1c764e95c34ad76dc64a5df3262a7f61b87654c0d9423ff87d9881d4a08a3f7594643669694fb63806bee93d20dec69c1e17ada3c9c6b500f4cdc278f89aa3285812ad836175d6a2b278c54f34db065d7e6061e345b53062cd05348532891b31965fe869bf1ead0fdde0eac4b21f8d8afb2f20b3d37ecd53ede660023cf4b662348cb7e7f436e120aa2f4b1cb03d8972847321d592162c02547978e68e63af47352f866cc82b2c9927dea6448c9238399c15575354b6eae81788b1fbc50e6e8d90be15e1411e58800928f264050dbcf8af75f28a61050e8d3e34e5234a101844dfca04559436bd8b8b598842d316ae54e56db8a28a5550f3a679949f18d80a632c86b2b99f29dec4827dc68608f20f57fd784df845fc1d6559f25b700e11e50ecd2a8d0f5c2ebafd11b931754f42944e1c77d3a2b1dd83a26d97774442d6ebbbbb76090a35abcd5f1ce75b05ee2bc96741f138915ccb956abdb2531eb141aaa75b7264da7898fcfce03991b28a39a0a3319ec6788b1ce6acd7084b1ae3fe08f1c9f240c6e794d6f81042e2f558bc832de12b17540f5f7741d7b8c00ef2226ae06d6b257775d6620c5c040903a5201d31d950d02285d48b8cc7d44eb7e52f5b698deddb79676ab919cf4984c8d238d4fa621cfd751fb4e0898d7f5fa8b3fe4d073abffbaac69cf0c9c6d8ce97e5eb1155c2da517ded4c4fe49abf76a646ba28bb01508d0abc6d90bcdd63859dda9db259ed6311f4098ceeda6f2dedfd5ddbd8c54be89cfc50e2348539f97733c36559e3db50874143d8633e067f752d8e529455a749ab359147c3652e4d479f78e4b08b62c7a846d9bebcdc730e5a01c27ad8e5dd8f86fcdb34395cb51ba67a4831a2621eb0333e1db8917995610e313dcaaf350867082fc74155ec6ac1456cf9a99b27087796098d9d94cac6d2bbdb8ffce5dc3f8eae78c9e50129b99d08f5e9f87fe841ce4e6a2da5392f11918a3c8cc051b491c2ba904132e3686cb19801d773b95698aea1aef735bea7002f4cc0bc899a09861903f1ac01d58bb8d99b0fe53d71d27b5c948dc0f39e45423ebe5cfb95334685494719a81ae577c3410303387ff4c4d159a4e2c1a655a7448f5f4bab482a431803455213610cf8036192f20a1ad4873a3e72fe025e6f72b91e1cc144dbaa39addfa51c780163ee978ec249443da779c35feb368be23b6adec3ed5f778348dc121581476fb8823f5a399462f3d2d1d55e2a88ccf9f99a924f108bb48c2e3f708dabbf8f6dd7b5a233c7d75d73d119cbacdb09b90c4be3101000000000000000000000010000009d1182cbb55afdb1b121d8a907596426ce781f0b435f50bfdc0dbbba36949fdb5ba6a9c70329a21969a24415752d648352573a45ad27debb71b8cc7c00df648349d9758942cd2ecee9e325a57d40b67b349d6e12512442ad4479e78d314f1ede3da0d40a6423fffa494b42637d18c60c96556ccced33a6ad4c12f9e93293e982b2acd20b4d7bc025f0c857318380428d5f15796406f3ea9a77620945f158210f4736e8399af327364b87b602ad55306d14ff5d9368c8e5fdae0d3509036cf8a9ca516aa7a41b9e19cd6460c7fd29dd353f230a8ad45d92f16c47eaeb866a06c7dcf137f23ecb971dbefb27d8af2d7ed38cc6444e1ae5111ac114ed0368d016bb22a9f566b00827c01558119b01d0b11210cc817f6cf270c81e46585b89723670bf0c239a23df3f42b55475fb407dbb05da828703ebd9f6be8b8fe4c67f94a3377a77d381df25626cea5a8702870214497db725c6269b076cfadfe20226d698f4a1a4beb5a1621cf60ae21538f8524efc4a4c6ed185b1375fad8c0b01b09d53108bd487ce24cfcc58cf50e6adffd19c135ee413d05cecea8230545aca400b22c0543c8914ba1d89c9a762072566dc7ea2731372ee83622a9d6bdcc4a82c38386a740ae4b197e09bb5b65b1805ad4e40a93fb1106d88f831ca026e332b4ef9c2e2a92caf0c10286cf53884751debe1559653fe3a410d1253d25b31f92a361e9f37f2a9888829c51fbffa67306604cbbfad4ae5f239a35782eb1f008f9c7d3d3b90d5fd2cf902b4ce82de9f8dc7130cb191aa546e166cf5b59d6d3e216ef4da100b16663713312b49846a4a1e529e3436d7fe52d54753f9f10f48f414944e6bc5992c843f67ab8bf1a57e7cab985d23884915794ec60e0689ea6e29ed599748122b0a0606a465258c930557530f2b52b6bcb3d0e9fdfc89521faf0a9693d5de8d0ecc2b6013b0c06f335ba6dd9d986fda0ca379e107547199be661575594aa989c31c5ba0a43ea140683d40e628cc2c3382b5b76e61c95eed320b2228063954fb8cbb389b4301727ae377d57a80a70e1eb3ab005e328d52b5cb0bb1e97c10d57bcdf85c432b992f219b08436a931d5e54ebbfa8ab36dd5a3234be57fa992eeac96dbb7feef6a59c004c3c89a833b71b5709f436c52a22dfe90ea6e8296225a6fd1dd8e147ace2041274999516d09b72ae9cd15ab551f943460b99574d8722b4f05980f3b8854f7ab906685a901664ff7dd566ad03ac5a1b5310ebd6d8350a94944755391471a64d483f3fe3252ed6534eedad9209f17d5ce41722ea1dd2a3cf8931348651c9235ff63c7a370c1e95ea280bc5f1f186afb72d6a133ea9037430637cb1622e83697167a3a07c4e6dab99a6d40f8a2c26557500eef4494197c51f3cbf563d86923096b6bd83f2cf27d8d6675970cf09f72febf4aa37d2a0bb8ccace73f035151950161c5d2e13d750588f78efe06a4bc68dc4cc8d77cdec97cc56c8c9f5a35a43177910e88fd75da8e76f93081fcbec77eed76603bb70b5f62d7afe0035a443d6528fd522921c0515437b3c511b122354bf36d66da592bf4def3baaa1455ae2df1619034072c9be5152e2623a3e732c5bddd266d807f7f60d54a08f53d393a70560299e31af799eeb41bb253f9cc45081675cebb67d61521908e75e6453e5a53b1dc7e14e62413cbc07daa687830acea5c2146e3f318ecb5a895a84548f05599c12a15dace7bed60627fc7a79f500293d8af35cd6cd8ed6e5b5bec4b0da152f924ce208064548586ce97cdcef8f3f3b821c82b666c71985a50565e43385d1e3b9b89e1f4f51156f382a67d772edd23c6a8aead48372a36c22f9e252944b810e8968ce2c0acd5ef5b8c3ffd87e80630523a104ab1c0bb7de97fde2fb4e41ba0eeee968baddd835f15c054c2eaa0194d7d028085be0d47c9816eabf4835ad5f3dbc84e1d1dfb10f26dcab4426694af190c039494dc2986c62ec3c1b4f1dba2c69d2f7de1fa262af2bae29aba9838999bdcae54a37451ad9dbc3923fd9fe21e371328579d0844b9431ed8bb78330bf08369f7f63d27aa5b0c85f71f833277b3b901e207b1ad799c1a5305a0630ea0192b1b3b866b14883bff3e19abc44d0b20a72cf8ad2329cbaf2bcad3904ab7242e407adef30fa2af1631bfc3c73ad1076e0095ee112bf309dd3381a8f2d70aa2576589271e508328efa18e3698de388d41c56a6dcf28e75ffc01018bba0b7621f77a864ff69bc21540ff5bbd800be2fbc06f635ba57c12f0edadfb66d653c6c1e4bb23dd9dd13f2af78f07d27d4bf1fdf16ad27e745658af3acccf1a563af29a0f926cb81506e49ac9ea6f333740d1c0da434a8394a31dd99f6154a5ccf246fe8a6a358a95ee1da1217a6582827acdf28cd6f1059ba6dca611fee1e3ecf90f410453730695ce775170ae121293558c98ba2e84db982a4444364021a41d332729aa7966ef0865421ce8fcff9d0e959037ea99812dd579760c121ab349cc0fce095028bd92c7689b0fd0c0cc5949869fe57e8202475d07e5c6b2e1f22d6e2fa301b4485cb725051f1bf682ec1751381ffb07e136a33ce92f0f0650040e0e306d988fe59e09938c85c04d5a6c6d6805092774f0af447086f0169ad7cdf37b4ef4d6ef78912b870be88499380e51b5299c13d01056adcf82d64071fb11be5fe46adf11b813812bcc8d82d60cec6d4f8f8faaaaf838e99ad5a3ca8a2576af20bf38e7f12c8d6ace5663c95778d122c571e662af7958dc1643cba100374aba457d1ad73ff9d9819b59b4147fa35d9de87043e544e02bb113b3c99853ee78d654f9fa3ba1c62229606453cb1a6503e3691f0ec9e047a8e4c0f28b7d1fa3ef8a5796de39d3b737e5c149cb23a9ce53d7475be1ec306351152fcfad4442ffa987d17c928078d889f87474a240c348e911a090a766bab62a6478d27ebb3649889c7a5fe83926131ccd0e41615afe3469bfd24b4b8e3facde4b3ccd5834fc183e0cb81f293767ffcf9254133616584a9b852e4c4662e77566a2578a05b5c81ae10128cfcbe3795937650e52abc5e20031aa8c9861bc948c25d2aa032c8993e788a668b5a1872521482f756cfaf4b9e5e2f6ab13baf957548822d6e147517742efa7768c33cb1dc356e6ad457ec3301819b7f6476b0c4212785dd7e3f8fed14ebdb3c8db0a5387a1a830c8084e9372c311a01736bac47efc49c6cc8e3de33c7f0ad0e5b01d993425d24ec2ee93bce7753671f515895b00c4ccc38c9dffed128bb230d046acf63fb369e6e3a7111de255123ced6e155caefdb41222c8c8d880f4ed0644d7ca51e0219532c9caff67b825e697221a97d2c2a740e236845d8375b18e35bfa0449ba6fd4f95a3c7cd28f5b8617793480497b97a371c9a49e9f9085a77f9b4d15e0aab443c9ba776960c38b422423948cad3c4b00c645e2d51b215f61e3feaea20f1923295c95f3fd369e3f054e0ab71dd2677c475b8a6758395cc87d95e35afea9a71e8801f3ebf75d0998594a4d1129013db746116798395f0be41c6699c61168cc455a3941a5576d05000000d434875b54bb09b33067bd2c8c8f962326f402ebbf10c57182d3057856c0da1d042dc12bd128d01e8828e9fa3f4323f7bef1ffcc944ea46582d40b26f8070199ab1243be1d65b748d9abd4f750c5b2b6726d799b712c12724867693e34d94d8562553a1ba998906662555381f0b97a03e2e00446b89fa8d023c01a7f741c998c591a19c84ff08127f65511c10289f3032e425c88d704372bb913c8abd31e16c289a5c3818b0d5a8a57e2621cc45c1409c922181e0f6e17d0ab5cf884fe68fa5f08b267860ae708dd286a774cf72120d0d0fc4a945164756c9dbdc9bdbe0580d07aa8c02d21fe89ad79944754dfb7a86cd649cf6197d12e96f69254987f0ffec43020e2dbb18fa285da736df0ac6746414b2e4df9ae693d010a001609cbeabe00d461a497610792f3e096481ded84bb5286c869730707973af3e0141cfbc0dea25c34a2c3edbbd382e4c263f93be3e33e265bb77b3938e8c3c95e940b2381e0b42ade19c18b36c97e3b2b469c0525865be0632fce5d07bc7d944c9022f843209a553b76b553056ce19a03beeca82f40a691c4e97dc3868eef616867efe653adc1d910972677b3455a5745a151ba21ee7b0f054ae183a461862606d8dd9f23c5872a739f4449837d3b38f0342fdf174b565a0cfc22f5dee1631aa53d06a77e3899045046c62cf5d63f103b5c594265841b1d90886be165c74424e3f40bdf21dbcc0063f70bad97977378ccad76f7e1f2fd73d230fbfedaeb3878d7a90b30b1b650f86901b476f5c4c868623972d14880a15ad30b4bb6e90886dfd7f451b537ce0863b0caa72a4d18ffd32c3f2001172778696d9d6f0847f515273b2f53b515a4b773aeb70c3642eb192b868a209ab9a506a82ccad8d150a74b5240a49d5cdf438b88a28e01f62d2545a67e46cf651b3bde8b54080b04f76aefb5a52ab6f3aac9ebb8d48207e37bce679a355fb7b5990a1f2e53ab09538a258dc1c084d62b07a750d04920f47a140ac3db7a88c9971a27a8672fba58e4f253a1fb5370a94c78a3a57073d54b127705d7b82b6740909b8267db61d81dca63208f52d9e7307758270ec0e11113783cf01e268700b967f42aa5ee1882067ac46842d07151acdef241fbafdb583ae306b814a3ef23a12d5082864d43fe5218ec616186311ff7785118fb4a1b002d4a3f97821a262cd3095db2a5523212627958e30f9127c4bf2f00dc57984b484efeabcccf88952cdbbbfc57efe6c0a765757443f51a4190560b59ba7a684dc32be0634387e29b5e91221832c954f21595088e681825bb9a418f44be97132e17f5c6d77a4fb1199e659ad6e8f047704fbc3fcc3f97c62f418238954d34fe4814363f1d0860b9085d89fbb26387b300177efb37929f0f6c9c800cb8b47ce4dee50d5d51d3eda4ba3f18d98c1f346959f099d2a166673f201b4d943d5c5c77738850d010bd78d5f42ba15166d337130ac395b8dac31725ff659fdc2d7c55188e5dcb89f7ffa13304a130c429499b07abfe4e19c469d2bae1f6cb1f65ea86d793092a47ef2b729de28b615dfd6c368bd286e2921184bc660e310cf5e42ab309493ebffa10cc5cdc3f9ebca022fd5029c8474729eae345a732a15d8d714d5059e7741e5a3a3cac5753b4619e8bfa154d73997a15e9ea225fd7ec14d8f12095791e9a40e3218d3c4465dc9c59b7bc2705b09d203dbceda28be16d547b3e8e5b9efe7c86ff2ae56a1e5150dc3bde9cf660c921e587e6685ba15ea5ba693f3eec2942010eac207c381e563b019c489740d1ece9e905c8408993ce7033c2a278d709ec60d314a009019d9ed7d0e79e5d8baf237cdcdaf69e7f3959ca57a9f9b6a48134ff3da9c39d9e91adc8fcba04d5e485d2e742bddc98fbf4a3aeeda967ceba0fddf710c51f9b22fe21218766a1ccc6e8afb1d48d687e7e4b841202b9840b2d179ce6ff1e8230aa4366c89900208a19cc8b4fb88362539ccd2dec7caee21dad2b82032a4de1ff8635cbd4cead0ff89a9457398d0abc9cc2de774b2cb3b78645304ea1e3b9ad6c04488babf6728b9672c88b801399c6301f6409240b9c350e54734eff9bcb0a8c7638b7bc2850d22e741c4664f2fa432000acaea75b35f558054324f50249ca6e4bf600efc7d29b0892df3fd70a9d1539a2f4b898cb455bdfaa6ee9e2b0c17f17f2a331330b09ab92bf4859a89f9f5338cf31df20106635d25cd4c35abbf9e357578796e3c678000000000000000f01000000040000ad0b2d2ed4b46e81b9c26ae0459391ca3db534bb877ac99c3813ff76c9b22c86da42196fb6c5c2fd4339700081e44be05472772664688dbc1f38db319ed9e19956a9a806a5c67c75a2a72956d8b0830387a16e5db0a6f87d255829d11cefb7b4b9682c000000000098000000000000003a000000f7ffffff7c352e39a569d8a82a20ee1217b63133f43d69d2137a97a0db9c3ea0bb064a7a2466230c5f02c5c52e9986381dba952885ae5033a9d9144a9a9d23875b9164be2c37ef7854611046e7300ba679dc9e0aeb33edce22e314c8b9f23182b17a80bb2b2b517d07d055f1830182e55b0b09206cae21a2d31085af4a970631bec4dfa7ca00000000000000f8000000000000001601000001040000a2613ef8b52d504d0548f9aaaca7a75f1bf2748104472fcb1c4baf52a6ab53e50ed41b5e0b26677e2af2a0a62474d38a6abb2e247919ea5654224ead66b64cda7883ca19ae3cced05d1f313d533719db6276802a0371a5c0a99c61fb758f6b14b5497ef82a505c071874b28c02503a963c8ad9b2db8ab3fc95005e7e7fdf720fe9fbb37abeb86c922d354e06aefeb54fb625e8ac38db1398c065b50a2b0bbfcedd7802f0394b7e74a74c46b2bb21e5e309843586fe7da8c2599237b7df951e6e7bc8f9cef09f8ec4fd6e753bf51abf58b857373659cdd987535065f90d328d190ddbd9e984b145755495683a9c127426fcf61d3b885b146525c7be903f317029bdb2e8ffcd1473dea38a5f03992a508b277f2270c07245bdcfda52b09202d8ddde89d7d606328e17c5248c583246592f2a56236556d4ffa68086332ce6d7d6d0b5adc68c791aecc3c2651bcb4a4078bf934498ee7f61575bca5025f1e41dd51fe95486e1e09c8e31507b92553f80da1536085d3482e47051e1ffa45f97fc246c24719f"], 0x2228, 0x4008804}, 0x4000805) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000800)={0x0, 0x0, 0x0}, &(0x7f0000000840)=0xc) ioctl$TUNSETGROUP(r1, 0x400454ce, r2) 2018/03/31 12:25:33 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x6) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)={[{0x2d, 'pids', 0x20}]}, 0x6) [ 842.612211] RAX: ffffffffffffffda RBX: 00007f935ae4c6d4 RCX: 0000000000454e79 [ 842.619481] RDX: 00000000200008c0 RSI: 0000000020000800 RDI: 000000002000c100 [ 842.626756] RBP: 000000000072bea0 R08: 0000000020000940 R09: 0000000000000000 [ 842.634027] R10: 0000000020000900 R11: 0000000000000246 R12: 0000000000000014 [ 842.641304] R13: 0000000000000051 R14: 00000000006f2838 R15: 0000000000000006 2018/03/31 12:25:33 executing program 3: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, 0x0, 0x40000005, r0, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r1, 0x4, 0x0) getpeername$packet(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r1, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r2}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r5, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r1, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:25:33 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) r1 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0xdd, 0x101000) openat$cgroup_int(r1, &(0x7f0000000140)='cpuset.cpus\x00', 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) r2 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xd42, 0x40000) ioctl$KDGKBMETA(r2, 0x4b62, &(0x7f0000000080)) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xfffffffffffffdae) 2018/03/31 12:25:33 executing program 6: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x80001, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x40) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x92b, 0x10, 0x1, r1}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(&(0x7f0000223000)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000cd9ff4)='/dev/rfkill\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) dup3(r5, r4, 0x0) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2b, 'pids', 0x20}]}, 0x6) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1) write$cgroup_subtree(r3, &(0x7f0000000100)={[{0x2d, 'pids', 0x20}]}, 0x6) epoll_wait(r2, &(0x7f0000000000)=[{}], 0x1, 0x0) 2018/03/31 12:25:33 executing program 3: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, 0x0, 0x40000005, r0, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r1, 0x4, 0x0) getpeername$packet(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r1, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r2}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r5, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r1, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:25:33 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x80, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000080)=0x4, 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f00000000c0)={0xfff, 0x9, 0x401, 'queue0\x00', 0x6}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0xfffffd74}], 0x1) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x7, 0x8000, 0x1000, 0x7d0, 0x0, 0xffffffff00000000, 0x0, 0x5, 0x9, 0x6, 0x1, 0x81, 0x5, 0x10000, 0x1, 0x7, 0xffffffffffffffff, 0xeda, 0x5, 0x0, 0x91, 0x10001, 0xffffffffffff0001, 0xc384, 0x8, 0xffffffffffffffe0, 0x0, 0x4, 0xffff, 0x80, 0x7, 0x2, 0x1, 0x0, 0x30, 0x3, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffff0f9, 0x8}, 0x20403, 0xcae, 0x9, 0x7, 0x0, 0xfff, 0x7}, r1, 0x0, r0, 0x2) 2018/03/31 12:25:33 executing program 1: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:25:33 executing program 7: socket$inet6(0xa, 0x6, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f00003fefff)=""/1, 0x1) r2 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r3, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r3, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r4}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)) r5 = dup2(r3, r4) fcntl$setown(r5, 0x8, r2) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r2, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0xe6, 0x2, {0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, 0xb64, 0x9, 0x9b, 0x5, 0xffff}}, &(0x7f0000000580)=0xb0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:25:33 executing program 2 (fault-call:10 fault-nth:7): r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="84d5aef1603cb020c5b219faa757913ec85ee74a155e1d635566777b78600bc65bf01ce33de9a6bc3a2041890df0926f2cfc2a7d63690f6b55610593773041755f61b034e3a62a770855b2c0481df219efbfa8ffd0c665434a1de026bcfb654d597ef77a7b231aa9efe45c53811c7591d56f69e9c6231e6da993bbd2a6133805be0c18ba114cfe865e693024a56c3331b93c03e25927a504d27acebf7eecd33d7c69359e3ca37dc546c4fc5bc62596a94cdc00f9b973616a9d2ebad2d9b3e60261ae73b8397694e1f0851475b4236fb47989e6bfd1ad926a01523df3f689dc2603a76b5fc5e023d5449d066d424d1001fee5d653c21fdb751e95ff2b", 0xfc}], 0x1, 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r2 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) ioctl$sock_ipx_SIOCAIPXPRISLT(r2, 0x89e1, &(0x7f0000000280)=0x3f) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f0000000200)={0x80, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23}, 0x0, 0x7, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000300)={r3, 0x1c9}, 0x8) r4 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e44ee") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x40, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000c40)={r3, 0x2}, &(0x7f0000000c80)=0xffffffffffffff39) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000540)=0x2, 0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000340)) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000d40)={0x7433, {{0x2, 0x4e21, @broadcast=0xffffffff}}, 0x1, 0x1, [{{0x2, 0x4e20}}]}, 0x110) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f, r3}, 0x20) 2018/03/31 12:25:33 executing program 5: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) [ 843.352975] FAULT_INJECTION: forcing a failure. [ 843.352975] name failslab, interval 1, probability 0, space 0, times 0 [ 843.364297] CPU: 1 PID: 21303 Comm: syz-executor2 Not tainted 4.16.0-rc7+ #373 [ 843.371671] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 843.381062] Call Trace: [ 843.381086] dump_stack+0x194/0x24d [ 843.381102] ? arch_local_irq_restore+0x53/0x53 [ 843.391989] should_fail+0x8c0/0xa40 [ 843.395730] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 843.400860] ? lock_release+0xa40/0xa40 [ 843.404857] ? find_held_lock+0x35/0x1d0 [ 843.408942] ? check_same_owner+0x320/0x320 [ 843.413277] ? rcu_note_context_switch+0x710/0x710 [ 843.418203] ? perf_event_init_task+0x1ce/0x890 [ 843.422863] should_failslab+0xec/0x120 [ 843.426825] kmem_cache_alloc+0x47/0x760 [ 843.430871] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 843.435880] copy_fs_struct+0x48/0x2d0 [ 843.439756] copy_process.part.38+0x2070/0x4bd0 [ 843.444418] ? __cleanup_sighand+0x40/0x40 [ 843.448646] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 843.453824] ? __lock_acquire+0x664/0x3e00 [ 843.458044] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 843.463214] ? environ_open+0x80/0x80 [ 843.467017] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 843.472208] ? __lock_acquire+0x664/0x3e00 [ 843.476437] ? mntput_no_expire+0x130/0xa90 [ 843.480756] ? print_irqtrace_events+0x270/0x270 [ 843.485504] ? trace_hardirqs_off+0x10/0x10 [ 843.489820] ? lock_acquire+0x1d5/0x580 [ 843.493783] ? trace_hardirqs_off+0x10/0x10 [ 843.498088] ? trace_hardirqs_off+0x10/0x10 [ 843.502397] ? __lock_acquire+0x664/0x3e00 [ 843.506612] ? check_same_owner+0x320/0x320 [ 843.510919] ? find_held_lock+0x35/0x1d0 [ 843.514968] ? _parse_integer+0xe9/0x140 [ 843.519021] ? trace_hardirqs_off+0x10/0x10 [ 843.523329] ? _parse_integer+0x140/0x140 [ 843.527464] ? trace_hardirqs_off+0x10/0x10 [ 843.531769] ? get_pid_task+0x93/0x140 [ 843.535645] ? lock_downgrade+0x980/0x980 [ 843.539781] ? find_held_lock+0x35/0x1d0 [ 843.543832] ? __f_unlock_pos+0x19/0x20 [ 843.547788] ? lock_downgrade+0x980/0x980 [ 843.551920] ? get_pid_task+0xbc/0x140 [ 843.555791] ? proc_fail_nth_write+0x9b/0x1d0 [ 843.560276] ? map_files_get_link+0x3a0/0x3a0 [ 843.564759] ? handle_mm_fault+0x35b/0xb10 [ 843.568978] _do_fork+0x1f7/0xf70 [ 843.572419] ? fork_idle+0x2d0/0x2d0 [ 843.576115] ? wait_for_completion+0x770/0x770 [ 843.580685] ? __lock_is_held+0xb6/0x140 [ 843.584743] ? __sb_end_write+0xa0/0xd0 [ 843.588704] ? fput+0xd2/0x140 [ 843.591877] ? SyS_write+0x184/0x220 [ 843.595576] ? SyS_read+0x220/0x220 [ 843.599194] SyS_clone+0x37/0x50 [ 843.602542] ? sys_vfork+0x30/0x30 [ 843.606063] do_syscall_64+0x281/0x940 [ 843.609933] ? vmalloc_sync_all+0x30/0x30 [ 843.614061] ? finish_task_switch+0x1c1/0x7e0 [ 843.618537] ? syscall_return_slowpath+0x550/0x550 [ 843.623450] ? syscall_return_slowpath+0x2ac/0x550 [ 843.628362] ? prepare_exit_to_usermode+0x350/0x350 [ 843.633363] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 843.638710] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 843.643539] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 843.648711] RIP: 0033:0x454e79 2018/03/31 12:25:34 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x0, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) [ 843.651882] RSP: 002b:00007f935ae4bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 843.659575] RAX: ffffffffffffffda RBX: 00007f935ae4c6d4 RCX: 0000000000454e79 [ 843.666830] RDX: 00000000200008c0 RSI: 0000000020000800 RDI: 000000002000c100 [ 843.674085] RBP: 000000000072bea0 R08: 0000000020000940 R09: 0000000000000000 [ 843.681381] R10: 0000000020000900 R11: 0000000000000246 R12: 0000000000000014 [ 843.688637] R13: 0000000000000051 R14: 00000000006f2838 R15: 0000000000000007 2018/03/31 12:25:34 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x7, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) r1 = socket$inet(0x2, 0x3, 0xff) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000003c0)=@sack_info={0x0, 0x81, 0xffffffff}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000540)={r2, 0xffffffffffffff38, "f61954b75ba51719a215a7fcc7908000df07207888367e7e664d818c4628d387fe63a5de7dfcceb93be3d4c1de9259936402c9715bd13b600384a8f1e7de35b5a1949b0d40ab4e3b59d9da26e4fe62c0b47bf45126a7befabcfe05b27b7f04faff297676317eeca09799b9cfda6ed28b048dbf7c5a5b9f4fd42af4bb9f15991eb174f016237a5f746f1928669107ddb96ee145c77001975825c057a45a76ed33f22e8ba67604d97ece6325c48a2e1ad99c1b2cbf268a2b8296a2f535c19856d15f869596ad8bb2b9022a4b"}, &(0x7f0000000040)=0xc7) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000140)={r3, 0x340}, 0xfffffffffffffeb9) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000080)=@assoc_id=r3, 0x4) r4 = memfd_create(&(0x7f0000000100)='\x00', 0x3) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000180)=@req={0x8, 0x6, 0x9, 0x70}, 0x10) memfd_create(&(0x7f00000002c0)='keyring.\x00', 0x1) 2018/03/31 12:25:34 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x0, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:25:34 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'pids', 0x20}]}, 0x6) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0000f2818c17cc38f7280cd1abb5c35dedf3180e41407e5b"], 0x6) [ 843.758743] IPVS: ftp: loaded support on port[0] = 21 2018/03/31 12:25:34 executing program 4: r0 = socket$inet6(0xa, 0x800, 0x2) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty, 0x9}, 0x1c) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x7f, 0x101200) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000080)={0x5, 0x8}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 2018/03/31 12:25:34 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f0000000000)) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = semget$private(0x0, 0x0, 0x2) ioctl$TCXONC(r0, 0x540a, 0x5) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000240)=[{0xa, 0x4}], 0x1) semctl$GETVAL(r2, 0x0, 0xc, &(0x7f0000000140)=""/213) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'pids', 0x20}]}, 0x6) write$cgroup_subtree(r1, &(0x7f0000000100)={[{0x31, 'pids', 0x20}]}, 0x6) 2018/03/31 12:25:35 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x2b, 'pids', 0x20}]}, 0x6) write$cgroup_subtree(r1, &(0x7f0000000100)={[{0x2d, 'pids', 0x20}]}, 0x6) 2018/03/31 12:25:35 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x0, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:25:35 executing program 2 (fault-call:10 fault-nth:8): r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="84d5aef1603cb020c5b219faa757913ec85ee74a155e1d635566777b78600bc65bf01ce33de9a6bc3a2041890df0926f2cfc2a7d63690f6b55610593773041755f61b034e3a62a770855b2c0481df219efbfa8ffd0c665434a1de026bcfb654d597ef77a7b231aa9efe45c53811c7591d56f69e9c6231e6da993bbd2a6133805be0c18ba114cfe865e693024a56c3331b93c03e25927a504d27acebf7eecd33d7c69359e3ca37dc546c4fc5bc62596a94cdc00f9b973616a9d2ebad2d9b3e60261ae73b8397694e1f0851475b4236fb47989e6bfd1ad926a01523df3f689dc2603a76b5fc5e023d5449d066d424d1001fee5d653c21fdb751e95ff2b", 0xfc}], 0x1, 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r2 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) ioctl$sock_ipx_SIOCAIPXPRISLT(r2, 0x89e1, &(0x7f0000000280)=0x3f) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f0000000200)={0x80, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23}, 0x0, 0x7, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000300)={r3, 0x1c9}, 0x8) r4 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e44ee") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x40, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000c40)={r3, 0x2}, &(0x7f0000000c80)=0xffffffffffffff39) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000540)=0x2, 0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000340)) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000d40)={0x7433, {{0x2, 0x4e21, @broadcast=0xffffffff}}, 0x1, 0x1, [{{0x2, 0x4e20}}]}, 0x110) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f, r3}, 0x20) 2018/03/31 12:25:35 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ioprio_get$pid(0x3, r1) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000100), &(0x7f0000000040)=0x68) 2018/03/31 12:25:35 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x80, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000080)=0x4, 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f00000000c0)={0xfff, 0x9, 0x401, 'queue0\x00', 0x6}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0xfffffd74}], 0x1) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x7, 0x8000, 0x1000, 0x7d0, 0x0, 0xffffffff00000000, 0x0, 0x5, 0x9, 0x6, 0x1, 0x81, 0x5, 0x10000, 0x1, 0x7, 0xffffffffffffffff, 0xeda, 0x5, 0x0, 0x91, 0x10001, 0xffffffffffff0001, 0xc384, 0x8, 0xffffffffffffffe0, 0x0, 0x4, 0xffff, 0x80, 0x7, 0x2, 0x1, 0x0, 0x30, 0x3, 0x0, 0x7, 0x0, @perf_config_ext={0xfffffffffffff0f9, 0x8}, 0x20403, 0xcae, 0x9, 0x7, 0x0, 0xfff, 0x7}, r1, 0x0, r0, 0x2) 2018/03/31 12:25:35 executing program 5: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:25:35 executing program 7: socket$inet6(0xa, 0x6, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f00003fefff)=""/1, 0x1) r2 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r3, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r3, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r4}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)) r5 = dup2(r3, r4) fcntl$setown(r5, 0x8, r2) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r2, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0xe6, 0x2, {0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, 0xb64, 0x9, 0x9b, 0x5, 0xffff}}, &(0x7f0000000580)=0xb0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:25:35 executing program 1: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) [ 844.818712] FAULT_INJECTION: forcing a failure. [ 844.818712] name failslab, interval 1, probability 0, space 0, times 0 [ 844.830118] CPU: 0 PID: 21357 Comm: syz-executor2 Not tainted 4.16.0-rc7+ #373 [ 844.837483] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 844.846824] Call Trace: [ 844.849397] dump_stack+0x194/0x24d [ 844.853004] ? arch_local_irq_restore+0x53/0x53 [ 844.857661] should_fail+0x8c0/0xa40 [ 844.861354] ? kasan_kmalloc+0xad/0xe0 [ 844.865226] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 844.870306] ? do_syscall_64+0x281/0x940 [ 844.874348] ? trace_hardirqs_off+0x10/0x10 [ 844.878657] ? lock_downgrade+0x980/0x980 [ 844.882789] ? find_held_lock+0x35/0x1d0 [ 844.886844] ? check_same_owner+0x320/0x320 [ 844.891157] ? rcu_note_context_switch+0x710/0x710 [ 844.896074] ? do_raw_spin_trylock+0x190/0x190 [ 844.900650] should_failslab+0xec/0x120 [ 844.904613] kmem_cache_alloc+0x47/0x760 [ 844.908660] ? _raw_spin_unlock+0x22/0x30 [ 844.912796] ? copy_fs_struct+0x247/0x2d0 [ 844.916930] copy_process.part.38+0x2148/0x4bd0 [ 844.921590] ? __cleanup_sighand+0x40/0x40 [ 844.925816] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 844.930994] ? __lock_acquire+0x664/0x3e00 [ 844.935219] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 844.940407] ? environ_open+0x80/0x80 [ 844.944195] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 844.949373] ? __lock_acquire+0x664/0x3e00 [ 844.953597] ? mntput_no_expire+0x130/0xa90 [ 844.957901] ? print_irqtrace_events+0x270/0x270 [ 844.962638] ? trace_hardirqs_off+0x10/0x10 [ 844.966945] ? lock_acquire+0x1d5/0x580 [ 844.970901] ? trace_hardirqs_off+0x10/0x10 [ 844.975208] ? trace_hardirqs_off+0x10/0x10 [ 844.979512] ? __lock_acquire+0x664/0x3e00 [ 844.983731] ? check_same_owner+0x320/0x320 [ 844.988040] ? find_held_lock+0x35/0x1d0 [ 844.992089] ? _parse_integer+0xe9/0x140 [ 844.996132] ? trace_hardirqs_off+0x10/0x10 [ 845.000433] ? _parse_integer+0x140/0x140 [ 845.004565] ? trace_hardirqs_off+0x10/0x10 [ 845.008868] ? get_pid_task+0x93/0x140 [ 845.012765] ? lock_downgrade+0x980/0x980 [ 845.016903] ? find_held_lock+0x35/0x1d0 [ 845.020952] ? __f_unlock_pos+0x19/0x20 [ 845.024910] ? lock_downgrade+0x980/0x980 [ 845.029043] ? get_pid_task+0xbc/0x140 [ 845.032912] ? proc_fail_nth_write+0x9b/0x1d0 [ 845.037387] ? map_files_get_link+0x3a0/0x3a0 [ 845.041864] ? handle_mm_fault+0x35b/0xb10 [ 845.046094] _do_fork+0x1f7/0xf70 [ 845.049532] ? fork_idle+0x2d0/0x2d0 [ 845.053230] ? wait_for_completion+0x770/0x770 [ 845.057794] ? __lock_is_held+0xb6/0x140 [ 845.061838] ? __sb_end_write+0xa0/0xd0 [ 845.065789] ? fput+0xd2/0x140 [ 845.068961] ? SyS_write+0x184/0x220 [ 845.072653] ? SyS_read+0x220/0x220 [ 845.076261] SyS_clone+0x37/0x50 [ 845.079602] ? sys_vfork+0x30/0x30 [ 845.083123] do_syscall_64+0x281/0x940 [ 845.086992] ? vmalloc_sync_all+0x30/0x30 [ 845.091121] ? finish_task_switch+0x1c1/0x7e0 [ 845.095594] ? syscall_return_slowpath+0x550/0x550 [ 845.100508] ? syscall_return_slowpath+0x2ac/0x550 [ 845.105423] ? prepare_exit_to_usermode+0x350/0x350 [ 845.110423] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 845.115772] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 845.120600] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 845.125771] RIP: 0033:0x454e79 [ 845.128939] RSP: 002b:00007f935ae4bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 845.136631] RAX: ffffffffffffffda RBX: 00007f935ae4c6d4 RCX: 0000000000454e79 [ 845.143882] RDX: 00000000200008c0 RSI: 0000000020000800 RDI: 000000002000c100 [ 845.151130] RBP: 000000000072bea0 R08: 0000000020000940 R09: 0000000000000000 [ 845.158377] R10: 0000000020000900 R11: 0000000000000246 R12: 0000000000000014 [ 845.165635] R13: 0000000000000051 R14: 00000000006f2838 R15: 0000000000000008 2018/03/31 12:25:35 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'pids', 0x20}]}, 0x6) write$cgroup_subtree(r1, &(0x7f0000000100)={[{0x2d, 'pids', 0x20}]}, 0x6) gettid() 2018/03/31 12:25:35 executing program 4: r0 = socket$inet6(0xa, 0x80802, 0x2f) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) r1 = add_key(&(0x7f0000000040)='rxrpc\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000100)="31aa6f795ae517c047cb0ed528147046f995706cb96ae2b4a77b143d0a600a52125bafaef90dd2c9684f10a474fff8d35c9a75ce5be125181f9ff18fabd924a3c6f106fc7b5edbcc9f98ba7ffaf2b0e6e0d759f06ecc87e978cfcb273b5acfd3141da2cf151795a1237034aae94846561bb1da07f34c6f3d6152374ecabcb90a7f1b50c4964693a95579b11506472c6f02847739fff3eae1b1317fef9963cdc8cd44b638c191f00ac8d41df6bf86fd445a69685276dcc379d8e78cbab057511702f0c43a400971d579db8cd3f5d7e384d42bf38bb46c3e327b7ef9c32e", 0xdd, 0x0) keyctl$update(0x2, r1, &(0x7f0000000200)="22b3f84347e560bc44ee1dcc7b438f08a3416e579af61800b37a08f561567031fb221113826cf574fb4d84224fee5bb7dab70bca8057d75cfc7c45317c6eb83982b51b5470d63fefde20568a17f858d40e95098b4e931db1ad107f67a6e79f028dd83c80b76f", 0x66) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x200000000000, @in=@remote={0xac, 0x14, 0x14, 0xbb}}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) [ 845.212272] IPVS: ftp: loaded support on port[0] = 21 2018/03/31 12:25:35 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f00000001c0)) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="58c7dacb8bae6b75fdd49a36fb2d7d1f7b3154130d1742fcf57d97cb9d1c6e032c21eb42dab4fba2f6fd9232cdb275fe15a4036a0ba621e8bda6ac1c6c68c706666934c2d8767bcb4532666c735030077dc1e46287ee2fe47f19361a01ce2084256b5d2eff098a629642c9c73a561d5e18441955c57a3b"], 0x6) write$cgroup_subtree(r1, &(0x7f0000000100)={[{0x2d, 'pids', 0x20}]}, 0x6) 2018/03/31 12:25:35 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x0, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:25:35 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)="2e4ff5b3eaee3b53036370752f73797a3100", 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) preadv(r0, &(0x7f0000000800)=[{&(0x7f0000000140)=""/145, 0x91}, {&(0x7f0000000280)=""/232, 0xe8}, {&(0x7f0000000380)=""/161, 0xa1}, {&(0x7f0000000440)=""/148, 0x94}, {&(0x7f0000000500)=""/167, 0xa7}, {&(0x7f00000005c0)=""/70, 0x46}, {&(0x7f0000000640)=""/154, 0x9a}, {&(0x7f0000000700)=""/217, 0xd9}], 0x8, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'pids', 0x20}]}, 0x6) write$cgroup_subtree(r1, &(0x7f0000000100)={[{0x2d, 'pids', 0x20}]}, 0x6) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000880)=""/4096, 0x1000}], 0x1, 0x0) 2018/03/31 12:25:35 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000100)={0x1f, {{0xa, 0x4e20, 0x3ff, @loopback={0x0, 0x1}, 0x9}}}, 0x88) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x3ff, 0x0) socket$inet6(0xa, 0x800, 0x7fff) ioctl$sock_bt(r1, 0x541b, &(0x7f0000000340)="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") setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f00000002c0)=0x1, 0x4) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000300)={@any=0xffffffff}) 2018/03/31 12:25:35 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x0, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:25:35 executing program 2 (fault-call:10 fault-nth:9): r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="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", 0xfc}], 0x1, 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r2 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) ioctl$sock_ipx_SIOCAIPXPRISLT(r2, 0x89e1, &(0x7f0000000280)=0x3f) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f0000000200)={0x80, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23}, 0x0, 0x7, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000300)={r3, 0x1c9}, 0x8) r4 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e44ee") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x40, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000c40)={r3, 0x2}, &(0x7f0000000c80)=0xffffffffffffff39) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000540)=0x2, 0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000340)) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000d40)={0x7433, {{0x2, 0x4e21, @broadcast=0xffffffff}}, 0x1, 0x1, [{{0x2, 0x4e20}}]}, 0x110) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f, r3}, 0x20) [ 845.433825] FAULT_INJECTION: forcing a failure. [ 845.433825] name failslab, interval 1, probability 0, space 0, times 0 [ 845.445302] CPU: 0 PID: 21408 Comm: syz-executor2 Not tainted 4.16.0-rc7+ #373 [ 845.452676] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 845.462036] Call Trace: [ 845.464641] dump_stack+0x194/0x24d [ 845.468288] ? arch_local_irq_restore+0x53/0x53 [ 845.472976] should_fail+0x8c0/0xa40 [ 845.476703] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 845.481800] ? is_bpf_text_address+0x7b/0x120 [ 845.486286] ? lock_downgrade+0x980/0x980 [ 845.490420] ? lock_release+0xa40/0xa40 [ 845.494380] ? find_held_lock+0x35/0x1d0 [ 845.498442] ? check_same_owner+0x320/0x320 [ 845.502746] ? __save_stack_trace+0x7e/0xd0 [ 845.507057] ? rcu_note_context_switch+0x710/0x710 [ 845.511982] should_failslab+0xec/0x120 [ 845.515944] kmem_cache_alloc+0x47/0x760 [ 845.519992] ? save_stack+0x43/0xd0 [ 845.523605] ? kasan_kmalloc+0xad/0xe0 [ 845.527473] ? kasan_slab_alloc+0x12/0x20 [ 845.531601] ? kmem_cache_alloc+0x12e/0x760 [ 845.535906] ? copy_process.part.38+0x2148/0x4bd0 [ 845.540734] ? _do_fork+0x1f7/0xf70 [ 845.546432] ? SyS_clone+0x37/0x50 [ 845.549960] ? do_syscall_64+0x281/0x940 [ 845.554006] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 845.559363] copy_signal+0xfe/0xa11 [ 845.562982] ? set_ti_thread_flag+0x1d/0x1d [ 845.567289] ? lock_downgrade+0x980/0x980 [ 845.571421] ? lock_release+0xa40/0xa40 [ 845.575388] ? memcg_kmem_get_cache+0x443/0x890 [ 845.580058] ? percpu_ref_put_many+0x132/0x220 [ 845.584624] ? rcu_pm_notify+0xc0/0xc0 [ 845.588522] ? copy_process.part.38+0x2148/0x4bd0 [ 845.593370] ? rcu_read_lock_sched_held+0x108/0x120 [ 845.598400] ? kmem_cache_alloc+0x466/0x760 [ 845.602710] ? _raw_spin_unlock+0x22/0x30 [ 845.606846] copy_process.part.38+0x1fb0/0x4bd0 [ 845.611510] ? __cleanup_sighand+0x40/0x40 [ 845.615739] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 845.620917] ? __lock_acquire+0x664/0x3e00 [ 845.625140] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 845.630330] ? perf_trace_lock+0xd6/0x900 [ 845.634468] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 845.639726] ? perf_trace_lock+0xd6/0x900 [ 845.643854] ? mntput_no_expire+0x130/0xa90 [ 845.648193] ? trace_event_raw_event_lock+0x340/0x340 [ 845.653380] ? perf_trace_lock+0xd6/0x900 [ 845.657520] ? lock_acquire+0x1d5/0x580 [ 845.661480] ? trace_hardirqs_off+0x10/0x10 [ 845.665784] ? perf_trace_lock+0xd6/0x900 [ 845.669925] ? find_held_lock+0x35/0x1d0 [ 845.673971] ? perf_trace_lock+0xd6/0x900 [ 845.678107] ? trace_event_raw_event_lock+0x340/0x340 [ 845.683278] ? _parse_integer+0x140/0x140 [ 845.687410] ? trace_hardirqs_off+0x10/0x10 [ 845.691719] ? get_pid_task+0x93/0x140 [ 845.695588] ? perf_trace_lock+0xd6/0x900 [ 845.699720] ? find_held_lock+0x35/0x1d0 [ 845.703773] ? __f_unlock_pos+0x19/0x20 [ 845.707734] ? lock_downgrade+0x980/0x980 [ 845.711865] ? get_pid_task+0xbc/0x140 [ 845.715736] ? proc_fail_nth_write+0x9b/0x1d0 [ 845.720214] ? map_files_get_link+0x3a0/0x3a0 [ 845.724695] ? handle_mm_fault+0x35b/0xb10 [ 845.728914] _do_fork+0x1f7/0xf70 [ 845.732357] ? fork_idle+0x2d0/0x2d0 [ 845.736055] ? wait_for_completion+0x770/0x770 [ 845.740639] ? __sb_end_write+0xa0/0xd0 [ 845.744596] ? fput+0xd2/0x140 [ 845.747773] ? SyS_write+0x184/0x220 [ 845.751474] ? SyS_read+0x220/0x220 [ 845.755088] SyS_clone+0x37/0x50 [ 845.758439] ? sys_vfork+0x30/0x30 [ 845.761977] do_syscall_64+0x281/0x940 [ 845.765847] ? vmalloc_sync_all+0x30/0x30 [ 845.769983] ? _raw_spin_unlock_irq+0x27/0x70 [ 845.774464] ? finish_task_switch+0x1c1/0x7e0 [ 845.778943] ? syscall_return_slowpath+0x550/0x550 [ 845.783853] ? syscall_return_slowpath+0x2ac/0x550 [ 845.788766] ? prepare_exit_to_usermode+0x350/0x350 [ 845.793765] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 845.799122] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 845.803968] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 845.809143] RIP: 0033:0x454e79 [ 845.812314] RSP: 002b:00007f935ae4bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 845.820025] RAX: ffffffffffffffda RBX: 00007f935ae4c6d4 RCX: 0000000000454e79 [ 845.827285] RDX: 00000000200008c0 RSI: 0000000020000800 RDI: 000000002000c100 2018/03/31 12:25:36 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x7) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 2018/03/31 12:25:36 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)="2e2f6367726f7570ba24b1cf5000", 0x200002, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000080)=0x0) getpriority(0x1, r1) r2 = openat$cgroup_subtree(r0, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000140)={[{0x2f, 'cpu', 0x20}, {0x2f, 'rdma', 0x20}, {0x2b, 'pids', 0x20}, {0x2f, 'io', 0x20}, {0x2b, 'memory', 0x20}]}, 0x475) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="000000100200"], 0x6) [ 845.834539] RBP: 000000000072bea0 R08: 0000000020000940 R09: 0000000000000000 [ 845.841791] R10: 0000000020000900 R11: 0000000000000246 R12: 0000000000000014 [ 845.849042] R13: 0000000000000051 R14: 00000000006f2838 R15: 0000000000000009 2018/03/31 12:25:36 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x80, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000080)=0x4, 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f00000000c0)={0xfff, 0x9, 0x401, 'queue0\x00', 0x6}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0xfffffd74}], 0x1) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x7, 0x8000, 0x1000, 0x7d0, 0x0, 0xffffffff00000000, 0x0, 0x5, 0x9, 0x6, 0x1, 0x81, 0x5, 0x10000, 0x1, 0x7, 0xffffffffffffffff, 0xeda, 0x5, 0x0, 0x91, 0x10001, 0xffffffffffff0001, 0xc384, 0x8, 0xffffffffffffffe0, 0x0, 0x4, 0xffff, 0x80, 0x7, 0x2, 0x1, 0x0, 0x30, 0x3, 0x0, 0x7, 0x0, @perf_config_ext={0xfffffffffffff0f9, 0x8}, 0x20403, 0xcae, 0x9, 0x7, 0x0, 0xfff, 0x7}, r1, 0x0, r0, 0x2) 2018/03/31 12:25:36 executing program 1: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:25:36 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000040)={0x0, 0x7, 0x30, 0xfffffffffffffffc, 0x2}, &(0x7f0000000080)=0x18) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={r1, 0x7}, 0x8) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 2018/03/31 12:25:36 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x0, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:25:37 executing program 2 (fault-call:10 fault-nth:10): r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="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", 0xfc}], 0x1, 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r2 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) ioctl$sock_ipx_SIOCAIPXPRISLT(r2, 0x89e1, &(0x7f0000000280)=0x3f) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f0000000200)={0x80, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23}, 0x0, 0x7, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000300)={r3, 0x1c9}, 0x8) r4 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e44ee") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x40, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000c40)={r3, 0x2}, &(0x7f0000000c80)=0xffffffffffffff39) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000540)=0x2, 0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000340)) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000d40)={0x7433, {{0x2, 0x4e21, @broadcast=0xffffffff}}, 0x1, 0x1, [{{0x2, 0x4e20}}]}, 0x110) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f, r3}, 0x20) 2018/03/31 12:25:37 executing program 5: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:25:37 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="2b33c533105a9d2031"], 0xfffffffffffffc41) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x3fb02108acca2095, 0x0) ioctl$KDSETLED(r2, 0x4b32, 0x3) write$cgroup_subtree(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="b97f7e847b08574c0faf6b423d0baa05487a7b4d84804171d2e6df0505c72cd47801c4f0b24cfe508f17e291c1da56ddee15f3113e4e653f1bc21bf5808ca66615be03ba419c68c7f27f8ebc6344e891890b53dccdd4985c9919de39d4f449f7a925bb511aaecb18a7d221ca2d98"], 0x6) 2018/03/31 12:25:37 executing program 1: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:25:37 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x80, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000080)=0x4, 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f00000000c0)={0xfff, 0x9, 0x401, 'queue0\x00', 0x6}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0xfffffd74}], 0x1) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x7, 0x8000, 0x1000, 0x7d0, 0x0, 0xffffffff00000000, 0x0, 0x5, 0x9, 0x6, 0x1, 0x81, 0x5, 0x10000, 0x1, 0x7, 0xffffffffffffffff, 0xeda, 0x5, 0x0, 0x91, 0x10001, 0xffffffffffff0001, 0xc384, 0x8, 0xffffffffffffffe0, 0x0, 0x4, 0xffff, 0x80, 0x7, 0x2, 0x1, 0x0, 0x30, 0x3, 0x0, 0x7, 0x0, @perf_config_ext={0xfffffffffffff0f9, 0x8}, 0x20403, 0xcae, 0x9, 0x7, 0x0, 0xfff, 0x7}, r1, 0x0, r0, 0x2) 2018/03/31 12:25:37 executing program 4: r0 = open(&(0x7f0000000080)='./file0\x00', 0x86000, 0x20) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000100)=ANY=[@ANYRES32=0x0, @ANYBLOB="0400000082b54303"], &(0x7f0000000140)=0xc) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000180)={r1, 0x7}, &(0x7f00000002c0)=0x8) r2 = socket$inet6(0xa, 0x80803, 0x2f) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@mcast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000400)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, r3}, {}, {}, 0x0, 0x0, 0x1, 0x80000000000000}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0xa, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) connect$inet6(r2, &(0x7f00000000c0)={0xa}, 0x1c) 2018/03/31 12:25:37 executing program 7: socket$inet6(0xa, 0x6, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000943ffc)=0xa35) read(0xffffffffffffffff, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(0xffffffffffffffff, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0xe6, 0x2, {0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, 0xb64, 0x9, 0x9b, 0x5, 0xffff}}, &(0x7f0000000580)=0xb0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:25:37 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x0, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:25:37 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) r3 = eventfd(0x401) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f0000000140)={0x2, r3}) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'pids', 0x20}]}, 0x6) write$cgroup_subtree(r1, &(0x7f0000000100)={[{0x2d, 'pids', 0x20}]}, 0x6) [ 846.999908] FAULT_INJECTION: forcing a failure. [ 846.999908] name failslab, interval 1, probability 0, space 0, times 0 [ 847.011302] CPU: 1 PID: 21460 Comm: syz-executor2 Not tainted 4.16.0-rc7+ #373 [ 847.018665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 847.028022] Call Trace: [ 847.030624] dump_stack+0x194/0x24d [ 847.034273] ? arch_local_irq_restore+0x53/0x53 [ 847.038975] should_fail+0x8c0/0xa40 2018/03/31 12:25:37 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0x7, 0x1, 0xa7, 0x11d}, &(0x7f00000002c0)=0x98) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000300)={r2, 0x81, 0x8, 0x69e}, &(0x7f0000000340)=0x10) ioctl$EVIOCSABS20(r1, 0x401845e0, &(0x7f0000000080)={0x7, 0x6, 0x10000, 0x7f, 0x5, 0x19}) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty, 0x48}, 0x1c) [ 847.038992] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 847.039004] ? debug_mutex_init+0x1c/0x60 [ 847.039019] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 847.039030] ? __lockdep_init_map+0xe4/0x650 [ 847.039038] ? find_held_lock+0x35/0x1d0 [ 847.039053] ? find_held_lock+0x35/0x1d0 [ 847.039076] ? check_same_owner+0x320/0x320 [ 847.039089] ? rcu_note_context_switch+0x710/0x710 [ 847.039098] ? copy_mm+0x12ee/0x131f [ 847.039113] should_failslab+0xec/0x120 [ 847.039123] kmem_cache_alloc+0x47/0x760 [ 847.039135] ? copy_namespaces+0x1a3/0x400 [ 847.039147] create_new_namespaces+0x88/0x880 [ 847.039161] ? sys_ni_syscall+0x20/0x20 [ 847.039172] ? ns_capable_common+0xcf/0x160 [ 847.039184] copy_namespaces+0x340/0x400 [ 847.039194] ? create_new_namespaces+0x880/0x880 [ 847.039208] ? _raw_spin_unlock+0x22/0x30 [ 847.039221] copy_process.part.38+0x2380/0x4bd0 [ 847.039238] ? __cleanup_sighand+0x40/0x40 [ 847.039258] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 847.039269] ? __lock_acquire+0x664/0x3e00 [ 847.039278] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 847.039288] ? perf_trace_lock+0xd6/0x900 [ 847.039304] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 847.039311] ? perf_trace_lock+0xd6/0x900 [ 847.039321] ? mntput_no_expire+0x130/0xa90 [ 847.039333] ? trace_event_raw_event_lock+0x340/0x340 [ 847.039341] ? perf_trace_lock+0xd6/0x900 [ 847.039354] ? lock_acquire+0x1d5/0x580 [ 847.039363] ? trace_hardirqs_off+0x10/0x10 [ 847.039372] ? perf_trace_lock+0xd6/0x900 [ 847.039391] ? find_held_lock+0x35/0x1d0 [ 847.039405] ? perf_trace_lock+0xd6/0x900 [ 847.039420] ? trace_event_raw_event_lock+0x340/0x340 [ 847.039430] ? _parse_integer+0x140/0x140 [ 847.039444] ? trace_hardirqs_off+0x10/0x10 [ 847.039455] ? get_pid_task+0x93/0x140 [ 847.039466] ? perf_trace_lock+0xd6/0x900 [ 847.039481] ? find_held_lock+0x35/0x1d0 [ 847.039495] ? __f_unlock_pos+0x19/0x20 [ 847.039505] ? lock_downgrade+0x980/0x980 [ 847.039513] ? get_pid_task+0xbc/0x140 [ 847.039523] ? proc_fail_nth_write+0x9b/0x1d0 [ 847.039540] ? map_files_get_link+0x3a0/0x3a0 [ 847.039554] ? handle_mm_fault+0x35b/0xb10 [ 847.039566] _do_fork+0x1f7/0xf70 [ 847.039580] ? fork_idle+0x2d0/0x2d0 [ 847.039589] ? wait_for_completion+0x770/0x770 [ 847.039614] ? __sb_end_write+0xa0/0xd0 [ 847.039624] ? fput+0xd2/0x140 [ 847.039634] ? SyS_write+0x184/0x220 [ 847.039645] ? SyS_read+0x220/0x220 [ 847.039655] SyS_clone+0x37/0x50 [ 847.039662] ? sys_vfork+0x30/0x30 [ 847.039674] do_syscall_64+0x281/0x940 [ 847.039682] ? vmalloc_sync_all+0x30/0x30 [ 847.039690] ? _raw_spin_unlock_irq+0x27/0x70 [ 847.039698] ? finish_task_switch+0x1c1/0x7e0 [ 847.039708] ? syscall_return_slowpath+0x550/0x550 [ 847.039717] ? syscall_return_slowpath+0x2ac/0x550 [ 847.039727] ? prepare_exit_to_usermode+0x350/0x350 [ 847.039747] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 847.039770] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 847.039797] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 847.039810] RIP: 0033:0x454e79 [ 847.039815] RSP: 002b:00007f935ae4bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 847.039824] RAX: ffffffffffffffda RBX: 00007f935ae4c6d4 RCX: 0000000000454e79 [ 847.039829] RDX: 00000000200008c0 RSI: 0000000020000800 RDI: 000000002000c100 [ 847.039834] RBP: 000000000072bea0 R08: 0000000020000940 R09: 0000000000000000 [ 847.039839] R10: 0000000020000900 R11: 0000000000000246 R12: 0000000000000014 [ 847.039844] R13: 0000000000000051 R14: 00000000006f2838 R15: 000000000000000a [ 847.076972] IPVS: ftp: loaded support on port[0] = 21 2018/03/31 12:25:38 executing program 4: socketpair(0xa, 0xf, 0x5f48b36b, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = gettid() getsockopt$ax25_int(r0, 0x101, 0x1, &(0x7f0000000340), &(0x7f0000000380)=0x4) r3 = getuid() fstat(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x8}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000300)={r5, 0x6}, 0x8) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080)={r2, r3, r4}, 0xc) r6 = socket$inet6(0xa, 0x80803, 0x2f) connect$inet6(r6, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r6, &(0x7f00000000c0)={0xa}, 0x1c) connect$ax25(r0, &(0x7f0000000440)={0x3, {"d91c863fe23394"}, 0x8}, 0x677) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000003c0)) ioctl$PIO_CMAP(r1, 0x4b71, &(0x7f0000000400)={0x100000000, 0x6efa, 0x0, 0x6, 0x7, 0xa01}) 2018/03/31 12:25:38 executing program 2 (fault-call:10 fault-nth:11): r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="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", 0xfc}], 0x1, 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r2 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) ioctl$sock_ipx_SIOCAIPXPRISLT(r2, 0x89e1, &(0x7f0000000280)=0x3f) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f0000000200)={0x80, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23}, 0x0, 0x7, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000300)={r3, 0x1c9}, 0x8) r4 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e44ee") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x40, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000c40)={r3, 0x2}, &(0x7f0000000c80)=0xffffffffffffff39) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000540)=0x2, 0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000340)) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000d40)={0x7433, {{0x2, 0x4e21, @broadcast=0xffffffff}}, 0x1, 0x1, [{{0x2, 0x4e20}}]}, 0x110) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f, r3}, 0x20) 2018/03/31 12:25:38 executing program 7: socket$inet6(0xa, 0x6, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000943ffc)=0xa35) read(r1, &(0x7f00003fefff)=""/1, 0x1) r2 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r3, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r3, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r4}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)) r5 = dup2(r3, r4) fcntl$setown(r5, 0x8, r2) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r2, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0xe6, 0x2, {0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, 0xb64, 0x9, 0x9b, 0x5, 0xffff}}, &(0x7f0000000580)=0xb0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:25:38 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x0, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:25:38 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x88000, 0x0) bind$nfc_llcp(r2, &(0x7f00000001c0)={0x27, 0x0, 0x2, 0x1, 0x1000, 0x8, "f10ce94367a065cff5cf17231b05489ca623e051602d1871d90d9c9a97d2c2c7e0ddde1f39a1b8e649eb810123aaaf62eb9cc855142409af156eae87cd0565", 0x1}, 0xfffffffffffffeab) ioctl$LOOP_SET_DIRECT_IO(r2, 0x4c08, 0x100) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'pids', 0x20}]}, 0x6) ioctl(r2, 0x3, &(0x7f0000000340)="8e03a7b0ca239da987ce10e8173e0eeafd53505d05b86f7a05155d9bb58035408a43febe40f0eabcc58ce2726352a8af6ce09c0a71a242a00d47fd75ace82cd19c0a8a877ba303a04de099728f4546092e5a7b54859fd3339d2dd0c43bd17e6f31001d3bd87409d3535e1781619ca7404893dda677cf269495637f6bedd81782c4a384ac7a6201fbdd283839bbcd4279e51f0c042ef4653c64136bc9b1b70c480b398de3834b59cf1cd3171537fd05e0688ec87e93086c0dbedd9ae074f34e0c623669e269ae7b27acfe90ac1c520e121ba8232aac24125ee6d29da6daa052909530ed96bcf42fa84d4bb76a9f4036138f2157dd5250") write$cgroup_subtree(r2, &(0x7f0000000140), 0x0) write$cgroup_subtree(r2, &(0x7f0000000140)={[{0x2f, 'rdma', 0x20}, {0x2d, 'cpu', 0x20}, {0x2b, 'memory', 0x20}, {0x2d, 'io', 0x20}, {0x2f, 'pids', 0x20}, {0x2d, 'cpu', 0x20}]}, 0x22) openat$cgroup_subtree(r0, &(0x7f0000000100)='cgroup.subtree_control\x00', 0x2, 0x0) 2018/03/31 12:25:38 executing program 5: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:25:38 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x80, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000080)=0x4, 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f00000000c0)={0xfff, 0x9, 0x401, 'queue0\x00', 0x6}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0xfffffd74}], 0x1) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x7, 0x8000, 0x1000, 0x7d0, 0x0, 0xffffffff00000000, 0x0, 0x5, 0x9, 0x6, 0x1, 0x81, 0x5, 0x10000, 0x1, 0x7, 0xffffffffffffffff, 0xeda, 0x5, 0x0, 0x91, 0x10001, 0xffffffffffff0001, 0xc384, 0x8, 0xffffffffffffffe0, 0x0, 0x4, 0xffff, 0x80, 0x7, 0x2, 0x1, 0x0, 0x30, 0x3, 0x0, 0x7, 0x4, @perf_config_ext={0x0, 0x8}, 0x20403, 0xcae, 0x9, 0x7, 0x0, 0xfff, 0x7}, r1, 0x0, r0, 0x2) 2018/03/31 12:25:38 executing program 1: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) [ 848.469669] FAULT_INJECTION: forcing a failure. [ 848.469669] name failslab, interval 1, probability 0, space 0, times 0 [ 848.481067] CPU: 1 PID: 21489 Comm: syz-executor2 Not tainted 4.16.0-rc7+ #373 [ 848.488441] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 848.497802] Call Trace: [ 848.500392] dump_stack+0x194/0x24d [ 848.504044] ? arch_local_irq_restore+0x53/0x53 [ 848.508710] ? lock_downgrade+0x980/0x980 [ 848.512855] should_fail+0x8c0/0xa40 [ 848.516567] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 848.521659] ? inc_ucount+0x204/0x9a0 [ 848.525443] ? lock_downgrade+0x980/0x980 [ 848.529577] ? is_bpf_text_address+0xa4/0x120 [ 848.534063] ? find_held_lock+0x35/0x1d0 [ 848.538126] ? check_same_owner+0x320/0x320 [ 848.542436] ? rcu_note_context_switch+0x710/0x710 [ 848.547369] ? retire_userns_sysctls+0x90/0x90 [ 848.551946] should_failslab+0xec/0x120 [ 848.555901] kmem_cache_alloc+0x47/0x760 [ 848.559955] copy_pid_ns+0x257/0xc60 [ 848.563651] ? refcount_add+0x60/0x60 [ 848.567440] ? pidns_get+0x170/0x170 [ 848.571139] ? refcount_inc+0x1e/0x50 [ 848.574922] ? copy_ipcs+0xb3/0x520 [ 848.578533] ? ipcns_get+0xf0/0xf0 [ 848.582060] ? do_mount+0x2bb0/0x2bb0 [ 848.585850] ? copy_namespaces+0x1a3/0x400 [ 848.590076] create_new_namespaces+0x307/0x880 [ 848.594649] ? sys_ni_syscall+0x20/0x20 [ 848.598609] ? ns_capable_common+0xcf/0x160 [ 848.602921] copy_namespaces+0x340/0x400 [ 848.606972] ? create_new_namespaces+0x880/0x880 [ 848.611719] ? _raw_spin_unlock+0x22/0x30 [ 848.615867] copy_process.part.38+0x2380/0x4bd0 [ 848.620533] ? __cleanup_sighand+0x40/0x40 [ 848.624777] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 848.629966] ? __lock_acquire+0x664/0x3e00 [ 848.634185] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 848.639369] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 848.644542] ? __lock_acquire+0x664/0x3e00 [ 848.648757] ? mntput_no_expire+0x130/0xa90 [ 848.653065] ? print_irqtrace_events+0x270/0x270 [ 848.657804] ? trace_hardirqs_off+0x10/0x10 [ 848.662115] ? lock_acquire+0x1d5/0x580 [ 848.666074] ? trace_hardirqs_off+0x10/0x10 [ 848.670381] ? trace_hardirqs_off+0x10/0x10 [ 848.674692] ? __lock_acquire+0x664/0x3e00 [ 848.678914] ? check_same_owner+0x320/0x320 [ 848.683225] ? find_held_lock+0x35/0x1d0 [ 848.687282] ? _parse_integer+0xe9/0x140 [ 848.691351] ? trace_hardirqs_off+0x10/0x10 [ 848.695666] ? _parse_integer+0x140/0x140 [ 848.699811] ? trace_hardirqs_off+0x10/0x10 [ 848.704127] ? get_pid_task+0x93/0x140 [ 848.708016] ? lock_downgrade+0x980/0x980 [ 848.712178] ? find_held_lock+0x35/0x1d0 [ 848.716234] ? __f_unlock_pos+0x19/0x20 [ 848.720197] ? lock_downgrade+0x980/0x980 [ 848.724332] ? get_pid_task+0xbc/0x140 [ 848.728210] ? proc_fail_nth_write+0x9b/0x1d0 [ 848.732692] ? map_files_get_link+0x3a0/0x3a0 [ 848.737174] ? handle_mm_fault+0x35b/0xb10 [ 848.741417] _do_fork+0x1f7/0xf70 [ 848.744870] ? fork_idle+0x2d0/0x2d0 [ 848.748580] ? wait_for_completion+0x770/0x770 [ 848.753160] ? __lock_is_held+0xb6/0x140 [ 848.757227] ? __sb_end_write+0xa0/0xd0 [ 848.761194] ? fput+0xd2/0x140 [ 848.764404] ? SyS_write+0x184/0x220 [ 848.768106] ? SyS_read+0x220/0x220 [ 848.771724] SyS_clone+0x37/0x50 [ 848.775077] ? sys_vfork+0x30/0x30 [ 848.778602] do_syscall_64+0x281/0x940 [ 848.782472] ? vmalloc_sync_all+0x30/0x30 [ 848.786607] ? _raw_spin_unlock_irq+0x27/0x70 [ 848.791089] ? finish_task_switch+0x1c1/0x7e0 [ 848.795572] ? syscall_return_slowpath+0x550/0x550 [ 848.800489] ? syscall_return_slowpath+0x2ac/0x550 [ 848.805410] ? prepare_exit_to_usermode+0x350/0x350 [ 848.810419] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 848.815778] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 848.820613] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 848.825792] RIP: 0033:0x454e79 [ 848.828967] RSP: 002b:00007f935ae4bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 848.836665] RAX: ffffffffffffffda RBX: 00007f935ae4c6d4 RCX: 0000000000454e79 [ 848.843925] RDX: 00000000200008c0 RSI: 0000000020000800 RDI: 000000002000c100 [ 848.851179] RBP: 000000000072bea0 R08: 0000000020000940 R09: 0000000000000000 [ 848.858445] R10: 0000000020000900 R11: 0000000000000246 R12: 0000000000000014 2018/03/31 12:25:39 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00295c2d2c3c8dd2f6997ab7c5641313dcaf1042c9dd6d61df9eb6628a9d2dd4bbde6ca2f75048be65845b1fb4e921f96984c0"], 0x6) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x100400000, 0x0) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000240)) write$cgroup_subtree(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="2d7069fac27a5b46bd76296774fb944cf53f647390"], 0x6) syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x0, 0x18000) [ 848.865697] R13: 0000000000000051 R14: 00000000006f2838 R15: 000000000000000b 2018/03/31 12:25:39 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, &(0x7f0000000080)=""/56) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000100)={r0, 0xff, 0x0, r0}) r1 = socket$inet6(0xa, 0x80803, 0x2f) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) ioctl$sock_ipx_SIOCAIPXPRISLT(r0, 0x89e1, &(0x7f0000000140)=0x401) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r1, &(0x7f00000000c0)={0xa}, 0x1c) 2018/03/31 12:25:39 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x0, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:25:39 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'pids', 0x20}]}, 0x6) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x400, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000140)=[@in6={0xa, 0x4e23, 0x3ff, @dev={0xfe, 0x80, [], 0xa}, 0x81}, @in6={0xa, 0x4e20, 0xfffffffffffff97b, @remote={0xfe, 0x80, [], 0xbb}, 0x5}, @in6={0xa, 0x4e21, 0x3, @remote={0xfe, 0x80, [], 0xbb}}], 0x54) fchdir(r0) write$cgroup_subtree(r1, &(0x7f0000000100)={[{0x2b, 'pids', 0x20}]}, 0x6) [ 848.928244] IPVS: ftp: loaded support on port[0] = 21 2018/03/31 12:25:39 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) socket$packet(0x11, 0x3, 0x300) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000400)='/dev/qat_adf_ctl\x00', 0x90401, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x100, 0x0) getsockname$packet(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000440)=0xffffffffffffffc0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000140)=0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @in6=@loopback={0x0, 0x1}, 0x4e22, 0x1, 0x4e20, 0x0, 0xa, 0x80, 0x80, 0xc, r2, r3}, {0x0, 0x5a5a, 0x8, 0x81, 0x36, 0xff, 0x8ed, 0xb12}, {0x3ff, 0x7, 0x3ff, 0x8}, 0x800, 0x0, 0x1, 0x0, 0x0, 0x3}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x4d2, 0x33}, 0xa, @in=@rand_addr=0x1, 0x0, 0x3, 0x3, 0xff, 0x8f, 0x7fffffff, 0x5}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 2018/03/31 12:25:39 executing program 6: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x200, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001600)={{{@in=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}, &(0x7f0000001700)=0xe8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_subtree(r0, &(0x7f00000017c0)='cgroup.subtree_control\x00', 0x2, 0x0) r3 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x5, 0x4) sendmsg$nfc_llcp(r3, &(0x7f0000001580)={&(0x7f0000000140)={0x27, 0x1, 0x1, 0x7, 0xffffffffffff0000, 0x6, "63e325b2e981e17a1b164732fe61c31f673a05376e48d48693c577767a200f2b789e6f6fadd8dd9cdd9751fdef0684c01d5ba569181ad84d76cc0735453187", 0x2f}, 0x60, &(0x7f0000001480)=[{&(0x7f00000001c0)="800e9df617b8627ea6fa1d448fd8bfa9fc282d29b06ce8aa2ac0aaf46027baed17c20f5d7819b2d981143e73ec14b1a0275a6c5ff7b7f96c6d71035c102c96811fe06f261881b261c768f06a379bb99edf36f1b16700e079f160d252943381a0b0aee9cba4db7213b42f63a51679e90f62a9bbfd48d03fcdebf115371f6e9fabefbc315e594df0b4362ea211fd08bac143eef64ca126642e38cee04a5e2c39185e937a4a63efa3d6126b77fa7e99a51a175a9e0153f084a69b5c8c14c5c74d22f99488c680e43db2d49429fe", 0xcc}, {&(0x7f00000002c0)="c5bd0a00f0804278b629fbc562", 0xd}, {&(0x7f0000000300)="f852245d7185611ad2a5d4e42de5d63f529772e4463d946b447316e194ae6a1c704b7164e2af82b4f5a6a53fefdcda25d1ef35a335d32bb1356b8bdbd42780ada82c23c53664bbfb743b05c76c6d593c3b848833d0fc1811347de5de0ccb340c67cb76053a6d490e07f9c349dad2e2fbc68f211e4db52b", 0x77}, {&(0x7f0000000380)="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", 0x1000}, {&(0x7f0000001380)="82328c337611fea7e20dce7da7c704bbf68eb20bbe2457d9c3690565c6803bc7ab99eec0b1723543f4fe99df2860bbda8803e01f285dc373016d1600c8c69be781d8ee53c3030138a71335c279b71d45ffec8f184861f073a4a9914d68edc527f7bbdbd97749b42d3818c1682379630e996f7bb9d6a1122968485170aec2f83b35fbec7455be3bbc8b5fc66da60c1143c78854c861f0558f050c58e0d56b7d2b380eb9e9e7132a1cf57e113cb330ac401972426a55908dc6df00337bf28e392ac1d303ee10a70f4a04251fc66fac396b53bc617033ee", 0xd6}], 0x5, &(0x7f0000001500)={0x80, 0x1ff, 0xf565, "dc975576a50b54d85e6000313ffa6b9bc747991eefc2da9d8ce1d6ec191452c715e3e55e448ba592f3a260b30e273dbd8ce743e95989540162c5876a0d9a3f0426fa5a8b969d2f18ac521d56ba0b36f4a260d69c74c7d928117eab65d42f852f20e30f1c70137b1943ad730d"}, 0x80}, 0x20008091) write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x2b, 'pids', 0x20}]}, 0x6) write$cgroup_subtree(r2, &(0x7f0000001800)=ANY=[@ANYBLOB="3e150ecb72789ad498e1ddf09da0ba87117500000000e00c0000b2293e628f97436659df335c122e3e3d02150366346d9996ed8a9209cf9ff8d8b622972f02febf658a7b2216b3f71f0000000861ad16862d6ebb5d27122b1ad4102a8e6ce9a855fa7543c078551fb25ce3470c8b9f6fa9481f0a"], 0x6) connect$packet(r3, &(0x7f0000001740)={0x11, 0xff, r1, 0x1, 0x0, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x14) 2018/03/31 12:25:39 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x0, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:25:39 executing program 2 (fault-call:10 fault-nth:12): r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="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", 0xfc}], 0x1, 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r2 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) ioctl$sock_ipx_SIOCAIPXPRISLT(r2, 0x89e1, &(0x7f0000000280)=0x3f) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f0000000200)={0x80, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23}, 0x0, 0x7, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000300)={r3, 0x1c9}, 0x8) r4 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e44ee") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x40, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000c40)={r3, 0x2}, &(0x7f0000000c80)=0xffffffffffffff39) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000540)=0x2, 0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000340)) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000d40)={0x7433, {{0x2, 0x4e21, @broadcast=0xffffffff}}, 0x1, 0x1, [{{0x2, 0x4e20}}]}, 0x110) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f, r3}, 0x20) 2018/03/31 12:25:39 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0xeffffffffffffffa, @loopback={0x0, 0x1}}, 0x1c) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x8, 0x11, r0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) openat$cgroup(r1, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) [ 849.111879] FAULT_INJECTION: forcing a failure. [ 849.111879] name failslab, interval 1, probability 0, space 0, times 0 [ 849.123291] CPU: 0 PID: 21534 Comm: syz-executor2 Not tainted 4.16.0-rc7+ #373 [ 849.130653] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 849.140001] Call Trace: [ 849.142587] dump_stack+0x194/0x24d [ 849.146205] ? arch_local_irq_restore+0x53/0x53 [ 849.150878] should_fail+0x8c0/0xa40 [ 849.154582] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 849.159674] ? trace_hardirqs_on+0xd/0x10 [ 849.163811] ? refcount_inc_not_zero+0xfe/0x180 [ 849.168470] ? find_held_lock+0x35/0x1d0 [ 849.172529] ? check_same_owner+0x320/0x320 [ 849.176832] ? refcount_inc+0x1e/0x50 [ 849.180616] ? rcu_note_context_switch+0x710/0x710 [ 849.185540] should_failslab+0xec/0x120 [ 849.189502] kmem_cache_alloc+0x47/0x760 [ 849.193553] ? copy_namespaces+0x1a3/0x400 [ 849.197782] alloc_pid+0xc1/0xa00 [ 849.201221] ? sys_ni_syscall+0x20/0x20 [ 849.205177] ? __change_pid+0x400/0x400 [ 849.209133] ? ns_capable_common+0xcf/0x160 [ 849.213446] ? copy_namespaces+0x1ee/0x400 [ 849.217671] ? memset+0x31/0x40 [ 849.220939] ? copy_thread_tls+0x268/0x8f0 [ 849.225170] copy_process.part.38+0x2516/0x4bd0 [ 849.229836] ? __cleanup_sighand+0x40/0x40 [ 849.234073] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 849.239249] ? __lock_acquire+0x664/0x3e00 [ 849.243472] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 849.248649] ? perf_trace_lock+0xd6/0x900 [ 849.252789] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 849.257961] ? perf_trace_lock+0xd6/0x900 [ 849.262098] ? mntput_no_expire+0x130/0xa90 [ 849.266412] ? trace_event_raw_event_lock+0x340/0x340 [ 849.271583] ? perf_trace_lock+0xd6/0x900 [ 849.275730] ? lock_acquire+0x1d5/0x580 [ 849.279699] ? trace_hardirqs_off+0x10/0x10 [ 849.284015] ? perf_trace_lock+0xd6/0x900 [ 849.288156] ? find_held_lock+0x35/0x1d0 [ 849.292202] ? perf_trace_lock+0xd6/0x900 [ 849.296339] ? trace_event_raw_event_lock+0x340/0x340 [ 849.301516] ? _parse_integer+0x140/0x140 [ 849.305655] ? trace_hardirqs_off+0x10/0x10 [ 849.309965] ? get_pid_task+0x93/0x140 [ 849.313842] ? perf_trace_lock+0xd6/0x900 [ 849.317985] ? find_held_lock+0x35/0x1d0 [ 849.322041] ? __f_unlock_pos+0x19/0x20 [ 849.326003] ? lock_downgrade+0x980/0x980 [ 849.330153] ? get_pid_task+0xbc/0x140 [ 849.334035] ? proc_fail_nth_write+0x9b/0x1d0 [ 849.338523] ? map_files_get_link+0x3a0/0x3a0 [ 849.343005] ? handle_mm_fault+0x35b/0xb10 [ 849.347239] _do_fork+0x1f7/0xf70 [ 849.350683] ? fork_idle+0x2d0/0x2d0 [ 849.354389] ? wait_for_completion+0x770/0x770 [ 849.358974] ? __sb_end_write+0xa0/0xd0 [ 849.362937] ? fput+0xd2/0x140 [ 849.366119] ? SyS_write+0x184/0x220 [ 849.369822] ? SyS_read+0x220/0x220 [ 849.373446] SyS_clone+0x37/0x50 [ 849.376799] ? sys_vfork+0x30/0x30 [ 849.380326] do_syscall_64+0x281/0x940 [ 849.384198] ? vmalloc_sync_all+0x30/0x30 [ 849.388327] ? _raw_spin_unlock_irq+0x27/0x70 [ 849.392803] ? finish_task_switch+0x1c1/0x7e0 [ 849.397278] ? syscall_return_slowpath+0x550/0x550 [ 849.402191] ? syscall_return_slowpath+0x2ac/0x550 [ 849.407108] ? prepare_exit_to_usermode+0x350/0x350 [ 849.412111] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 849.417465] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 849.422299] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 849.427475] RIP: 0033:0x454e79 [ 849.430651] RSP: 002b:00007f935ae4bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 849.438364] RAX: ffffffffffffffda RBX: 00007f935ae4c6d4 RCX: 0000000000454e79 [ 849.445622] RDX: 00000000200008c0 RSI: 0000000020000800 RDI: 000000002000c100 [ 849.452878] RBP: 000000000072bea0 R08: 0000000020000940 R09: 0000000000000000 2018/03/31 12:25:39 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'pids', 0x20}]}, 0x6) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x88000, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r2, &(0x7f0000000140)="ef8caa5cc39a7e7ca3ec2e631392dd6c89995c7b876433e2566630599e917b7492819bebc7dd5425d78c02f71cd37dff5ab4e0dec1c9411ca2c6455a2fe7709c41b91a7e2e2013638bcb9b27d2321674f29a67b82ed1d48680d2d20532efb8f66ea10c169ee30afbf68f0330ff60edbc2738a4148ba10328c804ed9f115698d71beb470c5b11d301ae0087c63a4212ceb676b0d302df4e76a58500c02c4c9cd56e07e5", &(0x7f0000000200)}, 0x18) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="409300282200"], 0x6) [ 849.460128] R10: 0000000020000900 R11: 0000000000000246 R12: 0000000000000014 [ 849.467377] R13: 0000000000000051 R14: 00000000006f2838 R15: 000000000000000c 2018/03/31 12:25:39 executing program 7: socket$inet6(0xa, 0x6, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000943ffc)=0xa35) read(r1, &(0x7f00003fefff)=""/1, 0x1) r2 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r3, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r3, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r4}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)) r5 = dup2(r3, r4) fcntl$setown(r5, 0x8, r2) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r2, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0xe6, 0x2, {0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, 0xb64, 0x9, 0x9b, 0x5, 0xffff}}, &(0x7f0000000580)=0xb0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:25:39 executing program 5: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:25:39 executing program 1: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:25:39 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xffffffffffffffff}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 2018/03/31 12:25:39 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x80, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000080)=0x4, 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f00000000c0)={0xfff, 0x9, 0x401, 'queue0\x00', 0x6}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0xfffffd74}], 0x1) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x7, 0x8000, 0x1000, 0x7d0, 0x0, 0xffffffff00000000, 0x0, 0x5, 0x9, 0x6, 0x1, 0x81, 0x5, 0x10000, 0x1, 0x7, 0xffffffffffffffff, 0xeda, 0x5, 0x0, 0x91, 0x10001, 0xffffffffffff0001, 0xc384, 0x8, 0xffffffffffffffe0, 0x0, 0x4, 0xffff, 0x80, 0x7, 0x2, 0x1, 0x0, 0x30, 0x3, 0x0, 0x7, 0x4, @perf_config_ext={0x0, 0x8}, 0x20403, 0xcae, 0x9, 0x7, 0x0, 0xfff, 0x7}, r1, 0x0, r0, 0x2) 2018/03/31 12:25:39 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f00000007c0)='./file0\x00', 0x10000, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @loopback, @rand_addr}, &(0x7f0000000840)=0xc) stat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000940)={{{@in, @in6=@mcast2={0xff, 0x2, [], 0x1}, 0x4e23, 0x4, 0x4e21, 0x687, 0xa, 0x20, 0x20, 0xff, r2, r3}, {0xfffffffffffffb92, 0x934b, 0x2, 0x1, 0x8, 0x0, 0x9, 0xffffffffffffbe9e}, {0x7fffffff, 0x28, 0x2, 0x28de}, 0x660, 0x6e6bb9, 0x1, 0x0, 0x1, 0x2}, {{@in6, 0x4d3, 0x6c}, 0x2, @in6=@mcast1={0xff, 0x1, [], 0x1}, 0x3504, 0x4, 0x3, 0x6, 0x1000, 0x9, 0x4}}, 0xe8) r4 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x6) r5 = semget(0x0, 0x0, 0x0) semctl$GETVAL(r5, 0x4, 0xc, &(0x7f0000000140)=""/200) write$cgroup_subtree(r4, &(0x7f0000000100)={[{0x2d, 'pids', 0x20}]}, 0x6) 2018/03/31 12:25:39 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x0, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:25:39 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x8, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r1, 0xc04064a0, &(0x7f00000002c0)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x5, 0x8, 0x5}) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000300)={'ah\x00'}, &(0x7f0000000340)=0x1e) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 2018/03/31 12:25:40 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)="2e2f6367726f753f00000048992e69544a3edd9f57e8ac17d21bda50d52cdc3b3b0c9921b22e50f64f571c00b13f1ff10d3371f01db9c02e7afe1db7640d39f5a30fca7bf7b899602b04aeaeb4b164535562176250e3fb25f4f6226ce7055d854d000000000000", 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'pids', 0x20}]}, 0x6) write$cgroup_subtree(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="2d70e96473200a772bb17da64bcb3d025a74051873a676705ed130cd1d3751f5b632fd019c31df5e279763df68711d54657f0c3b7300c11bf4d58922d5f85bc54fdafb47eadbdb383222b222cc69d51bf0d454837bf6aa8f8879e26b92b7f31048df864daba7159bd1e8db012b6e1520368e6809479de2bfa99d63877d18518766ad4d4798249fa26abfdf28792671de1c547096b1ad1e27dbbc8b0cccd4318be0c73f592883436e1c51"], 0x6) 2018/03/31 12:25:40 executing program 4: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000100)={0x1, {{0x2, 0x4e23, @broadcast=0xffffffff}}}, 0x88) r1 = socket$inet6(0xa, 0x80803, 0x2f) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r1, &(0x7f00000000c0)={0xa}, 0x1c) 2018/03/31 12:25:40 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x0, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:25:40 executing program 6: r0 = getpgrp(0xffffffffffffffff) socketpair(0x15, 0x7, 0x8001, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xffffffff, 0x4, 0x4, 0x1000, 0x0, 0x1, 0x800, 0xa, 0x6, 0x1de0, 0x77, 0x3, 0x4, 0x3, 0x6, 0x10000, 0x1, 0x1, 0x8000, 0x800, 0x1ff, 0x20, 0x40, 0x6, 0x6, 0x5, 0x936, 0x9, 0x0, 0x80000000, 0x401, 0x1cb9, 0x625da154, 0x1ff, 0x1ff, 0x84cc, 0x0, 0x103dbc89, 0x2, @perf_bp={&(0x7f0000000080), 0xa}, 0x80, 0x4, 0x9, 0x7, 0x6, 0x6814, 0x8}, r0, 0xa, r1, 0xa) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)="faec6367726f757000372b34be302256bbb8dd8a192c6e6a7e29087df549eb9ca3c305f45256c20310553e14b19b530caf9403696bf778b5052d4ed7b9637c8f571e9c435a360ebb3cbe119fe89429a8644e9f0ad1813963103fb8b32fdf940bf733327946e11db864be89ef8b89869c270a81563261e6c15f3805", 0x200002, 0x0) r4 = openat$cgroup_subtree(r3, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f00000000c0)={[{0x2b, 'pids', 0x20}]}, 0x6) write$cgroup_subtree(r4, &(0x7f0000000100), 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x6) 2018/03/31 12:25:40 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x40000) getsockname$unix(r1, &(0x7f0000000100), &(0x7f0000000080)=0x6e) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 2018/03/31 12:25:40 executing program 2 (fault-call:10 fault-nth:13): r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="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", 0xfc}], 0x1, 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r2 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) ioctl$sock_ipx_SIOCAIPXPRISLT(r2, 0x89e1, &(0x7f0000000280)=0x3f) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f0000000200)={0x80, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23}, 0x0, 0x7, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000300)={r3, 0x1c9}, 0x8) r4 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e44ee") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x40, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000c40)={r3, 0x2}, &(0x7f0000000c80)=0xffffffffffffff39) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000540)=0x2, 0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000340)) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000d40)={0x7433, {{0x2, 0x4e21, @broadcast=0xffffffff}}, 0x1, 0x1, [{{0x2, 0x4e20}}]}, 0x110) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f, r3}, 0x20) 2018/03/31 12:25:40 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x80, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000080)=0x4, 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f00000000c0)={0xfff, 0x9, 0x401, 'queue0\x00', 0x6}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0xfffffd74}], 0x1) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x7, 0x8000, 0x1000, 0x7d0, 0x0, 0xffffffff00000000, 0x0, 0x5, 0x9, 0x6, 0x1, 0x81, 0x5, 0x10000, 0x1, 0x7, 0xffffffffffffffff, 0xeda, 0x5, 0x0, 0x91, 0x10001, 0xffffffffffff0001, 0xc384, 0x8, 0xffffffffffffffe0, 0x0, 0x4, 0xffff, 0x80, 0x7, 0x2, 0x1, 0x0, 0x30, 0x3, 0x0, 0x7, 0x4, @perf_config_ext={0x0, 0x8}, 0x20403, 0xcae, 0x9, 0x7, 0x0, 0xfff, 0x7}, r1, 0x0, r0, 0x2) 2018/03/31 12:25:40 executing program 1: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:25:40 executing program 6: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x6, 0x479ec76c2c78d99) ioctl$KIOCSOUND(r0, 0x4b2f, 0x9) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)=0x5, 0x4) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x2b, 'pids', 0x20}]}, 0x6) write$cgroup_subtree(r2, &(0x7f0000000100)={[{0x2d, 'pids', 0x20}]}, 0x6) 2018/03/31 12:25:40 executing program 5: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:25:40 executing program 7: socket$inet6(0xa, 0x6, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000943ffc)=0xa35) read(r1, &(0x7f00003fefff)=""/1, 0x1) r2 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r3, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r3, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r4}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)) r5 = dup2(r3, r4) fcntl$setown(r5, 0x8, r2) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r2, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0xe6, 0x2, {0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, 0xb64, 0x9, 0x9b, 0x5, 0xffff}}, &(0x7f0000000580)=0xb0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:25:40 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:25:40 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x10000, 0x109000) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000080)=0x8000000, 0x4) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) mq_timedreceive(r1, &(0x7f0000000100)=""/85, 0x55, 0x100000000, &(0x7f0000000180)) [ 850.634409] FAULT_INJECTION: forcing a failure. [ 850.634409] name failslab, interval 1, probability 0, space 0, times 0 [ 850.645645] CPU: 0 PID: 21615 Comm: syz-executor2 Not tainted 4.16.0-rc7+ #373 [ 850.652984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 850.662314] Call Trace: [ 850.664882] dump_stack+0x194/0x24d [ 850.668491] ? arch_local_irq_restore+0x53/0x53 [ 850.673144] should_fail+0x8c0/0xa40 [ 850.676836] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 850.681921] ? radix_tree_clear_tags+0xb0/0xb0 [ 850.686486] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 850.691652] ? lock_downgrade+0x980/0x980 [ 850.695782] ? print_irqtrace_events+0x270/0x270 [ 850.700518] ? unwind_next_frame.part.6+0x1a6/0xb40 [ 850.705513] ? trace_hardirqs_off+0x10/0x10 [ 850.709813] ? trace_hardirqs_off+0x10/0x10 [ 850.714113] ? trace_hardirqs_off+0x10/0x10 [ 850.718414] ? print_irqtrace_events+0x270/0x270 [ 850.723155] should_failslab+0xec/0x120 [ 850.727106] kmem_cache_alloc+0x47/0x760 [ 850.731147] ? radix_tree_node_alloc.constprop.19+0x2d0/0x2d0 [ 850.737014] radix_tree_node_alloc.constprop.19+0x1b4/0x2d0 [ 850.742703] idr_get_free+0x9d0/0xfd0 [ 850.746484] ? radix_tree_clear_tags+0xb0/0xb0 [ 850.751043] ? unwind_get_return_address+0x61/0xa0 [ 850.755948] ? __save_stack_trace+0x7e/0xd0 [ 850.760253] ? save_stack+0xa3/0xd0 [ 850.763858] ? save_stack+0x43/0xd0 [ 850.767460] ? kasan_kmalloc+0xad/0xe0 [ 850.771321] ? kasan_slab_alloc+0x12/0x20 [ 850.775444] ? kmem_cache_alloc+0x12e/0x760 [ 850.779742] ? alloc_pid+0xc1/0xa00 [ 850.783345] ? copy_process.part.38+0x2516/0x4bd0 [ 850.788161] ? _do_fork+0x1f7/0xf70 [ 850.791762] ? SyS_clone+0x37/0x50 [ 850.795278] ? do_syscall_64+0x281/0x940 [ 850.799325] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 850.804800] ? refcount_inc_not_zero+0xfe/0x180 [ 850.809451] ? find_held_lock+0x35/0x1d0 [ 850.813495] idr_alloc_u32+0x1b2/0x390 [ 850.817362] ? __fprop_inc_percpu_max+0x2a0/0x2a0 [ 850.822180] ? lock_acquire+0x1d5/0x580 [ 850.826131] ? alloc_pid+0x22e/0xa00 [ 850.829943] ? rcu_pm_notify+0xc0/0xc0 [ 850.833808] idr_alloc_cyclic+0x15a/0x320 [ 850.837933] ? idr_alloc+0x180/0x180 [ 850.841624] ? copy_namespaces+0x1a3/0x400 [ 850.845837] ? __radix_tree_preload+0x133/0x1c0 [ 850.850487] alloc_pid+0x2ad/0xa00 [ 850.854007] ? __change_pid+0x400/0x400 [ 850.857958] ? ns_capable_common+0xcf/0x160 [ 850.862261] ? memset+0x31/0x40 [ 850.865516] ? copy_thread_tls+0x268/0x8f0 [ 850.869737] copy_process.part.38+0x2516/0x4bd0 [ 850.874388] ? __cleanup_sighand+0x40/0x40 [ 850.878611] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 850.883784] ? __lock_acquire+0x664/0x3e00 [ 850.887999] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 850.893169] ? environ_open+0x80/0x80 [ 850.896950] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 850.902114] ? __lock_acquire+0x664/0x3e00 [ 850.906325] ? mntput_no_expire+0x130/0xa90 [ 850.910623] ? print_irqtrace_events+0x270/0x270 [ 850.915354] ? trace_hardirqs_off+0x10/0x10 [ 850.919656] ? lock_acquire+0x1d5/0x580 [ 850.923606] ? trace_hardirqs_off+0x10/0x10 [ 850.927906] ? trace_hardirqs_off+0x10/0x10 [ 850.932206] ? __lock_acquire+0x664/0x3e00 [ 850.936419] ? check_same_owner+0x320/0x320 [ 850.940725] ? find_held_lock+0x35/0x1d0 [ 850.944767] ? _parse_integer+0xe9/0x140 [ 850.948819] ? trace_hardirqs_off+0x10/0x10 [ 850.953118] ? _parse_integer+0x140/0x140 [ 850.957245] ? trace_hardirqs_off+0x10/0x10 [ 850.961541] ? get_pid_task+0x93/0x140 [ 850.965408] ? lock_downgrade+0x980/0x980 [ 850.969533] ? find_held_lock+0x35/0x1d0 [ 850.973574] ? __f_unlock_pos+0x19/0x20 [ 850.977524] ? lock_downgrade+0x980/0x980 [ 850.981652] ? get_pid_task+0xbc/0x140 [ 850.985521] ? proc_fail_nth_write+0x9b/0x1d0 [ 850.989997] ? map_files_get_link+0x3a0/0x3a0 [ 850.994469] ? handle_mm_fault+0x35b/0xb10 [ 850.998683] _do_fork+0x1f7/0xf70 [ 851.002119] ? fork_idle+0x2d0/0x2d0 [ 851.005815] ? wait_for_completion+0x770/0x770 [ 851.010375] ? __lock_is_held+0xb6/0x140 [ 851.014423] ? __sb_end_write+0xa0/0xd0 [ 851.018378] ? fput+0xd2/0x140 [ 851.021546] ? SyS_write+0x184/0x220 [ 851.025236] ? SyS_read+0x220/0x220 [ 851.028839] SyS_clone+0x37/0x50 [ 851.032181] ? sys_vfork+0x30/0x30 [ 851.035698] do_syscall_64+0x281/0x940 [ 851.039565] ? vmalloc_sync_all+0x30/0x30 [ 851.043686] ? _raw_spin_unlock_irq+0x27/0x70 [ 851.048157] ? finish_task_switch+0x1c1/0x7e0 [ 851.052628] ? syscall_return_slowpath+0x550/0x550 [ 851.057534] ? syscall_return_slowpath+0x2ac/0x550 [ 851.062438] ? prepare_exit_to_usermode+0x350/0x350 [ 851.067433] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 851.072777] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 851.077601] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 851.082763] RIP: 0033:0x454e79 2018/03/31 12:25:41 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000bc0)={&(0x7f00000002c0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000340)=""/232, 0xe8}, {&(0x7f0000000440)=""/147, 0x93}, {&(0x7f0000000500)=""/203, 0xcb}, {&(0x7f0000000600)=""/224, 0xe0}, {&(0x7f0000000700)=""/218, 0xda}, {&(0x7f0000000800)=""/120, 0x78}, {&(0x7f0000000880)=""/135, 0x87}, {&(0x7f0000000940)=""/67, 0x43}, {&(0x7f00000009c0)}], 0x9, &(0x7f0000000ac0)=""/233, 0xe9, 0x1b2}, 0x10000) r3 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) dup3(r3, r2, 0x80000080000) write$cgroup_subtree(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="10518d431285d35be23547fb4e1f7d84f29c900f45d94624b123b12b73608698d9d3855ef9a5bda74211e4bcb56303403dfb966e59000000000000000012db36b3b93176cd90780a6435689d3159c92685afdc2c5e0b5a87bf88e019bde6baaecdbdd3527e077b4a7b21b38a0f672efb4c562c3d2aa270aaf76012ac6f06b4d20b6e215b0400000000000000833a098e285eb205bd4b3875d8039c34dc390d4e030ac097873408830ac46a3649d5cebe663f26dea4bee7fb1ae646ebc61c0328fdf35234eab4e463c4f8b465cc000000000000000000000000"], 0x6) write$cgroup_subtree(r3, &(0x7f0000000100)={[{0x2d, 'pids', 0x20}]}, 0x6) [ 851.085929] RSP: 002b:00007f935ae4bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 851.093614] RAX: ffffffffffffffda RBX: 00007f935ae4c6d4 RCX: 0000000000454e79 [ 851.100863] RDX: 00000000200008c0 RSI: 0000000020000800 RDI: 000000002000c100 [ 851.108109] RBP: 000000000072bea0 R08: 0000000020000940 R09: 0000000000000000 [ 851.115357] R10: 0000000020000900 R11: 0000000000000246 R12: 0000000000000014 [ 851.122604] R13: 0000000000000051 R14: 00000000006f2838 R15: 000000000000000d 2018/03/31 12:25:41 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1b) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 2018/03/31 12:25:41 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:25:41 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r1, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)=r2, 0x4) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) r3 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2b, 'pids', 0x20}]}, 0x6) write$cgroup_subtree(r3, &(0x7f0000000100)={[{0x2d, 'pids', 0x20}]}, 0x6) [ 851.187632] IPVS: ftp: loaded support on port[0] = 21 2018/03/31 12:25:41 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:25:41 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'pids', 0x20}]}, 0x6) write$cgroup_subtree(r1, &(0x7f0000000100)={[{0x2d, 'pids', 0x20}]}, 0x6) 2018/03/31 12:25:41 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x800, 0x0) ioctl$TCSBRK(r1, 0x5409, 0x9) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 2018/03/31 12:25:41 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, 0x0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:25:42 executing program 2 (fault-call:10 fault-nth:14): r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="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", 0xfc}], 0x1, 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r2 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) ioctl$sock_ipx_SIOCAIPXPRISLT(r2, 0x89e1, &(0x7f0000000280)=0x3f) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f0000000200)={0x80, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23}, 0x0, 0x7, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000300)={r3, 0x1c9}, 0x8) r4 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e44ee") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x40, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000c40)={r3, 0x2}, &(0x7f0000000c80)=0xffffffffffffff39) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000540)=0x2, 0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000340)) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000d40)={0x7433, {{0x2, 0x4e21, @broadcast=0xffffffff}}, 0x1, 0x1, [{{0x2, 0x4e20}}]}, 0x110) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f, r3}, 0x20) 2018/03/31 12:25:42 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, 0x0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:25:42 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x80, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000080)=0x4, 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f00000000c0)={0xfff, 0x9, 0x401, 'queue0\x00', 0x6}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0xfffffd74}], 0x1) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x7, 0x8000, 0x1000, 0x7d0, 0x0, 0xffffffff00000000, 0x0, 0x5, 0x9, 0x6, 0x1, 0x81, 0x5, 0x10000, 0x1, 0x7, 0xffffffffffffffff, 0xeda, 0x5, 0x0, 0x91, 0x10001, 0xffffffffffff0001, 0xc384, 0x8, 0xffffffffffffffe0, 0x0, 0x4, 0xffff, 0x80, 0x7, 0x2, 0x1, 0x0, 0x30, 0x3, 0x0, 0x7, 0x4, @perf_config_ext={0xfffffffffffff0f9}, 0x20403, 0xcae, 0x9, 0x7, 0x0, 0xfff, 0x7}, r1, 0x0, r0, 0x2) 2018/03/31 12:25:42 executing program 7: socket$inet6(0xa, 0x6, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0xe6, 0x2, {0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, 0xb64, 0x9, 0x9b, 0x5, 0xffff}}, &(0x7f0000000580)=0xb0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:25:42 executing program 1: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:25:42 executing program 5: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(0xffffffffffffffff, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$setown(r2, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:25:42 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'pids', 0x20}]}, 0x6) write$cgroup_subtree(r1, &(0x7f0000000100)={[{0x2d, 'pids', 0x20}]}, 0x6) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x9, 0x400041) connect$pptp(r2, &(0x7f0000000140)={0x18, 0x2, {0x1, @rand_addr=0x3}}, 0x1e) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000180)=@sack_info={0x0, 0x1, 0x27}, &(0x7f00000001c0)=0xc) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000200)={r3, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}}, &(0x7f00000002c0)=0x84) 2018/03/31 12:25:42 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) pipe(&(0x7f0000000040)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000002c0)={0x0, 0x1000, "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"}, &(0x7f0000000080)=0x1008) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000100)={r2, 0x8b, "ffdd6a1c29f5c854fb82af6aa9ba4f897361940511f286685912075b819f044a8e3846d3618954bc291b03ad74e0301660c03cc7b8d1c724b9934d2b3c91c3b8523396be7a6223a8964af58c8e8c85344a13685aa4d6b90ac9d056b8296672972a3bb4443f5ae197a6285ad6422fae8d83568b11ed2e55c8e2058e98001aa1f0b802987e73c8c6e1c3367f"}, &(0x7f0000001300)=0x93) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) [ 852.230315] FAULT_INJECTION: forcing a failure. [ 852.230315] name failslab, interval 1, probability 0, space 0, times 0 [ 852.241556] CPU: 1 PID: 21691 Comm: syz-executor2 Not tainted 4.16.0-rc7+ #373 [ 852.248897] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 852.258229] Call Trace: [ 852.260799] dump_stack+0x194/0x24d [ 852.264409] ? arch_local_irq_restore+0x53/0x53 [ 852.269076] should_fail+0x8c0/0xa40 [ 852.272768] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 852.277847] ? kasan_kmalloc+0xad/0xe0 [ 852.281711] ? kmem_cache_alloc+0x12e/0x760 [ 852.286016] ? radix_tree_node_alloc.constprop.19+0x1b4/0x2d0 [ 852.291877] ? idr_get_free+0x9d0/0xfd0 [ 852.295828] ? idr_alloc_u32+0x1b2/0x390 [ 852.299865] ? idr_alloc_cyclic+0x15a/0x320 [ 852.304165] ? alloc_pid+0x2ad/0xa00 [ 852.307859] ? copy_process.part.38+0x2516/0x4bd0 [ 852.312678] ? SyS_clone+0x37/0x50 [ 852.316196] ? do_syscall_64+0x281/0x940 [ 852.320236] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 852.325583] ? radix_tree_clear_tags+0xb0/0xb0 [ 852.330149] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 852.335319] ? lock_downgrade+0x980/0x980 [ 852.339447] ? trace_hardirqs_off+0x10/0x10 [ 852.343767] ? print_irqtrace_events+0x270/0x270 [ 852.348506] ? unwind_next_frame.part.6+0x1a6/0xb40 [ 852.353503] ? trace_hardirqs_off+0x10/0x10 [ 852.357805] ? trace_hardirqs_off+0x10/0x10 [ 852.362101] ? trace_hardirqs_off+0x10/0x10 [ 852.366402] ? print_irqtrace_events+0x270/0x270 [ 852.371139] ? __lock_is_held+0xb6/0x140 [ 852.375191] ? radix_tree_node_alloc.constprop.19+0x1b4/0x2d0 [ 852.381926] should_failslab+0xec/0x120 [ 852.385885] kmem_cache_alloc+0x47/0x760 [ 852.389925] ? radix_tree_node_alloc.constprop.19+0x2d0/0x2d0 [ 852.395794] radix_tree_node_alloc.constprop.19+0x1b4/0x2d0 [ 852.401484] idr_get_free+0x9d0/0xfd0 [ 852.405270] ? radix_tree_clear_tags+0xb0/0xb0 [ 852.409828] ? replace_slot+0x12b/0x500 [ 852.413781] ? unwind_get_return_address+0x61/0xa0 [ 852.418691] ? radix_tree_tagged+0x60/0x60 [ 852.422903] ? save_stack+0xa3/0xd0 [ 852.426505] ? save_stack+0x43/0xd0 [ 852.430111] ? kasan_kmalloc+0xad/0xe0 [ 852.433979] ? kasan_slab_alloc+0x12/0x20 [ 852.438105] ? kmem_cache_alloc+0x12e/0x760 [ 852.442405] ? alloc_pid+0xc1/0xa00 [ 852.446012] ? __radix_tree_replace+0x1af/0x310 [ 852.450665] ? trace_hardirqs_off+0x10/0x10 [ 852.454968] ? node_tag_clear+0xf2/0x180 [ 852.459011] ? radix_tree_iter_tag_clear+0x97/0xd0 [ 852.463921] idr_alloc_u32+0x1b2/0x390 [ 852.467787] ? __fprop_inc_percpu_max+0x2a0/0x2a0 [ 852.472610] ? lock_acquire+0x1d5/0x580 [ 852.476560] ? alloc_pid+0x22e/0xa00 [ 852.480254] ? lock_downgrade+0x980/0x980 [ 852.484384] idr_alloc_cyclic+0x15a/0x320 [ 852.488511] ? idr_alloc+0x180/0x180 [ 852.492203] ? __radix_tree_preload+0x133/0x1c0 [ 852.496852] alloc_pid+0x2ad/0xa00 [ 852.500371] ? __change_pid+0x400/0x400 [ 852.504322] ? ns_capable_common+0xcf/0x160 [ 852.508627] ? memset+0x31/0x40 [ 852.511884] ? copy_thread_tls+0x268/0x8f0 [ 852.516105] copy_process.part.38+0x2516/0x4bd0 [ 852.520760] ? __cleanup_sighand+0x40/0x40 [ 852.524982] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 852.530157] ? __lock_acquire+0x664/0x3e00 [ 852.534374] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 852.539550] ? environ_open+0x80/0x80 [ 852.543335] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 852.548531] ? __lock_acquire+0x664/0x3e00 [ 852.552751] ? mntput_no_expire+0x130/0xa90 [ 852.557052] ? print_irqtrace_events+0x270/0x270 [ 852.561784] ? trace_hardirqs_off+0x10/0x10 [ 852.566085] ? lock_acquire+0x1d5/0x580 [ 852.570039] ? trace_hardirqs_off+0x10/0x10 [ 852.574337] ? trace_hardirqs_off+0x10/0x10 [ 852.578641] ? __lock_acquire+0x664/0x3e00 [ 852.582852] ? check_same_owner+0x320/0x320 [ 852.587152] ? find_held_lock+0x35/0x1d0 [ 852.591198] ? _parse_integer+0xe9/0x140 [ 852.595238] ? trace_hardirqs_off+0x10/0x10 [ 852.599534] ? _parse_integer+0x140/0x140 [ 852.603663] ? trace_hardirqs_off+0x10/0x10 [ 852.607968] ? get_pid_task+0x93/0x140 [ 852.611831] ? lock_downgrade+0x980/0x980 [ 852.615958] ? find_held_lock+0x35/0x1d0 [ 852.619999] ? __f_unlock_pos+0x19/0x20 [ 852.623950] ? lock_downgrade+0x980/0x980 [ 852.628072] ? get_pid_task+0xbc/0x140 [ 852.631939] ? proc_fail_nth_write+0x9b/0x1d0 [ 852.636409] ? map_files_get_link+0x3a0/0x3a0 [ 852.640881] ? handle_mm_fault+0x35b/0xb10 [ 852.645100] _do_fork+0x1f7/0xf70 [ 852.648537] ? fork_idle+0x2d0/0x2d0 [ 852.652234] ? wait_for_completion+0x770/0x770 [ 852.656794] ? __lock_is_held+0xb6/0x140 [ 852.660840] ? __sb_end_write+0xa0/0xd0 [ 852.664793] ? fput+0xd2/0x140 [ 852.667962] ? SyS_write+0x184/0x220 [ 852.671656] ? SyS_read+0x220/0x220 [ 852.675262] SyS_clone+0x37/0x50 [ 852.678606] ? sys_vfork+0x30/0x30 [ 852.682126] do_syscall_64+0x281/0x940 [ 852.685990] ? vmalloc_sync_all+0x30/0x30 [ 852.690116] ? _raw_spin_unlock_irq+0x27/0x70 [ 852.694589] ? finish_task_switch+0x1c1/0x7e0 [ 852.699061] ? syscall_return_slowpath+0x550/0x550 [ 852.703970] ? syscall_return_slowpath+0x2ac/0x550 [ 852.708877] ? prepare_exit_to_usermode+0x350/0x350 [ 852.713874] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 852.719217] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 852.724041] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 852.729211] RIP: 0033:0x454e79 2018/03/31 12:25:43 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) tkill(r1, 0x2e) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000080)={'nr0\x00', 0x5}) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) [ 852.732378] RSP: 002b:00007f935ae4bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 852.740066] RAX: ffffffffffffffda RBX: 00007f935ae4c6d4 RCX: 0000000000454e79 [ 852.747316] RDX: 00000000200008c0 RSI: 0000000020000800 RDI: 000000002000c100 [ 852.754570] RBP: 000000000072bea0 R08: 0000000020000940 R09: 0000000000000000 [ 852.761836] R10: 0000000020000900 R11: 0000000000000246 R12: 0000000000000014 [ 852.769094] R13: 0000000000000051 R14: 00000000006f2838 R15: 000000000000000e 2018/03/31 12:25:43 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8, 0x200000) getsockopt$inet_tcp_int(r2, 0x6, 0x19, &(0x7f0000000140), &(0x7f0000000180)=0x4) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'pids', 0x20}]}, 0x6) write$cgroup_subtree(r1, &(0x7f0000000100)={[{0x2d, 'pids', 0x20}]}, 0x6) 2018/03/31 12:25:43 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) listen(r0, 0x557) r1 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0xfff, 0x2) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000140)={0x3, &(0x7f0000000100)=[{0x8165, 0x20, 0x7e94, 0x4}, {0x1, 0x7, 0x8001, 0x2}, {0xfffffffffffffe01, 0x7a1, 0x80, 0x2}]}, 0x10) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) ioctl$sock_bt(r0, 0x8907, &(0x7f00000002c0)="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") r2 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x7, 0x800) ioctl$TIOCSCTTY(r2, 0x540e, 0x6) 2018/03/31 12:25:43 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, 0x0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) [ 852.846188] IPVS: ftp: loaded support on port[0] = 21 2018/03/31 12:25:43 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="2b105ef691fc226ad23c50163bbd154f357bf855343d8e0000"], 0x6) write$cgroup_subtree(r1, &(0x7f0000000000), 0x0) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xc7, 0x40001) getsockopt$inet6_int(r2, 0x29, 0xd1, &(0x7f0000000100), &(0x7f0000000140)=0x4) 2018/03/31 12:25:43 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000040)={@dev}, &(0x7f0000000080)=0x14) 2018/03/31 12:25:43 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x0, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:25:43 executing program 6: r0 = open(&(0x7f0000000000)='./file0\x00', 0x2000, 0x0) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000140)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x2b, 'pids', 0x20}]}, 0x6) write$cgroup_subtree(r2, &(0x7f0000000100)={[{0x2d, 'pids', 0x20}]}, 0x6) 2018/03/31 12:25:44 executing program 2 (fault-call:10 fault-nth:15): r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="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", 0xfc}], 0x1, 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r2 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) ioctl$sock_ipx_SIOCAIPXPRISLT(r2, 0x89e1, &(0x7f0000000280)=0x3f) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f0000000200)={0x80, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23}, 0x0, 0x7, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000300)={r3, 0x1c9}, 0x8) r4 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e44ee") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x40, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000c40)={r3, 0x2}, &(0x7f0000000c80)=0xffffffffffffff39) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000540)=0x2, 0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000340)) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000d40)={0x7433, {{0x2, 0x4e21, @broadcast=0xffffffff}}, 0x1, 0x1, [{{0x2, 0x4e20}}]}, 0x110) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f, r3}, 0x20) 2018/03/31 12:25:44 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'pids', 0x20}]}, 0x6) write$cgroup_subtree(r1, &(0x7f0000000100)={[{0x2d, 'pids', 0x20}]}, 0x6) fsync(r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) fchdir(r1) 2018/03/31 12:25:44 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x0, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:25:44 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x80, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000080)=0x4, 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f00000000c0)={0xfff, 0x9, 0x401, 'queue0\x00', 0x6}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0xfffffd74}], 0x1) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x7, 0x8000, 0x1000, 0x7d0, 0x0, 0xffffffff00000000, 0x0, 0x5, 0x9, 0x6, 0x1, 0x81, 0x5, 0x10000, 0x1, 0x7, 0xffffffffffffffff, 0xeda, 0x5, 0x0, 0x91, 0x10001, 0xffffffffffff0001, 0xc384, 0x8, 0xffffffffffffffe0, 0x0, 0x4, 0xffff, 0x80, 0x7, 0x2, 0x1, 0x0, 0x30, 0x3, 0x0, 0x7, 0x4, @perf_config_ext={0xfffffffffffff0f9}, 0x20403, 0xcae, 0x9, 0x7, 0x0, 0xfff, 0x7}, r1, 0x0, r0, 0x2) 2018/03/31 12:25:44 executing program 5: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(0xffffffffffffffff, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$setown(r2, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:25:44 executing program 1: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:25:44 executing program 7: socket$inet6(0xa, 0x6, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0xe6, 0x2, {0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, 0xb64, 0x9, 0x9b, 0x5, 0xffff}}, &(0x7f0000000580)=0xb0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:25:44 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x4, 0x200) write$cgroup_int(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="37b2a5391b1f5e9d3aa19fa6bb064d8297e4b436efedc7542fd91a5ba5a04ec68a286aa34a5011bf84a8a6103d94af154db6048db82b8e14b4ef3c5d61024ca7f54c36663c6257f31eec5b39f97b6a07f8e5a2149d37e7e1b9c13a1539d7ed607b6c9fc124cda42f3a9960fd1732c5f579116103d2a83b4bf995d86dd9dc7ade355493d307baada1658546fdc95ac8169ed3f871e6ec9355e227219817fb96151d0507869e2cf1bf86502ce534fd9a409607de62fc"], 0x1) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) r2 = gettid() fcntl$setownex(r1, 0xf, &(0x7f0000000100)={0x1, r2}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) [ 853.743832] FAULT_INJECTION: forcing a failure. [ 853.743832] name failslab, interval 1, probability 0, space 0, times 0 [ 853.755286] CPU: 1 PID: 21754 Comm: syz-executor2 Not tainted 4.16.0-rc7+ #373 [ 853.762653] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 853.772016] Call Trace: [ 853.774618] dump_stack+0x194/0x24d [ 853.778253] ? arch_local_irq_restore+0x53/0x53 [ 853.782935] ? wait_for_completion+0x770/0x770 [ 853.787534] should_fail+0x8c0/0xa40 [ 853.791260] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 853.796362] ? rcu_pm_notify+0xc0/0xc0 [ 853.800261] ? find_held_lock+0x35/0x1d0 [ 853.804334] ? check_same_owner+0x320/0x320 [ 853.808649] ? sget_userns+0x27d/0xe40 [ 853.812532] ? rcu_note_context_switch+0x710/0x710 [ 853.817465] should_failslab+0xec/0x120 [ 853.821435] kmem_cache_alloc_trace+0x4b/0x740 [ 853.826013] ? check_same_owner+0x320/0x320 [ 853.830339] sget_userns+0x2a3/0xe40 [ 853.834055] ? set_anon_super+0x20/0x20 [ 853.838041] ? put_filp+0x90/0x90 [ 853.841492] ? __alloc_pages_nodemask+0xabe/0xdd0 [ 853.846327] ? destroy_unused_super.part.6+0xd0/0xd0 [ 853.851429] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 853.856440] ? save_stack+0xa3/0xd0 [ 853.860055] ? save_stack+0x43/0xd0 [ 853.863664] ? kasan_kmalloc+0xad/0xe0 [ 853.867534] ? kasan_slab_alloc+0x12/0x20 [ 853.871661] ? kmem_cache_alloc+0x12e/0x760 [ 853.875962] ? alloc_pid+0xc1/0xa00 [ 853.879576] ? __radix_tree_replace+0x1af/0x310 [ 853.884229] ? trace_hardirqs_off+0x10/0x10 [ 853.888532] ? radix_tree_delete+0x30/0x30 [ 853.892749] ? node_tag_clear+0xf2/0x180 [ 853.896801] ? proc_get_inode+0x620/0x620 [ 853.900930] mount_ns+0x6d/0x190 [ 853.904279] proc_mount+0x7a/0x90 [ 853.907714] mount_fs+0x66/0x2d0 [ 853.911068] vfs_kern_mount.part.26+0xc6/0x4a0 [ 853.915631] ? may_umount+0xa0/0xa0 [ 853.919240] ? idr_alloc_cyclic+0x1d6/0x320 [ 853.923559] ? do_raw_spin_trylock+0x190/0x190 [ 853.928161] ? idr_alloc+0x180/0x180 [ 853.931860] kern_mount_data+0x50/0xb0 [ 853.935731] pid_ns_prepare_proc+0x1e/0x80 [ 853.939948] alloc_pid+0x87e/0xa00 [ 853.943472] ? __change_pid+0x400/0x400 [ 853.947431] ? ns_capable_common+0xcf/0x160 [ 853.951745] ? memset+0x31/0x40 [ 853.955014] ? copy_thread_tls+0x268/0x8f0 [ 853.959241] copy_process.part.38+0x2516/0x4bd0 [ 853.963901] ? __cleanup_sighand+0x40/0x40 [ 853.968133] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 853.973313] ? __lock_acquire+0x664/0x3e00 [ 853.977534] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 853.982711] ? environ_open+0x80/0x80 [ 853.986507] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 853.991681] ? __lock_acquire+0x664/0x3e00 [ 853.995897] ? mntput_no_expire+0x130/0xa90 [ 854.000202] ? print_irqtrace_events+0x270/0x270 [ 854.004936] ? trace_hardirqs_off+0x10/0x10 [ 854.009243] ? lock_acquire+0x1d5/0x580 [ 854.013199] ? trace_hardirqs_off+0x10/0x10 [ 854.017499] ? trace_hardirqs_off+0x10/0x10 [ 854.021803] ? __lock_acquire+0x664/0x3e00 [ 854.026025] ? check_same_owner+0x320/0x320 [ 854.030334] ? find_held_lock+0x35/0x1d0 [ 854.034385] ? _parse_integer+0xe9/0x140 [ 854.038429] ? trace_hardirqs_off+0x10/0x10 [ 854.042731] ? _parse_integer+0x140/0x140 [ 854.046866] ? trace_hardirqs_off+0x10/0x10 [ 854.051171] ? get_pid_task+0x93/0x140 [ 854.055041] ? lock_downgrade+0x980/0x980 [ 854.059174] ? find_held_lock+0x35/0x1d0 [ 854.063222] ? __f_unlock_pos+0x19/0x20 [ 854.067177] ? lock_downgrade+0x980/0x980 [ 854.071307] ? get_pid_task+0xbc/0x140 [ 854.075175] ? proc_fail_nth_write+0x9b/0x1d0 [ 854.079652] ? map_files_get_link+0x3a0/0x3a0 [ 854.084129] ? handle_mm_fault+0x35b/0xb10 [ 854.088347] _do_fork+0x1f7/0xf70 [ 854.091785] ? fork_idle+0x2d0/0x2d0 [ 854.095482] ? wait_for_completion+0x770/0x770 [ 854.100050] ? __lock_is_held+0xb6/0x140 [ 854.104104] ? __sb_end_write+0xa0/0xd0 [ 854.108063] ? fput+0xd2/0x140 [ 854.111238] ? SyS_write+0x184/0x220 [ 854.114934] ? SyS_read+0x220/0x220 [ 854.118545] SyS_clone+0x37/0x50 [ 854.121896] ? sys_vfork+0x30/0x30 [ 854.125421] do_syscall_64+0x281/0x940 [ 854.129294] ? vmalloc_sync_all+0x30/0x30 [ 854.133424] ? _raw_spin_unlock_irq+0x27/0x70 [ 854.137906] ? finish_task_switch+0x1c1/0x7e0 [ 854.142382] ? syscall_return_slowpath+0x550/0x550 [ 854.147294] ? syscall_return_slowpath+0x2ac/0x550 [ 854.152204] ? prepare_exit_to_usermode+0x350/0x350 [ 854.157205] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 854.162556] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 854.167388] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 854.172559] RIP: 0033:0x454e79 [ 854.175731] RSP: 002b:00007f935ae4bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 854.183422] RAX: ffffffffffffffda RBX: 00007f935ae4c6d4 RCX: 0000000000454e79 2018/03/31 12:25:44 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {0x3}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) [ 854.190673] RDX: 00000000200008c0 RSI: 0000000020000800 RDI: 000000002000c100 [ 854.197924] RBP: 000000000072bea0 R08: 0000000020000940 R09: 0000000000000000 [ 854.205171] R10: 0000000020000900 R11: 0000000000000246 R12: 0000000000000014 [ 854.212421] R13: 0000000000000051 R14: 00000000006f2838 R15: 000000000000000f 2018/03/31 12:25:44 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)=0x0) ptrace$cont(0x7, r1, 0xcc8, 0x8) 2018/03/31 12:25:44 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) unlink(&(0x7f0000000180)='./file0\x00') r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) socket$kcm(0x29, 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'pids', 0x20}]}, 0x6) r2 = openat$cgroup_ro(r0, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$KVM_S390_VCPU_FAULT(r2, 0x4008ae52, &(0x7f0000000140)=0x1) semget(0x1, 0x7, 0x100) write$cgroup_subtree(r1, &(0x7f0000000100)={[{0x2d, 'pids', 0x20}]}, 0x6) 2018/03/31 12:25:44 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x0, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:25:44 executing program 4: r0 = openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.type\x00', 0x2, 0x0) ftruncate(r0, 0x26) r1 = socket$inet6(0xa, 0x80803, 0x2f) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x7}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000140)={r2, 0xc49b, 0x7fffffff}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={r2, 0x2, 0x20}, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f00000003c0)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000480)={{{@in6=@mcast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) setresuid(r3, r4, r5) connect$inet6(r1, &(0x7f00000000c0)={0xa}, 0x1c) 2018/03/31 12:25:44 executing program 6: r0 = socket$inet6(0xa, 0x1001000000080001, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f00000001c0)={0x0, 0x7}) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000540)=0x0) r3 = syz_open_procfs(r2, &(0x7f0000000300)="d06f756e74730060da5d3c672c499fa70b03fe") r4 = getpid() mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x1, 0x36, 0xffffffffffffffff, 0x3) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r5, 0x29, 0xd2, &(0x7f0000000000)={{0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, {0xa, 0x4e20, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x5c) setsockopt$inet6_MRT6_DEL_MFC(r5, 0x29, 0xcd, &(0x7f0000e93fb4)={{0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}}, 0x5c) r6 = syz_open_procfs(r4, &(0x7f0000000240)='fdinfo\x00') ioctl$EVIOCSCLOCKID(r6, 0x400445a0, &(0x7f0000000340)=0x9) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000180)={0xb2a, 0x7ff}, 0x8) r7 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/loop-control\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f00000002c0)={0x381e, 0x8001, 0x8000}, 0x14) fcntl$setlease(r0, 0x400, 0x1) ptrace$peekuser(0x3, 0x0, 0x0) ioctl$sock_ipx_SIOCAIPXITFCRT(0xffffffffffffffff, 0x89e0, &(0x7f00000003c0)=0x1000) r8 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r7, 0x4c81, r8) madvise(&(0x7f000000e000/0x4000)=nil, 0x4000, 0x0) ioctl$LOOP_CTL_GET_FREE(r7, 0x4c82) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000080)=[@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}]}, &(0x7f0000000140)=0xc) ioctl$VT_GETMODE(r6, 0x5601, &(0x7f0000000280)) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000001c0), 0x4) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000400)={'mangle\x00'}, &(0x7f0000000480)=0x54) pwrite64(0xffffffffffffffff, &(0x7f0000000000)="a81cbe49", 0x4, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x32, r7, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)=""/84, &(0x7f000000cffc)=0x54) 2018/03/31 12:25:44 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x1000000000000}, 0xffffffffffffff4b) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in6=@ipv4={[], [0xff, 0xff]}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x40, 0x24001) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r1, 0xc008551b, &(0x7f0000000080)={0x5fc6, 0x8, [0x1a, 0x3]}) 2018/03/31 12:25:44 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) [ 854.461630] IPVS: ftp: loaded support on port[0] = 21 2018/03/31 12:25:46 executing program 2 (fault-call:10 fault-nth:16): r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="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", 0xfc}], 0x1, 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r2 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) ioctl$sock_ipx_SIOCAIPXPRISLT(r2, 0x89e1, &(0x7f0000000280)=0x3f) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f0000000200)={0x80, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23}, 0x0, 0x7, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000300)={r3, 0x1c9}, 0x8) r4 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e44ee") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x40, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000c40)={r3, 0x2}, &(0x7f0000000c80)=0xffffffffffffff39) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000540)=0x2, 0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000340)) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000d40)={0x7433, {{0x2, 0x4e21, @broadcast=0xffffffff}}, 0x1, 0x1, [{{0x2, 0x4e20}}]}, 0x110) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f, r3}, 0x20) 2018/03/31 12:25:46 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x80, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000080)=0x4, 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f00000000c0)={0xfff, 0x9, 0x401, 'queue0\x00', 0x6}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0xfffffd74}], 0x1) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x7, 0x8000, 0x1000, 0x7d0, 0x0, 0xffffffff00000000, 0x0, 0x5, 0x9, 0x6, 0x1, 0x81, 0x5, 0x10000, 0x1, 0x7, 0xffffffffffffffff, 0xeda, 0x5, 0x0, 0x91, 0x10001, 0xffffffffffff0001, 0xc384, 0x8, 0xffffffffffffffe0, 0x0, 0x4, 0xffff, 0x80, 0x7, 0x2, 0x1, 0x0, 0x30, 0x3, 0x0, 0x7, 0x4, @perf_config_ext={0xfffffffffffff0f9}, 0x20403, 0xcae, 0x9, 0x7, 0x0, 0xfff, 0x7}, r1, 0x0, r0, 0x2) 2018/03/31 12:25:46 executing program 1: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:25:46 executing program 5: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(0xffffffffffffffff, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$setown(r2, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:25:46 executing program 7: socket$inet6(0xa, 0x6, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0xe6, 0x2, {0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, 0xb64, 0x9, 0x9b, 0x5, 0xffff}}, &(0x7f0000000580)=0xb0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:25:46 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) socket$nl_route(0x10, 0x3, 0x0) 2018/03/31 12:25:46 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x10400, 0x340fd900d99b0566) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000140)=""/8) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'pids', 0x20}]}, 0x6) write$cgroup_subtree(r1, &(0x7f0000000100)={[{0x2d, 'pids', 0x20}]}, 0x6) chroot(&(0x7f0000000180)='./file0\x00') 2018/03/31 12:25:46 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:25:46 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='+pods '], 0x6) write$cgroup_subtree(r1, &(0x7f0000000100)={[{0x2d, 'pids', 0x20}]}, 0x6) [ 855.714484] FAULT_INJECTION: forcing a failure. [ 855.714484] name failslab, interval 1, probability 0, space 0, times 0 [ 855.726382] CPU: 0 PID: 21830 Comm: syz-executor2 Not tainted 4.16.0-rc7+ #373 [ 855.733754] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 855.743111] Call Trace: [ 855.745708] dump_stack+0x194/0x24d [ 855.749357] ? arch_local_irq_restore+0x53/0x53 [ 855.754049] should_fail+0x8c0/0xa40 [ 855.757784] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 855.762893] ? find_next_zero_bit+0xe3/0x110 [ 855.767300] ? trace_hardirqs_off+0x10/0x10 [ 855.771618] ? __lock_is_held+0xb6/0x140 [ 855.775674] ? find_held_lock+0x35/0x1d0 [ 855.779725] ? __lock_is_held+0xb6/0x140 [ 855.783783] ? check_same_owner+0x320/0x320 [ 855.788090] ? rcu_note_context_switch+0x710/0x710 [ 855.793005] ? rcu_note_context_switch+0x710/0x710 [ 855.797938] should_failslab+0xec/0x120 [ 855.801904] __kmalloc+0x63/0x760 [ 855.805358] ? lockdep_init_map+0x9/0x10 [ 855.809425] ? debug_mutex_init+0x2d/0x60 [ 855.813581] ? __list_lru_init+0xcf/0x750 [ 855.817720] __list_lru_init+0xcf/0x750 [ 855.821686] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 855.827577] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 855.832581] ? __lockdep_init_map+0xe4/0x650 [ 855.836977] ? lockdep_init_map+0x9/0x10 [ 855.841033] sget_userns+0x691/0xe40 [ 855.844778] ? set_anon_super+0x20/0x20 [ 855.848741] ? put_filp+0x90/0x90 [ 855.852181] ? destroy_unused_super.part.6+0xd0/0xd0 [ 855.857274] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 855.862278] ? save_stack+0xa3/0xd0 [ 855.865892] ? save_stack+0x43/0xd0 [ 855.869505] ? kasan_slab_alloc+0x12/0x20 [ 855.873643] ? kmem_cache_alloc+0x12e/0x760 [ 855.877950] ? alloc_pid+0xc1/0xa00 [ 855.881566] ? __radix_tree_replace+0x1af/0x310 [ 855.886234] ? radix_tree_delete+0x30/0x30 [ 855.890453] ? node_tag_clear+0xf2/0x180 [ 855.894508] ? proc_get_inode+0x620/0x620 [ 855.898636] mount_ns+0x6d/0x190 [ 855.901986] proc_mount+0x7a/0x90 [ 855.905421] mount_fs+0x66/0x2d0 [ 855.908773] vfs_kern_mount.part.26+0xc6/0x4a0 [ 855.913350] ? may_umount+0xa0/0xa0 [ 855.916960] ? idr_alloc_cyclic+0x1d6/0x320 [ 855.921266] ? do_raw_spin_trylock+0x190/0x190 [ 855.925828] ? idr_alloc+0x180/0x180 [ 855.929525] kern_mount_data+0x50/0xb0 [ 855.933395] pid_ns_prepare_proc+0x1e/0x80 [ 855.937610] alloc_pid+0x87e/0xa00 [ 855.941133] ? __change_pid+0x400/0x400 [ 855.945090] ? ns_capable_common+0xcf/0x160 [ 855.949402] ? memset+0x31/0x40 [ 855.952662] ? copy_thread_tls+0x268/0x8f0 [ 855.956884] copy_process.part.38+0x2516/0x4bd0 [ 855.961544] ? __cleanup_sighand+0x40/0x40 [ 855.965769] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 855.970943] ? __lock_acquire+0x664/0x3e00 [ 855.975163] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 855.980341] ? environ_open+0x80/0x80 [ 855.984148] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 855.989330] ? __lock_acquire+0x664/0x3e00 [ 855.993546] ? mntput_no_expire+0x130/0xa90 [ 855.997854] ? print_irqtrace_events+0x270/0x270 [ 856.002595] ? trace_hardirqs_off+0x10/0x10 [ 856.006906] ? lock_acquire+0x1d5/0x580 [ 856.010864] ? trace_hardirqs_off+0x10/0x10 [ 856.015173] ? trace_hardirqs_off+0x10/0x10 [ 856.019510] ? __lock_acquire+0x664/0x3e00 [ 856.023730] ? check_same_owner+0x320/0x320 [ 856.028046] ? find_held_lock+0x35/0x1d0 [ 856.032099] ? _parse_integer+0xe9/0x140 [ 856.036148] ? trace_hardirqs_off+0x10/0x10 [ 856.040454] ? _parse_integer+0x140/0x140 [ 856.044588] ? trace_hardirqs_off+0x10/0x10 [ 856.048896] ? get_pid_task+0x93/0x140 [ 856.052766] ? lock_downgrade+0x980/0x980 [ 856.056900] ? find_held_lock+0x35/0x1d0 [ 856.060949] ? __f_unlock_pos+0x19/0x20 [ 856.064904] ? lock_downgrade+0x980/0x980 [ 856.069036] ? get_pid_task+0xbc/0x140 [ 856.072909] ? proc_fail_nth_write+0x9b/0x1d0 [ 856.077386] ? map_files_get_link+0x3a0/0x3a0 [ 856.081862] ? handle_mm_fault+0x35b/0xb10 [ 856.086084] _do_fork+0x1f7/0xf70 [ 856.089522] ? fork_idle+0x2d0/0x2d0 [ 856.093217] ? wait_for_completion+0x770/0x770 [ 856.097784] ? __lock_is_held+0xb6/0x140 [ 856.101836] ? __sb_end_write+0xa0/0xd0 [ 856.105790] ? fput+0xd2/0x140 [ 856.108969] ? SyS_write+0x184/0x220 [ 856.112669] ? SyS_read+0x220/0x220 [ 856.116283] SyS_clone+0x37/0x50 [ 856.119628] ? sys_vfork+0x30/0x30 [ 856.123152] do_syscall_64+0x281/0x940 [ 856.127039] ? vmalloc_sync_all+0x30/0x30 [ 856.131186] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 856.136715] ? syscall_return_slowpath+0x550/0x550 [ 856.141625] ? syscall_return_slowpath+0x2ac/0x550 [ 856.146543] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 856.151892] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 856.156735] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 856.161904] RIP: 0033:0x454e79 2018/03/31 12:25:46 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'pids', 0x20}]}, 0x6) fcntl$setflags(r1, 0x2, 0xfffffffffffffffd) write$cgroup_subtree(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="baebd9a750140de70ae1084d93029a2d70696473200155ef3a0798f9e613f06fed23a74204f7ac11c861643ca2048d87e2faaee828153824a2fb63a1c22407042e060e4fccee2f821cba84ba78fccd9c78abe8407e3bf7357dd45d94eb64e7247dcf0a7dd80f3e520237c87c1b20143e058538e723a9bcc0eddb2560520bb8c800"], 0x6) socket$kcm(0x29, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200, 0x4) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000ffb000/0x3000)=nil, 0x3000}, 0x2}) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000000180)={'filter\x00', 0x4}, 0x68) 2018/03/31 12:25:46 executing program 4: r0 = socket$inet6(0xa, 0x806, 0x100) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) [ 856.165074] RSP: 002b:00007f935ae4bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 856.172764] RAX: ffffffffffffffda RBX: 00007f935ae4c6d4 RCX: 0000000000454e79 [ 856.180016] RDX: 00000000200008c0 RSI: 0000000020000800 RDI: 000000002000c100 [ 856.187269] RBP: 000000000072bea0 R08: 0000000020000940 R09: 0000000000000000 [ 856.194522] R10: 0000000020000900 R11: 0000000000000246 R12: 0000000000000014 [ 856.201775] R13: 0000000000000051 R14: 00000000006f2838 R15: 0000000000000010 [ 856.239582] IPVS: ftp: loaded support on port[0] = 21 2018/03/31 12:25:46 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x0, 0x8040) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000002c0)={@mcast1}, &(0x7f0000000300)=0x14) r1 = socket$inet6(0xa, 0x80803, 0x2f) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffff9c, 0x84, 0xd, &(0x7f0000000040)=@assoc_value={0x0, 0x4}, &(0x7f0000000080)=0x8) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000001440)={@in={{0x2, 0x4e23, @rand_addr=0x8}}, 0x5, 0x4, 0xd1d, "b0e204cdfa93cda1ee8459e5cafcadbe148809923a1b419da45c304a170bdba27f941ae30e049d4a76a3462e00e329cfbce7b130e0861a86c3a7172e2d3643ac50c856c8fdbae7b580002e0368f9ac94"}, 0xd8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000100)={0xfffffffffffff8af, 0x5623, 0x8008, 0x1ff, 0x5, 0x6, 0x2, 0xff, r2}, 0x20) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000140)=[@in6={0xa, 0x4e20, 0x2, @loopback={0x0, 0x1}, 0x800}, @in6={0xa, 0x4e23, 0xc2fb, @empty, 0x7}], 0x38) connect$inet6(r1, &(0x7f00000000c0)={0xa}, 0x1c) getpeername(r1, &(0x7f0000000340)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @ipv4={[], [], @loopback}}}}, &(0x7f00000003c0)=0x80) setsockopt$inet_sctp_SCTP_AUTH_KEY(r3, 0x84, 0x17, &(0x7f0000000400)={r2, 0x7, 0x1000, "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"}, 0x1008) 2018/03/31 12:25:46 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:25:46 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) fchmod(r0, 0x42) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'pids', 0x20}]}, 0x6) write$cgroup_subtree(r1, &(0x7f0000000100)={[{0x2d, 'pids', 0x20}]}, 0x6) 2018/03/31 12:25:46 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000480)=ANY=[@ANYBLOB="1be700006e2f30b3fffffffc805b26c39eca43e6b83006f8740009ab67c884631a021a3f6babcffbafabf60cbd05b03f1b2ac9c69260434ea20e782e8a115352274f56f5ad750d4967423b4e6919dc", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000080)=0xc) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000100)={r2, 0x400}, 0x8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x10000000, @mcast2={0xff, 0x2, [], 0x1}, 0x2}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x80081, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000300)={r2, 0x3, 0x80, 0x1f}, 0x10) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x800) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000180)={r1, 0x7fff, 0x10}, 0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in=@rand_addr}}, {{}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 2018/03/31 12:25:46 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'pids', 0x20}]}, 0x6) write$cgroup_subtree(r1, &(0x7f0000000100)={[{0x2d, 'pids', 0x20}]}, 0x6) r2 = syz_open_dev$dmmidi(&(0x7f00000001c0)='/dev/dmmidi#\x00', 0x1, 0x10100) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x8) ppoll(&(0x7f0000000000)=[{r0, 0x2}, {r1, 0x440}, {r0, 0x2}, {r0, 0x3e9f19e70ef06702}, {r0}, {r0, 0x4000}, {r1, 0x82}, {r1}], 0x8, &(0x7f0000000140), &(0x7f0000000180)={0x800}, 0x8) 2018/03/31 12:25:47 executing program 2 (fault-call:10 fault-nth:17): r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="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", 0xfc}], 0x1, 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r2 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) ioctl$sock_ipx_SIOCAIPXPRISLT(r2, 0x89e1, &(0x7f0000000280)=0x3f) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f0000000200)={0x80, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23}, 0x0, 0x7, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000300)={r3, 0x1c9}, 0x8) r4 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e44ee") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x40, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000c40)={r3, 0x2}, &(0x7f0000000c80)=0xffffffffffffff39) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000540)=0x2, 0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000340)) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000d40)={0x7433, {{0x2, 0x4e21, @broadcast=0xffffffff}}, 0x1, 0x1, [{{0x2, 0x4e20}}]}, 0x110) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f, r3}, 0x20) 2018/03/31 12:25:47 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x0, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:25:47 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x80, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000080)=0x4, 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f00000000c0)={0xfff, 0x9, 0x401, 'queue0\x00', 0x6}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0xfffffd74}], 0x1) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x7, 0x8000, 0x1000, 0x7d0, 0x0, 0xffffffff00000000, 0x0, 0x5, 0x9, 0x6, 0x1, 0x81, 0x5, 0x10000, 0x1, 0x7, 0xffffffffffffffff, 0xeda, 0x5, 0x0, 0x91, 0x10001, 0xffffffffffff0001, 0xc384, 0x8, 0xffffffffffffffe0, 0x0, 0x4, 0xffff, 0x80, 0x7, 0x2, 0x1, 0x0, 0x30, 0x3, 0x0, 0x7, 0x4, @perf_config_ext={0xfffffffffffff0f9, 0x8}, 0x0, 0xcae, 0x9, 0x7, 0x0, 0xfff, 0x7}, r1, 0x0, r0, 0x2) 2018/03/31 12:25:47 executing program 1: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:25:47 executing program 7: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000943ffc)=0xa35) read(r1, &(0x7f00003fefff)=""/1, 0x1) r2 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r3, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r3, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r4}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)) r5 = dup2(r3, r4) fcntl$setown(r5, 0x8, r2) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r2, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0xe6, 0x2, {0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, 0xb64, 0x9, 0x9b, 0x5, 0xffff}}, &(0x7f0000000580)=0xb0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:25:47 executing program 5: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r1, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r1, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r2}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r3 = dup2(r1, r2) fcntl$setown(r3, 0x8, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(0x0, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:25:47 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x30) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000040)={'nat\x00', 0x3, [{}, {}, {}]}, 0x58) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) 2018/03/31 12:25:47 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'pids', 0x20}]}, 0x6) write$cgroup_subtree(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="2d7055649120fbb06f1094f27086242602263eb8d3dbd5bd7a4c9d6a9eb710c174b70a67c9a8599a5830b3c2359f88003b6ce89286b1b864f2a6a1c838fa4c0d533e3e960a917553f183ea5cbf47b78650c6dafe0bb4c3a0dc5eee"], 0x6) [ 857.224797] FAULT_INJECTION: forcing a failure. [ 857.224797] name failslab, interval 1, probability 0, space 0, times 0 [ 857.236100] CPU: 1 PID: 21901 Comm: syz-executor2 Not tainted 4.16.0-rc7+ #373 [ 857.243467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 857.252825] Call Trace: [ 857.255421] dump_stack+0x194/0x24d [ 857.259061] ? arch_local_irq_restore+0x53/0x53 [ 857.263751] should_fail+0x8c0/0xa40 [ 857.267477] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 857.272592] ? save_stack+0x43/0xd0 [ 857.276221] ? kasan_kmalloc+0xad/0xe0 [ 857.283577] ? __kmalloc+0x162/0x760 [ 857.287283] ? __list_lru_init+0xcf/0x750 [ 857.291434] ? find_held_lock+0x35/0x1d0 [ 857.295503] ? __lock_is_held+0xb6/0x140 [ 857.299580] ? check_same_owner+0x320/0x320 [ 857.303891] ? rcu_note_context_switch+0x710/0x710 [ 857.308814] should_failslab+0xec/0x120 [ 857.312772] kmem_cache_alloc_node_trace+0x5a/0x760 [ 857.317770] ? mark_held_locks+0xaf/0x100 [ 857.321896] ? __raw_spin_lock_init+0x1c/0x100 [ 857.326463] __kmalloc_node+0x33/0x70 [ 857.330247] kvmalloc_node+0x99/0xd0 [ 857.333946] __list_lru_init+0x5d5/0x750 [ 857.337992] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 857.343865] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 857.348873] ? __lockdep_init_map+0xe4/0x650 [ 857.353264] ? lockdep_init_map+0x9/0x10 [ 857.357307] sget_userns+0x691/0xe40 [ 857.361000] ? set_anon_super+0x20/0x20 [ 857.364963] ? put_filp+0x90/0x90 [ 857.368397] ? destroy_unused_super.part.6+0xd0/0xd0 [ 857.373484] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 857.378480] ? perf_trace_lock+0xd6/0x900 [ 857.382611] ? save_stack+0xa3/0xd0 [ 857.386222] ? kasan_slab_alloc+0x12/0x20 [ 857.390353] ? alloc_pid+0xc1/0xa00 [ 857.393963] ? __radix_tree_replace+0x1af/0x310 [ 857.398611] ? radix_tree_delete+0x30/0x30 [ 857.402827] ? node_tag_clear+0xf2/0x180 [ 857.406873] ? proc_get_inode+0x620/0x620 [ 857.410997] mount_ns+0x6d/0x190 [ 857.414350] proc_mount+0x7a/0x90 [ 857.417783] mount_fs+0x66/0x2d0 [ 857.421149] vfs_kern_mount.part.26+0xc6/0x4a0 [ 857.425715] ? may_umount+0xa0/0xa0 [ 857.429321] ? idr_alloc_cyclic+0x1d6/0x320 [ 857.433625] ? do_raw_spin_trylock+0x190/0x190 [ 857.438189] ? idr_alloc+0x180/0x180 [ 857.441886] kern_mount_data+0x50/0xb0 [ 857.445754] pid_ns_prepare_proc+0x1e/0x80 [ 857.449969] alloc_pid+0x87e/0xa00 [ 857.453493] ? __change_pid+0x400/0x400 [ 857.457446] ? ns_capable_common+0xcf/0x160 [ 857.461753] ? memset+0x31/0x40 [ 857.465018] ? copy_thread_tls+0x268/0x8f0 [ 857.469244] copy_process.part.38+0x2516/0x4bd0 [ 857.473905] ? __cleanup_sighand+0x40/0x40 [ 857.478140] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 857.483313] ? __lock_acquire+0x664/0x3e00 [ 857.487528] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 857.492698] ? perf_trace_lock+0xd6/0x900 [ 857.496836] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 857.502003] ? perf_trace_lock+0xd6/0x900 [ 857.506134] ? mntput_no_expire+0x130/0xa90 [ 857.510444] ? trace_event_raw_event_lock+0x340/0x340 [ 857.515610] ? perf_trace_lock+0xd6/0x900 [ 857.519743] ? lock_acquire+0x1d5/0x580 [ 857.523696] ? trace_hardirqs_off+0x10/0x10 [ 857.528001] ? perf_trace_lock+0xd6/0x900 [ 857.532143] ? find_held_lock+0x35/0x1d0 [ 857.536190] ? perf_trace_lock+0xd6/0x900 [ 857.540323] ? trace_event_raw_event_lock+0x340/0x340 [ 857.545497] ? _parse_integer+0x140/0x140 [ 857.549633] ? trace_hardirqs_off+0x10/0x10 [ 857.553937] ? get_pid_task+0x93/0x140 [ 857.557805] ? perf_trace_lock+0xd6/0x900 [ 857.561935] ? find_held_lock+0x35/0x1d0 [ 857.565981] ? __f_unlock_pos+0x19/0x20 [ 857.569934] ? lock_downgrade+0x980/0x980 [ 857.574062] ? get_pid_task+0xbc/0x140 [ 857.577932] ? proc_fail_nth_write+0x9b/0x1d0 [ 857.582409] ? map_files_get_link+0x3a0/0x3a0 [ 857.586887] ? handle_mm_fault+0x35b/0xb10 [ 857.591110] _do_fork+0x1f7/0xf70 [ 857.594545] ? fork_idle+0x2d0/0x2d0 [ 857.598240] ? wait_for_completion+0x770/0x770 [ 857.602819] ? __sb_end_write+0xa0/0xd0 [ 857.606775] ? fput+0xd2/0x140 [ 857.609949] ? SyS_write+0x184/0x220 [ 857.613643] ? SyS_read+0x220/0x220 [ 857.617252] SyS_clone+0x37/0x50 [ 857.620596] ? sys_vfork+0x30/0x30 [ 857.624119] do_syscall_64+0x281/0x940 [ 857.627982] ? vmalloc_sync_all+0x30/0x30 [ 857.632108] ? _raw_spin_unlock_irq+0x27/0x70 [ 857.636581] ? finish_task_switch+0x1c1/0x7e0 [ 857.641053] ? syscall_return_slowpath+0x550/0x550 [ 857.645963] ? syscall_return_slowpath+0x2ac/0x550 [ 857.650874] ? prepare_exit_to_usermode+0x350/0x350 [ 857.655874] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 857.661222] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 857.666052] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 857.671221] RIP: 0033:0x454e79 2018/03/31 12:25:48 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'pids', 0x20}]}, 0x6) write$cgroup_subtree(r1, &(0x7f0000000100)={[{0x2d, 'pids', 0x20}]}, 0x6) r2 = openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x1, 0x2c) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000002c0)={0x44, 0x0, &(0x7f0000000200)=[@reply={0x40406301, {0x4, 0x0, 0x2, 0x0, 0x10, 0x0, 0x0, 0x38, 0x8, &(0x7f0000000180)=[@fda={0x66646185, 0x2, 0x3, 0x33}, @fd={0x66642a85, 0x0, r2, 0x0, 0x4}], &(0x7f00000001c0)=[0x0]}}], 0x2e, 0x0, &(0x7f0000000280)="5d0361950474d1cd594e32567b3041c1e8a004527e74dd9c93e48f0f103c00abfd959e91aeb4d243a8e42516e502"}) 2018/03/31 12:25:48 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x0, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:25:48 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000040)={0x6, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}]}) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000080)={0x2, 0x9, 0x80000000, 0xbea, 0x79, 0x5, 0x7, 0x996}, &(0x7f0000000100)={0x206, 0xfe25, 0xfffffffffffffffe, 0x2, 0x8, 0x80, 0x53873487, 0xffffffff00000000}, &(0x7f0000000140)={0x4, 0x0, 0x4, 0xff, 0x7be0, 0x3, 0x7ff, 0x2}, &(0x7f0000000640)={r1, r2+30000000}, &(0x7f00000006c0)={&(0x7f0000000680)={0x3}, 0x8}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) [ 857.674390] RSP: 002b:00007f935ae4bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 857.682078] RAX: ffffffffffffffda RBX: 00007f935ae4c6d4 RCX: 0000000000454e79 [ 857.689327] RDX: 00000000200008c0 RSI: 0000000020000800 RDI: 000000002000c100 [ 857.696576] RBP: 000000000072bea0 R08: 0000000020000940 R09: 0000000000000000 [ 857.703824] R10: 0000000020000900 R11: 0000000000000246 R12: 0000000000000014 [ 857.711073] R13: 0000000000000051 R14: 00000000006f2838 R15: 0000000000000011 2018/03/31 12:25:48 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'pids', 0x20}]}, 0x6) write$cgroup_subtree(r1, &(0x7f0000000100)={[{0x2d, 'pids', 0x20}]}, 0x6) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x4d, 0x800) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, &(0x7f0000000180)=""/140) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000440)=0x0) getresuid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)=0x0) getgroups(0x2, &(0x7f0000000540)=[0xffffffffffffffff, 0xffffffffffffffff]) r6 = gettid() r7 = getuid() fstat(r0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getpgid(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000600)={{{@in=@rand_addr, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000700)=0xe8) r11 = getegid() ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000740)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000780)={{{@in6=@loopback, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) fstat(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(r0, &(0x7f0000000ac0)={&(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000400)=[{&(0x7f00000002c0)="3e32edc48ef0ac401fedf6ebfd88e922ed9cd973ac86099bd16a903b7f82bb2e84caee2240335b6d321c9c54462a78db2a99aace1f705937310bb4734481b013a402c70e5283a5aeac5fd9da75835fef36a0bbc2b4c8a7e16fe69206506ac9cd2044250775f262eb7500a79f9fce3687c85f509270cfa4110ee30f4e9cc33896c727aee6f1a6cc38cf06b3e3e12fcc2815ba2e1ad4e0bbe23a5682ff994c367d7f65f600415f592c70a5dde892b7ede5ad199db6d3bdde9d64", 0xb9}, {&(0x7f0000000380)="b609976e9d8af8bc053916abb500e1f5b0da290825f8696ebea3cc995c457fb2398d3d0ed7cc91c15878c83d10bbb111c2087948ec240b6cdf73fd6325d666ee461810c9c58bcdb23724a96b1cea6b1ba06b02642f7bb2eaf72b579805db781da9ad332872232909c2053237c1ffc3103104b77d073cd7092db8", 0x7a}], 0x2, &(0x7f0000000940)=[@rights={0x20, 0x1, 0x1, [r1, r0, r1]}, @cred={0x20, 0x1, 0x2, r3, r4, r5}, @rights={0x30, 0x1, 0x1, [r0, r2, r0, r0, r0, r2, r2]}, @rights={0x20, 0x1, 0x1, [r0, r2, r0]}, @rights={0x18, 0x1, 0x1, [r0, r2]}, @cred={0x20, 0x1, 0x2, r6, r7, r8}, @rights={0x20, 0x1, 0x1, [r2, r2, r1]}, @cred={0x20, 0x1, 0x2, r9, r10, r11}, @cred={0x20, 0x1, 0x2, r12, r13, r14}, @rights={0x38, 0x1, 0x1, [r0, r0, r1, r2, r2, r1, r0, r1, r1, r2]}], 0x160, 0x4}, 0x20000000) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f0000000140)={0x0, 0x2, 0x52c, 0x3, 0x101}) 2018/03/31 12:25:48 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x3, 0x1) ioctl$DRM_IOCTL_INFO_BUFS(r1, 0xc0106418, &(0x7f0000000080)={0x3, 0x0, 0xd2, 0x2, 0xe, 0x1ff}) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 2018/03/31 12:25:48 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = getpid() getpgid(r2) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000140)=""/78) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'pids', 0x20}]}, 0x6) write$cgroup_subtree(r1, &(0x7f0000000100)={[{0x2d, 'pids', 0x20}]}, 0x6) 2018/03/31 12:25:48 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x0, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:25:48 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x398, 0xa, &(0x7f00000006c0)=[{&(0x7f0000000100)="65790cf9ba302143721debbc663b2e45b531309587be1f7b5755f9ead58182ae644cea2870858749", 0x28, 0x6}, {&(0x7f0000000140)="e0d69a932c95ec8bb2a0bb6f5315585caaa70618c5f58afdd02905cfe4475e495679ffeccd72179bcdda7e03ac7f3039624b83061f864231667be402f1d095a1c915e5ab44035cc3e9282debe7a9dec3050a402d676f045cdf7c23e3bbe209b8e1865086a6c028bf8ce66f57bb09f6e0058ead", 0x73, 0x6c}, {&(0x7f00000002c0)="8e1c0158adfcc908b855b80db3126fed0dcff6d549b0a487fbedb4fc5fe1d51e7cbeb82224051f4ff44b77d4a31ddcb1c3b3a5f63aa36f90ebd707f2b6056bb7dfd412064dbdb22e8e81fe512cbd3d65ceae10a913bf453ccc41f6009c8cffef48", 0x61, 0x3}, {&(0x7f0000000340)="34227fbc38d55aea0a057d2e0b0949a673404284e7af0e757105cb07333cc4bdfcce66c7966ce753bd943650cf4283ea6302285f5db3bcb3e24b01783bff63009650f0f049d3dd2073d3b1c690da02daeb80eb82ff57d7e236c47cfeb7c791d3932de28a2a7dd8d8bf4c101f826c583371beb01f851cf83df57f9c2c265893da22e5ef0e7630a7c7abea42d63519be21bf8c760d6fde7d5fc4f0bfd813986ec5111ecb9caafdea298413a801", 0xac, 0x7f}, {&(0x7f0000000400)="697af425563a5f4d8e04ddcf1a7ad9a076d6892346e535a9132940a43607a9c0a941549f36220c21bbddee05e291e1128d3e", 0x32, 0x2}, {&(0x7f0000000440)="0f3f33cebba6ccb8ae551922adac069c1ecf7bef246dd64f79b59d0a8092b57ca83371ad26b432fef1bf393341cd9e8717ebdf816235b31166def67f1b5358936e3a4cd2e3d45cf3bb91ebfed2c645d5361ad3e863d59eaae842639a3e1e388baef028c87aa24aaa206a17503e5e901801be1fb70c1b1573411fd32f3830af527f3976f61f7e555210b2c683e74c2ac2926242f2c79e539d", 0x98, 0x5}, {&(0x7f0000000500)="94f588d00099f2e7db790c4659ad969032a1208c92be0e8cff8da83db9fc627070ef1175e3f2cb30a50dcd1179ce2c76e33ea325129765156e80f652a322103de33d10930e1dfc81e9", 0x49, 0x8}, {&(0x7f0000000580)="01c83e61f4af", 0x6, 0x81}, {&(0x7f00000005c0)="c4f7f22c0201c16c9cd1efd308983fedbf04f1b479450b083b86105ed96cc0c4072f7ca2dce6cf73", 0x28, 0x2fb9}, {&(0x7f0000000600)="3e4ad8a1ae52c0a2712b06a10e9cebf6f47394c2ba5b6f6d3a3ca6c86c4aad5ff0665ee02bed7b6165d3ad2078ce50cc80d6eee8f6600fb4a5cb9f46754253e2752920c4909d5debf95e83807a542255bc8d9c214b6593f74fa0fc224f9544340337e38f43f773c48545ecbef80584171d9dfa04154da6f4f0fdb15067ec9fffaec1cff5ecd096", 0x87, 0xfffffffffffffc01}], 0x8000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0\x00'}, 0x2c}]}) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) [ 857.972816] IPVS: ftp: loaded support on port[0] = 21 2018/03/31 12:25:48 executing program 2 (fault-call:10 fault-nth:18): r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="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", 0xfc}], 0x1, 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r2 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) ioctl$sock_ipx_SIOCAIPXPRISLT(r2, 0x89e1, &(0x7f0000000280)=0x3f) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f0000000200)={0x80, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23}, 0x0, 0x7, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000300)={r3, 0x1c9}, 0x8) r4 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e44ee") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x40, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000c40)={r3, 0x2}, &(0x7f0000000c80)=0xffffffffffffff39) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000540)=0x2, 0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000340)) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000d40)={0x7433, {{0x2, 0x4e21, @broadcast=0xffffffff}}, 0x1, 0x1, [{{0x2, 0x4e20}}]}, 0x110) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f, r3}, 0x20) 2018/03/31 12:25:48 executing program 7: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000943ffc)=0xa35) read(r1, &(0x7f00003fefff)=""/1, 0x1) r2 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r3, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r3, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r4}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)) r5 = dup2(r3, r4) fcntl$setown(r5, 0x8, r2) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r2, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0xe6, 0x2, {0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, 0xb64, 0x9, 0x9b, 0x5, 0xffff}}, &(0x7f0000000580)=0xb0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:25:48 executing program 5: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r1, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r1, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r2}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r3 = dup2(r1, r2) fcntl$setown(r3, 0x8, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(0x0, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:25:48 executing program 1: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:25:48 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'pids', 0x20}]}, 0x6) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000140)=0x5) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000280)={0x0, 0xa, "d3bdeeb05874f6175c3a"}, &(0x7f00000002c0)=0x12) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000180)={r4, 0x2, 0x6}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000200)={0xf3e9, 0x200, 0x7, 0x3, r5}, &(0x7f0000000240)=0x10) write$cgroup_subtree(r1, &(0x7f0000000100)={[{0x2d, 'pids', 0x20}]}, 0x6) 2018/03/31 12:25:48 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0xfffffffffffffffc}, 0xfffffffffffffdb6) 2018/03/31 12:25:48 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:25:48 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x80, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000080)=0x4, 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f00000000c0)={0xfff, 0x9, 0x401, 'queue0\x00', 0x6}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0xfffffd74}], 0x1) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x7, 0x8000, 0x1000, 0x7d0, 0x0, 0xffffffff00000000, 0x0, 0x5, 0x9, 0x6, 0x1, 0x81, 0x5, 0x10000, 0x1, 0x7, 0xffffffffffffffff, 0xeda, 0x5, 0x0, 0x91, 0x10001, 0xffffffffffff0001, 0xc384, 0x8, 0xffffffffffffffe0, 0x0, 0x4, 0xffff, 0x80, 0x7, 0x2, 0x1, 0x0, 0x30, 0x3, 0x0, 0x7, 0x4, @perf_config_ext={0xfffffffffffff0f9, 0x8}, 0x0, 0xcae, 0x9, 0x7, 0x0, 0xfff, 0x7}, r1, 0x0, r0, 0x2) [ 858.333277] FAULT_INJECTION: forcing a failure. [ 858.333277] name failslab, interval 1, probability 0, space 0, times 0 [ 858.344576] CPU: 0 PID: 21961 Comm: syz-executor2 Not tainted 4.16.0-rc7+ #373 [ 858.352610] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 858.352643] Call Trace: [ 858.352664] dump_stack+0x194/0x24d [ 858.352679] ? arch_local_irq_restore+0x53/0x53 [ 858.352702] should_fail+0x8c0/0xa40 [ 858.352713] ? is_bpf_text_address+0xa4/0x120 [ 858.352726] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 858.352735] ? __kernel_text_address+0xd/0x40 [ 858.352747] ? unwind_get_return_address+0x61/0xa0 [ 858.352770] ? find_held_lock+0x35/0x1d0 [ 858.352784] ? __lock_is_held+0xb6/0x140 [ 858.352805] ? check_same_owner+0x320/0x320 [ 858.352820] ? rcu_note_context_switch+0x710/0x710 [ 858.352839] should_failslab+0xec/0x120 [ 858.352850] kmem_cache_alloc_trace+0x4b/0x740 [ 858.352859] ? __kmalloc_node+0x33/0x70 [ 858.352867] ? __kmalloc_node+0x33/0x70 [ 858.352878] ? rcu_read_lock_sched_held+0x108/0x120 [ 858.352893] __memcg_init_list_lru_node+0x169/0x270 [ 858.352905] ? list_lru_add+0x7c0/0x7c0 [ 858.352915] ? __kmalloc_node+0x47/0x70 [ 858.352930] __list_lru_init+0x544/0x750 [ 858.352944] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 858.352957] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 858.352968] ? __lockdep_init_map+0xe4/0x650 [ 858.352980] ? lockdep_init_map+0x9/0x10 [ 858.352993] sget_userns+0x691/0xe40 [ 858.353001] ? set_anon_super+0x20/0x20 [ 858.353013] ? put_filp+0x90/0x90 [ 858.353023] ? destroy_unused_super.part.6+0xd0/0xd0 [ 858.353036] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 858.353057] ? save_stack+0xa3/0xd0 [ 858.353068] ? save_stack+0x43/0xd0 [ 858.353079] ? kasan_slab_alloc+0x12/0x20 [ 858.353088] ? kmem_cache_alloc+0x12e/0x760 [ 858.353096] ? alloc_pid+0xc1/0xa00 [ 858.353112] ? __radix_tree_replace+0x1af/0x310 [ 858.353125] ? radix_tree_delete+0x30/0x30 [ 858.353140] ? node_tag_clear+0xf2/0x180 [ 858.353159] ? proc_get_inode+0x620/0x620 [ 858.353167] mount_ns+0x6d/0x190 [ 858.353180] proc_mount+0x7a/0x90 [ 858.353192] mount_fs+0x66/0x2d0 [ 858.353211] vfs_kern_mount.part.26+0xc6/0x4a0 [ 858.353224] ? may_umount+0xa0/0xa0 [ 858.353234] ? idr_alloc_cyclic+0x1d6/0x320 [ 858.353248] ? do_raw_spin_trylock+0x190/0x190 [ 858.353259] ? idr_alloc+0x180/0x180 [ 858.353273] kern_mount_data+0x50/0xb0 [ 858.353284] pid_ns_prepare_proc+0x1e/0x80 [ 858.353294] alloc_pid+0x87e/0xa00 [ 858.353307] ? __change_pid+0x400/0x400 [ 858.353316] ? ns_capable_common+0xcf/0x160 [ 858.353332] ? memset+0x31/0x40 [ 858.353342] ? copy_thread_tls+0x268/0x8f0 [ 858.353358] copy_process.part.38+0x2516/0x4bd0 [ 858.353377] ? __cleanup_sighand+0x40/0x40 [ 858.353398] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 858.353417] ? __lock_acquire+0x664/0x3e00 [ 858.605203] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 858.610374] ? environ_open+0x80/0x80 [ 858.614162] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 858.619329] ? __lock_acquire+0x664/0x3e00 [ 858.623546] ? mntput_no_expire+0x130/0xa90 [ 858.627852] ? print_irqtrace_events+0x270/0x270 [ 858.632591] ? trace_hardirqs_off+0x10/0x10 [ 858.636898] ? lock_acquire+0x1d5/0x580 [ 858.640852] ? trace_hardirqs_off+0x10/0x10 [ 858.645152] ? trace_hardirqs_off+0x10/0x10 [ 858.649455] ? __lock_acquire+0x664/0x3e00 [ 858.653668] ? check_same_owner+0x320/0x320 [ 858.657974] ? find_held_lock+0x35/0x1d0 [ 858.662028] ? _parse_integer+0xe9/0x140 [ 858.666074] ? trace_hardirqs_off+0x10/0x10 [ 858.670376] ? _parse_integer+0x140/0x140 [ 858.674512] ? trace_hardirqs_off+0x10/0x10 [ 858.678817] ? get_pid_task+0x93/0x140 [ 858.682685] ? lock_downgrade+0x980/0x980 [ 858.686817] ? find_held_lock+0x35/0x1d0 [ 858.690864] ? __f_unlock_pos+0x19/0x20 [ 858.694817] ? lock_downgrade+0x980/0x980 [ 858.698951] ? get_pid_task+0xbc/0x140 [ 858.702821] ? proc_fail_nth_write+0x9b/0x1d0 [ 858.707299] ? map_files_get_link+0x3a0/0x3a0 [ 858.711777] ? handle_mm_fault+0x35b/0xb10 [ 858.715999] _do_fork+0x1f7/0xf70 [ 858.719442] ? fork_idle+0x2d0/0x2d0 [ 858.723139] ? wait_for_completion+0x770/0x770 [ 858.727704] ? __lock_is_held+0xb6/0x140 [ 858.731756] ? __sb_end_write+0xa0/0xd0 [ 858.735710] ? fput+0xd2/0x140 [ 858.738886] ? SyS_write+0x184/0x220 [ 858.743021] ? SyS_read+0x220/0x220 [ 858.746631] SyS_clone+0x37/0x50 [ 858.750158] ? sys_vfork+0x30/0x30 [ 858.753679] do_syscall_64+0x281/0x940 [ 858.757546] ? vmalloc_sync_all+0x30/0x30 [ 858.761675] ? _raw_spin_unlock_irq+0x27/0x70 [ 858.766152] ? finish_task_switch+0x1c1/0x7e0 [ 858.770643] ? syscall_return_slowpath+0x550/0x550 [ 858.775554] ? syscall_return_slowpath+0x2ac/0x550 [ 858.780465] ? prepare_exit_to_usermode+0x350/0x350 [ 858.785464] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 858.790815] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 858.795642] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 858.800814] RIP: 0033:0x454e79 [ 858.803984] RSP: 002b:00007f935ae4bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 858.811706] RAX: ffffffffffffffda RBX: 00007f935ae4c6d4 RCX: 0000000000454e79 [ 858.818957] RDX: 00000000200008c0 RSI: 0000000020000800 RDI: 000000002000c100 [ 858.826203] RBP: 000000000072bea0 R08: 0000000020000940 R09: 0000000000000000 2018/03/31 12:25:49 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) r1 = gettid() setpriority(0x1, r1, 0x6) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000040)={r0}) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f0000000100)={0x1ff, {0x2, 0x4e21, @broadcast=0xffffffff}, {0x2, 0x4e22, @multicast2=0xe0000002}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, 0x2, 0x4, 0x3, 0x800, 0x5, &(0x7f0000000080)='ifb0\x00', 0xff, 0x0, 0x7fffffff}) 2018/03/31 12:25:49 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) [ 858.833451] R10: 0000000020000900 R11: 0000000000000246 R12: 0000000000000014 [ 858.840700] R13: 0000000000000051 R14: 00000000006f2838 R15: 0000000000000012 2018/03/31 12:25:49 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x6, 0x391c40) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f0000000140)=""/100, &(0x7f00000000c0)=0x64) write$cgroup_subtree(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="2b706964af00659b9f048d4461a85351097b0c85088188e5d88edff1e9a63668edd4afe418dbaffc5bdc4d0847854ee19ec1f44619b660ce1c90f1827f64d4c6c8e40ba8c8b85d6b0f85dae70f0f0ff342ab70b4953448f22aa4efc6458db80f3dac22d3a236780ca3bd7562db5f97c24247ecffaf34691a8ce228e4a9a6804399ce5a09f7682b868416c173d244fe4be8a6f2759b12861fd9e05747c5c183184ba2a9fd98ba43116a93d4a1cf054b29992055a2c7138f752f7b79d0b3b8842cb9c81453dc190c8e7e5acfbdb03ae1d8bd5e8b5436069b408434b3"], 0x6) write$cgroup_subtree(r1, &(0x7f0000000100)={[{0x2d, 'pids', 0x20}]}, 0x6) 2018/03/31 12:25:49 executing program 4: r0 = socket$inet6(0xa, 0x2, 0xa78) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000500)='/dev/rfkill\x00', 0x260000, 0x0) getsockopt$inet_opts(r1, 0x0, 0xd, &(0x7f0000000540)=""/238, &(0x7f0000000640)=0xee) dup2(r0, r0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x4e21, 0x4, @dev={0xfe, 0x80, [], 0xc}, 0x800}}, 0x8, 0xffffffffffffffff, 0x6d01ddf6, "012abd383970c01db44a38348df88e6539a52b116058819ada7399546e501eb9af591f7032ef602d9968f57500cb825229d18446ff27c8edee1f22a9b2df2c59a23de235a1f3da963d6118de659da667"}, 0xd8) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000300)={'bpq0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000340)={@ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x17}}, 0x3c, r2}) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) 2018/03/31 12:25:49 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'pids', 0x20}]}, 0x6) write$cgroup_subtree(r1, &(0x7f0000000100)={[{0x2d, 'pids', 0x20}]}, 0x6) 2018/03/31 12:25:49 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2d) syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x7fff, 0x8040) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) r1 = memfd_create(&(0x7f0000000040)='keyring&Q+(\x00', 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000080)={0x101ff, 0x0, &(0x7f0000ffc000/0x4000)=nil}) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 2018/03/31 12:25:49 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = accept4(0xffffffffffffffff, &(0x7f0000000280)=@vsock={0x0, 0x0, 0x0, @hyper}, &(0x7f0000000000)=0x80, 0x0) openat$cgroup_ro(r0, &(0x7f0000000140)='rdma.current\x00', 0x0, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000000c0)=0x400000) write$cgroup_subtree(r1, &(0x7f00000001c0)={[{0x2d, 'rdma', 0x20}, {0x2d, 'rdma', 0x20}, {0x2f, 'rdma', 0x20}, {0x2f, 'io', 0x20}]}, 0x16) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x2000, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)={[{0x2d, 'pids', 0x20}]}, 0x6) r3 = gettid() fcntl$setown(r1, 0x8, r3) 2018/03/31 12:25:49 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:25:49 executing program 2 (fault-call:10 fault-nth:19): r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="84d5aef1603cb020c5b219faa757913ec85ee74a155e1d635566777b78600bc65bf01ce33de9a6bc3a2041890df0926f2cfc2a7d63690f6b55610593773041755f61b034e3a62a770855b2c0481df219efbfa8ffd0c665434a1de026bcfb654d597ef77a7b231aa9efe45c53811c7591d56f69e9c6231e6da993bbd2a6133805be0c18ba114cfe865e693024a56c3331b93c03e25927a504d27acebf7eecd33d7c69359e3ca37dc546c4fc5bc62596a94cdc00f9b973616a9d2ebad2d9b3e60261ae73b8397694e1f0851475b4236fb47989e6bfd1ad926a01523df3f689dc2603a76b5fc5e023d5449d066d424d1001fee5d653c21fdb751e95ff2b", 0xfc}], 0x1, 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r2 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) ioctl$sock_ipx_SIOCAIPXPRISLT(r2, 0x89e1, &(0x7f0000000280)=0x3f) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f0000000200)={0x80, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23}, 0x0, 0x7, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000300)={r3, 0x1c9}, 0x8) r4 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e44ee") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x40, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000c40)={r3, 0x2}, &(0x7f0000000c80)=0xffffffffffffff39) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000540)=0x2, 0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000340)) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000d40)={0x7433, {{0x2, 0x4e21, @broadcast=0xffffffff}}, 0x1, 0x1, [{{0x2, 0x4e20}}]}, 0x110) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f, r3}, 0x20) 2018/03/31 12:25:49 executing program 5: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r1, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r1, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r2}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r3 = dup2(r1, r2) fcntl$setown(r3, 0x8, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(0x0, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:25:49 executing program 7: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000943ffc)=0xa35) read(r1, &(0x7f00003fefff)=""/1, 0x1) r2 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r3, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r3, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r4}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)) r5 = dup2(r3, r4) fcntl$setown(r5, 0x8, r2) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r2, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0xe6, 0x2, {0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, 0xb64, 0x9, 0x9b, 0x5, 0xffff}}, &(0x7f0000000580)=0xb0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:25:49 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0xfffffffffffffe94) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) read(r0, &(0x7f0000000100)=""/143, 0x8f) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 2018/03/31 12:25:49 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$setpipe(r0, 0x407, 0x9) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'pids', 0x20}]}, 0x6) write$cgroup_subtree(r1, &(0x7f0000000100)={[{0x2d, 'pids', 0x20}]}, 0x6) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x10001, 0x8000) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000140)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffff9c, 0xc018620b, &(0x7f0000000180)={0x0}) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0x30, 0x0, &(0x7f00000001c0)=[@free_buffer={0x40086303, r3}, @request_death={0x400c630e, 0x3, 0x2}, @increfs_done={0x40106308, r4}], 0x16, 0x0, &(0x7f0000000200)="4d975bd64cea312b69cbfcc616a31b0d8260acd65bcc"}) 2018/03/31 12:25:49 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:25:49 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x80, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000080)=0x4, 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f00000000c0)={0xfff, 0x9, 0x401, 'queue0\x00', 0x6}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0xfffffd74}], 0x1) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x7, 0x8000, 0x1000, 0x7d0, 0x0, 0xffffffff00000000, 0x0, 0x5, 0x9, 0x6, 0x1, 0x81, 0x5, 0x10000, 0x1, 0x7, 0xffffffffffffffff, 0xeda, 0x5, 0x0, 0x91, 0x10001, 0xffffffffffff0001, 0xc384, 0x8, 0xffffffffffffffe0, 0x0, 0x4, 0xffff, 0x80, 0x7, 0x2, 0x1, 0x0, 0x30, 0x3, 0x0, 0x7, 0x4, @perf_config_ext={0xfffffffffffff0f9, 0x8}, 0x0, 0xcae, 0x9, 0x7, 0x0, 0xfff, 0x7}, r1, 0x0, r0, 0x2) 2018/03/31 12:25:49 executing program 1: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) [ 859.457874] FAULT_INJECTION: forcing a failure. [ 859.457874] name failslab, interval 1, probability 0, space 0, times 0 [ 859.469184] CPU: 0 PID: 22037 Comm: syz-executor2 Not tainted 4.16.0-rc7+ #373 [ 859.476582] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 859.485939] Call Trace: [ 859.488540] dump_stack+0x194/0x24d [ 859.492183] ? arch_local_irq_restore+0x53/0x53 [ 859.496859] ? __save_stack_trace+0x7e/0xd0 [ 859.501202] should_fail+0x8c0/0xa40 [ 859.504929] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 859.510055] ? kasan_kmalloc+0xad/0xe0 [ 859.513954] ? kmem_cache_alloc_trace+0x136/0x740 [ 859.518802] ? __memcg_init_list_lru_node+0x169/0x270 [ 859.523993] ? __list_lru_init+0x544/0x750 [ 859.528234] ? sget_userns+0x691/0xe40 [ 859.533869] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 859.538636] ? kern_mount_data+0x50/0xb0 [ 859.542710] ? pid_ns_prepare_proc+0x1e/0x80 [ 859.547113] ? alloc_pid+0x87e/0xa00 [ 859.550815] ? copy_process.part.38+0x2516/0x4bd0 2018/03/31 12:25:49 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'pids', 0x20}]}, 0x6) write$cgroup_subtree(r1, &(0x7f0000000100)={[{0x2d, 'pids', 0x20}]}, 0x6) socket$inet_icmp(0x2, 0x2, 0x1) 2018/03/31 12:25:49 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) ioctl$KVM_SET_CLOCK(r1, 0x4030ae7b, &(0x7f0000000080)={0x3, 0xffffffffffffffff}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) [ 859.555644] ? _do_fork+0x1f7/0xf70 [ 859.559262] ? SyS_clone+0x37/0x50 [ 859.562798] ? find_held_lock+0x35/0x1d0 [ 859.566855] ? __lock_is_held+0xb6/0x140 [ 859.570919] ? check_same_owner+0x320/0x320 [ 859.575244] ? rcu_note_context_switch+0x710/0x710 [ 859.580180] should_failslab+0xec/0x120 [ 859.584156] kmem_cache_alloc_trace+0x4b/0x740 [ 859.588731] ? __kmalloc_node+0x33/0x70 [ 859.592697] ? __kmalloc_node+0x33/0x70 [ 859.596663] ? rcu_read_lock_sched_held+0x108/0x120 [ 859.601687] __memcg_init_list_lru_node+0x169/0x270 [ 859.606710] ? list_lru_add+0x7c0/0x7c0 [ 859.610694] ? __kmalloc_node+0x47/0x70 [ 859.614680] __list_lru_init+0x544/0x750 [ 859.618742] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 859.624623] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 859.629633] ? __lockdep_init_map+0xe4/0x650 [ 859.634036] ? lockdep_init_map+0x9/0x10 [ 859.638083] sget_userns+0x691/0xe40 [ 859.641774] ? set_anon_super+0x20/0x20 [ 859.645730] ? put_filp+0x90/0x90 [ 859.649164] ? destroy_unused_super.part.6+0xd0/0xd0 [ 859.654249] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 859.659250] ? save_stack+0xa3/0xd0 [ 859.662858] ? save_stack+0x43/0xd0 [ 859.666461] ? kasan_slab_alloc+0x12/0x20 [ 859.670587] ? kmem_cache_alloc+0x12e/0x760 [ 859.674888] ? alloc_pid+0xc1/0xa00 [ 859.678500] ? __radix_tree_replace+0x1af/0x310 [ 859.683152] ? radix_tree_delete+0x30/0x30 [ 859.687368] ? node_tag_clear+0xf2/0x180 [ 859.691416] ? proc_get_inode+0x620/0x620 [ 859.695544] mount_ns+0x6d/0x190 [ 859.698893] proc_mount+0x7a/0x90 [ 859.702328] mount_fs+0x66/0x2d0 [ 859.705678] vfs_kern_mount.part.26+0xc6/0x4a0 [ 859.710244] ? may_umount+0xa0/0xa0 [ 859.713851] ? idr_alloc_cyclic+0x1d6/0x320 [ 859.718156] ? do_raw_spin_trylock+0x190/0x190 [ 859.722720] ? idr_alloc+0x180/0x180 [ 859.726415] kern_mount_data+0x50/0xb0 [ 859.730286] pid_ns_prepare_proc+0x1e/0x80 [ 859.734620] alloc_pid+0x87e/0xa00 [ 859.738146] ? __change_pid+0x400/0x400 [ 859.742190] ? ns_capable_common+0xcf/0x160 [ 859.746500] ? memset+0x31/0x40 [ 859.749761] ? copy_thread_tls+0x268/0x8f0 [ 859.753981] copy_process.part.38+0x2516/0x4bd0 [ 859.758763] ? __cleanup_sighand+0x40/0x40 [ 859.762991] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 859.768169] ? __lock_acquire+0x664/0x3e00 [ 859.772382] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 859.777550] ? environ_open+0x80/0x80 [ 859.781338] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 859.786505] ? __lock_acquire+0x664/0x3e00 [ 859.790717] ? mntput_no_expire+0x130/0xa90 [ 859.795029] ? print_irqtrace_events+0x270/0x270 [ 859.799771] ? trace_hardirqs_off+0x10/0x10 [ 859.804077] ? lock_acquire+0x1d5/0x580 [ 859.808041] ? trace_hardirqs_off+0x10/0x10 [ 859.812347] ? trace_hardirqs_off+0x10/0x10 [ 859.816652] ? __lock_acquire+0x664/0x3e00 [ 859.820863] ? check_same_owner+0x320/0x320 [ 859.825169] ? find_held_lock+0x35/0x1d0 [ 859.829220] ? _parse_integer+0xe9/0x140 [ 859.833269] ? trace_hardirqs_off+0x10/0x10 [ 859.837570] ? _parse_integer+0x140/0x140 [ 859.841705] ? trace_hardirqs_off+0x10/0x10 [ 859.846007] ? get_pid_task+0x93/0x140 [ 859.849882] ? lock_downgrade+0x980/0x980 [ 859.854022] ? find_held_lock+0x35/0x1d0 [ 859.858070] ? __f_unlock_pos+0x19/0x20 [ 859.862034] ? lock_downgrade+0x980/0x980 [ 859.866163] ? get_pid_task+0xbc/0x140 [ 859.870039] ? proc_fail_nth_write+0x9b/0x1d0 [ 859.874518] ? map_files_get_link+0x3a0/0x3a0 [ 859.879000] ? handle_mm_fault+0x35b/0xb10 [ 859.883235] _do_fork+0x1f7/0xf70 [ 859.886677] ? fork_idle+0x2d0/0x2d0 [ 859.890378] ? wait_for_completion+0x770/0x770 [ 859.894950] ? __lock_is_held+0xb6/0x140 [ 859.899014] ? __sb_end_write+0xa0/0xd0 [ 859.902978] ? fput+0xd2/0x140 [ 859.906161] ? SyS_write+0x184/0x220 [ 859.909857] ? SyS_read+0x220/0x220 [ 859.913474] SyS_clone+0x37/0x50 [ 859.916830] ? sys_vfork+0x30/0x30 [ 859.920355] do_syscall_64+0x281/0x940 [ 859.924224] ? vmalloc_sync_all+0x30/0x30 [ 859.928353] ? _raw_spin_unlock_irq+0x27/0x70 [ 859.932831] ? finish_task_switch+0x1c1/0x7e0 [ 859.937309] ? syscall_return_slowpath+0x550/0x550 [ 859.942223] ? syscall_return_slowpath+0x2ac/0x550 [ 859.947133] ? prepare_exit_to_usermode+0x350/0x350 [ 859.952146] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 859.957507] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 859.962356] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 859.967534] RIP: 0033:0x454e79 [ 859.970875] RSP: 002b:00007f935ae4bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 859.978569] RAX: ffffffffffffffda RBX: 00007f935ae4c6d4 RCX: 0000000000454e79 [ 859.985819] RDX: 00000000200008c0 RSI: 0000000020000800 RDI: 000000002000c100 [ 859.993072] RBP: 000000000072bea0 R08: 0000000020000940 R09: 0000000000000000 [ 860.000324] R10: 0000000020000900 R11: 0000000000000246 R12: 0000000000000014 [ 860.007577] R13: 0000000000000051 R14: 00000000006f2838 R15: 0000000000000013 2018/03/31 12:25:50 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0xff}, 0x1c) 2018/03/31 12:25:50 executing program 6: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/autofs\x00', 0x38081, 0x0) write$cgroup_subtree(r0, &(0x7f0000000300)={[{0x2f, 'memory', 0x20}, {0x8c95ef07f4ebeeb, 'pids', 0x20}, {0x0, 'rdma', 0x20}, {0x2d, 'memory', 0x20}, {0x2d, 'rdma', 0x20}, {0x2d, 'io', 0x20}, {0x2d, 'memory', 0x20}, {0x2d, 'rdma', 0x20}]}, 0x34) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000100)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x2b, 'pids', 0x20}]}, 0x6) r3 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x1, 0x8000) socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000140)={0x0, 0x800, 0x3}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f00000001c0)={r4, @in6={{0xa, 0x4e21, 0x3f, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, 0x4}}, 0x6, 0x4}, &(0x7f0000000280)=0x90) write$cgroup_subtree(r2, &(0x7f0000000340), 0x0) 2018/03/31 12:25:50 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:25:50 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x4800) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000080)) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 2018/03/31 12:25:50 executing program 6: r0 = semget(0x3, 0x3, 0x100) semctl$GETPID(r0, 0x3, 0xb, &(0x7f0000000200)=""/213) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x20002, 0x0) write$sndseq(r1, &(0x7f0000fa5000)=[{0x5b93, 0x0, 0xffffffffffffff80, 0x0, @time, {}, {}, @addr}], 0x30) read$eventfd(r1, &(0x7f0000000040), 0x8) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2b, 'pids', 0x20}]}, 0x6) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000140), &(0x7f00000001c0)=0x68) write$cgroup_subtree(r3, &(0x7f0000000100)={[{0x2d, 'pids', 0x20}]}, 0x6) fcntl$getflags(r2, 0x1) 2018/03/31 12:25:50 executing program 4: r0 = socket$inet6(0xa, 0x8000e, 0x7fffffff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, 0x10000}, 0x388) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/mcfilter6\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000b00)=ANY=[@ANYBLOB="e6ff0100cff555ca30a8a36b478c912c0a84c6b34ca4077171224834733b350d738b0ddba02e6211857a36c504a27651f40cb4e9ff895b92f00522fd2aa99d474135b0658b6b7496b0d6d18fda5c8fd26bf3955cf7fa3d7512637744ab59a65f438779469ce59735a7670c5671b5529b751ae0c3f6fc88a8af2c97a15ae0deb733d526c1536e844124cc72bbadb51b1db4c4a884c32f81e254f8f6b17d93ed4879e039b5c0e3f9df600e75af2160b9bab7de9fc4c4911dba91bb9113d95ec7e144566ccdfe6d7fc11e1441a37d712009b7dc2c50c3dc4b2713b1adbec7ecdfd8dc9de0c562634006535c1cb870e9ecfed9a93a3e8f5b27b4f8afa8919ed8279c1d744a7b2a02901c50ac7fb615059e1cf241c0cbe4e3f3c511c1c7e47dab3a9344e0a01d33b59c60838cc8a00ff156823d36108658db8ecbbb3cf2", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000300)=0x18) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000c80)={0x6, &(0x7f00000002c0)=[{0x1f, 0xd5}, {0x800, 0x10001}, {0x2, 0xfffffffffffffffa}, {0x1f, 0x5}, {0x7fffffff, 0x7ff}, {0x4c, 0xfff}]}) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000340)={0x100, 0x2, 0x0, 0x7fff, r2}, 0x10) recvfrom$unix(r1, &(0x7f0000000180)=""/36, 0x24, 0x40010002, 0x0, 0x0) syz_mount_image$minix(&(0x7f0000000380)='minix\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffc, 0x9, &(0x7f00000009c0)=[{&(0x7f0000000400), 0x0, 0x9}, {&(0x7f0000000440)="4c3cb3d1a6e58380ae2e8ef2023422cae8725945b609f9bc9538c3ec3d6d17a4be8649b8a3f23e48", 0x28, 0x800}, {&(0x7f0000000480)="9ab993036c2e20ebc90967da13e4dcb9082e6d809a5cf7546f6d07573661516e1e3ca8269e957ea8fdcf4c37f72401c2a483aabf31e223e951984d48191edd49b277ecadb884d902b34e47e135d90a343e563ea7f6f52fda4e6ff8ace9de9814dec1964579dd3ba98290039bef2d6763e1f920ed263954291e54c8e3d546d86bc604db0cacbe19f4abb1fccf4db451729e03955c6bcf7ef5c173034affb52b647db945e9bec0ccc2ee1d", 0xaa, 0x6}, {&(0x7f0000000540)="2ce49e332215222e343afe13de5d75a050161991dfe0f42dc8283bc420fbedcca84ccf7fccee052c7553275ac0f93b60693c5ef5d5e4fb1763be4de9f5494d1b6dd4165fdc95b426e4d929c7a0c47b4b76ba6ad61ebfe4a667b025c863fcd38d657286df61ec2c176dc9729810135f9427dbad89162ceb0339af900f1f5e0de192c100d8881dc99d8d846f13e64a2efa40732e12139a4c437970eb1414c9bf3ab70f07654f40fb350ae2079b3e9d4c4febd35b6416bc3aafce7a6c4007d406", 0xbf, 0x5}, {&(0x7f0000000600)="4040fa8e17d93aa2cb4d17a3a5e2b05f9c0c85e749bbdb5165538a1e6ea56e0762df3a663401cc069d0a969b4d2c0ae5f69c346e66d29f1bd2caf35b142f5ef3ff71c6272d69e4324e3b7eaea97658e1555343baf477e50da57fee18d4bc78c86251a323464d7bf0cb6c50631940ccf26a383814f2b963392ab49c83061e544cb020c226db685338ac9191d247f92b249029aa8c40ab1359b9852fac5a17a7e41eb54aa8da40800232c0c205917d418cec04920366caa74c993bacd0daad546e9aac9a32c8a193434229f554ec07b6e282da5ed651", 0xd5, 0x6}, {&(0x7f0000000700)="80892cd10552e3dd5e27bfd351497459f44b127494702bc43e72bc1b7f1b57547e5954f5c00d10aa1cd6d1a2a2594225b7405e23fd53e93dc9db4ed05ea38df19b4e64139383865e1e3491d4f92eae06020a1b5df3e1659288ae1536a510d249edd9f422ff15d0eaa36613bb7eb3e7a8b4f259a93b2ea8f4572ac8581299b21c78ce979d92357e719783d74d2ce61145f2f3e06836e157fc5520159b30423e0a54f975ab9b715ff9ac173db918658e3155c9f0dd1418730ee07e86f3b4bd6cbe75717b1c4047bf5ee58a538a70ce59d546c5ecf688d94b7e73e39e617cf0fe680fd411493091187ae62ac08b", 0xec, 0x1}, {&(0x7f0000000800)="d0823869b1105980b196dc915d96ca6b4be34c96a9bf38ff181171fc4966a7eb5f4a90eaf94a8d84ef23cf24d7da", 0x2e, 0x5}, {&(0x7f0000000840)="87998db10acd2edfb07e302ce26a21ab114a59ade5f101af3bd5e7b718e740c6f177c238ef351b8c9dce65c96178aee0c600ce0a48a69db96966150a706a9eee166f748f4954d3f160be1c483d0ade3ac49e640fa71a90852e7ee139592fea7b28370c30646a235fb156c15a7ef73a9fbb66bb535e29b27f702fb39862e8cb161bbd3156ec1c383bd9da5781035ba138a5cd607fb7598ce358e9468427e3dc86df9a3c4a63b842ef3c1a67ecc95c71938a7a525c70612ff0bd71aa023db459d9", 0xc0, 0x7}, {&(0x7f0000000900)="2de84162814fa104b369ca2d6da08dfab555247dab07821c33582cd8ebc2d3ea426e2230dec4967073764136ffe31372caf62cf6c0be9244684634a125ce05f2558fe7dc6b49bcb66166538bff58585766698c8059dd805005ce454313fa4029332ba48fc1ee6efa691a25c7c833e570330a791e57919b66ca92bd25278edd9af012125db1287e04dac9b255e131aa", 0x8f, 0x290}], 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000100)={{0xa, 0x4e20, 0x6, @mcast2={0xff, 0x2, [], 0x1}, 0x7}, {0xa, 0x4e22, 0xffffffffffffff1e, @dev={0xfe, 0x80, [], 0xf}, 0x2}, 0x7ff, [0x1c, 0x6, 0x7, 0x6, 0x8, 0x6, 0x9, 0xa6]}, 0x5c) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000400)=@sack_info={r3, 0x1, 0x8}, &(0x7f0000000ac0)=0xc) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x4e, @dev={0xfe, 0x80, [], 0x13}, 0x74}, 0x1c) 2018/03/31 12:25:50 executing program 2 (fault-call:10 fault-nth:20): r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="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", 0xfc}], 0x1, 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r2 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) ioctl$sock_ipx_SIOCAIPXPRISLT(r2, 0x89e1, &(0x7f0000000280)=0x3f) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f0000000200)={0x80, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23}, 0x0, 0x7, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000300)={r3, 0x1c9}, 0x8) r4 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e44ee") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x40, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000c40)={r3, 0x2}, &(0x7f0000000c80)=0xffffffffffffff39) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000540)=0x2, 0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000340)) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000d40)={0x7433, {{0x2, 0x4e21, @broadcast=0xffffffff}}, 0x1, 0x1, [{{0x2, 0x4e20}}]}, 0x110) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f, r3}, 0x20) 2018/03/31 12:25:50 executing program 1: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:25:50 executing program 7: socket$inet6(0xa, 0x0, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000943ffc)=0xa35) read(r1, &(0x7f00003fefff)=""/1, 0x1) r2 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r3, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r3, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r4}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)) r5 = dup2(r3, r4) fcntl$setown(r5, 0x8, r2) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r2, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0xe6, 0x2, {0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, 0xb64, 0x9, 0x9b, 0x5, 0xffff}}, &(0x7f0000000580)=0xb0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:25:50 executing program 5: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:25:50 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:25:50 executing program 6: r0 = socket$packet(0x11, 0x800000003, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000005ff0)={0x1, &(0x7f0000964ff8)=[{0x6}]}, 0x10) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000140)=@req3={0x4d42, 0x0, 0x8, 0x2, 0x8000, 0x7, 0x101}, 0x1c) syz_emit_ethernet(0xffffffffffffff72, &(0x7f0000000180)={@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], {@can={0xc, {{0x1, 0x8, 0x8, 0x5cba}, 0x1, 0x3, 0x0, 0x0, "c6f43a0f96d13057"}}}}, &(0x7f0000000080)={0xfffffffffffffffd, 0x3, [0x769, 0xec2, 0xdd1, 0xf09]}) r1 = accept(r0, &(0x7f0000000640)=@un=@abs, &(0x7f00000006c0)=0x80) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000000), &(0x7f0000000240)=0x4) sendmsg$key(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000700)={0x2, 0x16, 0x80000001, 0x0, 0xb, 0x0, 0x70bd28, 0x25dfdbff, [@sadb_x_nat_t_type={0x1, 0x14, 0x3}, @sadb_x_nat_t_port={0x1, 0x15, 0x4e22}, @sadb_ident={0x2, 0xb, 0x8, 0x0, 0x8}, @sadb_address={0x5, 0x6, 0x0, 0xa0, 0x0, @in6={0xa, 0x4e22, 0x1, @loopback={0x0, 0x1}, 0x2}}]}, 0x58}, 0x1}, 0x24000844) connect$netlink(r1, &(0x7f0000000100)=@proc={0x10, 0x0, 0x25dfdbff, 0x460}, 0xc) socketpair(0x2003, 0x800, 0x1e5b3101, &(0x7f00000001c0)={0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(r2, &(0x7f0000000440)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1000008}, 0xc, &(0x7f0000000400)={&(0x7f0000000280)={0x168, 0x0, 0x4, 0x70bd2a, 0x25dfdbfb, {0xf}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bcsf0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast=0xffffffff}]}, @IPVS_CMD_ATTR_DEST={0x54, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x3}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x8}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x58}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x2}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x2}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}]}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'fo\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_DAEMON={0x4c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bcsh0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback=0x7f000001}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bcsh0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x3a}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7ff}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x8}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast2={0xff, 0x2, [], 0x1}}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3ff}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}]}, 0x168}, 0x1, 0x0, 0x0, 0x4001}, 0x1) 2018/03/31 12:25:50 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x80, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000080)=0x4, 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f00000000c0)={0xfff, 0x9, 0x401, 'queue0\x00', 0x6}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0xfffffd74}], 0x1) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x7, 0x8000, 0x1000, 0x7d0, 0x0, 0xffffffff00000000, 0x0, 0x5, 0x9, 0x6, 0x1, 0x81, 0x5, 0x10000, 0x1, 0x7, 0xffffffffffffffff, 0xeda, 0x5, 0x0, 0x91, 0x10001, 0xffffffffffff0001, 0xc384, 0x8, 0xffffffffffffffe0, 0x0, 0x4, 0xffff, 0x80, 0x7, 0x2, 0x1, 0x0, 0x30, 0x3, 0x0, 0x7, 0x4, @perf_config_ext={0xfffffffffffff0f9, 0x8}, 0x20403, 0x0, 0x9, 0x7, 0x0, 0xfff, 0x7}, r1, 0x0, r0, 0x2) 2018/03/31 12:25:51 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e21, 0x100, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, 0x1}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x101801, 0x0) setsockopt$netlink_NETLINK_RX_RING(r1, 0x10e, 0x6, &(0x7f0000000080)={0x0, 0xe4c, 0x5, 0x7}, 0x10) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x4e21, 0x6, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0x5}, {0xa, 0x4e20, 0x8001, @empty, 0x152c00000}, 0x71f, [0xffffffffffffff80, 0x7, 0x2, 0x3, 0x1, 0x401, 0x1]}, 0x5c) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) [ 860.652466] FAULT_INJECTION: forcing a failure. [ 860.652466] name failslab, interval 1, probability 0, space 0, times 0 [ 860.663969] CPU: 0 PID: 22112 Comm: syz-executor2 Not tainted 4.16.0-rc7+ #373 [ 860.671337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 860.680697] Call Trace: [ 860.683297] dump_stack+0x194/0x24d [ 860.686938] ? arch_local_irq_restore+0x53/0x53 [ 860.691640] ? __save_stack_trace+0x7e/0xd0 [ 860.691660] should_fail+0x8c0/0xa40 [ 860.691675] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 860.704799] ? kasan_kmalloc+0xad/0xe0 [ 860.708695] ? kmem_cache_alloc_trace+0x136/0x740 [ 860.713540] ? __memcg_init_list_lru_node+0x169/0x270 [ 860.718765] ? __list_lru_init+0x544/0x750 [ 860.723004] ? sget_userns+0x691/0xe40 [ 860.726897] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 860.731777] ? kern_mount_data+0x50/0xb0 [ 860.735835] ? pid_ns_prepare_proc+0x1e/0x80 [ 860.740244] ? alloc_pid+0x87e/0xa00 [ 860.744053] ? copy_process.part.38+0x2516/0x4bd0 [ 860.748883] ? _do_fork+0x1f7/0xf70 [ 860.752490] ? SyS_clone+0x37/0x50 [ 860.756021] ? find_held_lock+0x35/0x1d0 [ 860.760069] ? __lock_is_held+0xb6/0x140 [ 860.764119] ? check_same_owner+0x320/0x320 [ 860.769468] ? rcu_note_context_switch+0x710/0x710 [ 860.774413] should_failslab+0xec/0x120 [ 860.778374] kmem_cache_alloc_trace+0x4b/0x740 [ 860.782935] ? __kmalloc_node+0x33/0x70 [ 860.786892] ? __kmalloc_node+0x33/0x70 [ 860.790847] ? rcu_read_lock_sched_held+0x108/0x120 [ 860.795853] __memcg_init_list_lru_node+0x169/0x270 [ 860.800856] ? list_lru_add+0x7c0/0x7c0 [ 860.804814] ? __kmalloc_node+0x47/0x70 [ 860.808784] __list_lru_init+0x544/0x750 [ 860.812849] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 860.818723] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 860.823722] ? __lockdep_init_map+0xe4/0x650 [ 860.828113] ? lockdep_init_map+0x9/0x10 [ 860.832157] sget_userns+0x691/0xe40 [ 860.835848] ? set_anon_super+0x20/0x20 [ 860.839806] ? put_filp+0x90/0x90 [ 860.843240] ? destroy_unused_super.part.6+0xd0/0xd0 [ 860.848331] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 860.853334] ? save_stack+0xa3/0xd0 [ 860.856946] ? save_stack+0x43/0xd0 [ 860.860557] ? kasan_slab_alloc+0x12/0x20 [ 860.864687] ? kmem_cache_alloc+0x12e/0x760 [ 860.869092] ? alloc_pid+0xc1/0xa00 [ 860.872711] ? __radix_tree_replace+0x1af/0x310 [ 860.877364] ? radix_tree_delete+0x30/0x30 [ 860.881586] ? node_tag_clear+0xf2/0x180 [ 860.885642] ? proc_get_inode+0x620/0x620 [ 860.889773] mount_ns+0x6d/0x190 [ 860.893126] proc_mount+0x7a/0x90 [ 860.896559] mount_fs+0x66/0x2d0 [ 860.899912] vfs_kern_mount.part.26+0xc6/0x4a0 [ 860.904481] ? may_umount+0xa0/0xa0 [ 860.908088] ? idr_alloc_cyclic+0x1d6/0x320 [ 860.912396] ? do_raw_spin_trylock+0x190/0x190 [ 860.916965] ? idr_alloc+0x180/0x180 [ 860.920667] kern_mount_data+0x50/0xb0 [ 860.924540] pid_ns_prepare_proc+0x1e/0x80 [ 860.928761] alloc_pid+0x87e/0xa00 [ 860.932288] ? __change_pid+0x400/0x400 [ 860.936246] ? ns_capable_common+0xcf/0x160 [ 860.940559] ? memset+0x31/0x40 [ 860.943822] ? copy_thread_tls+0x268/0x8f0 [ 860.948047] copy_process.part.38+0x2516/0x4bd0 [ 860.952712] ? __cleanup_sighand+0x40/0x40 [ 860.956943] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 860.962120] ? __lock_acquire+0x664/0x3e00 [ 860.966333] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 860.971504] ? environ_open+0x80/0x80 [ 860.975294] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 860.980463] ? __lock_acquire+0x664/0x3e00 [ 860.984679] ? mntput_no_expire+0x130/0xa90 [ 860.988991] ? print_irqtrace_events+0x270/0x270 [ 860.993730] ? trace_hardirqs_off+0x10/0x10 [ 860.998044] ? lock_acquire+0x1d5/0x580 [ 861.001998] ? trace_hardirqs_off+0x10/0x10 [ 861.006309] ? trace_hardirqs_off+0x10/0x10 [ 861.010612] ? __lock_acquire+0x664/0x3e00 [ 861.014826] ? check_same_owner+0x320/0x320 [ 861.019405] ? find_held_lock+0x35/0x1d0 [ 861.023453] ? _parse_integer+0xe9/0x140 [ 861.027500] ? trace_hardirqs_off+0x10/0x10 [ 861.031805] ? _parse_integer+0x140/0x140 [ 861.035951] ? trace_hardirqs_off+0x10/0x10 [ 861.040258] ? get_pid_task+0x93/0x140 [ 861.044128] ? lock_downgrade+0x980/0x980 [ 861.048269] ? find_held_lock+0x35/0x1d0 [ 861.052764] ? __f_unlock_pos+0x19/0x20 [ 861.056725] ? lock_downgrade+0x980/0x980 [ 861.060858] ? get_pid_task+0xbc/0x140 [ 861.064728] ? proc_fail_nth_write+0x9b/0x1d0 [ 861.070681] ? map_files_get_link+0x3a0/0x3a0 [ 861.075160] ? handle_mm_fault+0x35b/0xb10 [ 861.079385] _do_fork+0x1f7/0xf70 [ 861.082828] ? fork_idle+0x2d0/0x2d0 [ 861.086541] ? wait_for_completion+0x770/0x770 [ 861.091110] ? __lock_is_held+0xb6/0x140 [ 861.095166] ? __sb_end_write+0xa0/0xd0 [ 861.099126] ? fput+0xd2/0x140 [ 861.102321] ? SyS_write+0x184/0x220 [ 861.106022] ? SyS_read+0x220/0x220 [ 861.109637] SyS_clone+0x37/0x50 [ 861.112986] ? sys_vfork+0x30/0x30 [ 861.116512] do_syscall_64+0x281/0x940 [ 861.120394] ? vmalloc_sync_all+0x30/0x30 [ 861.124525] ? _raw_spin_unlock_irq+0x27/0x70 [ 861.129005] ? finish_task_switch+0x1c1/0x7e0 [ 861.133487] ? syscall_return_slowpath+0x550/0x550 [ 861.138420] ? syscall_return_slowpath+0x2ac/0x550 [ 861.143337] ? prepare_exit_to_usermode+0x350/0x350 [ 861.148349] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 861.153700] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 861.158533] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 861.163704] RIP: 0033:0x454e79 [ 861.166880] RSP: 002b:00007f935ae4bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 861.174572] RAX: ffffffffffffffda RBX: 00007f935ae4c6d4 RCX: 0000000000454e79 [ 861.181838] RDX: 00000000200008c0 RSI: 0000000020000800 RDI: 000000002000c100 [ 861.189088] RBP: 000000000072bea0 R08: 0000000020000940 R09: 0000000000000000 [ 861.196336] R10: 0000000020000900 R11: 0000000000000246 R12: 0000000000000014 2018/03/31 12:25:51 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:25:51 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) socket$inet6(0xa, 0x80000, 0x5) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0xdee, 0x200040) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='|\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="00022cbd7000fbdbdf25020000000c000200080002004e22000008000400000000805400020008000b0002000000080003000400000008000b000a0000000800090000000100080002004e2300000800090009000000080006008000000008000b000100000008000400030000000800050000100000"], 0x7c}, 0x1}, 0x4) [ 861.203592] R13: 0000000000000051 R14: 00000000006f2838 R15: 0000000000000014 2018/03/31 12:25:51 executing program 6: r0 = memfd_create(&(0x7f0000000040)='\x00', 0x0) r1 = socket$key(0xf, 0x3, 0x2) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) r2 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) fcntl$setlease(r2, 0x400, 0x0) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') rt_sigprocmask(0x0, &(0x7f0000032ff8), 0x0, 0x8) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, &(0x7f0000000240)="ab06fc681c85a5f49d449c43e9bbe5cb", 0x10, 0xfffffffffffffff8) clock_adjtime(0x0, &(0x7f0000000340)={0x9}) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300020e00000000000001020000000400080005000000000000000000001c00000000000000000000000000000000030006000000000002000000000000000000000000e10000020001000000000000d1fb0200000000030005000000000002000000e00000010001000000000000"], 0x70}, 0x1}, 0x0) recvmsg(r1, &(0x7f0000000400)={&(0x7f0000000140)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000380), 0x0, &(0x7f00000003c0)=""/25, 0x19}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='net/fib_triestat\x00') ioctl$int_in(r0, 0x5452, &(0x7f0000000380)) lookup_dcookie(0x0, &(0x7f00000001c0)=""/65, 0x41) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000080)) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f00000002c0)=0x4, 0x4) sendfile(r0, r3, &(0x7f0000000040), 0x10ed5b) getpid() r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r4, 0x0, 0x27, &(0x7f0000f97000)={@multicast1=0xe0000001, @loopback=0x7f000001}, 0xc) r5 = syz_open_procfs(0x0, &(0x7f0000272000)='net/mcfilter\x00') readv(r5, &(0x7f0000f46000)=[{&(0x7f0000120000)=""/4096, 0x1000}], 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001340)={{{@in=@local, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000001440)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a45352, &(0x7f0000001680)={{0x5}, 'port0\x00', 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x400, 0x0, 0x2, 0x634}) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f00000000c0)={0x0, 0x195a5685}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000140)=ANY=[@ANYRES32=r6, @ANYBLOB="270000009d42523583d766"], &(0x7f0000000280)=0x2) [ 861.319394] IPVS: ftp: loaded support on port[0] = 21 2018/03/31 12:25:51 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:25:51 executing program 6: r0 = memfd_create(&(0x7f0000000040)='\x00', 0x0) r1 = socket$key(0xf, 0x3, 0x2) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) r2 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) fcntl$setlease(r2, 0x400, 0x0) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') rt_sigprocmask(0x0, &(0x7f0000032ff8), 0x0, 0x8) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, &(0x7f0000000240)="ab06fc681c85a5f49d449c43e9bbe5cb740939e9b6", 0x15, 0xfffffffffffffff8) clock_adjtime(0x0, &(0x7f0000000340)={0x9}) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300020e00000000000001020000000400080005000000000000000000001c00000000000000000000000000000000030006000000000002000000000000000000000000e10000020001000000000000d1fb0200000000030005000000000002000000e00000010001000000000000"], 0x70}, 0x1}, 0x0) recvmsg(r1, &(0x7f0000000400)={&(0x7f0000000140)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000380), 0x0, &(0x7f00000003c0)=""/25, 0x19}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='net/fib_triestat\x00') ioctl$int_in(r0, 0x5452, &(0x7f0000000380)) lookup_dcookie(0x0, &(0x7f00000001c0)=""/65, 0x41) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000080)) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f00000002c0)=0x4, 0x4) sendfile(r0, r3, &(0x7f0000000040), 0x0) getpid() r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r4, 0x0, 0x27, &(0x7f0000f97000)={@multicast1=0xe0000001, @loopback=0x7f000001}, 0xc) r5 = syz_open_procfs(0x0, &(0x7f0000272000)='net/mcfilter\x00') readv(r5, &(0x7f0000f46000)=[{&(0x7f0000120000)=""/4096, 0x1000}], 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001340)={{{@in=@local, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000001440)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a45352, &(0x7f0000001680)={{0x5}, 'port0\x00', 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x400, 0x0, 0x2, 0x634}) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f00000000c0)={0x0, 0x195a5685}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000140)=ANY=[@ANYRES32=r6, @ANYBLOB="270000009d42523583d766"], &(0x7f0000000280)=0x2) 2018/03/31 12:25:51 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x101) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f0000000040)={0xa}, 0x1c) 2018/03/31 12:25:51 executing program 4: r0 = socket$inet6(0xa, 0x80805, 0x5) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') 2018/03/31 12:25:52 executing program 2 (fault-call:10 fault-nth:21): r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="84d5aef1603cb020c5b219faa757913ec85ee74a155e1d635566777b78600bc65bf01ce33de9a6bc3a2041890df0926f2cfc2a7d63690f6b55610593773041755f61b034e3a62a770855b2c0481df219efbfa8ffd0c665434a1de026bcfb654d597ef77a7b231aa9efe45c53811c7591d56f69e9c6231e6da993bbd2a6133805be0c18ba114cfe865e693024a56c3331b93c03e25927a504d27acebf7eecd33d7c69359e3ca37dc546c4fc5bc62596a94cdc00f9b973616a9d2ebad2d9b3e60261ae73b8397694e1f0851475b4236fb47989e6bfd1ad926a01523df3f689dc2603a76b5fc5e023d5449d066d424d1001fee5d653c21fdb751e95ff2b", 0xfc}], 0x1, 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r2 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) ioctl$sock_ipx_SIOCAIPXPRISLT(r2, 0x89e1, &(0x7f0000000280)=0x3f) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f0000000200)={0x80, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23}, 0x0, 0x7, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000300)={r3, 0x1c9}, 0x8) r4 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e44ee") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x40, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000c40)={r3, 0x2}, &(0x7f0000000c80)=0xffffffffffffff39) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000540)=0x2, 0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000340)) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000d40)={0x7433, {{0x2, 0x4e21, @broadcast=0xffffffff}}, 0x1, 0x1, [{{0x2, 0x4e20}}]}, 0x110) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f, r3}, 0x20) 2018/03/31 12:25:52 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:25:52 executing program 1: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:25:52 executing program 6: unshare(0x40000000) r0 = socket$kcm(0x29, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f0000000500)={0x0, 0x0, 0x201, 0x0, 0x9c6e}, &(0x7f0000000540)=0x20) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x7cb, 0x0, 0xa9}, &(0x7f00000005c0)=0x14) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f0000000840)={&(0x7f0000000740)=[0x0, 0x0, 0x0], &(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=[0x0], 0x3, 0x0, 0x0, 0x1}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x8000, 0x0) getdents64(r1, &(0x7f0000000080), 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000040)={0x1, 'sit0\x00'}, 0x18) setsockopt$ipx_IPX_TYPE(0xffffffffffffffff, 0x100, 0x1, &(0x7f0000000880), 0x4) ioctl$DRM_IOCTL_MODE_GETCRTC(r1, 0xc06864a1, &(0x7f00000000c0)={&(0x7f0000000080)=[0x0], 0x1, 0x5c01, 0x2, 0x0, 0x5, 0x9, {0x1c00000000000000, 0x20, 0xfff, 0x8, 0x5, 0x403309e7, 0x0, 0x422d, 0xf09, 0x4a5, 0x72d5, 0x81, 0x3, 0x3, "678e1464015e2e2a67ff601ccc883ad348f12618c8aaf0a9a9bf449c65b953e4"}}) fchdir(r0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f00000009c0)={'gretap0\x00', {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xc}}}) 2018/03/31 12:25:52 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x32) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e22, 0x8, @empty, 0x5}}, 0x4cf9, 0x3, 0xffff, 0xffc000000000, 0x80}, &(0x7f00000000c0)=0x98) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000140)={r1, 0x7, 0xffffffffffffffe0}, 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x3731, 0x100) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f0000000080)={r0, 0x13e1, 0x9, "c096cc19a69b0f13aee3a95703d9ee1f742be7dd15a726a30c288272"}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x125, @mcast1={0xff, 0x1, [], 0x1}, 0x4000}, 0xffffff54) 2018/03/31 12:25:52 executing program 7: socket$inet6(0xa, 0x0, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000943ffc)=0xa35) read(r1, &(0x7f00003fefff)=""/1, 0x1) r2 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r3, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r3, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r4}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)) r5 = dup2(r3, r4) fcntl$setown(r5, 0x8, r2) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r2, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0xe6, 0x2, {0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, 0xb64, 0x9, 0x9b, 0x5, 0xffff}}, &(0x7f0000000580)=0xb0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:25:52 executing program 5: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:25:52 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x80, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000080)=0x4, 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f00000000c0)={0xfff, 0x9, 0x401, 'queue0\x00', 0x6}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0xfffffd74}], 0x1) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x7, 0x8000, 0x1000, 0x7d0, 0x0, 0xffffffff00000000, 0x0, 0x5, 0x9, 0x6, 0x1, 0x81, 0x5, 0x10000, 0x1, 0x7, 0xffffffffffffffff, 0xeda, 0x5, 0x0, 0x91, 0x10001, 0xffffffffffff0001, 0xc384, 0x8, 0xffffffffffffffe0, 0x0, 0x4, 0xffff, 0x80, 0x7, 0x2, 0x1, 0x0, 0x30, 0x3, 0x0, 0x7, 0x4, @perf_config_ext={0xfffffffffffff0f9, 0x8}, 0x20403, 0x0, 0x9, 0x7, 0x0, 0xfff, 0x7}, r1, 0x0, r0, 0x2) [ 862.224856] FAULT_INJECTION: forcing a failure. [ 862.224856] name failslab, interval 1, probability 0, space 0, times 0 [ 862.236217] CPU: 1 PID: 22194 Comm: syz-executor2 Not tainted 4.16.0-rc7+ #373 [ 862.243582] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 862.252938] Call Trace: [ 862.255553] dump_stack+0x194/0x24d [ 862.259210] ? arch_local_irq_restore+0x53/0x53 [ 862.263916] ? __save_stack_trace+0x7e/0xd0 [ 862.263940] should_fail+0x8c0/0xa40 [ 862.263955] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 862.263968] ? kasan_kmalloc+0xad/0xe0 [ 862.263977] ? kmem_cache_alloc_trace+0x136/0x740 [ 862.263987] ? __memcg_init_list_lru_node+0x169/0x270 [ 862.263996] ? __list_lru_init+0x544/0x750 [ 862.264004] ? sget_userns+0x691/0xe40 [ 862.264016] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 862.264025] ? kern_mount_data+0x50/0xb0 [ 862.264034] ? pid_ns_prepare_proc+0x1e/0x80 [ 862.264043] ? alloc_pid+0x87e/0xa00 [ 862.264052] ? copy_process.part.38+0x2516/0x4bd0 [ 862.264060] ? _do_fork+0x1f7/0xf70 [ 862.264068] ? SyS_clone+0x37/0x50 [ 862.264081] ? find_held_lock+0x35/0x1d0 [ 862.264096] ? __lock_is_held+0xb6/0x140 [ 862.264115] ? check_same_owner+0x320/0x320 [ 862.264130] ? rcu_note_context_switch+0x710/0x710 [ 862.264147] should_failslab+0xec/0x120 [ 862.264157] kmem_cache_alloc_trace+0x4b/0x740 [ 862.264167] ? __kmalloc_node+0x33/0x70 [ 862.264175] ? __kmalloc_node+0x33/0x70 [ 862.264185] ? rcu_read_lock_sched_held+0x108/0x120 [ 862.264198] __memcg_init_list_lru_node+0x169/0x270 [ 862.264210] ? list_lru_add+0x7c0/0x7c0 [ 862.264219] ? __kmalloc_node+0x47/0x70 [ 862.264233] __list_lru_init+0x544/0x750 [ 862.264247] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 862.264259] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 862.264268] ? __lockdep_init_map+0xe4/0x650 [ 862.264279] ? lockdep_init_map+0x9/0x10 [ 862.264289] sget_userns+0x691/0xe40 [ 862.264296] ? set_anon_super+0x20/0x20 [ 862.264308] ? put_filp+0x90/0x90 [ 862.264318] ? destroy_unused_super.part.6+0xd0/0xd0 [ 862.264343] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 862.264356] ? save_stack+0xa3/0xd0 [ 862.264367] ? save_stack+0x43/0xd0 [ 862.264375] ? kasan_slab_alloc+0x12/0x20 [ 862.264383] ? kmem_cache_alloc+0x12e/0x760 [ 862.264390] ? alloc_pid+0xc1/0xa00 [ 862.264404] ? __radix_tree_replace+0x1af/0x310 [ 862.264416] ? radix_tree_delete+0x30/0x30 [ 862.264425] ? node_tag_clear+0xf2/0x180 [ 862.264444] ? proc_get_inode+0x620/0x620 [ 862.264454] mount_ns+0x6d/0x190 [ 862.264466] proc_mount+0x7a/0x90 [ 862.264476] mount_fs+0x66/0x2d0 [ 862.264490] vfs_kern_mount.part.26+0xc6/0x4a0 [ 862.264501] ? may_umount+0xa0/0xa0 [ 862.264510] ? idr_alloc_cyclic+0x1d6/0x320 [ 862.264522] ? do_raw_spin_trylock+0x190/0x190 [ 862.264532] ? idr_alloc+0x180/0x180 [ 862.264545] kern_mount_data+0x50/0xb0 [ 862.264554] pid_ns_prepare_proc+0x1e/0x80 [ 862.264563] alloc_pid+0x87e/0xa00 [ 862.264575] ? __change_pid+0x400/0x400 [ 862.264582] ? ns_capable_common+0xcf/0x160 [ 862.264595] ? memset+0x31/0x40 [ 862.264607] ? copy_thread_tls+0x268/0x8f0 [ 862.519993] copy_process.part.38+0x2516/0x4bd0 [ 862.524679] ? __cleanup_sighand+0x40/0x40 [ 862.529051] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 862.534242] ? __lock_acquire+0x664/0x3e00 [ 862.538458] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 862.543813] ? environ_open+0x80/0x80 [ 862.547611] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 862.552780] ? __lock_acquire+0x664/0x3e00 [ 862.556997] ? mntput_no_expire+0x130/0xa90 [ 862.561310] ? print_irqtrace_events+0x270/0x270 [ 862.566048] ? trace_hardirqs_off+0x10/0x10 [ 862.570357] ? lock_acquire+0x1d5/0x580 [ 862.574315] ? trace_hardirqs_off+0x10/0x10 [ 862.578621] ? trace_hardirqs_off+0x10/0x10 [ 862.582930] ? __lock_acquire+0x664/0x3e00 [ 862.587144] ? check_same_owner+0x320/0x320 [ 862.591450] ? find_held_lock+0x35/0x1d0 [ 862.595496] ? _parse_integer+0xe9/0x140 [ 862.599541] ? trace_hardirqs_off+0x10/0x10 [ 862.603854] ? _parse_integer+0x140/0x140 [ 862.607993] ? trace_hardirqs_off+0x10/0x10 [ 862.612307] ? get_pid_task+0x93/0x140 [ 862.616178] ? lock_downgrade+0x980/0x980 [ 862.620313] ? find_held_lock+0x35/0x1d0 [ 862.624367] ? __f_unlock_pos+0x19/0x20 [ 862.628329] ? lock_downgrade+0x980/0x980 [ 862.632457] ? get_pid_task+0xbc/0x140 [ 862.636330] ? proc_fail_nth_write+0x9b/0x1d0 [ 862.640806] ? map_files_get_link+0x3a0/0x3a0 [ 862.645287] ? handle_mm_fault+0x35b/0xb10 [ 862.649512] _do_fork+0x1f7/0xf70 [ 862.652950] ? fork_idle+0x2d0/0x2d0 [ 862.656645] ? wait_for_completion+0x770/0x770 [ 862.661217] ? __lock_is_held+0xb6/0x140 [ 862.665271] ? __sb_end_write+0xa0/0xd0 [ 862.669232] ? fput+0xd2/0x140 [ 862.672409] ? SyS_write+0x184/0x220 [ 862.676108] ? SyS_read+0x220/0x220 [ 862.679719] SyS_clone+0x37/0x50 [ 862.683065] ? sys_vfork+0x30/0x30 [ 862.686590] do_syscall_64+0x281/0x940 [ 862.690458] ? vmalloc_sync_all+0x30/0x30 [ 862.694585] ? _raw_spin_unlock_irq+0x27/0x70 [ 862.699062] ? finish_task_switch+0x1c1/0x7e0 [ 862.703538] ? syscall_return_slowpath+0x550/0x550 [ 862.708452] ? syscall_return_slowpath+0x2ac/0x550 [ 862.713363] ? prepare_exit_to_usermode+0x350/0x350 [ 862.718368] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 862.723812] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 862.728644] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 862.733814] RIP: 0033:0x454e79 [ 862.737070] RSP: 002b:00007f935ae4bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 862.744759] RAX: ffffffffffffffda RBX: 00007f935ae4c6d4 RCX: 0000000000454e79 [ 862.752010] RDX: 00000000200008c0 RSI: 0000000020000800 RDI: 000000002000c100 [ 862.759264] RBP: 000000000072bea0 R08: 0000000020000940 R09: 0000000000000000 [ 862.766519] R10: 0000000020000900 R11: 0000000000000246 R12: 0000000000000014 2018/03/31 12:25:53 executing program 4: ioperm(0xffff, 0x2, 0x80000001) r0 = socket$inet6(0xa, 0x80803, 0x2f) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) socket$inet6(0xa, 0x80800, 0x1) [ 862.773774] R13: 0000000000000051 R14: 00000000006f2838 R15: 0000000000000015 [ 862.950812] IPVS: ftp: loaded support on port[0] = 21 [ 862.982346] IPVS: ftp: loaded support on port[0] = 21 [ 862.991204] IPVS: You probably need to specify IP address on multicast interface. [ 863.000217] IPVS: Error connecting to the multicast addr [ 863.030187] IPVS: ftp: loaded support on port[0] = 21 [ 863.062136] IPVS: You probably need to specify IP address on multicast interface. [ 863.069882] IPVS: Error connecting to the multicast addr 2018/03/31 12:25:53 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:25:53 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) getsockopt$inet6_buf(r0, 0x29, 0x2d, &(0x7f00000002c0)=""/4096, &(0x7f0000000040)=0x1000) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f00000012c0)={0x7e8, {{0xa, 0x4e22, 0x9, @remote={0xfe, 0x80, [], 0xbb}, 0x7}}, 0x1, 0x4, [{{0xa, 0x4e24, 0x6, @empty, 0x200}}, {{0xa, 0x4e21, 0x63a5, @remote={0xfe, 0x80, [], 0xbb}, 0x200000}}, {{0xa, 0x4e24, 0x8, @mcast2={0xff, 0x2, [], 0x1}, 0x4}}, {{0xa, 0x4e22, 0x2d, @remote={0xfe, 0x80, [], 0xbb}, 0x6}}]}, 0x290) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 2018/03/31 12:25:53 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00002b8ff6), 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e1e, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f00000000c0)="237d00d3fc1ee4671fbaa0a455e73e678b8e96f7fd829d4d39f1828ebf765e220913b73db94f6d495077c32cf6d22b4c4f8d", 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000200)={0x0, 0x0, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f00000002c0)={0x0}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000500)={r6, @in6={{0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, [], 0x11}, 0x101}}, [0x0, 0xa07, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x8, 0x0, 0x0, 0x667]}, &(0x7f0000000340)=0x100) setitimer(0x1, &(0x7f0000000140)={{0x0, 0x2710}}, &(0x7f0000000180)) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f00000004c0)={r4}) ftruncate(r3, 0x40001) fchdir(0xffffffffffffffff) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000040), 0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000a40)=ANY=[], &(0x7f00000001c0)) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000003c0)={0x0, @in={{0x2, 0x0, @multicast1=0xe0000001}}}, 0x84) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) setitimer(0x100003, &(0x7f0000000680)={{0x0, 0x2710}, {r7, r8/1000+30000}}, &(0x7f00000006c0)) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000880)={r4, 0x80000, r5}) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000000240)=0x0) rt_sigqueueinfo(r9, 0x10, &(0x7f0000000280)={0x0, 0x0, 0x5, 0x412e351b}) setsockopt$inet6_buf(r1, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000000380)) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(0xffffffffffffffff, 0x40485404, &(0x7f0000000600)={{0x0, 0x2, 0x7, 0x2, 0x1f}, 0x3}) setsockopt$inet_buf(r0, 0x0, 0x20, &(0x7f0000000780)="509b8fca85820477e424c4ea2c567c0821efd09dda345b61e3a1e38c8d5c6f15967cea98b58258edd49e8b7c4424c4bf198df387567b2cc2d4069ec73d534c4e72fa465b400628ba6b7ece5d948407caacfed861d6a9e0519a5b955f49451c28", 0x60) sendfile(r0, r3, &(0x7f000000a000), 0x7ffff) 2018/03/31 12:25:53 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x80, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000080)=0x4, 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f00000000c0)={0xfff, 0x9, 0x401, 'queue0\x00', 0x6}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0xfffffd74}], 0x1) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x7, 0x8000, 0x1000, 0x7d0, 0x0, 0xffffffff00000000, 0x0, 0x5, 0x9, 0x6, 0x1, 0x81, 0x5, 0x10000, 0x1, 0x7, 0xffffffffffffffff, 0xeda, 0x5, 0x0, 0x91, 0x10001, 0xffffffffffff0001, 0xc384, 0x8, 0xffffffffffffffe0, 0x0, 0x4, 0xffff, 0x80, 0x7, 0x2, 0x1, 0x0, 0x30, 0x3, 0x0, 0x7, 0x4, @perf_config_ext={0xfffffffffffff0f9, 0x8}, 0x20403, 0x0, 0x9, 0x7, 0x0, 0xfff, 0x7}, r1, 0x0, r0, 0x2) 2018/03/31 12:25:53 executing program 2 (fault-call:10 fault-nth:22): r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="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", 0xfc}], 0x1, 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r2 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) ioctl$sock_ipx_SIOCAIPXPRISLT(r2, 0x89e1, &(0x7f0000000280)=0x3f) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f0000000200)={0x80, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23}, 0x0, 0x7, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000300)={r3, 0x1c9}, 0x8) r4 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e44ee") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x40, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000c40)={r3, 0x2}, &(0x7f0000000c80)=0xffffffffffffff39) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000540)=0x2, 0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000340)) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000d40)={0x7433, {{0x2, 0x4e21, @broadcast=0xffffffff}}, 0x1, 0x1, [{{0x2, 0x4e20}}]}, 0x110) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f, r3}, 0x20) 2018/03/31 12:25:53 executing program 5: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:25:53 executing program 1: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:25:53 executing program 7: socket$inet6(0xa, 0x0, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000943ffc)=0xa35) read(r1, &(0x7f00003fefff)=""/1, 0x1) r2 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r3, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r3, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r4}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)) r5 = dup2(r3, r4) fcntl$setown(r5, 0x8, r2) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r2, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0xe6, 0x2, {0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, 0xb64, 0x9, 0x9b, 0x5, 0xffff}}, &(0x7f0000000580)=0xb0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) [ 863.346892] FAULT_INJECTION: forcing a failure. [ 863.346892] name failslab, interval 1, probability 0, space 0, times 0 [ 863.358451] CPU: 1 PID: 22250 Comm: syz-executor2 Not tainted 4.16.0-rc7+ #373 [ 863.365819] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 863.375179] Call Trace: [ 863.377781] dump_stack+0x194/0x24d [ 863.381406] ? arch_local_irq_restore+0x53/0x53 [ 863.386072] ? __save_stack_trace+0x7e/0xd0 [ 863.390399] should_fail+0x8c0/0xa40 2018/03/31 12:25:53 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000000c0)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000080)=0x3, 0x4) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) [ 863.394107] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 863.399202] ? kasan_kmalloc+0xad/0xe0 [ 863.403086] ? kmem_cache_alloc_trace+0x136/0x740 [ 863.407918] ? __memcg_init_list_lru_node+0x169/0x270 [ 863.413109] ? __list_lru_init+0x544/0x750 [ 863.417346] ? sget_userns+0x691/0xe40 [ 863.421271] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 863.426038] ? kern_mount_data+0x50/0xb0 [ 863.430114] ? pid_ns_prepare_proc+0x1e/0x80 [ 863.434532] ? alloc_pid+0x87e/0xa00 [ 863.438264] ? copy_process.part.38+0x2516/0x4bd0 [ 863.443115] ? _do_fork+0x1f7/0xf70 [ 863.446743] ? SyS_clone+0x37/0x50 [ 863.450293] ? find_held_lock+0x35/0x1d0 [ 863.454359] ? __lock_is_held+0xb6/0x140 [ 863.458434] ? check_same_owner+0x320/0x320 [ 863.462766] ? rcu_note_context_switch+0x710/0x710 [ 863.467710] should_failslab+0xec/0x120 [ 863.471691] kmem_cache_alloc_trace+0x4b/0x740 [ 863.476281] ? __kmalloc_node+0x33/0x70 [ 863.480278] ? __kmalloc_node+0x33/0x70 [ 863.484260] ? rcu_read_lock_sched_held+0x108/0x120 [ 863.489288] __memcg_init_list_lru_node+0x169/0x270 [ 863.494313] ? list_lru_add+0x7c0/0x7c0 [ 863.498295] ? __kmalloc_node+0x47/0x70 [ 863.502279] __list_lru_init+0x544/0x750 [ 863.506356] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 863.512261] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 863.517377] ? __lockdep_init_map+0xe4/0x650 [ 863.521785] ? lockdep_init_map+0x9/0x10 [ 863.525845] sget_userns+0x691/0xe40 [ 863.529549] ? set_anon_super+0x20/0x20 [ 863.533517] ? put_filp+0x90/0x90 [ 863.536962] ? destroy_unused_super.part.6+0xd0/0xd0 [ 863.542058] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 863.547078] ? save_stack+0xa3/0xd0 [ 863.550704] ? save_stack+0x43/0xd0 [ 863.554322] ? kasan_slab_alloc+0x12/0x20 [ 863.558469] ? kmem_cache_alloc+0x12e/0x760 [ 863.562793] ? alloc_pid+0xc1/0xa00 [ 863.566417] ? __radix_tree_replace+0x1af/0x310 [ 863.571082] ? radix_tree_delete+0x30/0x30 [ 863.575307] ? node_tag_clear+0xf2/0x180 [ 863.579365] ? proc_get_inode+0x620/0x620 [ 863.583511] mount_ns+0x6d/0x190 [ 863.586870] proc_mount+0x7a/0x90 [ 863.590319] mount_fs+0x66/0x2d0 [ 863.593678] vfs_kern_mount.part.26+0xc6/0x4a0 [ 863.598256] ? may_umount+0xa0/0xa0 [ 863.601873] ? idr_alloc_cyclic+0x1d6/0x320 [ 863.606186] ? do_raw_spin_trylock+0x190/0x190 [ 863.610770] ? idr_alloc+0x180/0x180 [ 863.614482] kern_mount_data+0x50/0xb0 [ 863.618370] pid_ns_prepare_proc+0x1e/0x80 [ 863.622606] alloc_pid+0x87e/0xa00 [ 863.626147] ? __change_pid+0x400/0x400 [ 863.630119] ? ns_capable_common+0xcf/0x160 [ 863.634451] ? memset+0x31/0x40 [ 863.637732] ? copy_thread_tls+0x268/0x8f0 [ 863.641978] copy_process.part.38+0x2516/0x4bd0 [ 863.646659] ? __cleanup_sighand+0x40/0x40 [ 863.650916] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 863.656199] ? __lock_acquire+0x664/0x3e00 [ 863.660449] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 863.665632] ? environ_open+0x80/0x80 [ 863.669434] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 863.674617] ? __lock_acquire+0x664/0x3e00 [ 863.678941] ? mntput_no_expire+0x130/0xa90 [ 863.683259] ? print_irqtrace_events+0x270/0x270 [ 863.688008] ? trace_hardirqs_off+0x10/0x10 [ 863.692324] ? lock_acquire+0x1d5/0x580 [ 863.696289] ? trace_hardirqs_off+0x10/0x10 [ 863.700601] ? trace_hardirqs_off+0x10/0x10 [ 863.704917] ? __lock_acquire+0x664/0x3e00 [ 863.709141] ? check_same_owner+0x320/0x320 [ 863.713459] ? find_held_lock+0x35/0x1d0 [ 863.717521] ? _parse_integer+0xe9/0x140 [ 863.721576] ? trace_hardirqs_off+0x10/0x10 [ 863.725887] ? _parse_integer+0x140/0x140 [ 863.730034] ? trace_hardirqs_off+0x10/0x10 [ 863.734351] ? get_pid_task+0x93/0x140 [ 863.738247] ? lock_downgrade+0x980/0x980 [ 863.742404] ? find_held_lock+0x35/0x1d0 [ 863.746473] ? __f_unlock_pos+0x19/0x20 [ 863.750453] ? lock_downgrade+0x980/0x980 [ 863.754599] ? get_pid_task+0xbc/0x140 [ 863.758490] ? proc_fail_nth_write+0x9b/0x1d0 [ 863.762991] ? map_files_get_link+0x3a0/0x3a0 [ 863.768000] ? handle_mm_fault+0x35b/0xb10 [ 863.772237] _do_fork+0x1f7/0xf70 [ 863.775683] ? fork_idle+0x2d0/0x2d0 [ 863.779385] ? wait_for_completion+0x770/0x770 [ 863.783961] ? __lock_is_held+0xb6/0x140 [ 863.788022] ? __sb_end_write+0xa0/0xd0 [ 863.791988] ? fput+0xd2/0x140 [ 863.795169] ? SyS_write+0x184/0x220 [ 863.798877] ? SyS_read+0x220/0x220 [ 863.802502] SyS_clone+0x37/0x50 [ 863.805867] ? sys_vfork+0x30/0x30 [ 863.809411] do_syscall_64+0x281/0x940 [ 863.813300] ? vmalloc_sync_all+0x30/0x30 [ 863.817450] ? _raw_spin_unlock_irq+0x27/0x70 [ 863.821952] ? finish_task_switch+0x1c1/0x7e0 [ 863.826448] ? syscall_return_slowpath+0x550/0x550 [ 863.831370] ? syscall_return_slowpath+0x2ac/0x550 [ 863.836289] ? prepare_exit_to_usermode+0x350/0x350 [ 863.841334] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 863.846703] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 863.851543] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 863.856731] RIP: 0033:0x454e79 [ 863.859911] RSP: 002b:00007f935ae4bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 863.867611] RAX: ffffffffffffffda RBX: 00007f935ae4c6d4 RCX: 0000000000454e79 [ 863.874875] RDX: 00000000200008c0 RSI: 0000000020000800 RDI: 000000002000c100 [ 863.882136] RBP: 000000000072bea0 R08: 0000000020000940 R09: 0000000000000000 [ 863.889401] R10: 0000000020000900 R11: 0000000000000246 R12: 0000000000000014 [ 863.896662] R13: 0000000000000051 R14: 00000000006f2838 R15: 0000000000000016 2018/03/31 12:25:55 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cgroup.stat\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000003c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="0200e39e040000800046cafc20205838af347d01eb0084546d7d8cdfeeb807a0342fb0347ae01272035b070ceb04d4577f4706466b038b04828f634e48eee9b3f7be0df124639afc1c5832a1d894a0128cbb0502cf02dfc3d88205f6205d90faf7f56fe688ba809c2b0dbb39e8b44261ba5f2ae9343de870e01b1b123cc5a30ce512612baba21b93f410349645b855f9fc59be32eafb24ec6996c000e36aeb6057b01cb4e9a94964b5fd31487ed8021cc5c69d98af26146d4dc8d12c5947379c271021f2a609ff2a46aa7a92cc8c7b3c94ab96f855414d5bceb93d571ddb1d562843a1a7d5723c042d5cb99eae622c1151cab2"], &(0x7f00000002c0)=0xe) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000300)={r2, 0xfffffffffffffffe, 0x10}, &(0x7f0000000340)=0xc) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000140)={0x2}, 0x4) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000000040)={0xffffffffffffffff}) syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x2, 0x48300) mlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) getsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f00000006c0)={@remote, @loopback, 0x0}, &(0x7f0000000700)=0xc) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000380)={@remote={0xfe, 0x80, [], 0xbb}, 0x18, r4}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000740)={@mcast1={0xff, 0x1, [], 0x1}, 0x52, r4}) 2018/03/31 12:25:55 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00002b8ff6), 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e1e, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f00000000c0)="237d00d3fc1ee4671fbaa0a455e73e678b8e96f7fd829d4d39f1828ebf765e220913b73db94f6d495077c32cf6d22b4c4f8d", 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000200)={0x0, 0x0, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f00000002c0)={0x0}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000500)={r6, @in6={{0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, [], 0x11}, 0x101}}, [0x2, 0xa07, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x8, 0x0, 0x0, 0x667]}, &(0x7f0000000340)=0x100) setitimer(0x1, &(0x7f0000000140)={{0x0, 0x2710}}, &(0x7f0000000180)) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f00000004c0)={r4}) ftruncate(r3, 0x40001) fchdir(0xffffffffffffffff) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000040), 0x4) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r3, 0x40485404, &(0x7f0000000700)={{0x3, 0x2, 0x0, 0x1}, 0x9, 0x3}) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000a40)=ANY=[], &(0x7f00000001c0)) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000003c0)={0x0, @in={{0x2, 0x0, @multicast1=0xe0000001}}}, 0x84) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) setitimer(0x100003, &(0x7f0000000680)={{0x0, 0x2710}, {r7, r8/1000+30000}}, &(0x7f00000006c0)) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000880)={r4, 0x80000, r5}) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000000240)=0x0) rt_sigqueueinfo(r9, 0x10, &(0x7f0000000280)={0x0, 0x0, 0x5, 0x412e351b}) setsockopt$inet6_buf(r1, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000000380)) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r3, 0x40485404, &(0x7f0000000600)={{0x0, 0x2, 0x7, 0x2, 0x1f}, 0x3}) setsockopt$inet_buf(r0, 0x0, 0x20, &(0x7f0000000780)="509b8fca85820477e424c4ea2c567c0821efd09dda345b61e3a1e38c8d5c6f15967cea98b58258edd49e8b7c4424c4bf198df387567b2cc2d4069ec73d534c4e72fa465b400628ba6b7ece5d948407caacfed861d6a9e0519a5b955f49451c", 0x5f) sendfile(r0, r3, &(0x7f000000a000), 0x7ffff) 2018/03/31 12:25:55 executing program 1: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:25:55 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:25:55 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x80, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000080)=0x4, 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f00000000c0)={0xfff, 0x9, 0x401, 'queue0\x00', 0x6}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0xfffffd74}], 0x1) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x7, 0x8000, 0x1000, 0x7d0, 0x0, 0xffffffff00000000, 0x0, 0x5, 0x9, 0x6, 0x1, 0x81, 0x5, 0x10000, 0x1, 0x7, 0xffffffffffffffff, 0xeda, 0x5, 0x0, 0x91, 0x10001, 0xffffffffffff0001, 0xc384, 0x8, 0xffffffffffffffe0, 0x0, 0x4, 0xffff, 0x80, 0x7, 0x2, 0x1, 0x0, 0x30, 0x3, 0x0, 0x7, 0x4, @perf_config_ext={0xfffffffffffff0f9, 0x8}, 0x20403, 0xcae, 0x0, 0x7, 0x0, 0xfff, 0x7}, r1, 0x0, r0, 0x2) 2018/03/31 12:25:55 executing program 5: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000943ffc)=0xa35) read(0xffffffffffffffff, &(0x7f00003fefff)=""/1, 0x1) r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(0xffffffffffffffff, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r1, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r1, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r2}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)) r3 = dup2(r1, r2) fcntl$setown(r3, 0x8, r0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r0, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:25:55 executing program 2 (fault-call:10 fault-nth:23): r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="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", 0xfc}], 0x1, 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r2 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) ioctl$sock_ipx_SIOCAIPXPRISLT(r2, 0x89e1, &(0x7f0000000280)=0x3f) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f0000000200)={0x80, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23}, 0x0, 0x7, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000300)={r3, 0x1c9}, 0x8) r4 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e44ee") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x40, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000c40)={r3, 0x2}, &(0x7f0000000c80)=0xffffffffffffff39) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000540)=0x2, 0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000340)) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000d40)={0x7433, {{0x2, 0x4e21, @broadcast=0xffffffff}}, 0x1, 0x1, [{{0x2, 0x4e20}}]}, 0x110) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f, r3}, 0x20) 2018/03/31 12:25:55 executing program 7: socket$inet6(0xa, 0x6, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000943ffc)=0xa35) read(r1, &(0x7f00003fefff)=""/1, 0x1) r2 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r3, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r3, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r4}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)) r5 = dup2(r3, r4) fcntl$setown(r5, 0x8, r2) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r2, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0xe6, 0x2, {0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, 0xb64, 0x9, 0x9b, 0x5, 0xffff}}, &(0x7f0000000580)=0xb0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:25:55 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, &(0x7f00002b8ff6), 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e1e, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f00000000c0)="237d00d3fc1ee4671fbaa0a455e73e678b8e96f7fd829d4d39f1828ebf765e220913b73db94f6d495077c32cf6d22b4c4f8d", 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000200)={0x0, 0x80000}) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f00000002c0)={0x0, 0xba}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000500)={r5, @in6={{0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, [], 0x11}, 0x101}}, [0x2, 0xa07, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x8, 0x0, 0x0, 0x667]}, &(0x7f0000000340)=0x100) setitimer(0x1, &(0x7f0000000140)={{0x0, 0x2710}}, &(0x7f0000000180)) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f00000004c0)={r4}) ftruncate(r3, 0x40001) fchdir(0xffffffffffffffff) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000040), 0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000a40)=ANY=[@ANYRES32=0x0], &(0x7f00000001c0)=0x1) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000003c0)={0x0, @in={{0x2, 0x0, @multicast1=0xe0000001}}}, 0x84) clock_gettime(0x0, &(0x7f0000000480)) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000000240)=0x0) rt_sigqueueinfo(r6, 0x10, &(0x7f0000000280)={0x0, 0x0, 0x5, 0x412e351b}) setsockopt$inet6_buf(r1, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r3, 0x40485404, &(0x7f0000000600)={{0x0, 0x2, 0x7, 0x2, 0x1f}, 0x3}) setsockopt$inet_buf(r0, 0x0, 0x20, &(0x7f0000000780)="509b8fca85820477e424c4ea2c567c0821efd09dda345b61e3a1e38c8d5c6f15967cea98b58258edd49e8b7c4424c4bf198df387567b2cc2d4069ec73d534c4e72fa465b400628ba6b7ece5d948407caacfed861d6a9e0519a5b955f49451c", 0x5f) sendfile(r0, r3, &(0x7f000000a000), 0x7ffff) [ 864.670096] FAULT_INJECTION: forcing a failure. [ 864.670096] name failslab, interval 1, probability 0, space 0, times 0 [ 864.681578] CPU: 0 PID: 22288 Comm: syz-executor2 Not tainted 4.16.0-rc7+ #373 [ 864.688943] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 864.698302] Call Trace: [ 864.700897] dump_stack+0x194/0x24d [ 864.704539] ? arch_local_irq_restore+0x53/0x53 [ 864.709218] ? __save_stack_trace+0x7e/0xd0 [ 864.713555] should_fail+0x8c0/0xa40 2018/03/31 12:25:55 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000000040c500000000ff00009400000000e5000095001a0000000000"], &(0x7f0000c43000)='syzkaller\x00', 0xfffffffffffffffa, 0x1000, &(0x7f00009ab000)=""/4096}, 0x48) r1 = socket(0x10, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r1, 0x28, 0x6, &(0x7f0000000540)={0x0, 0x7530}, 0x10) ioctl$KVM_GET_XSAVE(r0, 0x9000aea4, &(0x7f0000000140)) write(r1, &(0x7f0000000080)="260000005e0009000000df623339410e590000000001000000ffffff000000000000", 0x22) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000c67000)={0xa, 0x4e20}, 0x1c) listen(r2, 0x1000008000) accept4(r2, &(0x7f0000000200)=@nl=@unspec, &(0x7f0000000080)=0x80, 0x0) r3 = socket$inet_dccp(0x2, 0x6, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) connect$inet(r3, &(0x7f00002f7ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) [ 864.717293] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 864.722401] ? kasan_kmalloc+0xad/0xe0 [ 864.726291] ? kmem_cache_alloc_trace+0x136/0x740 [ 864.731140] ? __memcg_init_list_lru_node+0x169/0x270 [ 864.736334] ? __list_lru_init+0x544/0x750 [ 864.740576] ? sget_userns+0x691/0xe40 [ 864.744472] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 864.749226] ? kern_mount_data+0x50/0xb0 [ 864.753282] ? pid_ns_prepare_proc+0x1e/0x80 [ 864.757693] ? alloc_pid+0x87e/0xa00 [ 864.761410] ? copy_process.part.38+0x2516/0x4bd0 [ 864.766250] ? _do_fork+0x1f7/0xf70 [ 864.769877] ? SyS_clone+0x37/0x50 [ 864.773422] ? find_held_lock+0x35/0x1d0 [ 864.777487] ? __lock_is_held+0xb6/0x140 [ 864.781558] ? check_same_owner+0x320/0x320 [ 864.785885] ? rcu_note_context_switch+0x710/0x710 [ 864.790818] should_failslab+0xec/0x120 [ 864.794780] kmem_cache_alloc_trace+0x4b/0x740 [ 864.799350] ? __kmalloc_node+0x33/0x70 [ 864.803306] ? __kmalloc_node+0x33/0x70 [ 864.807266] ? rcu_read_lock_sched_held+0x108/0x120 [ 864.812294] __memcg_init_list_lru_node+0x169/0x270 [ 864.817311] ? list_lru_add+0x7c0/0x7c0 [ 864.821271] ? __kmalloc_node+0x47/0x70 [ 864.825232] __list_lru_init+0x544/0x750 [ 864.829279] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 864.835157] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 864.840149] ? __lockdep_init_map+0xe4/0x650 [ 864.844535] ? lockdep_init_map+0x9/0x10 [ 864.848572] sget_userns+0x691/0xe40 [ 864.852259] ? set_anon_super+0x20/0x20 [ 864.856212] ? put_filp+0x90/0x90 [ 864.859645] ? destroy_unused_super.part.6+0xd0/0xd0 [ 864.864730] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 864.869734] ? save_stack+0xa3/0xd0 [ 864.873339] ? save_stack+0x43/0xd0 [ 864.876943] ? kasan_slab_alloc+0x12/0x20 [ 864.881064] ? kmem_cache_alloc+0x12e/0x760 [ 864.885365] ? alloc_pid+0xc1/0xa00 [ 864.888973] ? __radix_tree_replace+0x1af/0x310 [ 864.893622] ? radix_tree_delete+0x30/0x30 [ 864.897834] ? node_tag_clear+0xf2/0x180 [ 864.901877] ? proc_get_inode+0x620/0x620 [ 864.906005] mount_ns+0x6d/0x190 [ 864.909354] proc_mount+0x7a/0x90 [ 864.912788] mount_fs+0x66/0x2d0 [ 864.916140] vfs_kern_mount.part.26+0xc6/0x4a0 [ 864.920705] ? may_umount+0xa0/0xa0 [ 864.924310] ? idr_alloc_cyclic+0x1d6/0x320 [ 864.928615] ? do_raw_spin_trylock+0x190/0x190 [ 864.933185] ? idr_alloc+0x180/0x180 [ 864.936876] kern_mount_data+0x50/0xb0 [ 864.940743] pid_ns_prepare_proc+0x1e/0x80 [ 864.944955] alloc_pid+0x87e/0xa00 [ 864.948472] ? __change_pid+0x400/0x400 [ 864.952425] ? ns_capable_common+0xcf/0x160 [ 864.956732] ? memset+0x31/0x40 [ 864.959992] ? copy_thread_tls+0x268/0x8f0 [ 864.964212] copy_process.part.38+0x2516/0x4bd0 [ 864.968880] ? __cleanup_sighand+0x40/0x40 [ 864.973102] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 864.978271] ? __lock_acquire+0x664/0x3e00 [ 864.982483] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 864.987657] ? environ_open+0x80/0x80 [ 864.991446] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 864.996618] ? __lock_acquire+0x664/0x3e00 [ 865.000831] ? mntput_no_expire+0x130/0xa90 [ 865.005131] ? print_irqtrace_events+0x270/0x270 [ 865.009867] ? trace_hardirqs_off+0x10/0x10 [ 865.014176] ? lock_acquire+0x1d5/0x580 [ 865.018127] ? trace_hardirqs_off+0x10/0x10 [ 865.022430] ? trace_hardirqs_off+0x10/0x10 [ 865.026732] ? __lock_acquire+0x664/0x3e00 [ 865.030947] ? check_same_owner+0x320/0x320 [ 865.035252] ? find_held_lock+0x35/0x1d0 [ 865.039297] ? _parse_integer+0xe9/0x140 [ 865.043340] ? trace_hardirqs_off+0x10/0x10 [ 865.047641] ? _parse_integer+0x140/0x140 [ 865.051770] ? trace_hardirqs_off+0x10/0x10 [ 865.056070] ? get_pid_task+0x93/0x140 [ 865.059936] ? lock_downgrade+0x980/0x980 [ 865.064071] ? find_held_lock+0x35/0x1d0 [ 865.068115] ? __f_unlock_pos+0x19/0x20 [ 865.072066] ? lock_downgrade+0x980/0x980 [ 865.076189] ? get_pid_task+0xbc/0x140 [ 865.080057] ? proc_fail_nth_write+0x9b/0x1d0 [ 865.084532] ? map_files_get_link+0x3a0/0x3a0 [ 865.089008] ? handle_mm_fault+0x35b/0xb10 [ 865.093225] _do_fork+0x1f7/0xf70 [ 865.096657] ? fork_idle+0x2d0/0x2d0 [ 865.100350] ? wait_for_completion+0x770/0x770 [ 865.104911] ? __lock_is_held+0xb6/0x140 [ 865.108956] ? __sb_end_write+0xa0/0xd0 [ 865.112908] ? fput+0xd2/0x140 [ 865.116088] ? SyS_write+0x184/0x220 [ 865.119781] ? SyS_read+0x220/0x220 [ 865.123388] SyS_clone+0x37/0x50 [ 865.126731] ? sys_vfork+0x30/0x30 [ 865.130448] do_syscall_64+0x281/0x940 [ 865.134314] ? vmalloc_sync_all+0x30/0x30 [ 865.138437] ? _raw_spin_unlock_irq+0x27/0x70 [ 865.142910] ? finish_task_switch+0x1c1/0x7e0 [ 865.147382] ? syscall_return_slowpath+0x550/0x550 [ 865.152290] ? syscall_return_slowpath+0x2ac/0x550 [ 865.157198] ? prepare_exit_to_usermode+0x350/0x350 [ 865.162194] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 865.167537] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 865.172363] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 865.177530] RIP: 0033:0x454e79 [ 865.181304] RSP: 002b:00007f935ae4bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 865.188991] RAX: ffffffffffffffda RBX: 00007f935ae4c6d4 RCX: 0000000000454e79 [ 865.196240] RDX: 00000000200008c0 RSI: 0000000020000800 RDI: 000000002000c100 [ 865.203487] RBP: 000000000072bea0 R08: 0000000020000940 R09: 0000000000000000 [ 865.210733] R10: 0000000020000900 R11: 0000000000000246 R12: 0000000000000014 2018/03/31 12:25:55 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x40000, 0x0) fgetxattr(r0, &(0x7f0000000080)=@known='security.capability\x00', &(0x7f0000000100)=""/174, 0xae) r1 = socket$inet6(0xa, 0x80803, 0x2f) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) writev(r1, &(0x7f0000000740)=[{&(0x7f0000000400)}, {&(0x7f0000000440)="f9ca9c79b08d7e3f6e337e560a251083157911f0ecedf2980828405d17d8a6de09637eb6cad18b56e53b8c6f56b74712a387c46acc7ba1be2dded98f37eb8aa1f156f2e3340afc97264ee81602b9f02667459388", 0x54}, {&(0x7f00000004c0)="e48d27f798e40ae65238c13cf36d22431a5b17484421723c918ee2c8ad1130eba1c0de2308e237daf5a8291aa31f37e39511d87b1e8b652d2e5954d455f40cb495abfbe07d13b97d37bfceb34e158080a9f7143836257853fee6b78ae1e627a06b6a5d44778d02a94b9b11b743307efebb345dd72604beae972f77e558fc51e2ad398ee4b4b22d6f23e7fd70131f62367f331f801b4fa27424c7670023ac35f28833cc2ad1be8f96e76841a9f96d5dccd48b2db5d8191885890d262623e4b14cb48e6060da8755346cbbfea7459d6b28819e2e017e82ab73a75f1b60805ad320f9cef88d10feab5be5a4cb42362696ddcd6b7157735409", 0xf7}, {&(0x7f00000005c0)="02ff62c3addcf3ef97061f89e2c50b0a77088db8fe73a4cecb53d40613cddb4863698af79389d89b9f0c82c89c331364ffea743d97717b66a671396361f0c790c09493bec9888358e47c3901c8fdeafbd809dc5cec4089e199d868a499", 0x5d}, {&(0x7f0000000640)="1e1b7a8ca1142ef07043c420261e4889a9e7a510b42c52b8ce5af85f69df804fca59522d1ad04748d0f0e6e5b150b1879f1e3b7e08599a3ed09c923e0335cd940c365e7d50803d9d45b49a4219ab750626b989ef97c920aadfe623a0abdede1cec65c3bee4966e3200c27ef48b15d02ce15c295dd3faabd8796c987173b6b72dfd468865b483204489d0cf827f063ddc1aa79f5eab128b57d06fb60dd34331166b461e609de6365c6eea94655b8b904d1357cd9bdc743a5a335ecb85759408d58f20f11a7da4eb653cd6f393321eec73ba", 0xd1}], 0x5) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) syz_open_dev$midi(&(0x7f00000003c0)='/dev/midi#\x00', 0x2, 0x80) open_by_handle_at(r0, &(0x7f00000002c0)={0xd9, 0x0, "621030c9ba9f1bb65885b06b7f5812a1286d5b9274e9604a7a05b05b3f590d90b5caec6aa325694c754f6a6186aa7284cda9af8788974b7c2c032c6cc31b5518a0e4bbbdedc51870f09acd0beee7231155e9bf58294a6c912def8d022467f24c210eb71b628c16c9d134b287d929acc9f0860c0622009dededef59af1f801b679c127680e06d1d3b0e35672298902664b294c18897a57475ed5eefd3810c1f8d557e5a7c3b9d01d433eef2c7d53db7145bd31c36add6c7272cb8091012dc2fd7c8d9cd660c3d82d9604e30537e88bb31a6"}, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa}, 0x1c) [ 865.217978] R13: 0000000000000051 R14: 00000000006f2838 R15: 0000000000000017 2018/03/31 12:25:55 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x0, 0x4000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f00000002c0)=0x7f4c, 0x4) r1 = socket$inet6(0xa, 0x80803, 0x2f) getpeername$inet6(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, @loopback}, &(0x7f0000000400)=0x1c) connect$inet6(r1, &(0x7f0000000440)={0xa, 0x0, 0xffffffffffffffff, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0xffffff0c) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x0, 0x0) getsockname$inet6(r1, &(0x7f0000000100)={0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x1c) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000080)) getsockopt$bt_l2cap_L2CAP_CONNINFO(r2, 0x6, 0x2, &(0x7f0000000000), &(0x7f0000000480)=0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f0000000300)) connect$inet6(r1, &(0x7f00000000c0)={0xa}, 0x1c) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) 2018/03/31 12:25:55 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:25:55 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @remote}, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000003a40)=0x0) stat(&(0x7f0000003a80)='./file0\x00', &(0x7f0000003ac0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000003b40)='./file0\x00', &(0x7f0000003b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000003c00)=0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003c40)={{{@in=@broadcast, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000003d40)=0xe8) r9 = getgid() fcntl$getownex(r0, 0x10, &(0x7f0000003d80)={0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003dc0)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000003ec0)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000003f00)={0x0, 0x0, 0x0}, &(0x7f0000003f40)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003f80)=0x0) stat(&(0x7f0000003fc0)='./file0\x00', &(0x7f0000004000)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000004080), &(0x7f00000040c0), &(0x7f0000004100)=0x0) r16 = getpgid(0x0) getresuid(&(0x7f0000004140), &(0x7f0000004180), &(0x7f00000041c0)=0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004200)={0x0, 0x0, 0x0}, &(0x7f0000004240)=0xc) r19 = getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000004600)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@loopback}}, &(0x7f0000004700)=0xe8) getgroups(0x5, &(0x7f0000004740)=[0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0]) r22 = getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000004780)={{{@in6=@loopback, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f0000004880)=0xe8) getgroups(0x1, &(0x7f00000048c0)=[0x0]) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0)={0x0}, &(0x7f0000004e00)=0xc) getresuid(&(0x7f0000004e40), &(0x7f0000004e80), &(0x7f0000004ec0)=0x0) getresgid(&(0x7f0000004f00)=0x0, &(0x7f0000004f40), &(0x7f0000004f80)) r28 = getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004fc0)={{{@in6=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@rand_addr}}, &(0x7f00000050c0)=0xe8) r30 = getegid() r31 = getpgid(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000005100)={{{@in=@rand_addr, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000005200)=0xe8) getgroups(0x5, &(0x7f0000005240)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0]) fcntl$getownex(r0, 0x10, &(0x7f0000007600)={0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000007640)={{{@in6=@ipv4={[], [], @local}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@loopback}}, &(0x7f0000007740)=0xe8) r36 = getgid() ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000007780)=0x0) stat(&(0x7f00000077c0)='./file0\x00', &(0x7f0000007800)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000007880)={0x0, 0x0, 0x0}, &(0x7f00000078c0)=0xc) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000007900)=0x0) r41 = getuid() fstat(r0, &(0x7f0000007940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r0, &(0x7f0000007a80)=[{&(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000002c0)=[{&(0x7f0000000100)="4c23a026da15fbb69b8516ba9f77a950ead2227a62a481a8c20ae004138b9d9988cc62d9197fadef17cefab30ae79b9f6d7e7410195b397df1808dc1eee993bea50ccbc974918ec736b7e8cd6d046bd8", 0x50}, {&(0x7f0000000180)="dd9293d3d6b2464114e15fe2280eec979d7a391ef2", 0x15}], 0x2, &(0x7f0000000540)=[@cred={0x20, 0x1, 0x2, r1, r2, r3}], 0x20, 0x4000000}, {&(0x7f0000000580)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000003980)=[{&(0x7f0000000600)="694f02839cf3e8580a55a475acbed90100edea94607e9aeae6e162336849358c8732bfd5d50dc1d5e26dcc6e0179b8eacf4f7db39eeec9c23320a9bb8fd021cf678ac2c1c2712b587a13eeb01aa95b92eef897287838e60d9d937aadfd52820a2b37d736ac651b4c424cf5abd0638697d64bdb", 0x73}, {&(0x7f0000000680)="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", 0x1000}, {&(0x7f0000001680)="c9219eaf888783ccc2ebe6e4cc94e08f1892362ce636ad945ec2406cffd1d7d10c8fb70c808feb0f17ebb0f8c573257efb6138ccbd102d24bdf85a56b5f077ac40c4426138749c9cd5b90c5f259fd104a6a7ace0932173aa133df28a24211142c0a83bb2287d62faff032a5dc35370a9775a3395301d680da08a7e2e61824ec13e03968e76428a86267ffc235ff1859b0ff571569e1c389e453bafec32f64cce83534ac28568a15285fff0977a8c77bef8675eba5184837babdeeeda65abf4ee6edc", 0xc2}, {&(0x7f0000001780)="907e8e2849609c2b0ff0bebb9bef5f821b00ae778f51fad112f6b62adeb5871fb78364fa60172a4fbb169cc42455c4d893291778273254d770931e8d8acc048fbb1c86349e8b5400172b6733c77a72b4632cc14915ee10220225fb4818548ca11cf5dd02f996b3093f96a4868d6e0c38ac822b74bc1e8657018a76134410e6eb9252050c43ea54848046213097a6c2381af695278e70559328030c2e38fb48a3f60d", 0xa2}, {&(0x7f0000001840)="6a61d5dacda7c3f3961f8bd86ccc7ab1882007b4f9e80dcf6942a8044ccc115b3e13cfc3bd2ba4ba4bde458f24012aebdfd930b5bc35e4864dbd2b6c514364165a92a0c0279e7264c2ecb30471ec9695825b1f1f26d97e8644effb1dbfb9fa0ba73461fd8f77675ed16022fa67877df1c7e130d614ae43b488ac1558c9892dd1dc66c3274b7f4c844b21601fbfc37033507bdde0369465176ad9c2b526185e29d455886102b33e5436b13df6561afd5584326f284592e93ab6ad1a3129f6450f2c21aaeac4f7bf0401a9d6dfbc37c6e68df499ba96013c01e4a8f21dcaf6c9b542042e7d307a0842156f34e34e231fbd4926eabf9c5b09ea5236564bc09ec2571374552227099324c16e272edaa3a10cf2abcdd4aca579cf824d2c0b6758dc919d3918cd271f670930a20e661579f0cf54986985b434d8e47f8d3f7e03c19dffa5ec3856558e398b2dfa9dbe8dc5ee77544d1cc4e238e1320dfe9fdc81d3e69698adb9e2739782f5e178842c3a27c79b952562c27fdd39a66168ee993df10da371c30590c79a4952a9f902b3750228730d8c53f51e974ed0d796e3e6876115f5324013586dae535e7ec994143aaa940a07c330ed0df7a2ad310254cd75e44246b5205d7e19044e852915303631d76ed56127f2bde07a219eba89c98d63203226feb74454d133c66057a9818646e26ff0e897dc9f104f08920f1affefffd557bd499e2601eb048ed065c4eab97781e8d845239757472351ac794d104424b8a69ba2a5b40d6b502c063e8e85d88e92cc99af23901a579e32ab1a178ea1b91a8634b9a91de9cbd5656f8b41c65a7498e92c6ffb80615a61bd7187759d93cc3bf558d92927e96ca52c775298d60ca9fb846eb7a061b2cb8166ec38897dd0f94c8306ae64e920ee24988484a7f7139a67dded7ca279c2c5ac219710d46554f7d9188305ae4c7a9490fc10bc8b9a54d21ef6985051603932eb34984d7ae753ce35b53b3f68c0c0657455730d53fdbb54f3d60928e6f6722d5db8d6313f6efabf5fa94a3c244f3e3d2dff6dbf1ba98850d35482a2dc987ae8374b313a195fa89fa50b434670f8de524fa43f434c105509fd2bdbefb8c76c94d53e447e80f613afbd9114faf00e5b4f07275355502ccc7ceb9e338f3c604b0fa75111ae31ac50cf58480f9ddea0c1955fe0481a4efadcc5d8d8d05aa469ba44d5c0b7a6e18c86f937f0fca0c41da76aee867ee0aea478376e47e704a6fed38ee575aec47ea43e64858d21a8cf6e89d2328a968e46f0924ae91bd79e18e99d54c6081711c425fbd4386682dab5f9ce51fe384f91ae93f31ae5516dd021732fb375c2090f5b671c27b9b48f450a34d3d1b5e11510d2a6227b95d04a61a12b409e9e1bb7dcfbec3aac629647cd2e76be0c77b061cf34f3e3fce8d3b6d68f1a6dd58cfdd604a20130e966c886c3b63505283b95c9fbce2e995233b01307775d05d6f4fcd542981a863a4c43e1fb4d37e070e25a675aaeb627eb1e92f33becaeeed670a5e2dd1edd8fedae129debd490317fd507a9ba2fb8f3323e4930a77a7db1109df2f0621a3dfab21c95216e81a554bed3a5267c909a0408e1103520371c64cabc9a00cbf0f3c930dd09ea8db9b46a24bbebb33d4a5733d0311e3c4538e9c62704dda4ad1ce8a9add01ed481bc01b573ba369359d81f9a94bd64d67d5a1653300f70bfc52f42602e0f3e2a97f80bdfd4dfec15a2e5671117ac286c30a7bcff5537a1199f8da39f6efe9b7faf4bc119643622a05fd40e87a28a5013ea47f03c6b2e0ec0363588eabc156bd8652309aefdd29db9629ef7d44ee0fe19d823f067f15dd4e343e222fccf076fef7cc737c37a2c680a293f536f7910566cc7f2bf643d28b98ca6c8a876879568ce178b2beb1bd5de64fe86a62e624131b579834e7869ca0741c219d857993d8290a09f58d000b5dd353c737047f8ddf885da35ed3a2afd1823a773a44ac19af50a252e936b6cf210ef50f7bd70b4cf119926ed04c31176cc9ae5e99a268c1841bc1ae6fa7e26084df8f2a8f9ad8185a07878ea77468a3372dc75e55e18d184ba059b9b028141b68d506e69a779cf76f742d195cc9ac5498eb1934723cc96a4ced03b9e308e32dfce30608f20ed898ad63a9799e816df6d4e346485cfe3bf080c2ac8e315423aa37d9f6ec929a3cf0d823cfad852bc23c0dbac15cabb1f8d036f44230cf7c11cd272e5b5ea059d929f51d191a708d56195e44505167a00d10f58239a3eb1ccdcee8a88c09aaba55f5a4c3f5e31f8007818ace207ffb690942bc8f46bae8877b4fe930210f1b32a8b49518907fda52fc4fd8b1fce57f9aa933bbef3d211155e1c856472d25d9a8f69548d31f7d31d6adc11d5ed0d2e87ab1fc66cfc6db61f8499191f87ca9dddcc65d548e83698970b1c18f8af1230a3acca17a70ef91e3f351a2f5aef6c0fe967fae2bada3db700cd3edbb658416232d756d96185fb8500f055b1fdcbfbea7bf4fdb5e114082565589310837b4c4938cdbda75f57f7984e5cd11601a70c841f64a023df8a84df374551ab6342ceb12957b20d37193405b7269c10d57e927cdbd2ccb56fa0ebe00c4cf8bdec12735989749c2e1e011d53c16c0c84364319149d1c8b2223426b8b7a1dfaeaaec0be498468baca33b16267e0f5d315d20e81ffd405709345a0185b167ad489e1d7e532ee8231fa39cd503fc11f5c2d07b45e22c672bbe9a886e692765386d5110b3b7ad42225d122a5bc22bf3840bb76d373b45ceaed507be67fbc2f894ea05be2a1a2f4760ae766e9878f6898c0f94e352283779b8ac29c8144e758693232530162105aab01f0ecdf09d0236cbf4ecb0750fed2e7a66872877300481166214be3b59511070d3e72fcfa03a48b60e008762446f6b9525e20d8416edfd89044f2768d6b9df1e85a297a26876179fcdffcd2ac762af8ceaa5008af01a07d702ac168c6b64971779a85ab3f1c6f3e2bc6ed4ca1934613fe7269b69a056aa0da5ab89ac9e9f75c25974cec2680ceb5c1778a1d8ae7ed54753d062d89b52404b5afc1e7d83c1f6109e0d769ad101c334d476e97c1ead0802283ccca74591522b540730dcad9229782130d42c4985e5241115ed2a5e720337d711181d7b5233851ec9d7ed32a45f115b545e6940834e487e2a36bd354cc80bf5b706de72cbf2d964b181c8c1c2d0bd749b66f935a4575ee97a5265ffda0c3ff8e22e4b3263a007e953bd835d8a9f1ad1364e03e9284e22a86a91680926276dc5626a894910ec1a358901ba6c8f2c0d0fa6d1af680a4f908ea335e8576d297d3a235663226549f55b3383d34de4d81d22f2f4c8eaff1f52e6ef5bd5341aa472759ae8ed0a475024eaf423a95d96004ba5dca604fe8613bb7db02c51fe84d98800422d1cc5dc61f6024b959ceb43f9f62ad573b3341dcc1148b2d5464b30feb177980c349b95c15f03959e1f04b5f6dae4184e91e35c621a6eb848c2267f5adb9a55678cd3eb5593cf0d21d1c2a4fdafeb02374e9b7aaf64d23fb1f7da72fb6855b565d42ab82086d69b9889ec1d7fe7bf828c1ada84c1b5b9e00773e528ee8f57fcf9c020aadcc4bffa3e1a13420c5952234de06735f7abbf468af8d92c2964229f9e39d6e1bd38285684ab975086c5e433fae38fc2acfbaf28eb29e1d637d826d7bb1014fead72c5ceb966fe022d487c0823f36559214ee20ba883b06c6f4e944b7a24dd6c158177a51aa526448b8859955a891752fd5e3572567818c93b263db350ccf2ec1f180a9518f30bcd936f2a97e48582dd7c2fe5cf666cff8ad0e4ab2b6063cd3bf4debd6f3f30aad2586859d24bfe0b9f888dcde86fa74375e5de018f71fef88d6a07c5f864d7619c41a4506927df99bf376d0c70d5c05097ec51805dead290ebb60a50f0bd45b9c0939965dc4036e5edecf4fdb017a736f42f98147c39d1bc2ca015bceacca5061ea10fc02c29435605cefddaad249c8c1689d37a6a30b932aabb16759733cd9d283d84c870f8eebd152a3b526f13b9e85f5c8c8cfb027dbf729c01ad30e1acecc283bc638dd0f0b46c5d86fd2824a940fa42163a9a43666715611a929f9f060e5f773074d25f635d1b9ebdec091d13db4db250eac42ea3aa036d32e7373cb2f734d64acd0f52c8d7428cadcb408d7060353add9280fb06eadcc2c7636992a451d7a7f3d79ff44b62ec9edbbe1934734b4f44ddf342bf56456bc47381f191cd4d53c19bbaa79460851c38d7b7e24a536c4b1441f68d85edabfbb549a8a20dc1045a9e0726f4011ee06cfcfebd36370886b8821b217210ebdca74cf08a9bdf1c5d2dcf13a0631e1d3e1e471ede05bce32460fa4b6527b90d3eaba99e0afc7ef73179b664e5b1b8cc23e21f9d56278f1e409880833a2e551396dd9c00d6eae8ffd768470c1f1905ecf2712845e1a4b4c6c5db41ebb96d5df19b91210d812b3237fb4d539439788abaac5ec120512d98782237c399c0131c26451a53b71470a4a47452139684e5b7be6646ff1c5bc2611e993f1d0d22881f67b774b5526c74a77b728d7db6d5c68460601c1ba4d30bfd5310b1163c4f51b4c1b7786e0680c8ce5ab7d6d7ae735dcbd6b942b9f9e5d879aa868879ff4f0b74874c9434437cc0e55610ffaa4ee9eb0318bb282bab091f0f0d5be53f39328767ce5ad53bba6dfc76d1daef10dbed7d701c7b55350ae8fa332292430bc0931262069aa8160d0732dd1e8f66155aa48cf752cc6608b60ee0ccdf8f2dcb46b2d08449a7e9fc708e036d48eee421f65f7a553b0173d299c0ee922fe3f7006b8848fac2099296e530ae59bad566eb0207d2b0a4076a9f0baab5b7be4e7520de0e6a21cd55576546b794fb25906fbc8c1ac8f1c94b7f45a626282a9d03c0dea081975367310258ac4d4d7f5dd12cfb808af388d3d4150bb27a912df875b493a841192ceb75d126be4462120bb297f19b1e9eb501dd46365a0f9dec99a87a27c27291f175ea1685a131129b60ef5cc346fe91d44bd9d941ff83fa41459b5bdd4cdfe4f1fde58def8f14abc350d4f3d916c926d2caaae9b0e9c3927fb2212fbd141eacd3b5883fc8b70c7ab7807653deb6682772e722d37fddff5196395993b80bd83a6aa35e71bfb1581ca1d12a2d24f23ab3ef74b6a4d8b9a6b50bf3f160ff5378606621e24e746d35900aff4db30aa0ce966628d050b164eaed917e2bdfa24039c0dfef5fa0f89a0829acf93804da168fb72645bf74f4bb6e46a33bce20e2f6aa6fec88a6e7801c910f1801f54adcedb9977445e859583a50f21445292308a4ede8e5247505128cddacc92935d958cd20dbc3c94a46f187dbdcda34437621c1ae3ac50a1c310d4acab43250ebcc00aca83a5067ccd922e173923134a00c59f5df1e099bb08f2bae742b75b3d31902a3036445521a0132c29b11fed411fb3018688de88a4318e041b291fd2788f8de2071ea839d083229be9f76253e08f0431dc1ecbecf8b5726fcaed4b7a73903e291e6db4325cb7a2cb8d0671a0db65956678992823a59e25f46b61d96e6d3123cecd0e88cd18717595d5778b29d324973adc330ad00c0e65dc897c7fc10e4312a56dd31239c555857077ac4f92c16f34b9ce70400de3fabe572cedb8f821fe01742710faafe0c898140fb232f0bf8f5a65536a4598de87f4e98e8aabcf9ac043510879e9cfc8f0400cd32955b179e66a7573742992920af8db91cc7027a93f0024c8aa004007961d72362f5514621ca6c92340b91817a1575702ee2e01261ab8ce4e967f1d", 0x1000}, {&(0x7f0000002840)="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", 0x1000}, {&(0x7f0000003840)}, {&(0x7f0000003880)}, {&(0x7f00000038c0)="12a5c30deee74f0439dd1c7e320ca5324997600c76efbbb59636cb00298554353a8e2c42c5a4728966f03c4395ab4a94bd9f4c1482879ab1a8df9da5000670e50a52f6d147c37189f3961854eaf2d8d7ad1845f9f900a13526cc2f96d2ffd5536631d1", 0x63}, {&(0x7f0000003940)}], 0xa, &(0x7f0000004280)=[@rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r4, r5, r6}, @cred={0x20, 0x1, 0x2, r7, r8, r9}, @rights={0x20, 0x1, 0x1, [r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r10, r11, r12}, @cred={0x20, 0x1, 0x2, r13, r14, r15}, @cred={0x20, 0x1, 0x2, r16, r17, r18}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0]}], 0x150, 0x40}, {&(0x7f0000004400)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000045c0)=[{&(0x7f0000004480)}, {&(0x7f00000044c0)="a38a2f95d50c8a2c6b2194c30043a6879bffe9e262eaf0421b8b7fa3522cb5ce180387da97cf54e5c510b40cd4e5d7790874631a3fdf1b571dfea90ca08be4c21790700adcd886918645ef46b891c98aab57c15fd3007ba96d551d2246a89d946531b5faed4070056f0c03b29e8b4077e6032bf4fffd9e15b6d309dc3eba28ca3f80bde6ea0525fd45c5de", 0x8b}, {&(0x7f0000004580)="6fe5be6630c470155a166d81277d35dbeb588e92f203a7b51f1bc6ae3306dcd1c864433778719d53058549c91694467870e307a38a", 0x35}], 0x3, &(0x7f0000004900)=[@rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r19, r20, r21}, @cred={0x20, 0x1, 0x2, r22, r23, r24}], 0x70, 0x4}, {&(0x7f0000004980)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000004ac0)=[{&(0x7f0000004a00)="60b846b10156ac151a9663d74027cd0cba5ea3d756e5ec9ce4a5446b05c8572bb878aca9ce0c2056a1561c724d8f2bf4efcecb254642946ca19b043f37424c337d8ca635a39561d8dc02a21843970eb6753e030ae9bf9d3e56104d1cd6c24d75597b00c979af4e7a9e518cebf359ccd25d4e1934015d4a4f0335571abd96ced92c20e38168270f31a2302565826f5932013b27853c88775f5b9eda3f34797fdc6ac10231cb4c703d69d310e171", 0xad}], 0x1, 0x0, 0x0, 0x40}, {&(0x7f0000004b00)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000004d80)=[{&(0x7f0000004b80)="9d54021229211b1af09e51ac0406c8f7511965434fd69224c83d65811a8fcc172ec57486ab794764d522d8c689d37c6f88aed6ff2795a2c124ad80206956e518d49a89da3d984370b058e06b6756574027a664a260b67dc4bebe024e6fbed6ae20e09dc962fa6f1c32bab2cf9870eaecefb8bc5330690c093904410cb5691aab9742fb80f45e451c46396a5925fc53004052717daeac09c5f21ce2bd6f6196b7c315c9e7cd004f0d4833e9d3ae5d083cbb120cc95425070fd97251089460aee9f4a3f7b6c8668eff49f075c81f2da3d18bcaab23f84e2b3a26a22dc3", 0xdc}, {&(0x7f0000004c80)="42620e3ff5504f7b09354646a3003c7a3e5e6fa030e8f0327d34ad7f2e264ff22d9ac463b303453cdb29d148ca2c546e15a3b96e1d675660", 0x38}, {&(0x7f0000004cc0)="b743a3d6f6ce1d5d3eca89484bf36190b0a36a5dab2b52793125925abd3f65de4a8e421e6f3c0291b50adcc29cf316f123293297c73a7f8b252a64ccc9afb823fbcedf945497b6a3a0858cbe2c67a51ebda87fcbb19f219c90af0b24f61f0d477ef34061049c341bfa7277c77bc291ca78302fb3e18dbf5c0dc7560d36d4bf0d083476fdbbf9a9b3b9860472d3", 0x8d}], 0x3, &(0x7f0000005280)=[@cred={0x20, 0x1, 0x2, r25, r26, r27}, @cred={0x20, 0x1, 0x2, r28, r29, r30}, @rights={0x18, 0x1, 0x1, [r0, r0]}, @rights={0x18, 0x1, 0x1, [r0, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r31, r32, r33}], 0xc0, 0x8041}, {&(0x7f0000005340)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000006440)=[{&(0x7f00000053c0)="bc3a33575ea72d7ccfb25a70b3248ccb8a5960c286abc21ca99d34b8f27965171cdf283c8eeee4caa8c24c7be49a1c8e08bd05c8dc95be8b6e5c222a995b7db650620536b79e3d84e26a57b9ca34810cbcc9d0729e5d1e84b578f8509809c6a593f796a194a579457066e89fdd54123ad1591e296529511f81e25ea563e0bceb8e31b4304f1b3cd6cfee645c375f87f1777971bbeb44e27eb5ada7029a08b36bece0b340bd9c3f79196905a754aa5e6ca173cfb0aefcc21f19241e862ad2f041b2cd6af918e05ffa02922f6710d7cbc6ababe639becf9f4e868ed842ff812e05b92fe1945f1bee8fd5ced4f182b566f4d30d6fbfe8d4bba0b8dfeba0245e88b20f5f8eb59e41daf89902d38b1f19158a775d6a1b489024622a4ee180bfa6512790ed0c6308c286ebeef167610c608f09d08bfc8f93ef877182ec652371b2b87accd2464e14d0f64f3c11c680d5c5adf6e775f460f3f6041ccf71ad7529063613c2c7a5930e917310a7dfaa9018d38951cbbd5c636a435e9d403e457cf3740bb5da56e6dd55ccce70dd2a612a560202597c3e3dd9266f288454c32fc661d393a2ebeaf03837aed6acf7e6dd5ae427c70f78b437c176915c4c814edf03624e541126287742840abee67b7018416c6740415819b98bc7d27d93ac8f311e04155f8b7b1367c10f334b49b47c7277dbc0d6ccbe7af81f8dbcee1e2a23fe81fced178752050dbe7843fbc3dc819a5cfbae4d405321aa6ec58bfc3a3e2c654d4ea909ae64e8c715b3873d40e865b90200db6bdd116e84c0c3984e644a1754ef2530a7d1cd6d7b821ff881c42e5f958b69c1b2d71231210d1fd722b37fc7f4655601cd6a311bcc52072173d3cf29e16199b6d1c06c22892b3ed0ae1daddc989c0a7eeaa531f3faea514f0e065f8cba291710021473e01fc27314583dccff54fb85d4b852bb8175f47863f30beeab7dfafae2e0506cbc5c8e9555328c25ef377663aacc5b070f55cb66f0d6ccb369edbc587489256b4551dd6bd52a3fc8d9157b212853cf720c4909a603a84d8211ec687e8b07d704ecce5306f2b201f75b7f0d7f8e2bc3ad71bab5bbcc36088830cb532b5b5ab8fa22b5bcba3a6315e8fb08c42eebefff0ebd1bc24e2485fecd6d9476241a6fb4594b2186e453d5c3cec0a7b9842fe0250cf202e4dcb22823331e09d6a58b247bdf3c2c6356da993aa419ffb9e9f273c236a1e7c04ffacfbcb65253137f6b8b44c79b3715e32c849e22b0aaa107ebde62ae798592eec4bc9c0f153da5fd9a87bb312e838dd9d9c190f2c5b02bdbcf8acfe6ba2e33926a64944f937f2ac032cba0c8afe269ea7c80c27c9b21a70030f5a218124f6b1f0966da6ccf804f49edfc97186373c00fc58d170bf8e6e131642a637b5122a7a93a45076a2a036b7d2481cf0eafe56f78cf88fd10b1d74d3c122ef2c2f5250501dc9ea9e7d4b56434469ea477e43331471719b75667342da27f6c81e172643ac67920de85003c742c6f2d4819c849e295cbb8328eff8c988b84a5ebc7c00c31ba309c8940413783795bfb9e9f041190a1cad0524732a006c4bc127780ecfaa5a7529d76bc3e76fa673733c6e3e00fad4c4b350de81ca0a2bc8819f02c8fb1eb9c206c6c03dbb2aa7c72c8efd0333a492a3c2906b4630463d5a56c5428acb0a2865b9ef0ef88501aed8ea79d0108c74e0ab51de45c43f9d62b8d9dfcbb9502e98b5e4f4fec5efdba5ed2f162c4a23e8d3cce2613b6046c8bce34922d8b134dc50f1dcceca3c521fdf134789d439a1496bb02771207be25893f36773d5183a45ed36bdb77a88eacd2301c629aae1e83ba5b3469c4991e4a190e01a1a5b3cdb09a221de3cc2143248ca22ba5d7c6324fcf0ff0b9e9b79b7c5e9d7f3ea05562d1efe63e183b447b670a23935baad8961313236d3193e5c04eb611a51ea91059b9cd5dd7d358831286cc611f750d9936a9b5e00a678672c403a4e657364184fea35dd2d249037b7d92c4bc2c3c733b4e16963e72e43b2dab9537d95d97d5e1d31816fb52605d25bd3aaaeefa204b915510077c1f964209ee413a0c6050dd3ee9c91649da71d436b0567841b7d26498f3aae5150ffc71ff96ff04a63c34a0db4a342c52f86a3628f4a96a2555efc35b0fa1279ed0adbfb154f0fdcd7c035f5772cea7001f96c6a586e8e5bc0bd73fed33ed8fda532e5713c935ac0326be7aadfe89a3c4c20ed5931a6e94060a98ba08268dc05faf34eec4082456f0cd8f2029e9d9f90954f82313bb07f9831f4f4c503bd149bf6e3b29ed1cc8a41c51851d9ffd9c15f0c21618689a2483fdaf49968e438b00e4768f29c0b740284ccea0567ffd70702e01e8ed86ae392f1313a0500acde038298a05d80208151d49621804344880d1c6dbfb247c652e0e92d5fc36d9f363b9e1cba5a890c5c4ff670171a1388bfab75a1a96528180e9a972402733be4e9615617fe85af0d75213005ba7fff449de4606827bff4db2417c776e2b04d315935f697cff1e9a2d577f0f91aa176f0cb127833dc09d47026edd8c741905681fc1d95d1e03f3099e5d1373590792d4ef1d78ed29a21bb51084937ef588831dec8cc571ebd5c5d900a53cc8993824cd56eb9ddd2b9cd8b4e606168a696ad3bb3d7f95fb8166ffe138454730fa5ca0d0f499a5b59ae5e4b799eff9c07fec343c23b8f8495986b037b2b433849f54fc633edead1ec842b16de543e254f1a56689cecd8061e7eaa088020dd7ae52b4f5b2dbbdc67642c54a536a1239b1a50cf09b475ba43ef86fe0e5cb1b3fb4b17f0d9092c0c091b42428ba1692251edc0f0bd8e141dbc1c2a008178424cf01a982ab3261ac68e8ab8264d8829c0f3f3dcfe24d0bdf1db8eabda9abe2e91bd90e430dd7eb2b8eb1cada24dcd4d8467930dd3b6d7f142e471a7fca8c893d7b3edc5258ee31350ab3cff23aa360179fca45be9f867ed53287ea9ba2b1b5142acfb39564cd5118dfbedc21feb9836bcb92b75d94336f7e8a6e8bea4e2da4e4d3928ec9c24689e480b592480c85c91e0152073a49d4bd8373f8e3f2f9aeed45f21f7ffa9a32c6c67cba572e1acaa547bb3e1d595d23f1fe3d5d53b707b9913b34afe311ce5063c8d6d4590afe5c8ffc91f6fd9f043084247c35b16bb3671c0e2f8b36c3aced385d4b675511d77b0a4e19effd470d501c93a43720dde5dffb3fdef3be338e0948516fdcaaaf27b751b338e3a1f98c791399d5f3ed84846ceda0e5725842032acedca6f8b40f3a0ed9f17cf1d5451d003ba50d5a57726beaa0d33f48ebd115c767376f49dd6d014a7533afbc651010a6844797899c2ae312f67317fa7145b2e864c5dbb403e9e854f3318b99fbb8687960b0825bbdfbbb2c11027a5d3dcfcda1e59602c82f2832519c827048ab9431e10762419eb98552aae3dd925a599a0e39f136709d9bffa8093281c4e7a7031786be8c3868901d081b70e10f54764127b30f8edc69fa2c6beebfa8c69e1ab7cd0ccff9c3583b58ec37a1d62c8b539e70f8c929d9171b96234c5615cfae786bffcfa630a6a5ee05488a303ed2b844f9ab4b2fcab16d7ad14aca23dd93cf9925bc5dd6c9b257c74a382ac429628b9897ab6736d90f17b937d7ef7e26518a7f48dd4b86721b9e6795f4062a19a52d70e2d6afc0fc36c17f7f2d817cc5f21c57f7a9f70943f831e9e685856f4534583e11427153ed2f430b000265ae05b355ca5492bdc8817ec572ac95cb3e0f0a9add089054a5ef624c36e2d79005577caa3a783c4db614de1c47fab4bb8f17c04c9a0482621711161191f428b2c182a7d718f9208d0f23bd5a383db05d1e5d51777c0bd0699f9d4a15898fd68b863b73c7b10b7597329afc6753485910d3933a5567dcfd56f04fae55a047deb555a22934c69d722d7b3c22bd091444119148344fa8129dc59622ebfed309cfedd1eb7cef12a11d9d4a6c280425828bdc06578d77e168752025ad9d0c62c5a6c826561f5f2a9cc72f8cb30fc1836c9ef4fdadb2884d2b3516a8d2d970b03e11ff544308a2757d33f3436534569f645f28c15bb9b04fe500f248791fa2e1119dd638a829d652cb8a550b28e01cc7906cef0693770b97cd7f619a6e7a32d5adbb6ebcba00e0e0fa09cbf9b249b9bfa1cc786444a0677c5040a484255dbc8948442aee3ed4265dabaa07a9ae9bb23b74061e26d97d191ccbe28552ebd8c1442192a48faaf64c30e585311922f9081045bce88e0198b0977eac5b2e34622c90869af59243dbe6e998be04b832ee67daf2f1c193e8fc82ced4d66364ecd9bdbcb11d7792562fdc52c0995c52cf8b7c1bdb243fcfe13ff3313a542c2b26d5223190714a84ccf6a82eae744419e905d8644efc489f53e273fe9b94905966ca2a57a7b8f409cd5c2af34dfbdc464f77c775f8c9413d27fc4c9c20c962bdf4d3ae28e92f8206542a52d50c43d7bbfbd0e6ed1a3b62009a34c16dfd32c12f1b4099549f7fea16571ef653751905d3b50ce2c8c9b3e58762e771c2b7aac9c82f73c839ec23493e5661f75e26474ae77c5647a20eceb46f23971238a01dfdf4d8f2a7b23ddab424d92f476eaf88aa07d0b14b6dd9ecd0b39a44d355c03a2a207c6f30eae8d6c1400aacd329d3cc626f0c50aa264541290d539076ea6bfad516ce447f5c03a5b3433abf157bee61e687214612fb6d0f3cd4e4ceace8232938fa9ce4140bf267ab7b43a8f1fea6d186c7288e296b8aa044ddbe215d852c046594c73fa620420452eac987a81070c90fcd7b23d43e9bb94a3d3e1c053c911292fe324e4bd045e69a2cb9170fedbabd13cee6f9f831b3c635da94cc0cba4a2c6984590733ab94e362b81ffa5f5d352dbf743edcc406f3937d98c8df6b22898bc1d8ad25bc21d9c9082990055ceef6aaed2ffc86132c9814e4a4f707b0dd5f1890c3071f385840e5065d99fae9ddc2f52826d4f5b9381e2ce0489ce5c614ed112318810386f82848a98ab37a25cd5e8b33dd6a352ed1b6603a06e07229236a785087cdc9daf36b6f3068e17aee229572a484b2817ff36222cb8dc054dce05e73b4d160e28b338e129fe6ca30fe926d55435af4a4f55ac7daf6ad14f43f70ab01ffbb29541eaf05803387b9a40bf54330bd98832f1a991204973ae74b567ce7d42dfca639e0865c124ba06d1b6fc5d5ee64618aae6a27f584b67b6cad484a42e7e939a4082a88a2fe4a02d03cfbbb2f8f46538a326c81a8dc83b69a93f8faf2c586253f69346cbee89d4af4f2d3b81e65d21150749ab5ea1a062f26dca17db85868e102aaaffc5b1b1b39cf4addbd2036d48b94ed0c5294a2e5a1915a68e710832543676e4a59b70943386692393c2df3e4d82563cb50ab0ecf0b72253ddd7727546351326e1bf4ff9e9167d7d14f6ab460cdde146ce9c120df5400f4b28e3f93667d765933bccd1746a5bc07c28c69087a8582ab50651f5fc5392b9e85becc9875bfc9248edd30881b015ae71e133c0d710c0bd37b64f02e8d8718308f76f019478cdc028b1d3ec547d2fafdc744decd5c4f42b9354e9599e72f6f190493ee0ee801469eb95c8ea100f9245dacef1cc9ae12c7cd74b529e6dc09232ec127c094240e923052ae85fac74c3e42a369c30192014913a8d0250925dc67f92f64cbb064055f9b45df9c8447c04735ca5b3bcc274edbfadb62c391f5af05db0528e98abb2d93c799a036f65a059cf0b79d14cff864202b743eed35a10b17d1b5c3c7efcb91fee284a519b3375f10ce143387645750e9645f062fd9a4969918b43168fa", 0x1000}, {&(0x7f00000063c0)="ed176daccfc87d784ee9d2748368b93b73309151e9ad5fe28b831caf9d8c21fc8909a479adc9e979b3516be44aff75e0f4f8f6453e6b8efb73830a888c8d953ed6e6c6e6d421966f01065224e9949df90d5bf6ee3f09530826d6dd25b8939fbd31ceecc360357f", 0x67}], 0x2, &(0x7f0000006480), 0x0, 0x4}, {&(0x7f00000064c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000075c0)=[{&(0x7f0000006540)="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", 0x1000}, {&(0x7f0000007540)}, {&(0x7f0000007580)="4e53c3e341cf83cb749c76e7d84d9c3d567fbba298da80a6b80e35543312e7ebec149dac49ee970b", 0x28}], 0x3, &(0x7f00000079c0)=[@cred={0x20, 0x1, 0x2, r34, r35, r36}, @cred={0x20, 0x1, 0x2, r37, r38, r39}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r40, r41, r42}], 0x98, 0x8000}], 0x7, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback=0x7f000001, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xffffffffffffff8c) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 2018/03/31 12:25:55 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:25:55 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) getegid() setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 2018/03/31 12:25:55 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x80, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000080)=0x4, 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f00000000c0)={0xfff, 0x9, 0x401, 'queue0\x00', 0x6}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0xfffffd74}], 0x1) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x7, 0x8000, 0x1000, 0x7d0, 0x0, 0xffffffff00000000, 0x0, 0x5, 0x9, 0x6, 0x1, 0x81, 0x5, 0x10000, 0x1, 0x7, 0xffffffffffffffff, 0xeda, 0x5, 0x0, 0x91, 0x10001, 0xffffffffffff0001, 0xc384, 0x8, 0xffffffffffffffe0, 0x0, 0x4, 0xffff, 0x80, 0x7, 0x2, 0x1, 0x0, 0x30, 0x3, 0x0, 0x7, 0x4, @perf_config_ext={0xfffffffffffff0f9, 0x8}, 0x20403, 0xcae, 0x0, 0x7, 0x0, 0xfff, 0x7}, r1, 0x0, r0, 0x2) 2018/03/31 12:25:55 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:25:56 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) r1 = shmget$private(0x0, 0x1000, 0x40, &(0x7f0000ffe000/0x1000)=nil) shmctl$IPC_RMID(r1, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)=0x0) ptrace$setsig(0x4203, r2, 0x0, &(0x7f00000002c0)={0xf, 0x5, 0x0, 0xfffffffffffffffe}) fgetxattr(r0, &(0x7f0000000040)=@known='security.ima\x00', &(0x7f0000000100)=""/182, 0xb6) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer2\x00', 0x1, 0x0) bind$vsock_stream(r3, &(0x7f0000000340)={0x28, 0x0, 0xffffffff, @reserved=0x1}, 0x10) prctl$void(0x35) 2018/03/31 12:25:56 executing program 1: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:25:56 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:25:56 executing program 2 (fault-call:10 fault-nth:24): r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="84d5aef1603cb020c5b219faa757913ec85ee74a155e1d635566777b78600bc65bf01ce33de9a6bc3a2041890df0926f2cfc2a7d63690f6b55610593773041755f61b034e3a62a770855b2c0481df219efbfa8ffd0c665434a1de026bcfb654d597ef77a7b231aa9efe45c53811c7591d56f69e9c6231e6da993bbd2a6133805be0c18ba114cfe865e693024a56c3331b93c03e25927a504d27acebf7eecd33d7c69359e3ca37dc546c4fc5bc62596a94cdc00f9b973616a9d2ebad2d9b3e60261ae73b8397694e1f0851475b4236fb47989e6bfd1ad926a01523df3f689dc2603a76b5fc5e023d5449d066d424d1001fee5d653c21fdb751e95ff2b", 0xfc}], 0x1, 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r2 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) ioctl$sock_ipx_SIOCAIPXPRISLT(r2, 0x89e1, &(0x7f0000000280)=0x3f) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f0000000200)={0x80, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23}, 0x0, 0x7, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000300)={r3, 0x1c9}, 0x8) r4 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e44ee") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x40, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000c40)={r3, 0x2}, &(0x7f0000000c80)=0xffffffffffffff39) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000540)=0x2, 0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000340)) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000d40)={0x7433, {{0x2, 0x4e21, @broadcast=0xffffffff}}, 0x1, 0x1, [{{0x2, 0x4e20}}]}, 0x110) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f, r3}, 0x20) 2018/03/31 12:25:56 executing program 7: socket$inet6(0xa, 0x6, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000943ffc)=0xa35) read(r1, &(0x7f00003fefff)=""/1, 0x1) r2 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r3, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r3, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r4}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)) r5 = dup2(r3, r4) fcntl$setown(r5, 0x8, r2) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r2, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0xe6, 0x2, {0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, 0xb64, 0x9, 0x9b, 0x5, 0xffff}}, &(0x7f0000000580)=0xb0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:25:56 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x80, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000080)=0x4, 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f00000000c0)={0xfff, 0x9, 0x401, 'queue0\x00', 0x6}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0xfffffd74}], 0x1) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x7, 0x8000, 0x1000, 0x7d0, 0x0, 0xffffffff00000000, 0x0, 0x5, 0x9, 0x6, 0x1, 0x81, 0x5, 0x10000, 0x1, 0x7, 0xffffffffffffffff, 0xeda, 0x5, 0x0, 0x91, 0x10001, 0xffffffffffff0001, 0xc384, 0x8, 0xffffffffffffffe0, 0x0, 0x4, 0xffff, 0x80, 0x7, 0x2, 0x1, 0x0, 0x30, 0x3, 0x0, 0x7, 0x4, @perf_config_ext={0xfffffffffffff0f9, 0x8}, 0x20403, 0xcae, 0x0, 0x7, 0x0, 0xfff, 0x7}, r1, 0x0, r0, 0x2) 2018/03/31 12:25:56 executing program 6: socket$inet6(0xa, 0x6, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000943ffc)=0xa35) read(r1, &(0x7f00003fefff)=""/1, 0x1) r2 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r3, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r3, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r4}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)) r5 = dup2(r3, r4) fcntl$setown(r5, 0x8, r2) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r2, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0xe6, 0x2, {0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, 0xb64, 0x9, 0x9b, 0x5, 0xffff}}, &(0x7f0000000580)=0xb0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:25:56 executing program 5: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) [ 866.376210] FAULT_INJECTION: forcing a failure. [ 866.376210] name failslab, interval 1, probability 0, space 0, times 0 [ 866.387530] CPU: 0 PID: 22363 Comm: syz-executor2 Not tainted 4.16.0-rc7+ #373 [ 866.387538] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 866.387541] Call Trace: [ 866.387561] dump_stack+0x194/0x24d [ 866.387579] ? arch_local_irq_restore+0x53/0x53 [ 866.387593] ? __save_stack_trace+0x7e/0xd0 [ 866.387614] should_fail+0x8c0/0xa40 [ 866.387629] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 866.387644] ? kasan_kmalloc+0xad/0xe0 [ 866.432151] ? kmem_cache_alloc_trace+0x136/0x740 [ 866.436979] ? __memcg_init_list_lru_node+0x169/0x270 [ 866.442147] ? __list_lru_init+0x544/0x750 [ 866.446359] ? sget_userns+0x691/0xe40 [ 866.450234] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 866.454968] ? kern_mount_data+0x50/0xb0 [ 866.459012] ? pid_ns_prepare_proc+0x1e/0x80 [ 866.463496] ? alloc_pid+0x87e/0xa00 [ 866.467193] ? copy_process.part.38+0x2516/0x4bd0 [ 866.472018] ? _do_fork+0x1f7/0xf70 [ 866.475632] ? SyS_clone+0x37/0x50 [ 866.479158] ? find_held_lock+0x35/0x1d0 [ 866.483203] ? __lock_is_held+0xb6/0x140 [ 866.487308] ? check_same_owner+0x320/0x320 [ 866.491618] ? rcu_note_context_switch+0x710/0x710 [ 866.496539] should_failslab+0xec/0x120 [ 866.500503] kmem_cache_alloc_trace+0x4b/0x740 [ 866.505067] ? __kmalloc_node+0x33/0x70 [ 866.509028] ? __kmalloc_node+0x33/0x70 [ 866.512990] ? rcu_read_lock_sched_held+0x108/0x120 [ 866.517998] __memcg_init_list_lru_node+0x169/0x270 [ 866.523007] ? list_lru_add+0x7c0/0x7c0 [ 866.526968] ? __kmalloc_node+0x47/0x70 [ 866.530929] __list_lru_init+0x544/0x750 [ 866.535014] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 866.540886] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 866.545886] ? __lockdep_init_map+0xe4/0x650 [ 866.550281] ? lockdep_init_map+0x9/0x10 [ 866.554325] sget_userns+0x691/0xe40 [ 866.558021] ? set_anon_super+0x20/0x20 [ 866.561979] ? put_filp+0x90/0x90 [ 866.565413] ? destroy_unused_super.part.6+0xd0/0xd0 [ 866.570505] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 866.575505] ? perf_trace_lock+0xd6/0x900 [ 866.579643] ? save_stack+0xa3/0xd0 [ 866.583255] ? kasan_slab_alloc+0x12/0x20 [ 866.587386] ? alloc_pid+0xc1/0xa00 [ 866.590996] ? __radix_tree_replace+0x1af/0x310 [ 866.595651] ? radix_tree_delete+0x30/0x30 [ 866.599871] ? node_tag_clear+0xf2/0x180 [ 866.603920] ? proc_get_inode+0x620/0x620 [ 866.608051] mount_ns+0x6d/0x190 [ 866.611400] proc_mount+0x7a/0x90 [ 866.614834] mount_fs+0x66/0x2d0 [ 866.618185] vfs_kern_mount.part.26+0xc6/0x4a0 [ 866.622751] ? may_umount+0xa0/0xa0 [ 866.626357] ? idr_alloc_cyclic+0x1d6/0x320 [ 866.630664] ? do_raw_spin_trylock+0x190/0x190 [ 866.635224] ? idr_alloc+0x180/0x180 [ 866.638921] kern_mount_data+0x50/0xb0 [ 866.642790] pid_ns_prepare_proc+0x1e/0x80 [ 866.647000] alloc_pid+0x87e/0xa00 [ 866.650526] ? __change_pid+0x400/0x400 [ 866.654479] ? ns_capable_common+0xcf/0x160 [ 866.658785] ? memset+0x31/0x40 [ 866.662045] ? copy_thread_tls+0x268/0x8f0 [ 866.666267] copy_process.part.38+0x2516/0x4bd0 [ 866.670924] ? __cleanup_sighand+0x40/0x40 [ 866.675149] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 866.680319] ? __lock_acquire+0x664/0x3e00 [ 866.684534] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 866.689701] ? perf_trace_lock+0xd6/0x900 [ 866.693836] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 866.699002] ? perf_trace_lock+0xd6/0x900 [ 866.703134] ? mntput_no_expire+0x130/0xa90 [ 866.707441] ? trace_event_raw_event_lock+0x340/0x340 [ 866.712607] ? perf_trace_lock+0xd6/0x900 [ 866.716742] ? lock_acquire+0x1d5/0x580 [ 866.720694] ? trace_hardirqs_off+0x10/0x10 [ 866.724995] ? perf_trace_lock+0xd6/0x900 [ 866.729135] ? find_held_lock+0x35/0x1d0 [ 866.733178] ? perf_trace_lock+0xd6/0x900 [ 866.737309] ? trace_event_raw_event_lock+0x340/0x340 [ 866.742482] ? _parse_integer+0x140/0x140 [ 866.746617] ? trace_hardirqs_off+0x10/0x10 [ 866.750939] ? get_pid_task+0x93/0x140 [ 866.754819] ? perf_trace_lock+0xd6/0x900 [ 866.758955] ? find_held_lock+0x35/0x1d0 [ 866.763010] ? __f_unlock_pos+0x19/0x20 [ 866.766977] ? lock_downgrade+0x980/0x980 [ 866.771109] ? get_pid_task+0xbc/0x140 [ 866.774983] ? proc_fail_nth_write+0x9b/0x1d0 [ 866.779467] ? map_files_get_link+0x3a0/0x3a0 [ 866.783944] ? handle_mm_fault+0x35b/0xb10 [ 866.788166] _do_fork+0x1f7/0xf70 [ 866.791608] ? fork_idle+0x2d0/0x2d0 [ 866.795303] ? wait_for_completion+0x770/0x770 [ 866.799897] ? __sb_end_write+0xa0/0xd0 [ 866.803860] ? fput+0xd2/0x140 [ 866.807046] ? SyS_write+0x184/0x220 [ 866.810749] ? SyS_read+0x220/0x220 [ 866.814383] SyS_clone+0x37/0x50 [ 866.817739] ? sys_vfork+0x30/0x30 [ 866.821278] do_syscall_64+0x281/0x940 [ 866.825151] ? vmalloc_sync_all+0x30/0x30 [ 866.829282] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 866.834801] ? syscall_return_slowpath+0x550/0x550 [ 866.839713] ? syscall_return_slowpath+0x2ac/0x550 [ 866.844629] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 866.849980] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 866.854808] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 866.859980] RIP: 0033:0x454e79 [ 866.863150] RSP: 002b:00007f935ae4bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 866.870851] RAX: ffffffffffffffda RBX: 00007f935ae4c6d4 RCX: 0000000000454e79 2018/03/31 12:25:57 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0x0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) [ 866.878103] RDX: 00000000200008c0 RSI: 0000000020000800 RDI: 000000002000c100 [ 866.885355] RBP: 000000000072bea0 R08: 0000000020000940 R09: 0000000000000000 [ 866.892610] R10: 0000000020000900 R11: 0000000000000246 R12: 0000000000000014 [ 866.899861] R13: 0000000000000051 R14: 00000000006f2838 R15: 0000000000000018 2018/03/31 12:25:57 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x2d) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x3, 0x600108) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000180)) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x126ac211, {0x2, 0x4e24, @loopback=0x7f000001}, {0x2, 0x4e21, @broadcast=0xffffffff}, {0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x1, 0x9, 0x8, 0x2, 0x8000, &(0x7f0000000080)='syz_tun\x00', 0x1f, 0x5, 0x8}) [ 866.942616] IPVS: ftp: loaded support on port[0] = 21 2018/03/31 12:25:57 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x2f) r1 = open(&(0x7f0000000040)='./file0\x00', 0x800, 0x10) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000080)={0x8}, 0x4) socket$key(0xf, 0x3, 0x2) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x2000000, 0x0, 0x0, 0x5}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) ioctl$VHOST_RESET_OWNER(r1, 0xaf02, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000100)={0x0, 0x0, 0x2}) ioctl$DRM_IOCTL_GEM_CLOSE(r1, 0x40086409, &(0x7f0000000140)={r2}) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 2018/03/31 12:25:57 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0x0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:25:57 executing program 4: r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x9, 0x181900) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000100)={{0xa, 0x4e21, 0x5, @empty, 0x9dd}, {0xa, 0x4e24, 0x15ab, @dev={0xfe, 0x80, [], 0x14}, 0x800}, 0x5, [0x6, 0xbfbd, 0x627, 0x8, 0x3f, 0x1, 0x6, 0x8]}, 0x5c) r1 = socket$inet6(0xa, 0x80803, 0x2f) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r1, &(0x7f00000000c0)={0xa}, 0x1c) 2018/03/31 12:25:57 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0x0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:25:57 executing program 4: connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) r0 = semget(0x3, 0x3, 0x6) semctl$SEM_INFO(r0, 0x1, 0x13, &(0x7f0000000040)=""/86) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa}, 0x1c) 2018/03/31 12:25:57 executing program 2 (fault-call:10 fault-nth:25): r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="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", 0xfc}], 0x1, 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r2 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) ioctl$sock_ipx_SIOCAIPXPRISLT(r2, 0x89e1, &(0x7f0000000280)=0x3f) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f0000000200)={0x80, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23}, 0x0, 0x7, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000300)={r3, 0x1c9}, 0x8) r4 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e44ee") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x40, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000c40)={r3, 0x2}, &(0x7f0000000c80)=0xffffffffffffff39) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000540)=0x2, 0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000340)) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000d40)={0x7433, {{0x2, 0x4e21, @broadcast=0xffffffff}}, 0x1, 0x1, [{{0x2, 0x4e20}}]}, 0x110) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f, r3}, 0x20) [ 867.148789] FAULT_INJECTION: forcing a failure. [ 867.148789] name failslab, interval 1, probability 0, space 0, times 0 [ 867.160169] CPU: 1 PID: 22401 Comm: syz-executor2 Not tainted 4.16.0-rc7+ #373 [ 867.167530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 867.176900] Call Trace: [ 867.179510] dump_stack+0x194/0x24d [ 867.183132] ? arch_local_irq_restore+0x53/0x53 [ 867.187793] ? __save_stack_trace+0x7e/0xd0 [ 867.192126] should_fail+0x8c0/0xa40 [ 867.192141] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 867.192156] ? kasan_kmalloc+0xad/0xe0 [ 867.205194] ? kmem_cache_alloc_trace+0x136/0x740 [ 867.210051] ? __memcg_init_list_lru_node+0x169/0x270 [ 867.215249] ? __list_lru_init+0x544/0x750 [ 867.219578] ? sget_userns+0x691/0xe40 [ 867.223467] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 867.228226] ? kern_mount_data+0x50/0xb0 [ 867.232285] ? pid_ns_prepare_proc+0x1e/0x80 [ 867.236678] ? alloc_pid+0x87e/0xa00 [ 867.240367] ? copy_process.part.38+0x2516/0x4bd0 [ 867.245200] ? _do_fork+0x1f7/0xf70 [ 867.248822] ? SyS_clone+0x37/0x50 [ 867.252349] ? find_held_lock+0x35/0x1d0 [ 867.256405] ? __lock_is_held+0xb6/0x140 [ 867.260476] ? check_same_owner+0x320/0x320 [ 867.264796] ? rcu_note_context_switch+0x710/0x710 [ 867.269729] should_failslab+0xec/0x120 [ 867.273709] kmem_cache_alloc_trace+0x4b/0x740 [ 867.278287] ? __kmalloc_node+0x33/0x70 [ 867.282260] ? __kmalloc_node+0x33/0x70 [ 867.286229] ? rcu_read_lock_sched_held+0x108/0x120 [ 867.291244] __memcg_init_list_lru_node+0x169/0x270 [ 867.296261] ? list_lru_add+0x7c0/0x7c0 [ 867.300238] ? __kmalloc_node+0x47/0x70 [ 867.304217] __list_lru_init+0x544/0x750 [ 867.308274] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 867.314147] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 867.319157] ? __lockdep_init_map+0xe4/0x650 [ 867.323552] ? lockdep_init_map+0x9/0x10 [ 867.327605] sget_userns+0x691/0xe40 [ 867.331309] ? set_anon_super+0x20/0x20 [ 867.335287] ? put_filp+0x90/0x90 [ 867.338728] ? destroy_unused_super.part.6+0xd0/0xd0 [ 867.343834] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 867.348855] ? save_stack+0xa3/0xd0 [ 867.352485] ? save_stack+0x43/0xd0 [ 867.356106] ? kasan_slab_alloc+0x12/0x20 [ 867.360258] ? kmem_cache_alloc+0x12e/0x760 [ 867.364580] ? alloc_pid+0xc1/0xa00 [ 867.368217] ? __radix_tree_replace+0x1af/0x310 [ 867.372894] ? radix_tree_delete+0x30/0x30 [ 867.377151] ? node_tag_clear+0xf2/0x180 [ 867.381209] ? proc_get_inode+0x620/0x620 [ 867.385348] mount_ns+0x6d/0x190 [ 867.388713] proc_mount+0x7a/0x90 [ 867.392159] mount_fs+0x66/0x2d0 [ 867.395578] vfs_kern_mount.part.26+0xc6/0x4a0 [ 867.400142] ? may_umount+0xa0/0xa0 [ 867.403764] ? idr_alloc_cyclic+0x1d6/0x320 [ 867.408080] ? do_raw_spin_trylock+0x190/0x190 [ 867.412656] ? idr_alloc+0x180/0x180 [ 867.416377] kern_mount_data+0x50/0xb0 [ 867.420259] pid_ns_prepare_proc+0x1e/0x80 [ 867.424480] alloc_pid+0x87e/0xa00 [ 867.428018] ? __change_pid+0x400/0x400 [ 867.431999] ? ns_capable_common+0xcf/0x160 [ 867.436314] ? memset+0x31/0x40 [ 867.439571] ? copy_thread_tls+0x268/0x8f0 [ 867.443800] copy_process.part.38+0x2516/0x4bd0 [ 867.448461] ? __cleanup_sighand+0x40/0x40 [ 867.452682] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 867.457870] ? __lock_acquire+0x664/0x3e00 [ 867.462096] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 867.467275] ? environ_open+0x80/0x80 [ 867.471081] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 867.476266] ? __lock_acquire+0x664/0x3e00 [ 867.480532] ? mntput_no_expire+0x130/0xa90 [ 867.484870] ? print_irqtrace_events+0x270/0x270 [ 867.489627] ? trace_hardirqs_off+0x10/0x10 [ 867.494043] ? lock_acquire+0x1d5/0x580 [ 867.498018] ? trace_hardirqs_off+0x10/0x10 [ 867.502347] ? trace_hardirqs_off+0x10/0x10 [ 867.506665] ? __lock_acquire+0x664/0x3e00 [ 867.510884] ? check_same_owner+0x320/0x320 [ 867.515204] ? find_held_lock+0x35/0x1d0 [ 867.519274] ? _parse_integer+0xe9/0x140 [ 867.523331] ? trace_hardirqs_off+0x10/0x10 [ 867.527644] ? _parse_integer+0x140/0x140 [ 867.531784] ? trace_hardirqs_off+0x10/0x10 [ 867.536090] ? get_pid_task+0x93/0x140 [ 867.539980] ? lock_downgrade+0x980/0x980 [ 867.544120] ? find_held_lock+0x35/0x1d0 [ 867.548171] ? __f_unlock_pos+0x19/0x20 [ 867.552124] ? lock_downgrade+0x980/0x980 [ 867.556263] ? get_pid_task+0xbc/0x140 [ 867.560138] ? proc_fail_nth_write+0x9b/0x1d0 [ 867.564609] ? map_files_get_link+0x3a0/0x3a0 [ 867.569084] ? handle_mm_fault+0x35b/0xb10 [ 867.573302] _do_fork+0x1f7/0xf70 [ 867.576742] ? fork_idle+0x2d0/0x2d0 [ 867.580445] ? wait_for_completion+0x770/0x770 [ 867.585025] ? __lock_is_held+0xb6/0x140 [ 867.589168] ? __sb_end_write+0xa0/0xd0 [ 867.593122] ? fput+0xd2/0x140 [ 867.596299] ? SyS_write+0x184/0x220 [ 867.599999] ? SyS_read+0x220/0x220 [ 867.603620] SyS_clone+0x37/0x50 [ 867.606983] ? sys_vfork+0x30/0x30 [ 867.610536] do_syscall_64+0x281/0x940 [ 867.614409] ? vmalloc_sync_all+0x30/0x30 [ 867.618549] ? _raw_spin_unlock_irq+0x27/0x70 [ 867.623042] ? finish_task_switch+0x1c1/0x7e0 [ 867.627541] ? syscall_return_slowpath+0x550/0x550 [ 867.632454] ? syscall_return_slowpath+0x2ac/0x550 [ 867.637364] ? prepare_exit_to_usermode+0x350/0x350 [ 867.642372] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 867.647725] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 867.652561] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 867.657736] RIP: 0033:0x454e79 [ 867.660910] RSP: 002b:00007f935ae4bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 867.668602] RAX: ffffffffffffffda RBX: 00007f935ae4c6d4 RCX: 0000000000454e79 [ 867.675861] RDX: 00000000200008c0 RSI: 0000000020000800 RDI: 000000002000c100 [ 867.683124] RBP: 000000000072bea0 R08: 0000000020000940 R09: 0000000000000000 [ 867.690416] R10: 0000000020000900 R11: 0000000000000246 R12: 0000000000000014 [ 867.697686] R13: 0000000000000051 R14: 00000000006f2838 R15: 0000000000000019 2018/03/31 12:25:58 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x0, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:25:58 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) setrlimit(0xa, &(0x7f0000000040)={0x7, 0x2}) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 2018/03/31 12:25:58 executing program 1: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:25:58 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x80, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000080)=0x4, 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f00000000c0)={0xfff, 0x9, 0x401, 'queue0\x00', 0x6}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0xfffffd74}], 0x1) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x7, 0x8000, 0x1000, 0x7d0, 0x0, 0xffffffff00000000, 0x0, 0x5, 0x9, 0x6, 0x1, 0x81, 0x5, 0x10000, 0x1, 0x7, 0xffffffffffffffff, 0xeda, 0x5, 0x0, 0x91, 0x10001, 0xffffffffffff0001, 0xc384, 0x8, 0xffffffffffffffe0, 0x0, 0x4, 0xffff, 0x80, 0x7, 0x2, 0x1, 0x0, 0x30, 0x3, 0x0, 0x7, 0x4, @perf_config_ext={0xfffffffffffff0f9, 0x8}, 0x20403, 0xcae, 0x9, 0x0, 0x0, 0xfff, 0x7}, r1, 0x0, r0, 0x2) 2018/03/31 12:25:58 executing program 7: socket$inet6(0xa, 0x6, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000943ffc)=0xa35) read(r1, &(0x7f00003fefff)=""/1, 0x1) r2 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r3, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r3, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r4}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)) r5 = dup2(r3, r4) fcntl$setown(r5, 0x8, r2) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r2, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0xe6, 0x2, {0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, 0xb64, 0x9, 0x9b, 0x5, 0xffff}}, &(0x7f0000000580)=0xb0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:25:58 executing program 6: socket$inet6(0xa, 0x6, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000943ffc)=0xa35) read(r1, &(0x7f00003fefff)=""/1, 0x1) r2 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r3, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r3, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r4}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)) r5 = dup2(r3, r4) fcntl$setown(r5, 0x8, r2) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r2, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0xe6, 0x2, {0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, 0xb64, 0x9, 0x9b, 0x5, 0xffff}}, &(0x7f0000000580)=0xb0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:25:58 executing program 2 (fault-call:10 fault-nth:26): r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="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", 0xfc}], 0x1, 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r2 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) ioctl$sock_ipx_SIOCAIPXPRISLT(r2, 0x89e1, &(0x7f0000000280)=0x3f) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f0000000200)={0x80, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23}, 0x0, 0x7, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000300)={r3, 0x1c9}, 0x8) r4 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e44ee") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x40, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000c40)={r3, 0x2}, &(0x7f0000000c80)=0xffffffffffffff39) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000540)=0x2, 0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000340)) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000d40)={0x7433, {{0x2, 0x4e21, @broadcast=0xffffffff}}, 0x1, 0x1, [{{0x2, 0x4e20}}]}, 0x110) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f, r3}, 0x20) 2018/03/31 12:25:58 executing program 5: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) [ 868.142075] FAULT_INJECTION: forcing a failure. [ 868.142075] name failslab, interval 1, probability 0, space 0, times 0 [ 868.153398] CPU: 0 PID: 22444 Comm: syz-executor2 Not tainted 4.16.0-rc7+ #373 [ 868.160766] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 868.170120] Call Trace: [ 868.172721] dump_stack+0x194/0x24d [ 868.176365] ? arch_local_irq_restore+0x53/0x53 [ 868.181039] ? __save_stack_trace+0x7e/0xd0 [ 868.185374] should_fail+0x8c0/0xa40 [ 868.189086] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 868.194190] ? kasan_kmalloc+0xad/0xe0 [ 868.198070] ? kmem_cache_alloc_trace+0x136/0x740 [ 868.202910] ? __memcg_init_list_lru_node+0x169/0x270 [ 868.208100] ? __list_lru_init+0x544/0x750 [ 868.212330] ? sget_userns+0x691/0xe40 [ 868.216220] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 868.220972] ? kern_mount_data+0x50/0xb0 [ 868.225033] ? pid_ns_prepare_proc+0x1e/0x80 [ 868.229440] ? alloc_pid+0x87e/0xa00 [ 868.233152] ? copy_process.part.38+0x2516/0x4bd0 [ 868.237986] ? _do_fork+0x1f7/0xf70 [ 868.241607] ? SyS_clone+0x37/0x50 [ 868.245148] ? find_held_lock+0x35/0x1d0 [ 868.249215] ? __lock_is_held+0xb6/0x140 [ 868.253377] ? check_same_owner+0x320/0x320 [ 868.258309] ? rcu_note_context_switch+0x710/0x710 [ 868.263249] should_failslab+0xec/0x120 [ 868.267221] kmem_cache_alloc_trace+0x4b/0x740 [ 868.271796] ? __kmalloc_node+0x33/0x70 [ 868.275762] ? __kmalloc_node+0x33/0x70 [ 868.279734] ? rcu_read_lock_sched_held+0x108/0x120 [ 868.284747] __memcg_init_list_lru_node+0x169/0x270 2018/03/31 12:25:58 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) socket$unix(0x1, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {0x2}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x9}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) [ 868.289760] ? list_lru_add+0x7c0/0x7c0 [ 868.293733] ? __kmalloc_node+0x47/0x70 [ 868.297719] __list_lru_init+0x544/0x750 [ 868.301791] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 868.307676] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 868.312692] ? __lockdep_init_map+0xe4/0x650 [ 868.317099] ? lockdep_init_map+0x9/0x10 [ 868.321163] sget_userns+0x691/0xe40 [ 868.324872] ? set_anon_super+0x20/0x20 [ 868.328843] ? put_filp+0x90/0x90 [ 868.332294] ? destroy_unused_super.part.6+0xd0/0xd0 [ 868.337400] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 868.342409] ? perf_trace_lock+0xd6/0x900 [ 868.346557] ? save_stack+0xa3/0xd0 [ 868.350177] ? kasan_slab_alloc+0x12/0x20 [ 868.354319] ? alloc_pid+0xc1/0xa00 [ 868.357947] ? __radix_tree_replace+0x1af/0x310 [ 868.362622] ? radix_tree_delete+0x30/0x30 [ 868.366857] ? node_tag_clear+0xf2/0x180 [ 868.370929] ? proc_get_inode+0x620/0x620 [ 868.375081] mount_ns+0x6d/0x190 [ 868.378445] proc_mount+0x7a/0x90 [ 868.381895] mount_fs+0x66/0x2d0 [ 868.385258] vfs_kern_mount.part.26+0xc6/0x4a0 [ 868.389841] ? may_umount+0xa0/0xa0 [ 868.393461] ? idr_alloc_cyclic+0x1d6/0x320 [ 868.397777] ? do_raw_spin_trylock+0x190/0x190 [ 868.402358] ? idr_alloc+0x180/0x180 [ 868.406068] kern_mount_data+0x50/0xb0 [ 868.409949] pid_ns_prepare_proc+0x1e/0x80 [ 868.414177] alloc_pid+0x87e/0xa00 [ 868.417714] ? __change_pid+0x400/0x400 [ 868.421681] ? ns_capable_common+0xcf/0x160 [ 868.426003] ? memset+0x31/0x40 [ 868.429279] ? copy_thread_tls+0x268/0x8f0 [ 868.433515] copy_process.part.38+0x2516/0x4bd0 [ 868.438190] ? __cleanup_sighand+0x40/0x40 [ 868.442434] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 868.447625] ? __lock_acquire+0x664/0x3e00 [ 868.451856] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 868.457053] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 868.462223] ? perf_trace_lock+0xd6/0x900 [ 868.466359] ? perf_trace_lock+0xd6/0x900 [ 868.470489] ? trace_event_raw_event_lock+0x340/0x340 [ 868.475659] ? perf_trace_lock+0xd6/0x900 [ 868.479786] ? trace_event_raw_event_lock+0x340/0x340 [ 868.484963] ? lock_acquire+0x1d5/0x580 [ 868.488917] ? trace_hardirqs_off+0x10/0x10 [ 868.493223] ? perf_trace_lock+0xd6/0x900 [ 868.497360] ? find_held_lock+0x35/0x1d0 [ 868.501405] ? perf_trace_lock+0xd6/0x900 [ 868.505545] ? trace_event_raw_event_lock+0x340/0x340 [ 868.510719] ? _parse_integer+0x140/0x140 [ 868.514945] ? trace_hardirqs_off+0x10/0x10 [ 868.519247] ? get_pid_task+0x93/0x140 [ 868.523112] ? perf_trace_lock+0xd6/0x900 [ 868.527242] ? find_held_lock+0x35/0x1d0 [ 868.531289] ? __f_unlock_pos+0x19/0x20 [ 868.535243] ? lock_downgrade+0x980/0x980 [ 868.539373] ? get_pid_task+0xbc/0x140 [ 868.543917] ? proc_fail_nth_write+0x9b/0x1d0 [ 868.548395] ? map_files_get_link+0x3a0/0x3a0 [ 868.552878] _do_fork+0x1f7/0xf70 [ 868.556316] ? fork_idle+0x2d0/0x2d0 [ 868.560017] ? wait_for_completion+0x770/0x770 [ 868.564598] ? __sb_end_write+0xa0/0xd0 [ 868.568554] ? fput+0xd2/0x140 [ 868.571835] ? SyS_write+0x184/0x220 [ 868.575528] ? SyS_read+0x220/0x220 [ 868.579134] SyS_clone+0x37/0x50 [ 868.582476] ? sys_vfork+0x30/0x30 [ 868.586006] do_syscall_64+0x281/0x940 [ 868.589879] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 868.595744] ? syscall_return_slowpath+0x550/0x550 [ 868.600651] ? syscall_return_slowpath+0x2ac/0x550 [ 868.605562] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 868.610910] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 868.615828] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 868.621002] RIP: 0033:0x454e79 [ 868.624177] RSP: 002b:00007f935ae4bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 868.631866] RAX: ffffffffffffffda RBX: 00007f935ae4c6d4 RCX: 0000000000454e79 2018/03/31 12:25:59 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x0, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) [ 868.639117] RDX: 00000000200008c0 RSI: 0000000020000800 RDI: 000000002000c100 [ 868.646368] RBP: 000000000072bea0 R08: 0000000020000940 R09: 0000000000000000 [ 868.653617] R10: 0000000020000900 R11: 0000000000000246 R12: 0000000000000014 [ 868.660870] R13: 0000000000000051 R14: 00000000006f2838 R15: 000000000000001a 2018/03/31 12:25:59 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x100000000007fffe, 0x0) ioctl$KVM_SET_DEVICE_ATTR(r1, 0x4018aee1, &(0x7f0000000100)={0x0, 0x200, 0x2, &(0x7f0000000080)}) r2 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x20011, r2, 0x0) r3 = openat$vnet(0xffffffffffffff9c, &(0x7f00003de000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r3, &(0x7f0000001a80)={0x1, {&(0x7f00000009c0)=""/4096, 0x1000, &(0x7f00000019c0)=""/157}}, 0x68) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r1, 0xc08c5334, &(0x7f00000002c0)={0x8, 0xafbf, 0x1ff, 'queue0\x00', 0x8}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x1000, 0x0, 0x0, 0x2}, {}, {0x0, 0x0, 0x29}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0xa, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000040)=0x2) 2018/03/31 12:25:59 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x0, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:25:59 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x0, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:25:59 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) gettid() setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xbf}, {}, {}, 0x0, 0x0, 0x1, 0x8}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x10) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000100)=0x1c, 0x4) r2 = dup3(r0, r0, 0x80000) ioctl$TIOCLINUX6(r2, 0x541c, &(0x7f0000000040)={0x6, 0x6}) 2018/03/31 12:25:59 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) r1 = creat(&(0x7f00000003c0)='./file0\x00', 0x100) fadvise64(r0, 0x0, 0xfffffffffffffff7, 0x2) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000400)={0x0, 0x3ff}, &(0x7f0000000440)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000480)={r2, 0x100000001, 0x5, [0x8, 0x9, 0x1, 0x0, 0xfffffffffffffffa]}, 0x12) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0xfffffffffffffd46) r3 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0xfffffffffffffffb, 0x102) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r3, 0x111, 0x2, 0x0, 0x4) ioctl$int_in(r3, 0x80000040045010, &(0x7f0000000040)) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {0x0, 0x0, 0x7}, 0x0, 0x6e6bba, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90, 0x0, 0x34c2}}, 0xe8) setsockopt$inet6_opts(r3, 0x29, 0x39, &(0x7f0000000380)=@fragment={0x3e, 0x0, 0x1, 0x1, 0x0, 0x8, 0x66}, 0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000080)={0x0, 0x0, 0x9}, &(0x7f0000000140)=0x8) ioctl$DRM_IOCTL_AGP_ALLOC(r3, 0xc0206434, &(0x7f00000004c0)={0x800, 0x0, 0x2}) ioctl$DRM_IOCTL_AGP_BIND(r3, 0x40106436, &(0x7f0000000500)={r5, 0x19c0000000000000}) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f00000002c0)={r4, 0x7b, "48024c0ed6c3a0553593bf13cb86767cb1f743b0e97a19829f2d1df251f93864af5fc7dcc751e4a6f8a215c5f56bfcb0eebc820f3453abd0abd1ac4657f2b5915b2c9cf8af74d8b4b2b7230ac999c90f9dfa9118a05343042f50e375061359430b7f01625c48bc2274091d6ae6e19ad575674a6d5769576a56455f"}, &(0x7f0000000180)=0x83) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 2018/03/31 12:25:59 executing program 1: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:25:59 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x0, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:25:59 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x80, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000080)=0x4, 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f00000000c0)={0xfff, 0x9, 0x401, 'queue0\x00', 0x6}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0xfffffd74}], 0x1) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x7, 0x8000, 0x1000, 0x7d0, 0x0, 0xffffffff00000000, 0x0, 0x5, 0x9, 0x6, 0x1, 0x81, 0x5, 0x10000, 0x1, 0x7, 0xffffffffffffffff, 0xeda, 0x5, 0x0, 0x91, 0x10001, 0xffffffffffff0001, 0xc384, 0x8, 0xffffffffffffffe0, 0x0, 0x4, 0xffff, 0x80, 0x7, 0x2, 0x1, 0x0, 0x30, 0x3, 0x0, 0x7, 0x4, @perf_config_ext={0xfffffffffffff0f9, 0x8}, 0x20403, 0xcae, 0x9, 0x0, 0x0, 0xfff, 0x7}, r1, 0x0, r0, 0x2) 2018/03/31 12:25:59 executing program 7: socket$inet6(0xa, 0x6, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000943ffc)=0xa35) read(r1, &(0x7f00003fefff)=""/1, 0x1) r2 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r3, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r3, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r4}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)) r5 = dup2(r3, r4) fcntl$setown(r5, 0x8, r2) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r2, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0xe6, 0x2, {0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, 0xb64, 0x9, 0x9b, 0x5, 0xffff}}, &(0x7f0000000580)=0xb0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:25:59 executing program 6: socket$inet6(0xa, 0x6, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000943ffc)=0xa35) read(r1, &(0x7f00003fefff)=""/1, 0x1) r2 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r3, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r3, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r4}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)) r5 = dup2(r3, r4) fcntl$setown(r5, 0x8, r2) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r2, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0xe6, 0x2, {0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, 0xb64, 0x9, 0x9b, 0x5, 0xffff}}, &(0x7f0000000580)=0xb0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:25:59 executing program 2 (fault-call:10 fault-nth:27): r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="84d5aef1603cb020c5b219faa757913ec85ee74a155e1d635566777b78600bc65bf01ce33de9a6bc3a2041890df0926f2cfc2a7d63690f6b55610593773041755f61b034e3a62a770855b2c0481df219efbfa8ffd0c665434a1de026bcfb654d597ef77a7b231aa9efe45c53811c7591d56f69e9c6231e6da993bbd2a6133805be0c18ba114cfe865e693024a56c3331b93c03e25927a504d27acebf7eecd33d7c69359e3ca37dc546c4fc5bc62596a94cdc00f9b973616a9d2ebad2d9b3e60261ae73b8397694e1f0851475b4236fb47989e6bfd1ad926a01523df3f689dc2603a76b5fc5e023d5449d066d424d1001fee5d653c21fdb751e95ff2b", 0xfc}], 0x1, 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r2 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) ioctl$sock_ipx_SIOCAIPXPRISLT(r2, 0x89e1, &(0x7f0000000280)=0x3f) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f0000000200)={0x80, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23}, 0x0, 0x7, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000300)={r3, 0x1c9}, 0x8) r4 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e44ee") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x40, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000c40)={r3, 0x2}, &(0x7f0000000c80)=0xffffffffffffff39) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000540)=0x2, 0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000340)) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000d40)={0x7433, {{0x2, 0x4e21, @broadcast=0xffffffff}}, 0x1, 0x1, [{{0x2, 0x4e20}}]}, 0x110) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f, r3}, 0x20) 2018/03/31 12:25:59 executing program 5: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) [ 869.247692] FAULT_INJECTION: forcing a failure. [ 869.247692] name failslab, interval 1, probability 0, space 0, times 0 [ 869.259100] CPU: 1 PID: 22503 Comm: syz-executor2 Not tainted 4.16.0-rc7+ #373 [ 869.267427] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 869.276790] Call Trace: [ 869.279386] dump_stack+0x194/0x24d [ 869.283032] ? arch_local_irq_restore+0x53/0x53 [ 869.287701] ? __save_stack_trace+0x7e/0xd0 [ 869.292037] should_fail+0x8c0/0xa40 [ 869.295758] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 869.300871] ? kasan_kmalloc+0xad/0xe0 [ 869.304767] ? kmem_cache_alloc_trace+0x136/0x740 [ 869.309615] ? __memcg_init_list_lru_node+0x169/0x270 [ 869.314808] ? __list_lru_init+0x544/0x750 [ 869.319048] ? sget_userns+0x691/0xe40 [ 869.322939] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 869.327694] ? kern_mount_data+0x50/0xb0 [ 869.331754] ? pid_ns_prepare_proc+0x1e/0x80 [ 869.336158] ? alloc_pid+0x87e/0xa00 [ 869.339867] ? copy_process.part.38+0x2516/0x4bd0 [ 869.344704] ? _do_fork+0x1f7/0xf70 2018/03/31 12:25:59 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_XSAVE(r1, 0x5000aea5, &(0x7f00000002c0)={"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"}) [ 869.348336] ? SyS_clone+0x37/0x50 [ 869.351878] ? find_held_lock+0x35/0x1d0 [ 869.355950] ? __lock_is_held+0xb6/0x140 [ 869.360029] ? check_same_owner+0x320/0x320 [ 869.364366] ? rcu_note_context_switch+0x710/0x710 [ 869.369312] should_failslab+0xec/0x120 [ 869.373293] kmem_cache_alloc_trace+0x4b/0x740 [ 869.377892] ? __kmalloc_node+0x33/0x70 [ 869.381873] ? __kmalloc_node+0x33/0x70 [ 869.385856] ? rcu_read_lock_sched_held+0x108/0x120 [ 869.390883] __memcg_init_list_lru_node+0x169/0x270 2018/03/31 12:25:59 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000040)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@multicast2=0xe0000002, @in6, 0x4e24, 0x0, 0x4e24, 0x1000, 0x2, 0x80, 0x80, 0x0, 0x0, r1}, {0x1, 0xffffffff, 0x7ff, 0x200, 0x0, 0x20, 0x854, 0x2}, {0x200, 0x0, 0x6, 0x1}, 0x7, 0x6e6bba, 0x0, 0x0, 0x2, 0x1}, {{@in6=@dev={0xfe, 0x80, [], 0x11}, 0x4d6, 0x33}, 0x2, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x2, 0x1, 0x8000, 0x0, 0x200, 0x1f}}, 0xe8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) [ 869.395904] ? list_lru_add+0x7c0/0x7c0 [ 869.400519] ? __kmalloc_node+0x47/0x70 [ 869.400539] __list_lru_init+0x544/0x750 [ 869.400554] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 869.400568] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 869.400579] ? __lockdep_init_map+0xe4/0x650 [ 869.400591] ? lockdep_init_map+0x9/0x10 [ 869.400601] sget_userns+0x691/0xe40 [ 869.400608] ? set_anon_super+0x20/0x20 [ 869.400617] ? put_filp+0x90/0x90 [ 869.400627] ? destroy_unused_super.part.6+0xd0/0xd0 [ 869.400639] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 869.400648] ? perf_trace_lock+0xd6/0x900 [ 869.400657] ? save_stack+0xa3/0xd0 [ 869.400668] ? kasan_slab_alloc+0x12/0x20 [ 869.400677] ? alloc_pid+0xc1/0xa00 [ 869.400692] ? __radix_tree_replace+0x1af/0x310 [ 869.400703] ? radix_tree_delete+0x30/0x30 [ 869.400712] ? node_tag_clear+0xf2/0x180 2018/03/31 12:25:59 executing program 4: r0 = socket$inet6(0xa, 0xa0803, 0xe7) sysfs$1(0x1, &(0x7f0000000180)='\a') ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000640)={0x7, r0, 0x1}) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000680)={0x8, 0x6}) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$KVM_SET_CPUID2(r1, 0x4008ae90, &(0x7f0000000780)={0x3, 0x0, [{0xc0000001, 0x1, 0x7, 0x0, 0x9, 0x7fffffff, 0x1000}, {0x4, 0x81, 0x1, 0x7, 0x3f, 0x9, 0x6}, {0x80000007, 0x10001, 0x4, 0x3, 0x3, 0x5, 0x63}]}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x8, 0x2) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f0000000740)={0x1}) ioctl$PPPIOCSFLAGS(r3, 0x40047459, &(0x7f0000000480)=0x100000) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) ioctl$DRM_IOCTL_FREE_BUFS(r3, 0x4010641a, &(0x7f0000000400)={0x9, &(0x7f00000003c0)=[0x40, 0x9, 0xfffffffffffffff8, 0x4, 0xfb, 0xfffffffffffffffa, 0x1000, 0xffff, 0x10000]}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x3c, &(0x7f0000000040)=[@in={0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}, @in={0x2, 0x4e22, @loopback=0x7f000001}, @in6={0xa, 0x4e20, 0x6, @remote={0xfe, 0x80, [], 0xbb}, 0xb8}]}, &(0x7f00000002c0)=0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f00000006c0)={r5, 0x3}, &(0x7f0000000700)=0x8) sendmmsg$inet_sctp(r4, &(0x7f00000019c0)=[{&(0x7f0000000840)=@in6={0xa, 0x4e20, 0x8000800000000000, @loopback={0x0, 0x1}, 0x5}, 0x1c, &(0x7f0000000a40)=[{&(0x7f0000000880)="26e0cf6d7dc396bbb4079948771959d9b223420629dfaa947264017ffafd1d67cd07e30778e759ab4b396421bd4cdb0f10785f46789479e79e08dbcdf711d84df59d29eb42adbab1cc0113e33fd1e1bba28cb17aaf6c879a245dbf04e8def44e427e9deed0870d079a8a8ed7c69e0c58495fe0b5c981017a480a0726a3e761da0ddb8a58cda294ff345eb86a", 0x8c}, {&(0x7f0000000940)="7fe901d527b05e6d6a2f3822881e108b96a01f6c25301374c85d40898b4e7816265c9b32763eab26cb5505ecee499ec07b2d3ddc0186334939fdf0498016b92196f09382252fe6d8506b1c7a2f3020ef2b954b16b2a097d4d43d22242a50dec98427d10c83c0ab1bf316ca70218e27b730ca8d907220fd1841458d39e970b620a94ac4a3c864da899b056ce02832868a8697cdfbe83fa035c653cfe6bd6d383f74ec9cf087727db62a96f42c5d097db478d2f34272e7f8303d8f359a4feedc09af1ebbeceed9e68bcdf791170dcf32d707862aa5bea65a34d7adc1143f1eae74b8de6a7ce6e13ce12eb26ae868ac43", 0xef}], 0x2, &(0x7f0000000a80)=[@sndrcv={0x30, 0x84, 0x1, {0xffffffff, 0x1, 0x3, 0x7f, 0x1000, 0x2, 0x0, 0x3ff, r6}}, @init={0x18, 0x84, 0x0, {0x200, 0x6c, 0x2, 0x9}}, @sndinfo={0x20, 0x84, 0x2, {0x8, 0x4, 0xfffffffffffffbff, 0x80000000, r6}}, @init={0x18, 0x84, 0x0, {0x7, 0x3, 0x1, 0x3}}, @sndinfo={0x20, 0x84, 0x2, {0x8, 0x200, 0xfc, 0x5cd12027, r5}}, @init={0x18, 0x84, 0x0, {0x80000001, 0x8001, 0x9, 0x7}}, @sndinfo={0x20, 0x84, 0x2, {0xe73f, 0x8200, 0x1, 0x40, r5}}, @sndrcv={0x30, 0x84, 0x1, {0x400, 0x7ff, 0x207, 0x2, 0xfb, 0x200, 0x9, 0x9, r6}}, @sndrcv={0x30, 0x84, 0x1, {0x1, 0x3, 0x1, 0xf8, 0x4, 0x6, 0xffffffff, 0x6, r6}}, @sndrcv={0x30, 0x84, 0x1, {0x62d33f9d, 0x100000000, 0x8000, 0x7, 0x81, 0x4, 0x7fffffff, 0x8, r6}}], 0x1e0, 0x1}, {&(0x7f0000000c80)=@in6={0xa, 0x4e20, 0x1f, @loopback={0x0, 0x1}, 0x3}, 0x1c, &(0x7f0000001040)=[{&(0x7f0000000cc0)="d394458fb72b11466d1a15d4dce8a2463179fedc6518fddb7150764097c378d08378f67d78831cc53a25f02fb528e7eed0ba65e089ebf7bb673023496c31f92ff19a85f607550454990c1b9416048b73160e54f7d8535d53e7584a9408aacddf8d0f6ae13ec795e0a1784784d88e8be5d18597e1ef5a79c8ef35f63982", 0x7d}, {&(0x7f0000000d40)="275ce60f70237eb593ac4c1d4d589830cf30cc7990b777766dbf0115f32c81a648d887da71f1558b94285bb15c946f5d3a868d7736e46b8595bb9f997cf1ec8a02bf55ccddaadb3f78f531b48bb57d7c52d1c18c0598203ec42ef47b4edef8d31a5f68", 0x63}, {&(0x7f0000000dc0)="edfac4d64d95373cf6cfcfaa019cf34d61323e8c948a7bad88ebe3937282bdc0659dbd809cacd529e3cec6f4eb98fbc6ee67f5dcde8da165fbff353fca693a5c4b466c197185e91a681a4b669379185962827520293b345fae6a", 0x5a}, {&(0x7f0000000e40)="c988d1c6bab7664d342adba1ec62e67de9eab2919c29920bf4a58bc3add1e88c5bcd17d1c23d8702a35c9a0720eae4a6158e5ab022027b8887972f7f2346488c281b1fef568592c212e8360bb88274ddbe2857185dc4772ad96d2500b4a15e605ba37dfce1889e239d61f2f550ea808ffb8afb14775fd706c36beeb2ae90d02cb0bd320d0ce4f6e002591ce0fef016ea87a8e17d975448eb617b367dd5c740108ced8c678a7f6ec222f78908c8cac8dc3f588619a30f3b27576c9a70ffe1677f188962a3e60914f79a4284d7217eda068747a56e5a1eec940050b49191f781d90c3953b189ccb4ad76fdba2f50adb25aa3edae52", 0xf4}, {&(0x7f0000000f40)="0875ff899bfd069ca5f9f93dd192c92316c0f130d044038dd8", 0x19}, {&(0x7f0000000f80)="92c0d1276a0d93001a58b658b0dfb9122f7969bdad700025097a67ab501819065aa97deabf18f8531a9c32cb99bb671f0c0cd2343ec8b6ad77c7e4a80a3518468efba9da4e41f9f33632a33cb2b16577431f5f6e62181136f5023c054014756fb09b56503edc867ce7f5faa01ec90e9e666b39db0d3f797e0bf0c6413a75a2b2489e216785ace615f8929e94611873d0961804fb4de7f5387ec88e15069771dc057e44df01ed2ec338ebb5896f13a0641aca786f2fa4638208c92f", 0xbb}], 0x6, &(0x7f00000010c0)=[@sndinfo={0x20, 0x84, 0x2, {0x9, 0x8201, 0x4, 0xffffffffbc82c429, r6}}, @sndinfo={0x20, 0x84, 0x2, {0x70, 0x4, 0x1000, 0x3, r6}}, @sndrcv={0x30, 0x84, 0x1, {0x37d, 0x3, 0x8, 0x4, 0x5, 0x4, 0x8, 0x4, r5}}, @sndrcv={0x30, 0x84, 0x1, {0x8, 0x7ff, 0x4, 0x7fffffff, 0x8, 0x74cd, 0x80000000, 0x9, r5}}], 0xc0, 0x10}, {&(0x7f0000001180)=@in6={0xa, 0x4e20, 0x1f, @mcast1={0xff, 0x1, [], 0x1}, 0x1}, 0x1c, &(0x7f0000001680)=[{&(0x7f00000011c0)="d74080e217ef16e584c5df9df8178e3b5695c711ae8b130d89c69ebdd138f5a7f948bfce4b034b21083ed79b28af76c97278c1625e7f7d307467f2155a015fcd7e258a8fb62d3ca009fe0e2b5f2e42d7473568cf70bb78c0af89ccab3f9ecc2b054ba129b314bc67da9508423dd1bca49385f85dfb32b031501fd6412800c96b418ab3da2bfa1463f000076a4974ebab88ef46c2", 0x94}, {&(0x7f0000001280)="c47335555f30f890713cd9004aedcf44fed709eda89169e7ad445a79ebfaf467d53406f8b104a5bf7f34855f014c48f6c022193c33d03293bb0eccccd913193a3ba1f210f98cb3ca2f916b6b5021c226d90327e9bb9161e87c216ed49b907d8430cfe5dc42cbc9939269f8019317302863ff2607d3caeb046c1daccf939a7e49baafa0ece4eba9cb4bcc030c423ed893341e42a10d2cb97a1343e9f33bf501ef40fdd36eb61abb", 0xa7}, {&(0x7f0000001340)="d8e283afb6649a85bd45e9d6a2b0b1529da904a17184b1ce5b69189c75", 0x1d}, {&(0x7f0000001380)="095017c0b473bf37fcb235513c144a610551d7eb6199bc52a81e7f4e669e5b42cc0a8c88bd77268a48b6c8c2fbdcbf6ddfca586f4eebc6e184837691642135c2e31a50eb724f8cd587208e2362eff0409fdddba9977eac4508aa59a349fcb6b93247db3b3ea0d55e76e37d59944942919247c56801f398e11fe4ea2aff8e18cee084fd22d710d8ab0810e89aa6e617e690374116b6beff1b", 0x98}, {&(0x7f0000001440)="2371ad34e38757610c181471d5b9094f74b02f50c1326544f347905b87a68f458f098b1381e0c8c2f7374dd0d08396d1afefcd1c511820f62bf5fe24154ee2dc1e404225816fdb54de5f170acc1ff4632e6ebee0f0760f1e46f03a716f14a8728ab52b5d240e4529de29e7b8609b97522149b5958c25d460e5dfd162fed2448679d40f0e4d4009ff9a96baad9d0773b15c57ea8e4dd20c3f824eeb1bf6a3babc1dbbd756de1f3a5eefe3fe051903818e8285bcc45077992b50b9bbe30b049537", 0xc0}, {&(0x7f0000001500)="cfa28dbc6ba5297dd24b9269ace34061e687cd735ec5ccd3993ad38690c703549abc4a0bfdd3d278432deeac450fe4f1954903037a687444e47cb89c1e3d6548ca9f7689236a378b048602fef35fadcc03161c91ccb1dbf81309", 0x5a}, {&(0x7f0000001580)="ed0f4825b5d4104166eaa4f494d85147c8a982c3dabda73def948ed04a670b0b2589e2a87b81e680aa8c617c17c04bee5109c6d9d2a40dfd904a297af0948efdeeda3f703a887382df081fda086a9ad214cf7a5d7f1761912cf2f972c466011b4a373f05345f60d8f1d86d281daaf532f186288601c8896083f2f3d58bbb9cdd0547201271a5156aabeec231054fb67b61ffa6f45d880730bce462915483b6e75eeba61ffa535c59c7b1", 0xaa}, {&(0x7f0000001640)="2c7a1a08", 0x4}], 0x8, &(0x7f0000001700)=[@sndinfo={0x20, 0x84, 0x2, {0xe356, 0x8000, 0x1, 0x1f, r6}}, @init={0x18, 0x84, 0x0, {0x9, 0x7, 0x30, 0x2}}, @init={0x18, 0x84, 0x0, {0x1, 0xd, 0xfffffffffffffffc, 0xffff}}, @init={0x18, 0x84, 0x0, {0x100000001, 0x8, 0x100000001, 0x46}}, @sndrcv={0x30, 0x84, 0x1, {0x8, 0x81, 0x4, 0x8, 0x6, 0x3, 0x2400, 0x80, r5}}, @sndrcv={0x30, 0x84, 0x1, {0x400, 0xffffffffffff0000, 0x204, 0x9, 0x1, 0xba3, 0xde3, 0xfffffffffffffffd, r5}}, @init={0x18, 0x84, 0x0, {0x166, 0x5, 0x9, 0x100000000}}], 0x150, 0x800}, {&(0x7f0000001880)=@in6={0xa, 0x4e21, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x200}, 0x1c, &(0x7f0000001940)=[{&(0x7f00000018c0)="eeebb5d15182974d599b0e4a49b51e4d3a7f345cb4877831baad90bd672b4d5f8e319f98f5bc5a0d93a8da4b37b49611ece3831c354e13d6d9003939a541627fd85b1461550e786488c63941257c0d9001b2415d0d6241a5126e830fca9f", 0x5e}], 0x1, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0xffffffffffffffc1, 0x2, 0x356, 0x8, r5}}], 0x30, 0x40}], 0x4, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(r4, 0x84, 0x11, &(0x7f0000000300)={r5, 0x8001}, &(0x7f0000000340)=0x8) pselect6(0x40, &(0x7f00000004c0)={0x0, 0x8f, 0x8, 0x4, 0x8001, 0x3, 0xfffffffffffffffa, 0x189c70f0c0}, &(0x7f0000000500)={0x7, 0x100000000, 0x9, 0x2, 0x5a82, 0x6, 0x3, 0x9}, &(0x7f0000000540)={0xfffffffffffffff9, 0x6, 0xffff, 0x4, 0x100, 0x4, 0x7ff, 0x2}, &(0x7f0000000580)={0x77359400}, &(0x7f0000000600)={&(0x7f00000005c0)={0x9}, 0x8}) ioctl$DRM_IOCTL_GEM_FLINK(r4, 0xc008640a, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f0000000800)={r7, 0x80000, r4}) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r4, 0x84, 0x12, &(0x7f0000000440)=0xfffffffffffffff9, 0x4) 2018/03/31 12:25:59 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rtc\x00', 0x400, 0x0) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f0000000400)=0x1) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e24, 0xb, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, 0x800}, 0x1c) getitimer(0xd6e50525fa608c1, &(0x7f0000000180)) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$KVM_GET_PIT(r0, 0xc048ae65, &(0x7f00000002c0)) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, r2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty, 0x4619}, 0x1c) r3 = memfd_create(&(0x7f0000000340)="5b47504c22757365727472757374656475736572706f7369785f61636c5f61636365737370707031706f7369785f61636c5f616363657373766d6e657430df246d696d655f7479706521", 0x1) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000080)=0x3, 0x8) [ 869.400732] ? proc_get_inode+0x620/0x620 [ 869.400740] mount_ns+0x6d/0x190 [ 869.400750] proc_mount+0x7a/0x90 [ 869.400766] mount_fs+0x66/0x2d0 [ 869.400783] vfs_kern_mount.part.26+0xc6/0x4a0 [ 869.400796] ? may_umount+0xa0/0xa0 [ 869.400806] ? idr_alloc_cyclic+0x1d6/0x320 [ 869.400817] ? do_raw_spin_trylock+0x190/0x190 [ 869.400825] ? idr_alloc+0x180/0x180 [ 869.400837] kern_mount_data+0x50/0xb0 [ 869.400847] pid_ns_prepare_proc+0x1e/0x80 [ 869.400856] alloc_pid+0x87e/0xa00 2018/03/31 12:25:59 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f00000002c0)=""/138, &(0x7f0000000080)=0x8a) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) prctl$setname(0xf, &(0x7f0000000380)='\x00') getsockopt$inet6_buf(r0, 0x29, 0xe3, &(0x7f0000000100)=""/167, &(0x7f0000000040)=0xa7) [ 869.400869] ? __change_pid+0x400/0x400 [ 869.400876] ? ns_capable_common+0xcf/0x160 [ 869.400892] ? memset+0x31/0x40 [ 869.400903] ? copy_thread_tls+0x268/0x8f0 [ 869.400918] copy_process.part.38+0x2516/0x4bd0 [ 869.400937] ? __cleanup_sighand+0x40/0x40 [ 869.400959] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 869.400971] ? __lock_acquire+0x664/0x3e00 [ 869.400982] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 869.400992] ? environ_open+0x80/0x80 [ 869.401012] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 869.401021] ? __lock_acquire+0x664/0x3e00 2018/03/31 12:25:59 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x8000) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$KVM_SET_CLOCK(r1, 0x4030ae7b, &(0x7f0000000080)={0x7, 0x8}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) lseek(r0, 0x0, 0x1) [ 869.401029] ? mntput_no_expire+0x130/0xa90 [ 869.401042] ? print_irqtrace_events+0x270/0x270 [ 869.401051] ? trace_hardirqs_off+0x10/0x10 [ 869.401066] ? lock_acquire+0x1d5/0x580 [ 869.401073] ? trace_hardirqs_off+0x10/0x10 [ 869.401083] ? trace_hardirqs_off+0x10/0x10 [ 869.401094] ? __lock_acquire+0x664/0x3e00 [ 869.401103] ? check_same_owner+0x320/0x320 [ 869.401116] ? find_held_lock+0x35/0x1d0 [ 869.401134] ? _parse_integer+0xe9/0x140 [ 869.401147] ? trace_hardirqs_off+0x10/0x10 [ 869.401157] ? _parse_integer+0x140/0x140 2018/03/31 12:26:00 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0xf}, 0x1}, 0xe7) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 2018/03/31 12:26:00 executing program 4: r0 = socket$inet6(0xa, 0x7, 0x30) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x4000001000000, @dev={0xfe, 0x80, [], 0x19}, 0xfffffffffffffffc}, 0x1e4) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) [ 869.401173] ? trace_hardirqs_off+0x10/0x10 [ 869.401181] ? get_pid_task+0x93/0x140 [ 869.401190] ? lock_downgrade+0x980/0x980 [ 869.401204] ? find_held_lock+0x35/0x1d0 [ 869.401217] ? __f_unlock_pos+0x19/0x20 [ 869.401227] ? lock_downgrade+0x980/0x980 [ 869.401236] ? get_pid_task+0xbc/0x140 [ 869.401247] ? proc_fail_nth_write+0x9b/0x1d0 [ 869.401256] ? map_files_get_link+0x3a0/0x3a0 [ 869.401268] ? handle_mm_fault+0x35b/0xb10 [ 869.401282] _do_fork+0x1f7/0xf70 [ 869.401294] ? fork_idle+0x2d0/0x2d0 [ 869.401307] ? wait_for_completion+0x770/0x770 [ 869.401322] ? __lock_is_held+0xb6/0x140 [ 869.401343] ? __sb_end_write+0xa0/0xd0 [ 869.401355] ? fput+0xd2/0x140 [ 869.401369] ? SyS_write+0x184/0x220 [ 869.401381] ? SyS_read+0x220/0x220 [ 869.401394] SyS_clone+0x37/0x50 [ 869.401402] ? sys_vfork+0x30/0x30 [ 869.401415] do_syscall_64+0x281/0x940 [ 869.401427] ? vmalloc_sync_all+0x30/0x30 [ 869.401436] ? _raw_spin_unlock_irq+0x27/0x70 [ 869.401444] ? finish_task_switch+0x1c1/0x7e0 [ 869.401452] ? syscall_return_slowpath+0x550/0x550 [ 869.401462] ? syscall_return_slowpath+0x2ac/0x550 [ 869.401471] ? prepare_exit_to_usermode+0x350/0x350 [ 869.401482] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 869.401495] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 869.401509] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 869.401517] RIP: 0033:0x454e79 [ 869.401522] RSP: 002b:00007f935ae4bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 869.401533] RAX: ffffffffffffffda RBX: 00007f935ae4c6d4 RCX: 0000000000454e79 [ 869.401539] RDX: 00000000200008c0 RSI: 0000000020000800 RDI: 000000002000c100 [ 869.401544] RBP: 000000000072bea0 R08: 0000000020000940 R09: 0000000000000000 [ 869.401549] R10: 0000000020000900 R11: 0000000000000246 R12: 0000000000000014 [ 869.401555] R13: 0000000000000051 R14: 00000000006f2838 R15: 000000000000001b [ 869.443393] IPVS: ftp: loaded support on port[0] = 21 2018/03/31 12:26:00 executing program 4: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:26:00 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x0, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:26:00 executing program 6: socket$inet6(0xa, 0x6, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000943ffc)=0xa35) read(r1, &(0x7f00003fefff)=""/1, 0x1) r2 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r3, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r3, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r4}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)) r5 = dup2(r3, r4) fcntl$setown(r5, 0x8, r2) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r2, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0xe6, 0x2, {0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, 0xb64, 0x9, 0x9b, 0x5, 0xffff}}, &(0x7f0000000580)=0xb0) 2018/03/31 12:26:00 executing program 2 (fault-call:10 fault-nth:28): r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="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", 0xfc}], 0x1, 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r2 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) ioctl$sock_ipx_SIOCAIPXPRISLT(r2, 0x89e1, &(0x7f0000000280)=0x3f) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f0000000200)={0x80, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23}, 0x0, 0x7, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000300)={r3, 0x1c9}, 0x8) r4 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e44ee") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x40, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000c40)={r3, 0x2}, &(0x7f0000000c80)=0xffffffffffffff39) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000540)=0x2, 0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000340)) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000d40)={0x7433, {{0x2, 0x4e21, @broadcast=0xffffffff}}, 0x1, 0x1, [{{0x2, 0x4e20}}]}, 0x110) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f, r3}, 0x20) 2018/03/31 12:26:00 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x80, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000080)=0x4, 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f00000000c0)={0xfff, 0x9, 0x401, 'queue0\x00', 0x6}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0xfffffd74}], 0x1) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x7, 0x8000, 0x1000, 0x7d0, 0x0, 0xffffffff00000000, 0x0, 0x5, 0x9, 0x6, 0x1, 0x81, 0x5, 0x10000, 0x1, 0x7, 0xffffffffffffffff, 0xeda, 0x5, 0x0, 0x91, 0x10001, 0xffffffffffff0001, 0xc384, 0x8, 0xffffffffffffffe0, 0x0, 0x4, 0xffff, 0x80, 0x7, 0x2, 0x1, 0x0, 0x30, 0x3, 0x0, 0x7, 0x4, @perf_config_ext={0xfffffffffffff0f9, 0x8}, 0x20403, 0xcae, 0x9, 0x0, 0x0, 0xfff, 0x7}, r1, 0x0, r0, 0x2) 2018/03/31 12:26:00 executing program 5: socket$inet6(0xa, 0x6, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:26:00 executing program 7: socket$inet6(0xa, 0x6, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000943ffc)=0xa35) read(r1, &(0x7f00003fefff)=""/1, 0x1) r2 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r3, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r3, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r4}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)) r5 = dup2(r3, r4) fcntl$setown(r5, 0x8, r2) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r2, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0xe6, 0x2, {0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, 0xb64, 0x9, 0x9b, 0x5, 0xffff}}, &(0x7f0000000580)=0xb0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:26:00 executing program 1: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) [ 870.382612] FAULT_INJECTION: forcing a failure. [ 870.382612] name failslab, interval 1, probability 0, space 0, times 0 [ 870.393924] CPU: 0 PID: 22573 Comm: syz-executor2 Not tainted 4.16.0-rc7+ #373 [ 870.401286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 870.410634] Call Trace: [ 870.413222] dump_stack+0x194/0x24d [ 870.416839] ? arch_local_irq_restore+0x53/0x53 [ 870.421500] ? mutex_lock_io_nested+0x1900/0x1900 [ 870.426367] ? __memcg_init_list_lru_node+0x169/0x270 [ 870.431549] should_fail+0x8c0/0xa40 [ 870.435251] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 870.440341] ? trace_hardirqs_off+0x10/0x10 [ 870.444654] ? lock_downgrade+0x980/0x980 [ 870.448876] ? trace_hardirqs_off+0x10/0x10 [ 870.453186] ? find_held_lock+0x35/0x1d0 [ 870.457234] ? __lock_is_held+0xb6/0x140 [ 870.461287] ? check_same_owner+0x320/0x320 [ 870.465594] ? rcu_note_context_switch+0x710/0x710 [ 870.470508] ? rcu_note_context_switch+0x710/0x710 [ 870.475437] should_failslab+0xec/0x120 [ 870.479399] __kmalloc+0x63/0x760 [ 870.482861] ? __kmalloc_node+0x47/0x70 [ 870.486824] ? __list_lru_init+0xcf/0x750 [ 870.490959] __list_lru_init+0xcf/0x750 [ 870.494923] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 870.500794] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 870.505797] ? lockdep_init_map+0x9/0x10 [ 870.509843] sget_userns+0x6b1/0xe40 [ 870.513539] ? set_anon_super+0x20/0x20 [ 870.517505] ? put_filp+0x90/0x90 [ 870.520944] ? destroy_unused_super.part.6+0xd0/0xd0 [ 870.526038] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 870.531046] ? save_stack+0xa3/0xd0 [ 870.534810] ? save_stack+0x43/0xd0 [ 870.538420] ? kasan_slab_alloc+0x12/0x20 [ 870.542557] ? kmem_cache_alloc+0x12e/0x760 [ 870.547498] ? alloc_pid+0xc1/0xa00 [ 870.551120] ? __radix_tree_replace+0x1af/0x310 [ 870.555772] ? radix_tree_delete+0x30/0x30 [ 870.559988] ? node_tag_clear+0xf2/0x180 [ 870.564044] ? proc_get_inode+0x620/0x620 [ 870.568176] mount_ns+0x6d/0x190 [ 870.571526] proc_mount+0x7a/0x90 [ 870.574959] mount_fs+0x66/0x2d0 [ 870.578312] vfs_kern_mount.part.26+0xc6/0x4a0 [ 870.582881] ? may_umount+0xa0/0xa0 [ 870.586502] ? idr_alloc_cyclic+0x1d6/0x320 [ 870.590813] ? do_raw_spin_trylock+0x190/0x190 [ 870.595379] ? idr_alloc+0x180/0x180 [ 870.599079] kern_mount_data+0x50/0xb0 [ 870.602950] pid_ns_prepare_proc+0x1e/0x80 [ 870.607172] alloc_pid+0x87e/0xa00 [ 870.610712] ? __change_pid+0x400/0x400 [ 870.614668] ? ns_capable_common+0xcf/0x160 [ 870.618981] ? memset+0x31/0x40 [ 870.622249] ? copy_thread_tls+0x268/0x8f0 [ 870.626473] copy_process.part.38+0x2516/0x4bd0 [ 870.631133] ? __cleanup_sighand+0x40/0x40 [ 870.635371] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 870.640555] ? __lock_acquire+0x664/0x3e00 [ 870.644769] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 870.649936] ? environ_open+0x80/0x80 [ 870.653724] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 870.658891] ? __lock_acquire+0x664/0x3e00 [ 870.663105] ? mntput_no_expire+0x130/0xa90 [ 870.667408] ? print_irqtrace_events+0x270/0x270 [ 870.672141] ? trace_hardirqs_off+0x10/0x10 [ 870.676448] ? lock_acquire+0x1d5/0x580 [ 870.680399] ? trace_hardirqs_off+0x10/0x10 [ 870.684703] ? trace_hardirqs_off+0x10/0x10 [ 870.689006] ? __lock_acquire+0x664/0x3e00 [ 870.693238] ? check_same_owner+0x320/0x320 [ 870.697563] ? find_held_lock+0x35/0x1d0 [ 870.701609] ? _parse_integer+0xe9/0x140 [ 870.705653] ? trace_hardirqs_off+0x10/0x10 [ 870.709956] ? _parse_integer+0x140/0x140 [ 870.714090] ? trace_hardirqs_off+0x10/0x10 [ 870.718394] ? get_pid_task+0x93/0x140 [ 870.722264] ? lock_downgrade+0x980/0x980 [ 870.726397] ? find_held_lock+0x35/0x1d0 [ 870.730446] ? __f_unlock_pos+0x19/0x20 [ 870.734499] ? lock_downgrade+0x980/0x980 [ 870.738639] ? get_pid_task+0xbc/0x140 [ 870.742513] ? proc_fail_nth_write+0x9b/0x1d0 [ 870.747083] ? map_files_get_link+0x3a0/0x3a0 [ 870.751569] ? handle_mm_fault+0x35b/0xb10 [ 870.755791] _do_fork+0x1f7/0xf70 [ 870.759227] ? fork_idle+0x2d0/0x2d0 [ 870.762923] ? wait_for_completion+0x770/0x770 [ 870.767487] ? __lock_is_held+0xb6/0x140 [ 870.771550] ? __sb_end_write+0xa0/0xd0 [ 870.775508] ? fput+0xd2/0x140 [ 870.778684] ? SyS_write+0x184/0x220 [ 870.782384] ? SyS_read+0x220/0x220 [ 870.785997] SyS_clone+0x37/0x50 [ 870.789349] ? sys_vfork+0x30/0x30 [ 870.792877] do_syscall_64+0x281/0x940 [ 870.796748] ? vmalloc_sync_all+0x30/0x30 [ 870.800876] ? _raw_spin_unlock_irq+0x27/0x70 [ 870.805355] ? finish_task_switch+0x1c1/0x7e0 [ 870.809833] ? syscall_return_slowpath+0x550/0x550 [ 870.814746] ? syscall_return_slowpath+0x2ac/0x550 [ 870.819663] ? prepare_exit_to_usermode+0x350/0x350 [ 870.824929] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 870.830277] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 870.835105] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 870.840279] RIP: 0033:0x454e79 [ 870.843463] RSP: 002b:00007f935ae4bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 870.851156] RAX: ffffffffffffffda RBX: 00007f935ae4c6d4 RCX: 0000000000454e79 [ 870.858408] RDX: 00000000200008c0 RSI: 0000000020000800 RDI: 000000002000c100 [ 870.865674] RBP: 000000000072bea0 R08: 0000000020000940 R09: 0000000000000000 [ 870.872923] R10: 0000000020000900 R11: 0000000000000246 R12: 0000000000000014 [ 870.880173] R13: 0000000000000051 R14: 00000000006f2838 R15: 000000000000001c 2018/03/31 12:26:01 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x0, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:26:01 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x0, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:26:01 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x0, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:26:01 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:26:01 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:26:01 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x80, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000080)=0x4, 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f00000000c0)={0xfff, 0x9, 0x401, 'queue0\x00', 0x6}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0xfffffd74}], 0x1) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x7, 0x8000, 0x1000, 0x7d0, 0x0, 0xffffffff00000000, 0x0, 0x5, 0x9, 0x6, 0x1, 0x81, 0x5, 0x10000, 0x1, 0x7, 0xffffffffffffffff, 0xeda, 0x5, 0x0, 0x91, 0x10001, 0xffffffffffff0001, 0xc384, 0x8, 0xffffffffffffffe0, 0x0, 0x4, 0xffff, 0x80, 0x7, 0x2, 0x1, 0x0, 0x30, 0x3, 0x0, 0x7, 0x4, @perf_config_ext={0xfffffffffffff0f9, 0x8}, 0x20403, 0xcae, 0x9, 0x7, 0x0, 0x0, 0x7}, r1, 0x0, r0, 0x2) 2018/03/31 12:26:01 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:26:01 executing program 6: socket$inet6(0xa, 0x6, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000943ffc)=0xa35) read(r1, &(0x7f00003fefff)=""/1, 0x1) r2 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r3, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r3, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r4}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)) r5 = dup2(r3, r4) fcntl$setown(r5, 0x8, r2) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r2, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0xe6, 0x2, {0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, 0xb64, 0x9, 0x9b, 0x5, 0xffff}}, &(0x7f0000000580)=0xb0) 2018/03/31 12:26:01 executing program 4: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:26:01 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x0, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:26:01 executing program 2 (fault-call:10 fault-nth:29): r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="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", 0xfc}], 0x1, 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r2 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) ioctl$sock_ipx_SIOCAIPXPRISLT(r2, 0x89e1, &(0x7f0000000280)=0x3f) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f0000000200)={0x80, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23}, 0x0, 0x7, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000300)={r3, 0x1c9}, 0x8) r4 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e44ee") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x40, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000c40)={r3, 0x2}, &(0x7f0000000c80)=0xffffffffffffff39) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000540)=0x2, 0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000340)) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000d40)={0x7433, {{0x2, 0x4e21, @broadcast=0xffffffff}}, 0x1, 0x1, [{{0x2, 0x4e20}}]}, 0x110) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f, r3}, 0x20) 2018/03/31 12:26:01 executing program 1: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:26:01 executing program 5: socket$inet6(0xa, 0x6, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) [ 871.510714] FAULT_INJECTION: forcing a failure. [ 871.510714] name failslab, interval 1, probability 0, space 0, times 0 [ 871.522140] CPU: 1 PID: 22637 Comm: syz-executor2 Not tainted 4.16.0-rc7+ #373 [ 871.529512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 871.538864] Call Trace: [ 871.541458] dump_stack+0x194/0x24d [ 871.545080] ? arch_local_irq_restore+0x53/0x53 [ 871.549748] should_fail+0x8c0/0xa40 [ 871.553470] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 871.558566] ? trace_event_raw_event_lock+0x340/0x340 [ 871.563768] ? trace_hardirqs_off+0x10/0x10 [ 871.568095] ? lock_downgrade+0x980/0x980 [ 871.572237] ? trace_hardirqs_off+0x10/0x10 [ 871.576556] ? find_held_lock+0x35/0x1d0 [ 871.580624] ? __lock_is_held+0xb6/0x140 [ 871.584685] ? check_same_owner+0x320/0x320 [ 871.589004] ? rcu_note_context_switch+0x710/0x710 [ 871.593937] ? rcu_note_context_switch+0x710/0x710 [ 871.598878] should_failslab+0xec/0x120 [ 871.602858] __kmalloc+0x63/0x760 [ 871.606412] ? __kmalloc_node+0x47/0x70 [ 871.610386] ? __list_lru_init+0xcf/0x750 [ 871.614525] __list_lru_init+0xcf/0x750 [ 871.618500] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 871.624378] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 871.629392] ? lockdep_init_map+0x9/0x10 [ 871.633443] sget_userns+0x6b1/0xe40 [ 871.637145] ? set_anon_super+0x20/0x20 [ 871.641121] ? put_filp+0x90/0x90 [ 871.644580] ? destroy_unused_super.part.6+0xd0/0xd0 [ 871.649684] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 871.654702] ? perf_trace_lock+0xd6/0x900 2018/03/31 12:26:02 executing program 7: socket$inet6(0xa, 0x6, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000943ffc)=0xa35) read(r1, &(0x7f00003fefff)=""/1, 0x1) r2 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r3, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r3, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r4}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)) r5 = dup2(r3, r4) fcntl$setown(r5, 0x8, r2) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r2, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0xe6, 0x2, {0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, 0xb64, 0x9, 0x9b, 0x5, 0xffff}}, &(0x7f0000000580)=0xb0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) [ 871.658858] ? save_stack+0xa3/0xd0 [ 871.662500] ? kasan_slab_alloc+0x12/0x20 [ 871.666643] ? alloc_pid+0xc1/0xa00 [ 871.670275] ? __radix_tree_replace+0x1af/0x310 [ 871.674935] ? radix_tree_delete+0x30/0x30 [ 871.679251] ? node_tag_clear+0xf2/0x180 [ 871.683308] ? proc_get_inode+0x620/0x620 [ 871.687436] mount_ns+0x6d/0x190 [ 871.690792] proc_mount+0x7a/0x90 [ 871.694233] mount_fs+0x66/0x2d0 [ 871.697589] vfs_kern_mount.part.26+0xc6/0x4a0 [ 871.702324] ? may_umount+0xa0/0xa0 [ 871.705939] ? idr_alloc_cyclic+0x1d6/0x320 [ 871.710257] ? do_raw_spin_trylock+0x190/0x190 [ 871.714837] ? idr_alloc+0x180/0x180 [ 871.718541] kern_mount_data+0x50/0xb0 [ 871.722423] pid_ns_prepare_proc+0x1e/0x80 [ 871.726646] alloc_pid+0x87e/0xa00 [ 871.730175] ? __change_pid+0x400/0x400 [ 871.734135] ? ns_capable_common+0xcf/0x160 [ 871.738458] ? memset+0x31/0x40 [ 871.741729] ? copy_thread_tls+0x268/0x8f0 [ 871.745956] copy_process.part.38+0x2516/0x4bd0 [ 871.750622] ? __cleanup_sighand+0x40/0x40 [ 871.754855] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 871.760044] ? __lock_acquire+0x664/0x3e00 [ 871.764276] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 871.769470] ? perf_trace_lock+0xd6/0x900 [ 871.773623] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 871.778801] ? perf_trace_lock+0xd6/0x900 [ 871.782946] ? mntput_no_expire+0x130/0xa90 [ 871.787272] ? trace_event_raw_event_lock+0x340/0x340 [ 871.792463] ? perf_trace_lock+0xd6/0x900 [ 871.796622] ? lock_acquire+0x1d5/0x580 [ 871.800594] ? trace_hardirqs_off+0x10/0x10 [ 871.804897] ? perf_trace_lock+0xd6/0x900 [ 871.809038] ? find_held_lock+0x35/0x1d0 [ 871.813097] ? perf_trace_lock+0xd6/0x900 [ 871.817240] ? trace_event_raw_event_lock+0x340/0x340 [ 871.822418] ? _parse_integer+0x140/0x140 [ 871.826554] ? trace_hardirqs_off+0x10/0x10 [ 871.830864] ? get_pid_task+0x93/0x140 [ 871.834735] ? perf_trace_lock+0xd6/0x900 [ 871.838875] ? find_held_lock+0x35/0x1d0 [ 871.842920] ? __f_unlock_pos+0x19/0x20 [ 871.846885] ? lock_downgrade+0x980/0x980 [ 871.851028] ? get_pid_task+0xbc/0x140 [ 871.854988] ? proc_fail_nth_write+0x9b/0x1d0 [ 871.859468] ? map_files_get_link+0x3a0/0x3a0 [ 871.863945] ? handle_mm_fault+0x35b/0xb10 [ 871.868164] _do_fork+0x1f7/0xf70 [ 871.871598] ? fork_idle+0x2d0/0x2d0 [ 871.875297] ? wait_for_completion+0x770/0x770 [ 871.879877] ? retint_kernel+0x10/0x10 [ 871.883760] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 871.888765] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 871.893512] ? retint_kernel+0x10/0x10 [ 871.897384] SyS_clone+0x37/0x50 [ 871.900741] ? sys_vfork+0x30/0x30 [ 871.904270] do_syscall_64+0x281/0x940 [ 871.908137] ? vmalloc_sync_all+0x30/0x30 [ 871.912529] ? _raw_spin_unlock_irq+0x27/0x70 [ 871.917009] ? finish_task_switch+0x1c1/0x7e0 [ 871.921496] ? syscall_return_slowpath+0x550/0x550 [ 871.926406] ? syscall_return_slowpath+0x2ac/0x550 [ 871.931320] ? prepare_exit_to_usermode+0x350/0x350 [ 871.936329] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 871.941681] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 871.946519] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 871.951715] RIP: 0033:0x454e79 [ 871.954889] RSP: 002b:00007f935ae4bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 2018/03/31 12:26:02 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x0, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) [ 871.962583] RAX: ffffffffffffffda RBX: 00007f935ae4c6d4 RCX: 0000000000454e79 [ 871.969848] RDX: 00000000200008c0 RSI: 0000000020000800 RDI: 000000002000c100 [ 871.977110] RBP: 000000000072bea0 R08: 0000000020000940 R09: 0000000000000000 [ 871.984376] R10: 0000000020000900 R11: 0000000000000246 R12: 0000000000000014 [ 871.991637] R13: 0000000000000051 R14: 00000000006f2838 R15: 000000000000001d 2018/03/31 12:26:02 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x0, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:26:02 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x80, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000080)=0x4, 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f00000000c0)={0xfff, 0x9, 0x401, 'queue0\x00', 0x6}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0xfffffd74}], 0x1) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x7, 0x8000, 0x1000, 0x7d0, 0x0, 0xffffffff00000000, 0x0, 0x5, 0x9, 0x6, 0x1, 0x81, 0x5, 0x10000, 0x1, 0x7, 0xffffffffffffffff, 0xeda, 0x5, 0x0, 0x91, 0x10001, 0xffffffffffff0001, 0xc384, 0x8, 0xffffffffffffffe0, 0x0, 0x4, 0xffff, 0x80, 0x7, 0x2, 0x1, 0x0, 0x30, 0x3, 0x0, 0x7, 0x4, @perf_config_ext={0xfffffffffffff0f9, 0x8}, 0x20403, 0xcae, 0x9, 0x7, 0x0, 0x0, 0x7}, r1, 0x0, r0, 0x2) 2018/03/31 12:26:02 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x0, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:26:02 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x0, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:26:02 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x0, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) [ 872.260588] IPVS: ftp: loaded support on port[0] = 21 2018/03/31 12:26:02 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x0, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:26:02 executing program 2 (fault-call:10 fault-nth:30): r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="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", 0xfc}], 0x1, 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r2 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) ioctl$sock_ipx_SIOCAIPXPRISLT(r2, 0x89e1, &(0x7f0000000280)=0x3f) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f0000000200)={0x80, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23}, 0x0, 0x7, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000300)={r3, 0x1c9}, 0x8) r4 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e44ee") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x40, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000c40)={r3, 0x2}, &(0x7f0000000c80)=0xffffffffffffff39) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000540)=0x2, 0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000340)) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000d40)={0x7433, {{0x2, 0x4e21, @broadcast=0xffffffff}}, 0x1, 0x1, [{{0x2, 0x4e20}}]}, 0x110) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f, r3}, 0x20) [ 872.366319] FAULT_INJECTION: forcing a failure. [ 872.366319] name failslab, interval 1, probability 0, space 0, times 0 [ 872.377846] CPU: 0 PID: 22683 Comm: syz-executor2 Not tainted 4.16.0-rc7+ #373 [ 872.385289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 872.394635] Call Trace: [ 872.397222] dump_stack+0x194/0x24d [ 872.400842] ? arch_local_irq_restore+0x53/0x53 [ 872.405514] should_fail+0x8c0/0xa40 [ 872.409228] ? is_bpf_text_address+0xa4/0x120 [ 872.413713] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 872.418812] ? __kernel_text_address+0xd/0x40 [ 872.423320] ? unwind_get_return_address+0x61/0xa0 [ 872.428250] ? find_held_lock+0x35/0x1d0 [ 872.432302] ? __lock_is_held+0xb6/0x140 [ 872.436366] ? check_same_owner+0x320/0x320 [ 872.440691] ? rcu_note_context_switch+0x710/0x710 [ 872.445633] should_failslab+0xec/0x120 [ 872.449605] kmem_cache_alloc_trace+0x4b/0x740 [ 872.454187] ? __kmalloc_node+0x33/0x70 [ 872.458167] ? __kmalloc_node+0x33/0x70 [ 872.462232] ? rcu_read_lock_sched_held+0x108/0x120 [ 872.467240] __memcg_init_list_lru_node+0x169/0x270 [ 872.472240] ? list_lru_add+0x7c0/0x7c0 [ 872.476197] ? __kmalloc_node+0x47/0x70 [ 872.480167] __list_lru_init+0x544/0x750 [ 872.484235] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 872.490119] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 872.495119] ? lockdep_init_map+0x9/0x10 [ 872.499209] sget_userns+0x6b1/0xe40 [ 872.502917] ? set_anon_super+0x20/0x20 [ 872.506895] ? put_filp+0x90/0x90 [ 872.510350] ? destroy_unused_super.part.6+0xd0/0xd0 [ 872.515461] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 872.520483] ? save_stack+0xa3/0xd0 [ 872.524111] ? save_stack+0x43/0xd0 [ 872.527732] ? kasan_slab_alloc+0x12/0x20 [ 872.531854] ? kmem_cache_alloc+0x12e/0x760 [ 872.536152] ? alloc_pid+0xc1/0xa00 [ 872.539758] ? __radix_tree_replace+0x1af/0x310 [ 872.544961] ? radix_tree_delete+0x30/0x30 [ 872.549177] ? node_tag_clear+0xf2/0x180 [ 872.553222] ? proc_get_inode+0x620/0x620 [ 872.557349] mount_ns+0x6d/0x190 [ 872.560695] proc_mount+0x7a/0x90 [ 872.564128] mount_fs+0x66/0x2d0 [ 872.567479] vfs_kern_mount.part.26+0xc6/0x4a0 [ 872.572052] ? may_umount+0xa0/0xa0 [ 872.575668] ? idr_alloc_cyclic+0x1d6/0x320 [ 872.579968] ? do_raw_spin_trylock+0x190/0x190 [ 872.584536] ? idr_alloc+0x180/0x180 [ 872.588235] kern_mount_data+0x50/0xb0 [ 872.592105] pid_ns_prepare_proc+0x1e/0x80 [ 872.596324] alloc_pid+0x87e/0xa00 [ 872.599851] ? __change_pid+0x400/0x400 [ 872.603805] ? ns_capable_common+0xcf/0x160 [ 872.608113] ? memset+0x31/0x40 [ 872.611390] ? copy_thread_tls+0x268/0x8f0 [ 872.615601] copy_process.part.38+0x2516/0x4bd0 [ 872.620252] ? __cleanup_sighand+0x40/0x40 [ 872.624470] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 872.629648] ? __lock_acquire+0x664/0x3e00 [ 872.633883] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 872.639053] ? environ_open+0x80/0x80 [ 872.642851] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 872.648034] ? __lock_acquire+0x664/0x3e00 [ 872.652261] ? mntput_no_expire+0x130/0xa90 [ 872.656568] ? print_irqtrace_events+0x270/0x270 [ 872.661300] ? trace_hardirqs_off+0x10/0x10 [ 872.665619] ? lock_acquire+0x1d5/0x580 [ 872.669580] ? trace_hardirqs_off+0x10/0x10 [ 872.673879] ? trace_hardirqs_off+0x10/0x10 [ 872.678180] ? __lock_acquire+0x664/0x3e00 [ 872.682391] ? check_same_owner+0x320/0x320 [ 872.686702] ? find_held_lock+0x35/0x1d0 [ 872.690766] ? _parse_integer+0xe9/0x140 [ 872.694817] ? trace_hardirqs_off+0x10/0x10 [ 872.699126] ? _parse_integer+0x140/0x140 [ 872.703258] ? trace_hardirqs_off+0x10/0x10 [ 872.707587] ? get_pid_task+0x93/0x140 [ 872.711458] ? lock_downgrade+0x980/0x980 [ 872.715592] ? find_held_lock+0x35/0x1d0 [ 872.719647] ? __f_unlock_pos+0x19/0x20 [ 872.723607] ? lock_downgrade+0x980/0x980 [ 872.727742] ? get_pid_task+0xbc/0x140 [ 872.731628] ? proc_fail_nth_write+0x9b/0x1d0 [ 872.736107] ? map_files_get_link+0x3a0/0x3a0 [ 872.740599] ? handle_mm_fault+0x35b/0xb10 [ 872.744823] _do_fork+0x1f7/0xf70 [ 872.748260] ? fork_idle+0x2d0/0x2d0 [ 872.751954] ? wait_for_completion+0x770/0x770 [ 872.756535] ? __lock_is_held+0xb6/0x140 [ 872.760609] ? __sb_end_write+0xa0/0xd0 [ 872.764584] ? fput+0xd2/0x140 2018/03/31 12:26:03 executing program 7: socket$inet6(0xa, 0x6, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000943ffc)) read(r1, &(0x7f00003fefff)=""/1, 0x1) r2 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r3, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r3, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r4}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)) r5 = dup2(r3, r4) fcntl$setown(r5, 0x8, r2) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r2, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0xe6, 0x2, {0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, 0xb64, 0x9, 0x9b, 0x5, 0xffff}}, &(0x7f0000000580)=0xb0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) [ 872.767778] ? SyS_write+0x184/0x220 [ 872.771487] ? SyS_read+0x220/0x220 [ 872.775102] SyS_clone+0x37/0x50 [ 872.778467] ? sys_vfork+0x30/0x30 [ 872.782010] do_syscall_64+0x281/0x940 [ 872.785891] ? vmalloc_sync_all+0x30/0x30 [ 872.790031] ? _raw_spin_unlock_irq+0x27/0x70 [ 872.794522] ? finish_task_switch+0x1c1/0x7e0 [ 872.799020] ? syscall_return_slowpath+0x550/0x550 [ 872.803948] ? syscall_return_slowpath+0x2ac/0x550 [ 872.808873] ? prepare_exit_to_usermode+0x350/0x350 [ 872.813891] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 872.819260] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 872.824119] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 872.829303] RIP: 0033:0x454e79 [ 872.832480] RSP: 002b:00007f935ae4bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 872.840184] RAX: ffffffffffffffda RBX: 00007f935ae4c6d4 RCX: 0000000000454e79 [ 872.847449] RDX: 00000000200008c0 RSI: 0000000020000800 RDI: 000000002000c100 [ 872.854718] RBP: 000000000072bea0 R08: 0000000020000940 R09: 0000000000000000 [ 872.861985] R10: 0000000020000900 R11: 0000000000000246 R12: 0000000000000014 [ 872.869240] R13: 0000000000000051 R14: 00000000006f2838 R15: 000000000000001e 2018/03/31 12:26:04 executing program 6: socket$inet6(0xa, 0x6, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000943ffc)=0xa35) read(r1, &(0x7f00003fefff)=""/1, 0x1) r2 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r3, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r3, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r4}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)) r5 = dup2(r3, r4) fcntl$setown(r5, 0x8, r2) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r2, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0xe6, 0x2, {0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, 0xb64, 0x9, 0x9b, 0x5, 0xffff}}, &(0x7f0000000580)=0xb0) 2018/03/31 12:26:04 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x80, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000080)=0x4, 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f00000000c0)={0xfff, 0x9, 0x401, 'queue0\x00', 0x6}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0xfffffd74}], 0x1) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x7, 0x8000, 0x1000, 0x7d0, 0x0, 0xffffffff00000000, 0x0, 0x5, 0x9, 0x6, 0x1, 0x81, 0x5, 0x10000, 0x1, 0x7, 0xffffffffffffffff, 0xeda, 0x5, 0x0, 0x91, 0x10001, 0xffffffffffff0001, 0xc384, 0x8, 0xffffffffffffffe0, 0x0, 0x4, 0xffff, 0x80, 0x7, 0x2, 0x1, 0x0, 0x30, 0x3, 0x0, 0x7, 0x4, @perf_config_ext={0xfffffffffffff0f9, 0x8}, 0x20403, 0xcae, 0x9, 0x7, 0x0, 0x0, 0x7}, r1, 0x0, r0, 0x2) 2018/03/31 12:26:04 executing program 5: socket$inet6(0xa, 0x6, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:26:04 executing program 1: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:26:04 executing program 7: socket$inet6(0xa, 0x6, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000943ffc)) read(r1, &(0x7f00003fefff)=""/1, 0x1) r2 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r3, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r3, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r4}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)) r5 = dup2(r3, r4) fcntl$setown(r5, 0x8, r2) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r2, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0xe6, 0x2, {0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, 0xb64, 0x9, 0x9b, 0x5, 0xffff}}, &(0x7f0000000580)=0xb0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:26:04 executing program 2 (fault-call:10 fault-nth:31): r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="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", 0xfc}], 0x1, 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r2 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) ioctl$sock_ipx_SIOCAIPXPRISLT(r2, 0x89e1, &(0x7f0000000280)=0x3f) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f0000000200)={0x80, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23}, 0x0, 0x7, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000300)={r3, 0x1c9}, 0x8) r4 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e44ee") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x40, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000c40)={r3, 0x2}, &(0x7f0000000c80)=0xffffffffffffff39) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000540)=0x2, 0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000340)) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000d40)={0x7433, {{0x2, 0x4e21, @broadcast=0xffffffff}}, 0x1, 0x1, [{{0x2, 0x4e20}}]}, 0x110) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f, r3}, 0x20) 2018/03/31 12:26:04 executing program 4: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:26:04 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x0, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) [ 873.916311] FAULT_INJECTION: forcing a failure. [ 873.916311] name failslab, interval 1, probability 0, space 0, times 0 [ 873.927688] CPU: 1 PID: 22716 Comm: syz-executor2 Not tainted 4.16.0-rc7+ #373 [ 873.935069] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 873.944435] Call Trace: [ 873.947034] dump_stack+0x194/0x24d [ 873.950656] ? arch_local_irq_restore+0x53/0x53 [ 873.955333] should_fail+0x8c0/0xa40 [ 873.959083] ? is_bpf_text_address+0xa4/0x120 [ 873.963566] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 873.968652] ? __kernel_text_address+0xd/0x40 [ 873.973135] ? unwind_get_return_address+0x61/0xa0 [ 873.978065] ? find_held_lock+0x35/0x1d0 [ 873.982111] ? __lock_is_held+0xb6/0x140 [ 873.986162] ? check_same_owner+0x320/0x320 [ 873.990469] ? rcu_note_context_switch+0x710/0x710 [ 873.995397] should_failslab+0xec/0x120 [ 873.999357] kmem_cache_alloc_trace+0x4b/0x740 [ 874.003921] ? __kmalloc_node+0x33/0x70 [ 874.007886] ? __kmalloc_node+0x33/0x70 [ 874.011888] ? rcu_read_lock_sched_held+0x108/0x120 [ 874.016895] __memcg_init_list_lru_node+0x169/0x270 [ 874.021901] ? list_lru_add+0x7c0/0x7c0 [ 874.025863] ? __kmalloc_node+0x47/0x70 [ 874.029827] __list_lru_init+0x544/0x750 [ 874.033880] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 874.039851] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 874.044858] ? lockdep_init_map+0x9/0x10 [ 874.048910] sget_userns+0x6b1/0xe40 [ 874.052611] ? set_anon_super+0x20/0x20 [ 874.056836] ? put_filp+0x90/0x90 [ 874.060371] ? destroy_unused_super.part.6+0xd0/0xd0 [ 874.065467] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 874.070475] ? save_stack+0xa3/0xd0 [ 874.074095] ? save_stack+0x43/0xd0 [ 874.077705] ? kasan_slab_alloc+0x12/0x20 [ 874.082187] ? kmem_cache_alloc+0x12e/0x760 [ 874.086491] ? alloc_pid+0xc1/0xa00 [ 874.090107] ? __radix_tree_replace+0x1af/0x310 [ 874.094764] ? radix_tree_delete+0x30/0x30 [ 874.099006] ? node_tag_clear+0xf2/0x180 [ 874.103067] ? proc_get_inode+0x620/0x620 [ 874.107202] mount_ns+0x6d/0x190 [ 874.110557] proc_mount+0x7a/0x90 [ 874.113997] mount_fs+0x66/0x2d0 [ 874.117397] vfs_kern_mount.part.26+0xc6/0x4a0 [ 874.121974] ? may_umount+0xa0/0xa0 [ 874.125583] ? retint_kernel+0x10/0x10 [ 874.129464] kern_mount_data+0x50/0xb0 [ 874.133336] pid_ns_prepare_proc+0x1e/0x80 [ 874.137556] alloc_pid+0x87e/0xa00 [ 874.141083] ? __change_pid+0x400/0x400 [ 874.145041] ? ns_capable_common+0xcf/0x160 [ 874.149355] ? memset+0x31/0x40 [ 874.152622] ? copy_thread_tls+0x268/0x8f0 [ 874.156846] copy_process.part.38+0x2516/0x4bd0 [ 874.161508] ? __cleanup_sighand+0x40/0x40 [ 874.165739] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 874.170924] ? __lock_acquire+0x664/0x3e00 [ 874.175146] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 874.180321] ? environ_open+0x80/0x80 [ 874.184120] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 874.189293] ? __lock_acquire+0x664/0x3e00 [ 874.193515] ? mntput_no_expire+0x130/0xa90 [ 874.197826] ? print_irqtrace_events+0x270/0x270 [ 874.202565] ? trace_hardirqs_off+0x10/0x10 [ 874.206877] ? lock_acquire+0x1d5/0x580 [ 874.210835] ? trace_hardirqs_off+0x10/0x10 [ 874.215149] ? trace_hardirqs_off+0x10/0x10 [ 874.219456] ? __lock_acquire+0x664/0x3e00 [ 874.223669] ? check_same_owner+0x320/0x320 [ 874.227975] ? find_held_lock+0x35/0x1d0 [ 874.232034] ? _parse_integer+0xe9/0x140 [ 874.236080] ? trace_hardirqs_off+0x10/0x10 [ 874.240383] ? _parse_integer+0x140/0x140 [ 874.244519] ? trace_hardirqs_off+0x10/0x10 [ 874.248826] ? get_pid_task+0x93/0x140 [ 874.252696] ? lock_downgrade+0x980/0x980 [ 874.256828] ? find_held_lock+0x35/0x1d0 [ 874.260881] ? __f_unlock_pos+0x19/0x20 [ 874.264840] ? lock_downgrade+0x980/0x980 [ 874.268971] ? get_pid_task+0xbc/0x140 [ 874.272843] ? proc_fail_nth_write+0x9b/0x1d0 [ 874.277319] ? map_files_get_link+0x3a0/0x3a0 [ 874.281798] ? handle_mm_fault+0x35b/0xb10 [ 874.286025] _do_fork+0x1f7/0xf70 [ 874.289468] ? fork_idle+0x2d0/0x2d0 [ 874.293165] ? wait_for_completion+0x770/0x770 [ 874.297733] ? __lock_is_held+0xb6/0x140 [ 874.301787] ? __sb_end_write+0xa0/0xd0 [ 874.305745] ? fput+0xd2/0x140 [ 874.308925] ? SyS_write+0x184/0x220 [ 874.312623] ? SyS_read+0x220/0x220 [ 874.316240] SyS_clone+0x37/0x50 [ 874.319590] ? sys_vfork+0x30/0x30 [ 874.323117] do_syscall_64+0x281/0x940 [ 874.326985] ? vmalloc_sync_all+0x30/0x30 [ 874.331115] ? _raw_spin_unlock_irq+0x27/0x70 [ 874.335590] ? finish_task_switch+0x1c1/0x7e0 [ 874.340065] ? syscall_return_slowpath+0x550/0x550 [ 874.344972] ? syscall_return_slowpath+0x2ac/0x550 [ 874.349880] ? prepare_exit_to_usermode+0x350/0x350 [ 874.354885] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 874.360232] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 874.365061] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 874.370235] RIP: 0033:0x454e79 [ 874.373404] RSP: 002b:00007f935ae4bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 874.381833] RAX: ffffffffffffffda RBX: 00007f935ae4c6d4 RCX: 0000000000454e79 [ 874.389187] RDX: 00000000200008c0 RSI: 0000000020000800 RDI: 000000002000c100 [ 874.396441] RBP: 000000000072bea0 R08: 0000000020000940 R09: 0000000000000000 [ 874.403693] R10: 0000000020000900 R11: 0000000000000246 R12: 0000000000000014 [ 874.410955] R13: 0000000000000051 R14: 00000000006f2838 R15: 000000000000001f 2018/03/31 12:26:04 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x0, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) [ 874.439099] IPVS: ftp: loaded support on port[0] = 21 2018/03/31 12:26:04 executing program 2 (fault-call:10 fault-nth:32): r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="84d5aef1603cb020c5b219faa757913ec85ee74a155e1d635566777b78600bc65bf01ce33de9a6bc3a2041890df0926f2cfc2a7d63690f6b55610593773041755f61b034e3a62a770855b2c0481df219efbfa8ffd0c665434a1de026bcfb654d597ef77a7b231aa9efe45c53811c7591d56f69e9c6231e6da993bbd2a6133805be0c18ba114cfe865e693024a56c3331b93c03e25927a504d27acebf7eecd33d7c69359e3ca37dc546c4fc5bc62596a94cdc00f9b973616a9d2ebad2d9b3e60261ae73b8397694e1f0851475b4236fb47989e6bfd1ad926a01523df3f689dc2603a76b5fc5e023d5449d066d424d1001fee5d653c21fdb751e95ff2b", 0xfc}], 0x1, 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r2 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) ioctl$sock_ipx_SIOCAIPXPRISLT(r2, 0x89e1, &(0x7f0000000280)=0x3f) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f0000000200)={0x80, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23}, 0x0, 0x7, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000300)={r3, 0x1c9}, 0x8) r4 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e44ee") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x40, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000c40)={r3, 0x2}, &(0x7f0000000c80)=0xffffffffffffff39) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000540)=0x2, 0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000340)) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000d40)={0x7433, {{0x2, 0x4e21, @broadcast=0xffffffff}}, 0x1, 0x1, [{{0x2, 0x4e20}}]}, 0x110) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f, r3}, 0x20) [ 874.526380] FAULT_INJECTION: forcing a failure. [ 874.526380] name failslab, interval 1, probability 0, space 0, times 0 [ 874.537730] CPU: 1 PID: 22735 Comm: syz-executor2 Not tainted 4.16.0-rc7+ #373 [ 874.545092] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 874.554449] Call Trace: [ 874.557045] dump_stack+0x194/0x24d [ 874.560672] ? arch_local_irq_restore+0x53/0x53 [ 874.565339] ? __save_stack_trace+0x7e/0xd0 [ 874.569679] should_fail+0x8c0/0xa40 [ 874.573406] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 874.578523] ? kasan_kmalloc+0xad/0xe0 [ 874.582400] ? kmem_cache_alloc_trace+0x136/0x740 [ 874.587239] ? __memcg_init_list_lru_node+0x169/0x270 [ 874.592423] ? __list_lru_init+0x544/0x750 [ 874.596641] ? sget_userns+0x6b1/0xe40 [ 874.600523] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 874.605274] ? kern_mount_data+0x50/0xb0 [ 874.609330] ? pid_ns_prepare_proc+0x1e/0x80 [ 874.613742] ? alloc_pid+0x87e/0xa00 [ 874.617445] ? copy_process.part.38+0x2516/0x4bd0 [ 874.622272] ? _do_fork+0x1f7/0xf70 [ 874.625891] ? SyS_clone+0x37/0x50 [ 874.629441] ? find_held_lock+0x35/0x1d0 [ 874.633507] ? __lock_is_held+0xb6/0x140 [ 874.637568] ? check_same_owner+0x320/0x320 [ 874.641885] ? rcu_note_context_switch+0x710/0x710 [ 874.646810] should_failslab+0xec/0x120 [ 874.650774] kmem_cache_alloc_trace+0x4b/0x740 [ 874.655344] ? __kmalloc_node+0x33/0x70 [ 874.659303] ? __kmalloc_node+0x33/0x70 [ 874.663259] ? rcu_read_lock_sched_held+0x108/0x120 [ 874.668258] __memcg_init_list_lru_node+0x169/0x270 [ 874.673267] ? list_lru_add+0x7c0/0x7c0 [ 874.677235] ? __kmalloc_node+0x47/0x70 [ 874.681210] __list_lru_init+0x544/0x750 [ 874.685267] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 874.691154] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 874.696179] ? lockdep_init_map+0x9/0x10 [ 874.700239] sget_userns+0x6b1/0xe40 [ 874.703949] ? set_anon_super+0x20/0x20 [ 874.707947] ? put_filp+0x90/0x90 [ 874.707959] ? destroy_unused_super.part.6+0xd0/0xd0 [ 874.716503] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 874.721516] ? perf_trace_lock+0xd6/0x900 [ 874.725672] ? save_stack+0xa3/0xd0 [ 874.729298] ? kasan_slab_alloc+0x12/0x20 [ 874.733440] ? alloc_pid+0xc1/0xa00 [ 874.737066] ? __radix_tree_replace+0x1af/0x310 [ 874.741734] ? radix_tree_delete+0x30/0x30 [ 874.745959] ? node_tag_clear+0xf2/0x180 [ 874.750013] ? proc_get_inode+0x620/0x620 [ 874.754154] mount_ns+0x6d/0x190 [ 874.757507] proc_mount+0x7a/0x90 [ 874.760952] mount_fs+0x66/0x2d0 [ 874.764366] vfs_kern_mount.part.26+0xc6/0x4a0 [ 874.768942] ? may_umount+0xa0/0xa0 [ 874.772553] ? idr_alloc_cyclic+0x1d6/0x320 [ 874.776862] ? do_raw_spin_trylock+0x190/0x190 [ 874.781429] ? idr_alloc+0x180/0x180 [ 874.785130] kern_mount_data+0x50/0xb0 [ 874.789008] pid_ns_prepare_proc+0x1e/0x80 [ 874.793242] alloc_pid+0x87e/0xa00 [ 874.796792] ? __change_pid+0x400/0x400 [ 874.800761] ? ns_capable_common+0xcf/0x160 [ 874.805086] ? memset+0x31/0x40 [ 874.808392] ? copy_thread_tls+0x268/0x8f0 [ 874.812629] copy_process.part.38+0x2516/0x4bd0 [ 874.817303] ? __cleanup_sighand+0x40/0x40 [ 874.821553] ? debug_check_no_locks_freed+0x3c0/0x3c0 2018/03/31 12:26:05 executing program 1: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) [ 874.826749] ? __lock_acquire+0x664/0x3e00 [ 874.830979] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 874.836164] ? perf_trace_lock+0xd6/0x900 [ 874.840325] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 874.845515] ? perf_trace_lock+0xd6/0x900 [ 874.849657] ? mntput_no_expire+0x130/0xa90 [ 874.853965] ? trace_event_raw_event_lock+0x340/0x340 [ 874.859139] ? perf_trace_lock+0xd6/0x900 [ 874.863285] ? lock_acquire+0x1d5/0x580 [ 874.867257] ? trace_hardirqs_off+0x10/0x10 [ 874.871570] ? perf_trace_lock+0xd6/0x900 [ 874.875722] ? find_held_lock+0x35/0x1d0 [ 874.879778] ? perf_trace_lock+0xd6/0x900 [ 874.883918] ? trace_event_raw_event_lock+0x340/0x340 [ 874.889099] ? _parse_integer+0x140/0x140 [ 874.893250] ? trace_hardirqs_off+0x10/0x10 [ 874.897567] ? get_pid_task+0x93/0x140 [ 874.901451] ? perf_trace_lock+0xd6/0x900 [ 874.905579] ? find_held_lock+0x35/0x1d0 [ 874.909719] ? __f_unlock_pos+0x19/0x20 [ 874.913956] ? lock_downgrade+0x980/0x980 [ 874.918097] ? get_pid_task+0xbc/0x140 [ 874.921983] ? proc_fail_nth_write+0x9b/0x1d0 [ 874.926473] ? map_files_get_link+0x3a0/0x3a0 [ 874.930967] ? handle_mm_fault+0x35b/0xb10 [ 874.935224] _do_fork+0x1f7/0xf70 [ 874.938671] ? fork_idle+0x2d0/0x2d0 [ 874.942465] ? wait_for_completion+0x770/0x770 [ 874.947056] ? __sb_end_write+0xa0/0xd0 [ 874.951033] ? fput+0xd2/0x140 [ 874.954215] ? SyS_write+0x184/0x220 [ 874.957911] ? SyS_read+0x220/0x220 [ 874.961528] SyS_clone+0x37/0x50 [ 874.964890] ? sys_vfork+0x30/0x30 [ 874.968419] do_syscall_64+0x281/0x940 [ 874.972289] ? vmalloc_sync_all+0x30/0x30 2018/03/31 12:26:05 executing program 5: openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) [ 874.976433] ? _raw_spin_unlock_irq+0x27/0x70 [ 874.980915] ? finish_task_switch+0x1c1/0x7e0 [ 874.985423] ? syscall_return_slowpath+0x550/0x550 [ 874.990348] ? syscall_return_slowpath+0x2ac/0x550 [ 874.995283] ? prepare_exit_to_usermode+0x350/0x350 [ 875.000316] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 875.005687] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 875.010542] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 875.015730] RIP: 0033:0x454e79 [ 875.018916] RSP: 002b:00007f935ae4bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 2018/03/31 12:26:05 executing program 4: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) 2018/03/31 12:26:05 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:26:05 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x80, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000080)=0x4, 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f00000000c0)={0xfff, 0x9, 0x401, 'queue0\x00', 0x6}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0xfffffd74}], 0x1) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x7, 0x8000, 0x1000, 0x7d0, 0x0, 0xffffffff00000000, 0x0, 0x5, 0x9, 0x6, 0x1, 0x81, 0x5, 0x10000, 0x1, 0x7, 0xffffffffffffffff, 0xeda, 0x5, 0x0, 0x91, 0x10001, 0xffffffffffff0001, 0xc384, 0x8, 0xffffffffffffffe0, 0x0, 0x4, 0xffff, 0x80, 0x7, 0x2, 0x1, 0x0, 0x30, 0x3, 0x0, 0x7, 0x4, @perf_config_ext={0xfffffffffffff0f9, 0x8}, 0x20403, 0xcae, 0x9, 0x7, 0x0, 0xfff}, r1, 0x0, r0, 0x2) [ 875.026622] RAX: ffffffffffffffda RBX: 00007f935ae4c6d4 RCX: 0000000000454e79 [ 875.033895] RDX: 00000000200008c0 RSI: 0000000020000800 RDI: 000000002000c100 [ 875.041198] RBP: 000000000072bea0 R08: 0000000020000940 R09: 0000000000000000 [ 875.048461] R10: 0000000020000900 R11: 0000000000000246 R12: 0000000000000014 [ 875.055734] R13: 0000000000000051 R14: 00000000006f2838 R15: 0000000000000020 2018/03/31 12:26:06 executing program 6: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:26:06 executing program 2 (fault-call:10 fault-nth:33): r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="84d5aef1603cb020c5b219faa757913ec85ee74a155e1d635566777b78600bc65bf01ce33de9a6bc3a2041890df0926f2cfc2a7d63690f6b55610593773041755f61b034e3a62a770855b2c0481df219efbfa8ffd0c665434a1de026bcfb654d597ef77a7b231aa9efe45c53811c7591d56f69e9c6231e6da993bbd2a6133805be0c18ba114cfe865e693024a56c3331b93c03e25927a504d27acebf7eecd33d7c69359e3ca37dc546c4fc5bc62596a94cdc00f9b973616a9d2ebad2d9b3e60261ae73b8397694e1f0851475b4236fb47989e6bfd1ad926a01523df3f689dc2603a76b5fc5e023d5449d066d424d1001fee5d653c21fdb751e95ff2b", 0xfc}], 0x1, 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r2 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) ioctl$sock_ipx_SIOCAIPXPRISLT(r2, 0x89e1, &(0x7f0000000280)=0x3f) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f0000000200)={0x80, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23}, 0x0, 0x7, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000300)={r3, 0x1c9}, 0x8) r4 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e44ee") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x40, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000c40)={r3, 0x2}, &(0x7f0000000c80)=0xffffffffffffff39) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000540)=0x2, 0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000340)) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000d40)={0x7433, {{0x2, 0x4e21, @broadcast=0xffffffff}}, 0x1, 0x1, [{{0x2, 0x4e20}}]}, 0x110) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f, r3}, 0x20) 2018/03/31 12:26:06 executing program 7: socket$inet6(0xa, 0x6, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000943ffc)) read(r1, &(0x7f00003fefff)=""/1, 0x1) r2 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r3, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r3, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r4}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)) r5 = dup2(r3, r4) fcntl$setown(r5, 0x8, r2) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r2, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0xe6, 0x2, {0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, 0xb64, 0x9, 0x9b, 0x5, 0xffff}}, &(0x7f0000000580)=0xb0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:26:06 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:26:06 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x80, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000080)=0x4, 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f00000000c0)={0xfff, 0x9, 0x401, 'queue0\x00', 0x6}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0xfffffd74}], 0x1) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x7, 0x8000, 0x1000, 0x7d0, 0x0, 0xffffffff00000000, 0x0, 0x5, 0x9, 0x6, 0x1, 0x81, 0x5, 0x10000, 0x1, 0x7, 0xffffffffffffffff, 0xeda, 0x5, 0x0, 0x91, 0x10001, 0xffffffffffff0001, 0xc384, 0x8, 0xffffffffffffffe0, 0x0, 0x4, 0xffff, 0x80, 0x7, 0x2, 0x1, 0x0, 0x30, 0x3, 0x0, 0x7, 0x4, @perf_config_ext={0xfffffffffffff0f9, 0x8}, 0x20403, 0xcae, 0x9, 0x7, 0x0, 0xfff}, r1, 0x0, r0, 0x2) 2018/03/31 12:26:06 executing program 5: openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:26:06 executing program 4: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) 2018/03/31 12:26:06 executing program 1: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) [ 876.227182] FAULT_INJECTION: forcing a failure. [ 876.227182] name failslab, interval 1, probability 0, space 0, times 0 [ 876.238529] CPU: 1 PID: 22797 Comm: syz-executor2 Not tainted 4.16.0-rc7+ #373 [ 876.245895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 876.255244] Call Trace: [ 876.257833] dump_stack+0x194/0x24d [ 876.261444] ? arch_local_irq_restore+0x53/0x53 [ 876.266094] ? __save_stack_trace+0x7e/0xd0 [ 876.270399] should_fail+0x8c0/0xa40 [ 876.274092] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 876.279174] ? kasan_kmalloc+0xad/0xe0 [ 876.283039] ? kmem_cache_alloc_trace+0x136/0x740 [ 876.287858] ? __memcg_init_list_lru_node+0x169/0x270 [ 876.293036] ? __list_lru_init+0x544/0x750 [ 876.297250] ? sget_userns+0x6b1/0xe40 [ 876.301128] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 876.305860] ? kern_mount_data+0x50/0xb0 [ 876.309904] ? pid_ns_prepare_proc+0x1e/0x80 [ 876.314289] ? alloc_pid+0x87e/0xa00 [ 876.317980] ? copy_process.part.38+0x2516/0x4bd0 [ 876.322799] ? _do_fork+0x1f7/0xf70 [ 876.326416] ? SyS_clone+0x37/0x50 [ 876.329943] ? find_held_lock+0x35/0x1d0 [ 876.333988] ? __lock_is_held+0xb6/0x140 [ 876.338041] ? check_same_owner+0x320/0x320 [ 876.342347] ? rcu_note_context_switch+0x710/0x710 [ 876.347259] should_failslab+0xec/0x120 [ 876.351216] kmem_cache_alloc_trace+0x4b/0x740 [ 876.355774] ? __kmalloc_node+0x33/0x70 [ 876.359725] ? __kmalloc_node+0x33/0x70 [ 876.363676] ? rcu_read_lock_sched_held+0x108/0x120 [ 876.368673] __memcg_init_list_lru_node+0x169/0x270 [ 876.373668] ? list_lru_add+0x7c0/0x7c0 [ 876.378236] ? __kmalloc_node+0x47/0x70 [ 876.382201] __list_lru_init+0x544/0x750 [ 876.386246] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 876.392128] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 876.397129] ? lockdep_init_map+0x9/0x10 [ 876.401167] sget_userns+0x6b1/0xe40 [ 876.404856] ? set_anon_super+0x20/0x20 [ 876.408813] ? put_filp+0x90/0x90 [ 876.412244] ? destroy_unused_super.part.6+0xd0/0xd0 [ 876.417332] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 876.422333] ? save_stack+0xa3/0xd0 [ 876.425938] ? save_stack+0x43/0xd0 [ 876.429546] ? kasan_slab_alloc+0x12/0x20 [ 876.433670] ? kmem_cache_alloc+0x12e/0x760 [ 876.437970] ? alloc_pid+0xc1/0xa00 [ 876.441575] ? __radix_tree_replace+0x1af/0x310 [ 876.446221] ? radix_tree_delete+0x30/0x30 [ 876.450433] ? node_tag_clear+0xf2/0x180 [ 876.454474] ? proc_get_inode+0x620/0x620 [ 876.458596] mount_ns+0x6d/0x190 [ 876.461942] proc_mount+0x7a/0x90 [ 876.465370] mount_fs+0x66/0x2d0 [ 876.468715] vfs_kern_mount.part.26+0xc6/0x4a0 [ 876.473274] ? may_umount+0xa0/0xa0 [ 876.476876] ? idr_alloc_cyclic+0x1d6/0x320 [ 876.481271] ? do_raw_spin_trylock+0x190/0x190 [ 876.485830] ? idr_alloc+0x180/0x180 [ 876.489525] kern_mount_data+0x50/0xb0 [ 876.493391] pid_ns_prepare_proc+0x1e/0x80 [ 876.497604] alloc_pid+0x87e/0xa00 [ 876.501124] ? __change_pid+0x400/0x400 [ 876.505075] ? ns_capable_common+0xcf/0x160 [ 876.509470] ? memset+0x31/0x40 [ 876.512734] ? copy_thread_tls+0x268/0x8f0 [ 876.516975] copy_process.part.38+0x2516/0x4bd0 [ 876.521628] ? __cleanup_sighand+0x40/0x40 [ 876.526033] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 876.531387] ? __lock_acquire+0x664/0x3e00 [ 876.535614] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 876.541134] ? environ_open+0x80/0x80 [ 876.544939] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 876.550107] ? __lock_acquire+0x664/0x3e00 [ 876.554320] ? mntput_no_expire+0x130/0xa90 [ 876.558620] ? print_irqtrace_events+0x270/0x270 [ 876.563352] ? trace_hardirqs_off+0x10/0x10 [ 876.567652] ? lock_acquire+0x1d5/0x580 [ 876.571603] ? trace_hardirqs_off+0x10/0x10 [ 876.575907] ? trace_hardirqs_off+0x10/0x10 [ 876.580211] ? __lock_acquire+0x664/0x3e00 [ 876.584425] ? check_same_owner+0x320/0x320 [ 876.588732] ? find_held_lock+0x35/0x1d0 [ 876.592780] ? _parse_integer+0xe9/0x140 [ 876.596823] ? trace_hardirqs_off+0x10/0x10 [ 876.601126] ? _parse_integer+0x140/0x140 [ 876.605258] ? trace_hardirqs_off+0x10/0x10 [ 876.609558] ? get_pid_task+0x93/0x140 [ 876.613424] ? lock_downgrade+0x980/0x980 [ 876.617554] ? find_held_lock+0x35/0x1d0 [ 876.621601] ? __f_unlock_pos+0x19/0x20 [ 876.625574] ? lock_downgrade+0x980/0x980 [ 876.629700] ? get_pid_task+0xbc/0x140 [ 876.633569] ? proc_fail_nth_write+0x9b/0x1d0 [ 876.638050] ? map_files_get_link+0x3a0/0x3a0 [ 876.642610] ? handle_mm_fault+0x35b/0xb10 [ 876.646823] _do_fork+0x1f7/0xf70 [ 876.650256] ? fork_idle+0x2d0/0x2d0 [ 876.653954] ? wait_for_completion+0x770/0x770 [ 876.658517] ? __lock_is_held+0xb6/0x140 [ 876.662565] ? __sb_end_write+0xa0/0xd0 [ 876.666516] ? fput+0xd2/0x140 [ 876.669686] ? SyS_write+0x184/0x220 [ 876.673378] ? SyS_read+0x220/0x220 [ 876.676983] SyS_clone+0x37/0x50 [ 876.680323] ? sys_vfork+0x30/0x30 [ 876.683841] do_syscall_64+0x281/0x940 [ 876.687706] ? vmalloc_sync_all+0x30/0x30 [ 876.691827] ? _raw_spin_unlock_irq+0x27/0x70 [ 876.696299] ? finish_task_switch+0x1c1/0x7e0 [ 876.700771] ? syscall_return_slowpath+0x550/0x550 [ 876.705682] ? syscall_return_slowpath+0x2ac/0x550 [ 876.710590] ? prepare_exit_to_usermode+0x350/0x350 [ 876.715759] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 876.721108] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 876.725932] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 876.731099] RIP: 0033:0x454e79 [ 876.734267] RSP: 002b:00007f935ae4bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 876.741954] RAX: ffffffffffffffda RBX: 00007f935ae4c6d4 RCX: 0000000000454e79 [ 876.749201] RDX: 00000000200008c0 RSI: 0000000020000800 RDI: 000000002000c100 [ 876.756445] RBP: 000000000072bea0 R08: 0000000020000940 R09: 0000000000000000 [ 876.763694] R10: 0000000020000900 R11: 0000000000000246 R12: 0000000000000014 [ 876.770947] R13: 0000000000000051 R14: 00000000006f2838 R15: 0000000000000021 2018/03/31 12:26:07 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) [ 876.797489] IPVS: ftp: loaded support on port[0] = 21 2018/03/31 12:26:07 executing program 2 (fault-call:10 fault-nth:34): r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="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", 0xfc}], 0x1, 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r2 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) ioctl$sock_ipx_SIOCAIPXPRISLT(r2, 0x89e1, &(0x7f0000000280)=0x3f) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f0000000200)={0x80, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23}, 0x0, 0x7, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000300)={r3, 0x1c9}, 0x8) r4 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e44ee") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x40, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000c40)={r3, 0x2}, &(0x7f0000000c80)=0xffffffffffffff39) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000540)=0x2, 0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000340)) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000d40)={0x7433, {{0x2, 0x4e21, @broadcast=0xffffffff}}, 0x1, 0x1, [{{0x2, 0x4e20}}]}, 0x110) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f, r3}, 0x20) 2018/03/31 12:26:07 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x0, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:26:07 executing program 4: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) 2018/03/31 12:26:07 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x80, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000080)=0x4, 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f00000000c0)={0xfff, 0x9, 0x401, 'queue0\x00', 0x6}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0xfffffd74}], 0x1) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x7, 0x8000, 0x1000, 0x7d0, 0x0, 0xffffffff00000000, 0x0, 0x5, 0x9, 0x6, 0x1, 0x81, 0x5, 0x10000, 0x1, 0x7, 0xffffffffffffffff, 0xeda, 0x5, 0x0, 0x91, 0x10001, 0xffffffffffff0001, 0xc384, 0x8, 0xffffffffffffffe0, 0x0, 0x4, 0xffff, 0x80, 0x7, 0x2, 0x1, 0x0, 0x30, 0x3, 0x0, 0x7, 0x4, @perf_config_ext={0xfffffffffffff0f9, 0x8}, 0x20403, 0xcae, 0x9, 0x7, 0x0, 0xfff}, r1, 0x0, r0, 0x2) 2018/03/31 12:26:07 executing program 1: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) dup2(r2, r3) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:26:07 executing program 5: openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:26:07 executing program 7: socket$inet6(0xa, 0x6, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000943ffc)=0xa35) read(0xffffffffffffffff, &(0x7f00003fefff)=""/1, 0x1) r2 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r3, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r3, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r4}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)) r5 = dup2(r3, r4) fcntl$setown(r5, 0x8, r2) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r2, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0xe6, 0x2, {0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, 0xb64, 0x9, 0x9b, 0x5, 0xffff}}, &(0x7f0000000580)=0xb0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:26:07 executing program 6: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) [ 877.405132] FAULT_INJECTION: forcing a failure. [ 877.405132] name failslab, interval 1, probability 0, space 0, times 0 [ 877.416478] CPU: 0 PID: 22845 Comm: syz-executor2 Not tainted 4.16.0-rc7+ #373 [ 877.423845] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 877.433299] Call Trace: [ 877.436427] dump_stack+0x194/0x24d [ 877.440054] ? arch_local_irq_restore+0x53/0x53 [ 877.444726] ? __save_stack_trace+0x7e/0xd0 [ 877.449057] should_fail+0x8c0/0xa40 [ 877.452793] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 877.457899] ? kasan_kmalloc+0xad/0xe0 [ 877.461782] ? kmem_cache_alloc_trace+0x136/0x740 [ 877.466624] ? __memcg_init_list_lru_node+0x169/0x270 [ 877.471805] ? __list_lru_init+0x544/0x750 [ 877.476046] ? sget_userns+0x6b1/0xe40 [ 877.479938] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 877.484688] ? kern_mount_data+0x50/0xb0 [ 877.488741] ? pid_ns_prepare_proc+0x1e/0x80 [ 877.493142] ? alloc_pid+0x87e/0xa00 [ 877.496848] ? copy_process.part.38+0x2516/0x4bd0 [ 877.501679] ? _do_fork+0x1f7/0xf70 [ 877.505293] ? SyS_clone+0x37/0x50 [ 877.508831] ? find_held_lock+0x35/0x1d0 [ 877.512892] ? __lock_is_held+0xb6/0x140 [ 877.516965] ? check_same_owner+0x320/0x320 [ 877.521296] ? rcu_note_context_switch+0x710/0x710 [ 877.526271] should_failslab+0xec/0x120 [ 877.530249] kmem_cache_alloc_trace+0x4b/0x740 [ 877.534835] ? __kmalloc_node+0x33/0x70 [ 877.539410] ? __kmalloc_node+0x33/0x70 [ 877.543380] ? rcu_read_lock_sched_held+0x108/0x120 [ 877.548398] __memcg_init_list_lru_node+0x169/0x270 [ 877.553419] ? list_lru_add+0x7c0/0x7c0 [ 877.557387] ? __kmalloc_node+0x47/0x70 [ 877.561359] __list_lru_init+0x544/0x750 [ 877.565417] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 877.571302] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 877.576324] ? lockdep_init_map+0x9/0x10 [ 877.580381] sget_userns+0x6b1/0xe40 [ 877.584089] ? set_anon_super+0x20/0x20 [ 877.588061] ? put_filp+0x90/0x90 [ 877.591505] ? destroy_unused_super.part.6+0xd0/0xd0 [ 877.596599] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 877.601626] ? save_stack+0xa3/0xd0 [ 877.605244] ? save_stack+0x43/0xd0 [ 877.608865] ? kasan_slab_alloc+0x12/0x20 [ 877.613001] ? kmem_cache_alloc+0x12e/0x760 [ 877.617341] ? alloc_pid+0xc1/0xa00 [ 877.621158] ? __radix_tree_replace+0x1af/0x310 [ 877.625823] ? radix_tree_delete+0x30/0x30 [ 877.630052] ? node_tag_clear+0xf2/0x180 [ 877.634131] ? proc_get_inode+0x620/0x620 [ 877.638277] mount_ns+0x6d/0x190 [ 877.641641] proc_mount+0x7a/0x90 [ 877.645087] mount_fs+0x66/0x2d0 [ 877.648453] vfs_kern_mount.part.26+0xc6/0x4a0 [ 877.653032] ? may_umount+0xa0/0xa0 [ 877.656652] ? idr_alloc_cyclic+0x1d6/0x320 [ 877.660967] ? do_raw_spin_trylock+0x190/0x190 [ 877.665537] ? idr_alloc+0x180/0x180 [ 877.669243] kern_mount_data+0x50/0xb0 [ 877.673125] pid_ns_prepare_proc+0x1e/0x80 [ 877.677356] alloc_pid+0x87e/0xa00 [ 877.680892] ? __change_pid+0x400/0x400 [ 877.684855] ? ns_capable_common+0xcf/0x160 [ 877.689179] ? memset+0x31/0x40 [ 877.692452] ? copy_thread_tls+0x268/0x8f0 [ 877.696688] copy_process.part.38+0x2516/0x4bd0 [ 877.701357] ? __cleanup_sighand+0x40/0x40 [ 877.705599] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 877.710873] ? __lock_acquire+0x664/0x3e00 [ 877.715104] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 877.720301] ? environ_open+0x80/0x80 [ 877.724115] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 877.729294] ? __lock_acquire+0x664/0x3e00 [ 877.733531] ? mntput_no_expire+0x130/0xa90 [ 877.737846] ? print_irqtrace_events+0x270/0x270 [ 877.742605] ? trace_hardirqs_off+0x10/0x10 [ 877.746926] ? lock_acquire+0x1d5/0x580 [ 877.750894] ? trace_hardirqs_off+0x10/0x10 [ 877.755211] ? trace_hardirqs_off+0x10/0x10 [ 877.759530] ? __lock_acquire+0x664/0x3e00 [ 877.763757] ? check_same_owner+0x320/0x320 [ 877.768083] ? find_held_lock+0x35/0x1d0 [ 877.772145] ? _parse_integer+0xe9/0x140 [ 877.776203] ? trace_hardirqs_off+0x10/0x10 [ 877.780521] ? _parse_integer+0x140/0x140 [ 877.784663] ? trace_hardirqs_off+0x10/0x10 [ 877.788984] ? get_pid_task+0x93/0x140 [ 877.792864] ? lock_downgrade+0x980/0x980 [ 877.797010] ? find_held_lock+0x35/0x1d0 [ 877.801072] ? __f_unlock_pos+0x19/0x20 [ 877.805037] ? lock_downgrade+0x980/0x980 [ 877.809176] ? get_pid_task+0xbc/0x140 [ 877.813059] ? proc_fail_nth_write+0x9b/0x1d0 [ 877.817544] ? map_files_get_link+0x3a0/0x3a0 [ 877.822037] ? handle_mm_fault+0x35b/0xb10 [ 877.826271] _do_fork+0x1f7/0xf70 [ 877.829722] ? fork_idle+0x2d0/0x2d0 [ 877.833428] ? wait_for_completion+0x770/0x770 [ 877.838005] ? __lock_is_held+0xb6/0x140 [ 877.842069] ? __sb_end_write+0xa0/0xd0 [ 877.846035] ? fput+0xd2/0x140 [ 877.849229] ? SyS_write+0x184/0x220 [ 877.852937] ? SyS_read+0x220/0x220 [ 877.856557] SyS_clone+0x37/0x50 [ 877.859919] ? sys_vfork+0x30/0x30 [ 877.863449] do_syscall_64+0x281/0x940 [ 877.867330] ? vmalloc_sync_all+0x30/0x30 [ 877.871467] ? _raw_spin_unlock_irq+0x27/0x70 [ 877.875951] ? finish_task_switch+0x1c1/0x7e0 [ 877.880440] ? syscall_return_slowpath+0x550/0x550 [ 877.885375] ? syscall_return_slowpath+0x2ac/0x550 [ 877.890300] ? prepare_exit_to_usermode+0x350/0x350 [ 877.895315] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 877.900675] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 877.905522] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 877.911139] RIP: 0033:0x454e79 [ 877.914316] RSP: 002b:00007f935ae4bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 877.922041] RAX: ffffffffffffffda RBX: 00007f935ae4c6d4 RCX: 0000000000454e79 [ 877.929315] RDX: 00000000200008c0 RSI: 0000000020000800 RDI: 000000002000c100 [ 877.936588] RBP: 000000000072bea0 R08: 0000000020000940 R09: 0000000000000000 [ 877.943851] R10: 0000000020000900 R11: 0000000000000246 R12: 0000000000000014 [ 877.951119] R13: 0000000000000051 R14: 00000000006f2838 R15: 0000000000000022 2018/03/31 12:26:08 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x0, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) [ 878.195826] IPVS: ftp: loaded support on port[0] = 21 2018/03/31 12:26:09 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x0, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:26:09 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x80, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000080)=0x4, 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f00000000c0)={0xfff, 0x9, 0x401, 'queue0\x00', 0x6}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0xfffffd74}], 0x1) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x7, 0x8000, 0x1000, 0x7d0, 0x0, 0xffffffff00000000, 0x0, 0x5, 0x9, 0x6, 0x1, 0x81, 0x5, 0x10000, 0x1, 0x7, 0xffffffffffffffff, 0xeda, 0x5, 0x0, 0x91, 0x10001, 0xffffffffffff0001, 0xc384, 0x8, 0xffffffffffffffe0, 0x0, 0x4, 0xffff, 0x80, 0x7, 0x2, 0x1, 0x0, 0x30, 0x3, 0x0, 0x7, 0x4, @perf_config_ext={0xfffffffffffff0f9, 0x8}, 0x20403, 0xcae, 0x9, 0x7, 0x0, 0xfff, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x2) 2018/03/31 12:26:09 executing program 2 (fault-call:10 fault-nth:35): r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="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", 0xfc}], 0x1, 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r2 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) ioctl$sock_ipx_SIOCAIPXPRISLT(r2, 0x89e1, &(0x7f0000000280)=0x3f) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f0000000200)={0x80, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23}, 0x0, 0x7, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000300)={r3, 0x1c9}, 0x8) r4 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e44ee") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x40, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000c40)={r3, 0x2}, &(0x7f0000000c80)=0xffffffffffffff39) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000540)=0x2, 0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000340)) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000d40)={0x7433, {{0x2, 0x4e21, @broadcast=0xffffffff}}, 0x1, 0x1, [{{0x2, 0x4e20}}]}, 0x110) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f, r3}, 0x20) 2018/03/31 12:26:09 executing program 4: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:26:09 executing program 6: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:26:09 executing program 7: socket$inet6(0xa, 0x6, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000943ffc)=0xa35) read(0xffffffffffffffff, &(0x7f00003fefff)=""/1, 0x1) r2 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r3, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r3, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r4}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)) r5 = dup2(r3, r4) fcntl$setown(r5, 0x8, r2) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r2, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0xe6, 0x2, {0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, 0xb64, 0x9, 0x9b, 0x5, 0xffff}}, &(0x7f0000000580)=0xb0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:26:09 executing program 1: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) dup2(r2, r3) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:26:09 executing program 5: socket$inet6(0xa, 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) [ 878.832755] FAULT_INJECTION: forcing a failure. [ 878.832755] name failslab, interval 1, probability 0, space 0, times 0 [ 878.844095] CPU: 0 PID: 22899 Comm: syz-executor2 Not tainted 4.16.0-rc7+ #373 [ 878.851453] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 878.860798] Call Trace: [ 878.863555] dump_stack+0x194/0x24d [ 878.867176] ? arch_local_irq_restore+0x53/0x53 [ 878.871836] ? __save_stack_trace+0x7e/0xd0 [ 878.876154] should_fail+0x8c0/0xa40 [ 878.879859] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 878.884956] ? kasan_kmalloc+0xad/0xe0 [ 878.888831] ? kmem_cache_alloc_trace+0x136/0x740 [ 878.893665] ? __memcg_init_list_lru_node+0x169/0x270 [ 878.898844] ? __list_lru_init+0x544/0x750 [ 878.903073] ? sget_userns+0x6b1/0xe40 [ 878.906969] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 878.911721] ? kern_mount_data+0x50/0xb0 [ 878.915778] ? pid_ns_prepare_proc+0x1e/0x80 [ 878.920178] ? alloc_pid+0x87e/0xa00 [ 878.923885] ? copy_process.part.38+0x2516/0x4bd0 [ 878.928716] ? _do_fork+0x1f7/0xf70 [ 878.932339] ? SyS_clone+0x37/0x50 [ 878.935874] ? find_held_lock+0x35/0x1d0 [ 878.939931] ? __lock_is_held+0xb6/0x140 [ 878.943996] ? check_same_owner+0x320/0x320 [ 878.948755] ? rcu_note_context_switch+0x710/0x710 [ 878.953689] should_failslab+0xec/0x120 [ 878.957658] kmem_cache_alloc_trace+0x4b/0x740 [ 878.962232] ? __kmalloc_node+0x33/0x70 [ 878.966207] __memcg_init_list_lru_node+0x169/0x270 [ 878.971217] ? list_lru_add+0x7c0/0x7c0 [ 878.975184] ? __kmalloc_node+0x47/0x70 [ 878.979157] __list_lru_init+0x544/0x750 [ 878.983217] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 878.989101] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 878.994118] ? lockdep_init_map+0x9/0x10 [ 878.998174] sget_userns+0x6b1/0xe40 [ 879.001878] ? set_anon_super+0x20/0x20 [ 879.005843] ? put_filp+0x90/0x90 [ 879.009287] ? destroy_unused_super.part.6+0xd0/0xd0 [ 879.014383] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 879.019391] ? save_stack+0xa3/0xd0 [ 879.023005] ? save_stack+0x43/0xd0 [ 879.026619] ? kasan_slab_alloc+0x12/0x20 [ 879.030751] ? kmem_cache_alloc+0x12e/0x760 [ 879.035058] ? alloc_pid+0xc1/0xa00 [ 879.038680] ? __radix_tree_replace+0x1af/0x310 [ 879.043335] ? radix_tree_delete+0x30/0x30 [ 879.047560] ? node_tag_clear+0xf2/0x180 [ 879.051625] ? proc_get_inode+0x620/0x620 [ 879.055763] mount_ns+0x6d/0x190 [ 879.059126] proc_mount+0x7a/0x90 [ 879.062577] mount_fs+0x66/0x2d0 [ 879.065941] vfs_kern_mount.part.26+0xc6/0x4a0 [ 879.070517] ? may_umount+0xa0/0xa0 [ 879.074136] ? idr_alloc_cyclic+0x1d6/0x320 [ 879.078451] ? do_raw_spin_trylock+0x190/0x190 [ 879.083022] ? idr_alloc+0x180/0x180 [ 879.086731] kern_mount_data+0x50/0xb0 [ 879.090609] pid_ns_prepare_proc+0x1e/0x80 [ 879.094836] alloc_pid+0x87e/0xa00 [ 879.098368] ? __change_pid+0x400/0x400 [ 879.102329] ? ns_capable_common+0xcf/0x160 [ 879.106646] ? memset+0x31/0x40 [ 879.109917] ? copy_thread_tls+0x268/0x8f0 [ 879.114147] copy_process.part.38+0x2516/0x4bd0 [ 879.118814] ? __cleanup_sighand+0x40/0x40 [ 879.123051] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 879.128235] ? __lock_acquire+0x664/0x3e00 [ 879.132456] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 879.137637] ? environ_open+0x80/0x80 [ 879.141434] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 879.146609] ? __lock_acquire+0x664/0x3e00 [ 879.150835] ? mntput_no_expire+0x130/0xa90 [ 879.155147] ? print_irqtrace_events+0x270/0x270 [ 879.159893] ? trace_hardirqs_off+0x10/0x10 [ 879.164206] ? lock_acquire+0x1d5/0x580 [ 879.168165] ? trace_hardirqs_off+0x10/0x10 [ 879.172473] ? trace_hardirqs_off+0x10/0x10 [ 879.176794] ? __lock_acquire+0x664/0x3e00 [ 879.181024] ? check_same_owner+0x320/0x320 [ 879.185338] ? find_held_lock+0x35/0x1d0 [ 879.189389] ? _parse_integer+0xe9/0x140 [ 879.193436] ? trace_hardirqs_off+0x10/0x10 [ 879.197738] ? _parse_integer+0x140/0x140 [ 879.201870] ? trace_hardirqs_off+0x10/0x10 [ 879.206177] ? get_pid_task+0x93/0x140 [ 879.210045] ? lock_downgrade+0x980/0x980 [ 879.214177] ? find_held_lock+0x35/0x1d0 [ 879.218232] ? __f_unlock_pos+0x19/0x20 [ 879.222187] ? lock_downgrade+0x980/0x980 [ 879.226320] ? get_pid_task+0xbc/0x140 [ 879.230194] ? proc_fail_nth_write+0x9b/0x1d0 [ 879.234675] ? map_files_get_link+0x3a0/0x3a0 [ 879.239156] ? handle_mm_fault+0x35b/0xb10 [ 879.243394] _do_fork+0x1f7/0xf70 [ 879.246832] ? fork_idle+0x2d0/0x2d0 [ 879.250538] ? wait_for_completion+0x770/0x770 [ 879.255105] ? __lock_is_held+0xb6/0x140 [ 879.259156] ? __sb_end_write+0xa0/0xd0 [ 879.263112] ? fput+0xd2/0x140 [ 879.266313] ? SyS_write+0x184/0x220 [ 879.270028] ? SyS_read+0x220/0x220 [ 879.273636] SyS_clone+0x37/0x50 [ 879.276979] ? sys_vfork+0x30/0x30 [ 879.280500] do_syscall_64+0x281/0x940 [ 879.284371] ? vmalloc_sync_all+0x30/0x30 [ 879.288501] ? _raw_spin_unlock_irq+0x27/0x70 [ 879.292978] ? finish_task_switch+0x1c1/0x7e0 [ 879.297457] ? syscall_return_slowpath+0x550/0x550 [ 879.302376] ? syscall_return_slowpath+0x2ac/0x550 [ 879.307289] ? prepare_exit_to_usermode+0x350/0x350 [ 879.312292] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 879.317642] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 879.322475] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 879.327645] RIP: 0033:0x454e79 [ 879.330812] RSP: 002b:00007f935ae4bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 879.338505] RAX: ffffffffffffffda RBX: 00007f935ae4c6d4 RCX: 0000000000454e79 [ 879.345754] RDX: 00000000200008c0 RSI: 0000000020000800 RDI: 000000002000c100 [ 879.353014] RBP: 000000000072bea0 R08: 0000000020000940 R09: 0000000000000000 [ 879.360264] R10: 0000000020000900 R11: 0000000000000246 R12: 0000000000000014 [ 879.367522] R13: 0000000000000051 R14: 00000000006f2838 R15: 0000000000000023 2018/03/31 12:26:09 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x0, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:26:09 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x0, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:26:09 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x0, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:26:09 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:26:10 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:26:10 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x80, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000080)=0x4, 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f00000000c0)={0xfff, 0x9, 0x401, 'queue0\x00', 0x6}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0xfffffd74}], 0x1) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x7, 0x8000, 0x1000, 0x7d0, 0x0, 0xffffffff00000000, 0x0, 0x5, 0x9, 0x6, 0x1, 0x81, 0x5, 0x10000, 0x1, 0x7, 0xffffffffffffffff, 0xeda, 0x5, 0x0, 0x91, 0x10001, 0xffffffffffff0001, 0xc384, 0x8, 0xffffffffffffffe0, 0x0, 0x4, 0xffff, 0x80, 0x7, 0x2, 0x1, 0x0, 0x30, 0x3, 0x0, 0x7, 0x4, @perf_config_ext={0xfffffffffffff0f9, 0x8}, 0x20403, 0xcae, 0x9, 0x7, 0x0, 0xfff, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x2) [ 879.662879] IPVS: ftp: loaded support on port[0] = 21 2018/03/31 12:26:10 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:26:10 executing program 2 (fault-call:10 fault-nth:36): r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="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", 0xfc}], 0x1, 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r2 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) ioctl$sock_ipx_SIOCAIPXPRISLT(r2, 0x89e1, &(0x7f0000000280)=0x3f) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f0000000200)={0x80, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23}, 0x0, 0x7, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000300)={r3, 0x1c9}, 0x8) r4 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e44ee") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x40, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000c40)={r3, 0x2}, &(0x7f0000000c80)=0xffffffffffffff39) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000540)=0x2, 0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000340)) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000d40)={0x7433, {{0x2, 0x4e21, @broadcast=0xffffffff}}, 0x1, 0x1, [{{0x2, 0x4e20}}]}, 0x110) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f, r3}, 0x20) [ 879.760971] FAULT_INJECTION: forcing a failure. [ 879.760971] name failslab, interval 1, probability 0, space 0, times 0 [ 879.772301] CPU: 1 PID: 22947 Comm: syz-executor2 Not tainted 4.16.0-rc7+ #373 [ 879.779661] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 879.789005] Call Trace: [ 879.791591] dump_stack+0x194/0x24d [ 879.795214] ? arch_local_irq_restore+0x53/0x53 [ 879.799876] ? __save_stack_trace+0x7e/0xd0 [ 879.804186] should_fail+0x8c0/0xa40 [ 879.807881] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 879.812966] ? kasan_kmalloc+0xad/0xe0 [ 879.816838] ? kmem_cache_alloc_trace+0x136/0x740 [ 879.821668] ? __memcg_init_list_lru_node+0x169/0x270 [ 879.826845] ? __list_lru_init+0x544/0x750 [ 879.831060] ? sget_userns+0x6b1/0xe40 [ 879.834951] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 879.839690] ? kern_mount_data+0x50/0xb0 [ 879.843739] ? pid_ns_prepare_proc+0x1e/0x80 [ 879.848138] ? alloc_pid+0x87e/0xa00 [ 879.851848] ? copy_process.part.38+0x2516/0x4bd0 [ 879.856677] ? _do_fork+0x1f7/0xf70 [ 879.860293] ? SyS_clone+0x37/0x50 [ 879.863826] ? find_held_lock+0x35/0x1d0 [ 879.867867] ? __lock_is_held+0xb6/0x140 [ 879.871915] ? check_same_owner+0x320/0x320 [ 879.876224] ? rcu_note_context_switch+0x710/0x710 [ 879.881141] should_failslab+0xec/0x120 [ 879.885094] kmem_cache_alloc_trace+0x4b/0x740 [ 879.889663] ? __kmalloc_node+0x33/0x70 [ 879.893624] ? __kmalloc_node+0x33/0x70 [ 879.897585] ? rcu_read_lock_sched_held+0x108/0x120 [ 879.902593] __memcg_init_list_lru_node+0x169/0x270 [ 879.907588] ? list_lru_add+0x7c0/0x7c0 [ 879.911545] ? __kmalloc_node+0x47/0x70 [ 879.915514] __list_lru_init+0x544/0x750 [ 879.919573] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 879.925453] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 879.930477] ? lockdep_init_map+0x9/0x10 [ 879.934529] sget_userns+0x6b1/0xe40 [ 879.938232] ? set_anon_super+0x20/0x20 [ 879.942196] ? put_filp+0x90/0x90 [ 879.945639] ? destroy_unused_super.part.6+0xd0/0xd0 [ 879.950734] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 879.955756] ? perf_trace_lock+0xd6/0x900 [ 879.959905] ? save_stack+0xa3/0xd0 [ 879.963536] ? kasan_slab_alloc+0x12/0x20 [ 879.967692] ? alloc_pid+0xc1/0xa00 [ 879.971314] ? __radix_tree_replace+0x1af/0x310 [ 879.975982] ? radix_tree_delete+0x30/0x30 [ 879.980209] ? node_tag_clear+0xf2/0x180 [ 879.984266] ? proc_get_inode+0x620/0x620 [ 879.988398] mount_ns+0x6d/0x190 [ 879.991749] proc_mount+0x7a/0x90 [ 879.995201] mount_fs+0x66/0x2d0 [ 879.998643] vfs_kern_mount.part.26+0xc6/0x4a0 [ 880.003210] ? may_umount+0xa0/0xa0 [ 880.006821] ? idr_alloc_cyclic+0x1d6/0x320 [ 880.011138] ? do_raw_spin_trylock+0x190/0x190 [ 880.015715] ? idr_alloc+0x180/0x180 [ 880.019416] kern_mount_data+0x50/0xb0 [ 880.023287] pid_ns_prepare_proc+0x1e/0x80 [ 880.027509] alloc_pid+0x87e/0xa00 [ 880.031036] ? __change_pid+0x400/0x400 [ 880.035001] ? ns_capable_common+0xcf/0x160 [ 880.039321] ? memset+0x31/0x40 [ 880.042592] ? copy_thread_tls+0x268/0x8f0 [ 880.046820] copy_process.part.38+0x2516/0x4bd0 [ 880.051502] ? __cleanup_sighand+0x40/0x40 [ 880.055731] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 880.060912] ? __lock_acquire+0x664/0x3e00 [ 880.065129] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 880.070308] ? perf_trace_lock+0xd6/0x900 [ 880.074447] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 880.079625] ? perf_trace_lock+0xd6/0x900 [ 880.083758] ? mntput_no_expire+0x130/0xa90 [ 880.088068] ? trace_event_raw_event_lock+0x340/0x340 [ 880.093258] ? perf_trace_lock+0xd6/0x900 [ 880.097394] ? lock_acquire+0x1d5/0x580 [ 880.101349] ? trace_hardirqs_off+0x10/0x10 [ 880.105654] ? perf_trace_lock+0xd6/0x900 [ 880.109787] ? find_held_lock+0x35/0x1d0 [ 880.113848] ? perf_trace_lock+0xd6/0x900 [ 880.117999] ? trace_event_raw_event_lock+0x340/0x340 [ 880.123184] ? _parse_integer+0x140/0x140 [ 880.127319] ? trace_hardirqs_off+0x10/0x10 [ 880.131623] ? get_pid_task+0x93/0x140 [ 880.135497] ? perf_trace_lock+0xd6/0x900 [ 880.139640] ? find_held_lock+0x35/0x1d0 [ 880.143697] ? __f_unlock_pos+0x19/0x20 [ 880.147662] ? lock_downgrade+0x980/0x980 [ 880.151951] ? get_pid_task+0xbc/0x140 [ 880.155834] ? proc_fail_nth_write+0x9b/0x1d0 [ 880.160310] ? map_files_get_link+0x3a0/0x3a0 [ 880.164800] ? handle_mm_fault+0x35b/0xb10 [ 880.169036] _do_fork+0x1f7/0xf70 [ 880.172486] ? fork_idle+0x2d0/0x2d0 [ 880.176192] ? wait_for_completion+0x770/0x770 [ 880.180779] ? __sb_end_write+0xa0/0xd0 [ 880.184744] ? fput+0xd2/0x140 [ 880.187924] ? SyS_write+0x184/0x220 [ 880.191633] ? SyS_read+0x220/0x220 [ 880.195609] SyS_clone+0x37/0x50 [ 880.198972] ? sys_vfork+0x30/0x30 [ 880.202501] do_syscall_64+0x281/0x940 [ 880.206373] ? vmalloc_sync_all+0x30/0x30 [ 880.210512] ? _raw_spin_unlock_irq+0x27/0x70 [ 880.215007] ? finish_task_switch+0x1c1/0x7e0 [ 880.219504] ? syscall_return_slowpath+0x550/0x550 [ 880.224523] ? syscall_return_slowpath+0x2ac/0x550 [ 880.229459] ? prepare_exit_to_usermode+0x350/0x350 [ 880.234742] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 880.240105] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 880.244948] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 880.250130] RIP: 0033:0x454e79 [ 880.253307] RSP: 002b:00007f935ae4bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 2018/03/31 12:26:10 executing program 1: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) dup2(r2, r3) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:26:10 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:26:10 executing program 7: socket$inet6(0xa, 0x6, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000943ffc)=0xa35) read(0xffffffffffffffff, &(0x7f00003fefff)=""/1, 0x1) r2 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r3, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r3, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r4}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)) r5 = dup2(r3, r4) fcntl$setown(r5, 0x8, r2) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r2, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0xe6, 0x2, {0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, 0xb64, 0x9, 0x9b, 0x5, 0xffff}}, &(0x7f0000000580)=0xb0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) [ 880.260999] RAX: ffffffffffffffda RBX: 00007f935ae4c6d4 RCX: 0000000000454e79 [ 880.268267] RDX: 00000000200008c0 RSI: 0000000020000800 RDI: 000000002000c100 [ 880.275576] RBP: 000000000072bea0 R08: 0000000020000940 R09: 0000000000000000 [ 880.282843] R10: 0000000020000900 R11: 0000000000000246 R12: 0000000000000014 [ 880.290125] R13: 0000000000000051 R14: 00000000006f2838 R15: 0000000000000024 2018/03/31 12:26:10 executing program 4: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:26:10 executing program 5: socket$inet6(0xa, 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:26:10 executing program 6: socket$inet6(0xa, 0x6, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000943ffc)=0xa35) read(r1, &(0x7f00003fefff)=""/1, 0x1) r2 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r3, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r3, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r4}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)) r5 = dup2(r3, r4) fcntl$setown(r5, 0x8, r2) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r2, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0xe6, 0x2, {0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, 0xb64, 0x9, 0x9b, 0x5, 0xffff}}, &(0x7f0000000580)=0xb0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:26:10 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:26:10 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:26:10 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x80, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000080)=0x4, 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f00000000c0)={0xfff, 0x9, 0x401, 'queue0\x00', 0x6}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0xfffffd74}], 0x1) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x7, 0x8000, 0x1000, 0x7d0, 0x0, 0xffffffff00000000, 0x0, 0x5, 0x9, 0x6, 0x1, 0x81, 0x5, 0x10000, 0x1, 0x7, 0xffffffffffffffff, 0xeda, 0x5, 0x0, 0x91, 0x10001, 0xffffffffffff0001, 0xc384, 0x8, 0xffffffffffffffe0, 0x0, 0x4, 0xffff, 0x80, 0x7, 0x2, 0x1, 0x0, 0x30, 0x3, 0x0, 0x7, 0x4, @perf_config_ext={0xfffffffffffff0f9, 0x8}, 0x20403, 0xcae, 0x9, 0x7, 0x0, 0xfff, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x2) 2018/03/31 12:26:10 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:26:11 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:26:12 executing program 2 (fault-call:10 fault-nth:37): r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="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", 0xfc}], 0x1, 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r2 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) ioctl$sock_ipx_SIOCAIPXPRISLT(r2, 0x89e1, &(0x7f0000000280)=0x3f) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f0000000200)={0x80, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23}, 0x0, 0x7, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000300)={r3, 0x1c9}, 0x8) r4 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e44ee") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x40, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000c40)={r3, 0x2}, &(0x7f0000000c80)=0xffffffffffffff39) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000540)=0x2, 0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000340)) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000d40)={0x7433, {{0x2, 0x4e21, @broadcast=0xffffffff}}, 0x1, 0x1, [{{0x2, 0x4e20}}]}, 0x110) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f, r3}, 0x20) 2018/03/31 12:26:12 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:26:12 executing program 1: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) fcntl$setown(0xffffffffffffffff, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:26:12 executing program 7: socket$inet6(0xa, 0x6, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000943ffc)=0xa35) read(r1, &(0x7f00003fefff)=""/1, 0x1) r2 = gettid() socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r3, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r3, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r4}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)) r5 = dup2(r3, r4) fcntl$setown(r5, 0x8, r2) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r2, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0xe6, 0x2, {0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, 0xb64, 0x9, 0x9b, 0x5, 0xffff}}, &(0x7f0000000580)=0xb0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:26:12 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x80, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000080)=0x4, 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f00000000c0)={0xfff, 0x9, 0x401, 'queue0\x00', 0x6}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0xfffffd74}], 0x1) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x7, 0x8000, 0x1000, 0x7d0, 0x0, 0xffffffff00000000, 0x0, 0x5, 0x9, 0x6, 0x1, 0x81, 0x5, 0x10000, 0x1, 0x7, 0xffffffffffffffff, 0xeda, 0x5, 0x0, 0x91, 0x10001, 0xffffffffffff0001, 0xc384, 0x8, 0xffffffffffffffe0, 0x0, 0x4, 0xffff, 0x80, 0x7, 0x2, 0x1, 0x0, 0x30, 0x3, 0x0, 0x7, 0x4, @perf_config_ext={0xfffffffffffff0f9, 0x8}, 0x20403, 0xcae, 0x9, 0x7, 0x0, 0xfff, 0x7}, r1, 0x0, 0xffffffffffffffff, 0x2) 2018/03/31 12:26:12 executing program 6: socket$inet6(0xa, 0x6, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000943ffc)=0xa35) read(r1, &(0x7f00003fefff)=""/1, 0x1) r2 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r3, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r3, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r4}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)) r5 = dup2(r3, r4) fcntl$setown(r5, 0x8, r2) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r2, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0xe6, 0x2, {0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, 0xb64, 0x9, 0x9b, 0x5, 0xffff}}, &(0x7f0000000580)=0xb0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:26:12 executing program 4: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:26:12 executing program 5: socket$inet6(0xa, 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) [ 881.727197] FAULT_INJECTION: forcing a failure. [ 881.727197] name failslab, interval 1, probability 0, space 0, times 0 [ 881.738615] CPU: 0 PID: 23028 Comm: syz-executor2 Not tainted 4.16.0-rc7+ #373 [ 881.745990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 881.755365] Call Trace: [ 881.757953] dump_stack+0x194/0x24d [ 881.761577] ? arch_local_irq_restore+0x53/0x53 [ 881.766238] ? __save_stack_trace+0x7e/0xd0 [ 881.770571] should_fail+0x8c0/0xa40 [ 881.774292] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 881.779398] ? kasan_kmalloc+0xad/0xe0 [ 881.783294] ? kmem_cache_alloc_trace+0x136/0x740 [ 881.788138] ? __memcg_init_list_lru_node+0x169/0x270 [ 881.793323] ? __list_lru_init+0x544/0x750 [ 881.797551] ? sget_userns+0x6b1/0xe40 [ 881.801445] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 881.806207] ? kern_mount_data+0x50/0xb0 [ 881.810285] ? pid_ns_prepare_proc+0x1e/0x80 [ 881.814706] ? alloc_pid+0x87e/0xa00 [ 881.818445] ? copy_process.part.38+0x2516/0x4bd0 [ 881.823304] ? _do_fork+0x1f7/0xf70 [ 881.826924] ? SyS_clone+0x37/0x50 [ 881.830461] ? find_held_lock+0x35/0x1d0 [ 881.834521] ? __lock_is_held+0xb6/0x140 [ 881.838575] ? check_same_owner+0x320/0x320 [ 881.842883] ? rcu_note_context_switch+0x710/0x710 [ 881.847808] should_failslab+0xec/0x120 [ 881.851774] kmem_cache_alloc_trace+0x4b/0x740 [ 881.856341] ? __kmalloc_node+0x33/0x70 [ 881.860311] ? __kmalloc_node+0x33/0x70 [ 881.864307] ? rcu_read_lock_sched_held+0x108/0x120 [ 881.869333] __memcg_init_list_lru_node+0x169/0x270 [ 881.874370] ? list_lru_add+0x7c0/0x7c0 [ 881.878340] ? __kmalloc_node+0x47/0x70 [ 881.882315] __list_lru_init+0x544/0x750 [ 881.886382] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 881.892270] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 881.897295] ? lockdep_init_map+0x9/0x10 [ 881.901351] sget_userns+0x6b1/0xe40 [ 881.905055] ? set_anon_super+0x20/0x20 [ 881.909026] ? put_filp+0x90/0x90 [ 881.912473] ? destroy_unused_super.part.6+0xd0/0xd0 [ 881.917576] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 881.922606] ? save_stack+0xa3/0xd0 [ 881.926229] ? save_stack+0x43/0xd0 [ 881.929839] ? kasan_slab_alloc+0x12/0x20 [ 881.933968] ? kmem_cache_alloc+0x12e/0x760 [ 881.938280] ? alloc_pid+0xc1/0xa00 [ 881.941918] ? __radix_tree_replace+0x1af/0x310 [ 881.946573] ? radix_tree_delete+0x30/0x30 [ 881.950790] ? node_tag_clear+0xf2/0x180 [ 881.954849] ? proc_get_inode+0x620/0x620 [ 881.958994] mount_ns+0x6d/0x190 [ 881.962353] proc_mount+0x7a/0x90 [ 881.965794] mount_fs+0x66/0x2d0 [ 881.969163] vfs_kern_mount.part.26+0xc6/0x4a0 [ 881.973737] ? may_umount+0xa0/0xa0 [ 881.977345] ? idr_alloc_cyclic+0x1d6/0x320 [ 881.981658] ? do_raw_spin_trylock+0x190/0x190 [ 881.986231] ? idr_alloc+0x180/0x180 [ 881.989929] kern_mount_data+0x50/0xb0 [ 881.993979] pid_ns_prepare_proc+0x1e/0x80 [ 881.998200] alloc_pid+0x87e/0xa00 [ 882.001726] ? __change_pid+0x400/0x400 [ 882.005690] ? ns_capable_common+0xcf/0x160 [ 882.010012] ? memset+0x31/0x40 [ 882.013289] ? copy_thread_tls+0x268/0x8f0 [ 882.017515] copy_process.part.38+0x2516/0x4bd0 [ 882.022175] ? __cleanup_sighand+0x40/0x40 [ 882.026415] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 882.031597] ? __lock_acquire+0x664/0x3e00 [ 882.035820] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 882.041007] ? environ_open+0x80/0x80 [ 882.044804] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 882.049972] ? __lock_acquire+0x664/0x3e00 [ 882.054194] ? mntput_no_expire+0x130/0xa90 [ 882.058512] ? print_irqtrace_events+0x270/0x270 [ 882.063269] ? trace_hardirqs_off+0x10/0x10 [ 882.067591] ? lock_acquire+0x1d5/0x580 [ 882.071553] ? trace_hardirqs_off+0x10/0x10 [ 882.075851] ? trace_hardirqs_off+0x10/0x10 [ 882.080157] ? __lock_acquire+0x664/0x3e00 [ 882.084385] ? check_same_owner+0x320/0x320 [ 882.088697] ? find_held_lock+0x35/0x1d0 [ 882.092751] ? _parse_integer+0xe9/0x140 [ 882.096802] ? trace_hardirqs_off+0x10/0x10 [ 882.101103] ? _parse_integer+0x140/0x140 [ 882.105254] ? trace_hardirqs_off+0x10/0x10 [ 882.109567] ? get_pid_task+0x93/0x140 [ 882.113450] ? lock_downgrade+0x980/0x980 [ 882.117607] ? find_held_lock+0x35/0x1d0 [ 882.121655] ? __f_unlock_pos+0x19/0x20 [ 882.125614] ? lock_downgrade+0x980/0x980 [ 882.129751] ? get_pid_task+0xbc/0x140 [ 882.133641] ? proc_fail_nth_write+0x9b/0x1d0 [ 882.138138] ? map_files_get_link+0x3a0/0x3a0 [ 882.142617] ? handle_mm_fault+0x35b/0xb10 [ 882.146843] _do_fork+0x1f7/0xf70 [ 882.150290] ? fork_idle+0x2d0/0x2d0 [ 882.153995] ? wait_for_completion+0x770/0x770 [ 882.158578] ? __lock_is_held+0xb6/0x140 [ 882.162641] ? __sb_end_write+0xa0/0xd0 [ 882.166606] ? fput+0xd2/0x140 [ 882.169792] ? SyS_write+0x184/0x220 [ 882.173500] ? SyS_read+0x220/0x220 [ 882.177125] SyS_clone+0x37/0x50 [ 882.180482] ? sys_vfork+0x30/0x30 [ 882.184012] do_syscall_64+0x281/0x940 [ 882.187889] ? vmalloc_sync_all+0x30/0x30 [ 882.192025] ? _raw_spin_unlock_irq+0x27/0x70 [ 882.196516] ? finish_task_switch+0x1c1/0x7e0 [ 882.200994] ? syscall_return_slowpath+0x550/0x550 [ 882.205918] ? syscall_return_slowpath+0x2ac/0x550 [ 882.210839] ? prepare_exit_to_usermode+0x350/0x350 [ 882.215856] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 882.221213] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 882.226056] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 882.231240] RIP: 0033:0x454e79 [ 882.234416] RSP: 002b:00007f935ae4bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 882.242141] RAX: ffffffffffffffda RBX: 00007f935ae4c6d4 RCX: 0000000000454e79 [ 882.249405] RDX: 00000000200008c0 RSI: 0000000020000800 RDI: 000000002000c100 [ 882.256668] RBP: 000000000072bea0 R08: 0000000020000940 R09: 0000000000000000 [ 882.263932] R10: 0000000020000900 R11: 0000000000000246 R12: 0000000000000014 [ 882.271190] R13: 0000000000000051 R14: 00000000006f2838 R15: 0000000000000025 2018/03/31 12:26:12 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) [ 882.301800] IPVS: ftp: loaded support on port[0] = 21 2018/03/31 12:26:12 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:26:12 executing program 2 (fault-call:10 fault-nth:38): r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="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", 0xfc}], 0x1, 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r2 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) ioctl$sock_ipx_SIOCAIPXPRISLT(r2, 0x89e1, &(0x7f0000000280)=0x3f) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f0000000200)={0x80, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23}, 0x0, 0x7, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000300)={r3, 0x1c9}, 0x8) r4 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e44ee") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x40, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000c40)={r3, 0x2}, &(0x7f0000000c80)=0xffffffffffffff39) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000540)=0x2, 0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000340)) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000d40)={0x7433, {{0x2, 0x4e21, @broadcast=0xffffffff}}, 0x1, 0x1, [{{0x2, 0x4e20}}]}, 0x110) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f, r3}, 0x20) 2018/03/31 12:26:12 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) [ 882.389918] FAULT_INJECTION: forcing a failure. [ 882.389918] name failslab, interval 1, probability 0, space 0, times 0 [ 882.401252] CPU: 0 PID: 23043 Comm: syz-executor2 Not tainted 4.16.0-rc7+ #373 [ 882.408615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 882.417968] Call Trace: [ 882.420544] dump_stack+0x194/0x24d [ 882.424159] ? arch_local_irq_restore+0x53/0x53 [ 882.428813] ? __save_stack_trace+0x7e/0xd0 [ 882.433121] should_fail+0x8c0/0xa40 [ 882.436823] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 882.441927] ? kasan_kmalloc+0xad/0xe0 [ 882.445807] ? kmem_cache_alloc_trace+0x136/0x740 [ 882.450645] ? __memcg_init_list_lru_node+0x169/0x270 [ 882.455829] ? __list_lru_init+0x544/0x750 [ 882.460061] ? sget_userns+0x6b1/0xe40 [ 882.463946] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 882.468692] ? kern_mount_data+0x50/0xb0 [ 882.472738] ? pid_ns_prepare_proc+0x1e/0x80 [ 882.477139] ? alloc_pid+0x87e/0xa00 [ 882.480840] ? copy_process.part.38+0x2516/0x4bd0 [ 882.486450] ? _do_fork+0x1f7/0xf70 [ 882.490065] ? SyS_clone+0x37/0x50 [ 882.493608] ? find_held_lock+0x35/0x1d0 [ 882.497664] ? __lock_is_held+0xb6/0x140 [ 882.501711] ? check_same_owner+0x320/0x320 [ 882.506028] ? rcu_note_context_switch+0x710/0x710 [ 882.510952] should_failslab+0xec/0x120 [ 882.514908] kmem_cache_alloc_trace+0x4b/0x740 [ 882.519482] ? __kmalloc_node+0x33/0x70 [ 882.523460] ? __kmalloc_node+0x33/0x70 [ 882.527445] ? rcu_read_lock_sched_held+0x108/0x120 [ 882.532468] __memcg_init_list_lru_node+0x169/0x270 [ 882.537469] ? list_lru_add+0x7c0/0x7c0 [ 882.541866] ? __kmalloc_node+0x47/0x70 [ 882.545834] __list_lru_init+0x544/0x750 [ 882.549886] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 882.555778] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 882.560794] ? lockdep_init_map+0x9/0x10 [ 882.564847] sget_userns+0x6b1/0xe40 [ 882.568551] ? set_anon_super+0x20/0x20 [ 882.572516] ? put_filp+0x90/0x90 [ 882.575951] ? destroy_unused_super.part.6+0xd0/0xd0 [ 882.581045] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 882.586049] ? save_stack+0xa3/0xd0 [ 882.589651] ? save_stack+0x43/0xd0 [ 882.593272] ? kasan_slab_alloc+0x12/0x20 [ 882.597420] ? kmem_cache_alloc+0x12e/0x760 [ 882.601730] ? alloc_pid+0xc1/0xa00 [ 882.605348] ? __radix_tree_replace+0x1af/0x310 [ 882.609995] ? radix_tree_delete+0x30/0x30 [ 882.614215] ? node_tag_clear+0xf2/0x180 [ 882.618269] ? proc_get_inode+0x620/0x620 [ 882.622407] mount_ns+0x6d/0x190 [ 882.625764] proc_mount+0x7a/0x90 [ 882.629221] mount_fs+0x66/0x2d0 [ 882.632595] vfs_kern_mount.part.26+0xc6/0x4a0 [ 882.637169] ? may_umount+0xa0/0xa0 [ 882.640778] ? idr_alloc_cyclic+0x1d6/0x320 [ 882.645094] ? do_raw_spin_trylock+0x190/0x190 [ 882.649662] ? idr_alloc+0x180/0x180 [ 882.653373] kern_mount_data+0x50/0xb0 [ 882.657248] pid_ns_prepare_proc+0x1e/0x80 [ 882.661477] alloc_pid+0x87e/0xa00 [ 882.665025] ? __change_pid+0x400/0x400 [ 882.669014] ? ns_capable_common+0xcf/0x160 [ 882.673330] ? memset+0x31/0x40 [ 882.676592] ? copy_thread_tls+0x268/0x8f0 [ 882.680821] copy_process.part.38+0x2516/0x4bd0 [ 882.685489] ? __cleanup_sighand+0x40/0x40 [ 882.689720] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 882.694897] ? __lock_acquire+0x664/0x3e00 [ 882.699121] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 882.704299] ? environ_open+0x80/0x80 [ 882.708098] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 882.713273] ? __lock_acquire+0x664/0x3e00 [ 882.717485] ? mntput_no_expire+0x130/0xa90 [ 882.721793] ? print_irqtrace_events+0x270/0x270 [ 882.726541] ? trace_hardirqs_off+0x10/0x10 [ 882.730846] ? lock_acquire+0x1d5/0x580 [ 882.734810] ? trace_hardirqs_off+0x10/0x10 [ 882.739127] ? trace_hardirqs_off+0x10/0x10 [ 882.743437] ? __lock_acquire+0x664/0x3e00 [ 882.747653] ? check_same_owner+0x320/0x320 [ 882.751960] ? find_held_lock+0x35/0x1d0 [ 882.756021] ? _parse_integer+0xe9/0x140 [ 882.760069] ? trace_hardirqs_off+0x10/0x10 [ 882.764368] ? _parse_integer+0x140/0x140 [ 882.768494] ? trace_hardirqs_off+0x10/0x10 [ 882.772795] ? get_pid_task+0x93/0x140 [ 882.776673] ? lock_downgrade+0x980/0x980 [ 882.780808] ? find_held_lock+0x35/0x1d0 [ 882.784850] ? __f_unlock_pos+0x19/0x20 [ 882.788807] ? lock_downgrade+0x980/0x980 [ 882.792941] ? get_pid_task+0xbc/0x140 [ 882.796807] ? proc_fail_nth_write+0x9b/0x1d0 [ 882.801300] ? map_files_get_link+0x3a0/0x3a0 [ 882.805776] ? handle_mm_fault+0x35b/0xb10 [ 882.809990] _do_fork+0x1f7/0xf70 [ 882.813425] ? fork_idle+0x2d0/0x2d0 [ 882.817126] ? wait_for_completion+0x770/0x770 [ 882.821696] ? __lock_is_held+0xb6/0x140 [ 882.825740] ? __sb_end_write+0xa0/0xd0 [ 882.829694] ? fput+0xd2/0x140 [ 882.832865] ? SyS_write+0x184/0x220 [ 882.836563] ? SyS_read+0x220/0x220 [ 882.840168] SyS_clone+0x37/0x50 [ 882.843532] ? sys_vfork+0x30/0x30 [ 882.847065] do_syscall_64+0x281/0x940 [ 882.850931] ? vmalloc_sync_all+0x30/0x30 [ 882.855061] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 882.860592] ? syscall_return_slowpath+0x550/0x550 [ 882.865505] ? syscall_return_slowpath+0x2ac/0x550 [ 882.870432] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 882.875774] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 882.880603] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 882.885775] RIP: 0033:0x454e79 [ 882.888947] RSP: 002b:00007f935ae4bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 882.896631] RAX: ffffffffffffffda RBX: 00007f935ae4c6d4 RCX: 0000000000454e79 [ 882.903877] RDX: 00000000200008c0 RSI: 0000000020000800 RDI: 000000002000c100 [ 882.911128] RBP: 000000000072bea0 R08: 0000000020000940 R09: 0000000000000000 [ 882.918391] R10: 0000000020000900 R11: 0000000000000246 R12: 0000000000000014 [ 882.925644] R13: 0000000000000051 R14: 00000000006f2838 R15: 0000000000000026 2018/03/31 12:26:13 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x80, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000080)=0x4, 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f00000000c0)={0xfff, 0x9, 0x401, 'queue0\x00', 0x6}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0xfffffd74}], 0x1) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x7, 0x8000, 0x1000, 0x7d0, 0x0, 0xffffffff00000000, 0x0, 0x5, 0x9, 0x6, 0x1, 0x81, 0x5, 0x10000, 0x1, 0x7, 0xffffffffffffffff, 0xeda, 0x5, 0x0, 0x91, 0x10001, 0xffffffffffff0001, 0xc384, 0x8, 0xffffffffffffffe0, 0x0, 0x4, 0xffff, 0x80, 0x7, 0x2, 0x1, 0x0, 0x30, 0x3, 0x0, 0x7, 0x4, @perf_config_ext={0xfffffffffffff0f9, 0x8}, 0x20403, 0xcae, 0x9, 0x7, 0x0, 0xfff, 0x7}, r1, 0x0, 0xffffffffffffffff, 0x2) 2018/03/31 12:26:13 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:26:13 executing program 5: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:26:13 executing program 4: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:26:13 executing program 1: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) fcntl$setown(0xffffffffffffffff, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:26:13 executing program 2 (fault-call:10 fault-nth:39): r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="84d5aef1603cb020c5b219faa757913ec85ee74a155e1d635566777b78600bc65bf01ce33de9a6bc3a2041890df0926f2cfc2a7d63690f6b55610593773041755f61b034e3a62a770855b2c0481df219efbfa8ffd0c665434a1de026bcfb654d597ef77a7b231aa9efe45c53811c7591d56f69e9c6231e6da993bbd2a6133805be0c18ba114cfe865e693024a56c3331b93c03e25927a504d27acebf7eecd33d7c69359e3ca37dc546c4fc5bc62596a94cdc00f9b973616a9d2ebad2d9b3e60261ae73b8397694e1f0851475b4236fb47989e6bfd1ad926a01523df3f689dc2603a76b5fc5e023d5449d066d424d1001fee5d653c21fdb751e95ff2b", 0xfc}], 0x1, 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r2 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) ioctl$sock_ipx_SIOCAIPXPRISLT(r2, 0x89e1, &(0x7f0000000280)=0x3f) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f0000000200)={0x80, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23}, 0x0, 0x7, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000300)={r3, 0x1c9}, 0x8) r4 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e44ee") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x40, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000c40)={r3, 0x2}, &(0x7f0000000c80)=0xffffffffffffff39) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000540)=0x2, 0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000340)) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000d40)={0x7433, {{0x2, 0x4e21, @broadcast=0xffffffff}}, 0x1, 0x1, [{{0x2, 0x4e20}}]}, 0x110) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f, r3}, 0x20) 2018/03/31 12:26:13 executing program 7: socket$inet6(0xa, 0x6, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000943ffc)=0xa35) read(r1, &(0x7f00003fefff)=""/1, 0x1) r2 = gettid() socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r3, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r3, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r4}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)) r5 = dup2(r3, r4) fcntl$setown(r5, 0x8, r2) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r2, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0xe6, 0x2, {0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, 0xb64, 0x9, 0x9b, 0x5, 0xffff}}, &(0x7f0000000580)=0xb0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:26:13 executing program 6: socket$inet6(0xa, 0x6, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000943ffc)=0xa35) read(r1, &(0x7f00003fefff)=""/1, 0x1) r2 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r3, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r3, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r4}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)) r5 = dup2(r3, r4) fcntl$setown(r5, 0x8, r2) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r2, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0xe6, 0x2, {0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, 0xb64, 0x9, 0x9b, 0x5, 0xffff}}, &(0x7f0000000580)=0xb0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) [ 883.382557] FAULT_INJECTION: forcing a failure. [ 883.382557] name failslab, interval 1, probability 0, space 0, times 0 [ 883.393923] CPU: 1 PID: 23094 Comm: syz-executor2 Not tainted 4.16.0-rc7+ #373 [ 883.401283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 883.410635] Call Trace: [ 883.413234] dump_stack+0x194/0x24d [ 883.416855] ? arch_local_irq_restore+0x53/0x53 [ 883.421514] ? __save_stack_trace+0x7e/0xd0 [ 883.425840] should_fail+0x8c0/0xa40 [ 883.429549] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 883.434655] ? kasan_kmalloc+0xad/0xe0 [ 883.438530] ? kmem_cache_alloc_trace+0x136/0x740 [ 883.443365] ? __memcg_init_list_lru_node+0x169/0x270 [ 883.448545] ? __list_lru_init+0x544/0x750 [ 883.452766] ? sget_userns+0x6b1/0xe40 [ 883.456657] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 883.461402] ? kern_mount_data+0x50/0xb0 [ 883.465451] ? pid_ns_prepare_proc+0x1e/0x80 [ 883.469846] ? alloc_pid+0x87e/0xa00 [ 883.473549] ? copy_process.part.38+0x2516/0x4bd0 [ 883.478382] ? _do_fork+0x1f7/0xf70 [ 883.481996] ? SyS_clone+0x37/0x50 [ 883.485528] ? find_held_lock+0x35/0x1d0 [ 883.489583] ? __lock_is_held+0xb6/0x140 [ 883.493646] ? check_same_owner+0x320/0x320 [ 883.497961] ? rcu_note_context_switch+0x710/0x710 [ 883.502891] should_failslab+0xec/0x120 [ 883.506857] kmem_cache_alloc_trace+0x4b/0x740 [ 883.511432] ? __kmalloc_node+0x33/0x70 [ 883.515395] ? __kmalloc_node+0x33/0x70 [ 883.519360] ? rcu_read_lock_sched_held+0x108/0x120 [ 883.524369] __memcg_init_list_lru_node+0x169/0x270 [ 883.529380] ? list_lru_add+0x7c0/0x7c0 [ 883.533345] ? __kmalloc_node+0x47/0x70 [ 883.537316] __list_lru_init+0x544/0x750 [ 883.541373] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 883.547259] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 883.552281] ? lockdep_init_map+0x9/0x10 [ 883.556336] sget_userns+0x6b1/0xe40 [ 883.560040] ? set_anon_super+0x20/0x20 [ 883.564010] ? put_filp+0x90/0x90 [ 883.567453] ? destroy_unused_super.part.6+0xd0/0xd0 [ 883.572550] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 883.577560] ? save_stack+0xa3/0xd0 [ 883.581175] ? save_stack+0x43/0xd0 [ 883.584795] ? kasan_slab_alloc+0x12/0x20 [ 883.588934] ? kmem_cache_alloc+0x12e/0x760 [ 883.593243] ? alloc_pid+0xc1/0xa00 [ 883.596866] ? __radix_tree_replace+0x1af/0x310 [ 883.601525] ? radix_tree_delete+0x30/0x30 [ 883.605755] ? node_tag_clear+0xf2/0x180 [ 883.609814] ? proc_get_inode+0x620/0x620 [ 883.613949] mount_ns+0x6d/0x190 [ 883.617305] proc_mount+0x7a/0x90 [ 883.620750] mount_fs+0x66/0x2d0 [ 883.624109] vfs_kern_mount.part.26+0xc6/0x4a0 [ 883.628680] ? may_umount+0xa0/0xa0 [ 883.632297] ? idr_alloc_cyclic+0x1d6/0x320 [ 883.636613] ? do_raw_spin_trylock+0x190/0x190 [ 883.641187] ? idr_alloc+0x180/0x180 [ 883.644892] kern_mount_data+0x50/0xb0 [ 883.648768] pid_ns_prepare_proc+0x1e/0x80 [ 883.652990] alloc_pid+0x87e/0xa00 [ 883.656529] ? __change_pid+0x400/0x400 [ 883.660490] ? ns_capable_common+0xcf/0x160 [ 883.664806] ? memset+0x31/0x40 [ 883.668076] ? copy_thread_tls+0x268/0x8f0 [ 883.672307] copy_process.part.38+0x2516/0x4bd0 [ 883.676974] ? __cleanup_sighand+0x40/0x40 [ 883.681209] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 883.686391] ? __lock_acquire+0x664/0x3e00 [ 883.690622] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 883.695801] ? environ_open+0x80/0x80 [ 883.699599] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 883.704780] ? __lock_acquire+0x664/0x3e00 [ 883.709036] ? mntput_no_expire+0x130/0xa90 [ 883.713350] ? print_irqtrace_events+0x270/0x270 [ 883.718093] ? trace_hardirqs_off+0x10/0x10 [ 883.722406] ? lock_acquire+0x1d5/0x580 [ 883.726369] ? trace_hardirqs_off+0x10/0x10 [ 883.730683] ? trace_hardirqs_off+0x10/0x10 [ 883.734995] ? __lock_acquire+0x664/0x3e00 [ 883.739221] ? check_same_owner+0x320/0x320 [ 883.743536] ? find_held_lock+0x35/0x1d0 [ 883.747595] ? _parse_integer+0xe9/0x140 [ 883.751655] ? trace_hardirqs_off+0x10/0x10 [ 883.755968] ? _parse_integer+0x140/0x140 [ 883.760108] ? trace_hardirqs_off+0x10/0x10 [ 883.764417] ? get_pid_task+0x93/0x140 [ 883.768295] ? lock_downgrade+0x980/0x980 [ 883.772439] ? find_held_lock+0x35/0x1d0 [ 883.776496] ? __f_unlock_pos+0x19/0x20 [ 883.780460] ? lock_downgrade+0x980/0x980 [ 883.784601] ? get_pid_task+0xbc/0x140 [ 883.788493] ? proc_fail_nth_write+0x9b/0x1d0 [ 883.792976] ? map_files_get_link+0x3a0/0x3a0 [ 883.797480] ? handle_mm_fault+0x35b/0xb10 [ 883.801707] _do_fork+0x1f7/0xf70 [ 883.805154] ? fork_idle+0x2d0/0x2d0 [ 883.808859] ? wait_for_completion+0x770/0x770 [ 883.813431] ? __lock_is_held+0xb6/0x140 [ 883.817491] ? __sb_end_write+0xa0/0xd0 [ 883.821456] ? fput+0xd2/0x140 [ 883.824637] ? SyS_write+0x184/0x220 [ 883.828339] ? SyS_read+0x220/0x220 [ 883.831957] SyS_clone+0x37/0x50 [ 883.835309] ? sys_vfork+0x30/0x30 [ 883.838838] do_syscall_64+0x281/0x940 [ 883.842711] ? vmalloc_sync_all+0x30/0x30 [ 883.846847] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 883.852375] ? syscall_return_slowpath+0x550/0x550 [ 883.857296] ? syscall_return_slowpath+0x2ac/0x550 [ 883.862221] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 883.867585] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 883.872426] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 883.877606] RIP: 0033:0x454e79 2018/03/31 12:26:14 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) [ 883.880786] RSP: 002b:00007f935ae4bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 883.888490] RAX: ffffffffffffffda RBX: 00007f935ae4c6d4 RCX: 0000000000454e79 [ 883.895745] RDX: 00000000200008c0 RSI: 0000000020000800 RDI: 000000002000c100 [ 883.903006] RBP: 000000000072bea0 R08: 0000000020000940 R09: 0000000000000000 [ 883.910261] R10: 0000000020000900 R11: 0000000000000246 R12: 0000000000000014 [ 883.917515] R13: 0000000000000051 R14: 00000000006f2838 R15: 0000000000000027 [ 884.089092] IPVS: ftp: loaded support on port[0] = 21 2018/03/31 12:26:15 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:26:15 executing program 2 (fault-call:10 fault-nth:40): r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000400)="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", 0xfc}], 0x1, 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r2 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) ioctl$sock_ipx_SIOCAIPXPRISLT(r2, 0x89e1, &(0x7f0000000280)=0x3f) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f0000000200)={0x80, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23}, 0x0, 0x7, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000300)={r3, 0x1c9}, 0x8) r4 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e44ee") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x40, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000c40)={r3, 0x2}, &(0x7f0000000c80)=0xffffffffffffff39) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000540)=0x2, 0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000340)) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000d40)={0x7433, {{0x2, 0x4e21, @broadcast=0xffffffff}}, 0x1, 0x1, [{{0x2, 0x4e20}}]}, 0x110) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f, r3}, 0x20) 2018/03/31 12:26:15 executing program 6: socket$inet6(0xa, 0x6, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000943ffc)=0xa35) read(r1, &(0x7f00003fefff)=""/1, 0x1) r2 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r3, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r3, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r4}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)) r5 = dup2(r3, r4) fcntl$setown(r5, 0x8, r2) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r2, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0xe6, 0x2, {0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, 0xb64, 0x9, 0x9b, 0x5, 0xffff}}, &(0x7f0000000580)=0xb0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:26:15 executing program 4: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:26:15 executing program 5: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:26:15 executing program 7: socket$inet6(0xa, 0x6, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000943ffc)=0xa35) read(r1, &(0x7f00003fefff)=""/1, 0x1) r2 = gettid() socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r3, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r3, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r4}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)) r5 = dup2(r3, r4) fcntl$setown(r5, 0x8, r2) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r2, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0xe6, 0x2, {0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, 0xb64, 0x9, 0x9b, 0x5, 0xffff}}, &(0x7f0000000580)=0xb0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:26:15 executing program 1: socket$inet6(0xa, 0x6, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000340)=0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) fcntl$setown(0xffffffffffffffff, 0x8, r1) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x16) gettid() process_vm_readv(0x0, &(0x7f0000001880)=[{&(0x7f0000000680)=""/198, 0xc6}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000400)=""/14, 0xe}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/112, 0x70}], 0x1, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000240)={{{@in6}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x9, @empty, 0x1781}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x8}, &(0x7f0000000480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/03/31 12:26:15 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x80, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000080)=0x4, 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f00000000c0)={0xfff, 0x9, 0x401, 'queue0\x00', 0x6}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0xfffffd74}], 0x1) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x7, 0x8000, 0x1000, 0x7d0, 0x0, 0xffffffff00000000, 0x0, 0x5, 0x9, 0x6, 0x1, 0x81, 0x5, 0x10000, 0x1, 0x7, 0xffffffffffffffff, 0xeda, 0x5, 0x0, 0x91, 0x10001, 0xffffffffffff0001, 0xc384, 0x8, 0xffffffffffffffe0, 0x0, 0x4, 0xffff, 0x80, 0x7, 0x2, 0x1, 0x0, 0x30, 0x3, 0x0, 0x7, 0x4, @perf_config_ext={0xfffffffffffff0f9, 0x8}, 0x20403, 0xcae, 0x9, 0x7, 0x0, 0xfff, 0x7}, r1, 0x0, 0xffffffffffffffff, 0x2) [ 884.840709] FAULT_INJECTION: forcing a failure. [ 884.840709] name failslab, interval 1, probability 0, space 0, times 0 [ 884.852468] CPU: 1 PID: 23141 Comm: syz-executor2 Not tainted 4.16.0-rc7+ #373 [ 884.859829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 884.869181] Call Trace: [ 884.871774] dump_stack+0x194/0x24d [ 884.875404] ? arch_local_irq_restore+0x53/0x53 [ 884.880073] ? find_held_lock+0x35/0x1d0 [ 884.884136] should_fail+0x8c0/0xa40 [ 884.887845] ? __list_lru_init+0x352/0x750 [ 884.892076] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 884.897176] ? find_first_zero_bit+0x93/0xe0 [ 884.901580] ? trace_hardirqs_off+0x10/0x10 [ 884.905896] ? find_held_lock+0x35/0x1d0 [ 884.909948] ? __lock_is_held+0xb6/0x140 [ 884.914009] ? check_same_owner+0x320/0x320 [ 884.918320] ? lock_downgrade+0x980/0x980 [ 884.922463] ? rcu_note_context_switch+0x710/0x710 [ 884.927378] ? find_held_lock+0x35/0x1d0 [ 884.931444] should_failslab+0xec/0x120 [ 884.935424] __kmalloc+0x63/0x760 [ 884.938883] ? lock_downgrade+0x980/0x980 [ 884.943030] ? register_shrinker+0x10e/0x2d0 [ 884.947433] ? trace_event_raw_event_module_request+0x320/0x320 [ 884.953492] register_shrinker+0x10e/0x2d0 [ 884.957731] ? prepare_kswapd_sleep+0x1f0/0x1f0 [ 884.963067] ? memcpy+0x45/0x50 [ 884.963092] sget_userns+0xbbf/0xe40 [ 884.963102] ? set_anon_super+0x20/0x20 [ 884.963114] ? put_filp+0x90/0x90 [ 884.963126] ? destroy_unused_super.part.6+0xd0/0xd0 [ 884.963142] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 884.963154] ? save_stack+0xa3/0xd0 2018/03/31 12:26:15 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) 2018/03/31 12:26:15 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) [ 884.991226] ? save_stack+0x43/0xd0 [ 884.994855] ? kasan_slab_alloc+0x12/0x20 [ 884.999002] ? kmem_cache_alloc+0x12e/0x760 [ 885.003320] ? alloc_pid+0xc1/0xa00 [ 885.006945] ? __radix_tree_replace+0x1af/0x310 [ 885.011609] ? radix_tree_delete+0x30/0x30 [ 885.015840] ? node_tag_clear+0xf2/0x180 [ 885.019908] ? proc_get_inode+0x620/0x620 [ 885.024055] mount_ns+0x6d/0x190 [ 885.027422] proc_mount+0x7a/0x90 [ 885.030884] mount_fs+0x66/0x2d0 [ 885.030901] vfs_kern_mount.part.26+0xc6/0x4a0 2018/03/31 12:26:15 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) [ 885.038821] ? may_umount+0xa0/0xa0 [ 885.042443] ? idr_alloc_cyclic+0x1d6/0x320 [ 885.046760] ? do_raw_spin_trylock+0x190/0x190 [ 885.051333] ? idr_alloc+0x180/0x180 [ 885.055045] kern_mount_data+0x50/0xb0 [ 885.058928] pid_ns_prepare_proc+0x1e/0x80 [ 885.063156] alloc_pid+0x87e/0xa00 [ 885.066694] ? __change_pid+0x400/0x400 [ 885.070665] ? ns_capable_common+0xcf/0x160 [ 885.074989] ? memset+0x31/0x40 [ 885.078279] ? copy_thread_tls+0x268/0x8f0 [ 885.078297] copy_process.part.38+0x2516/0x4bd0 [ 885.087187] ? __cleanup_sighand+0x40/0x40 2018/03/31 12:26:15 executing program 3: r0 = getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x2, 0x1000000000000, 0x3ff}) kcmp(0x0, r0, 0x40000005, r1, 0xffffffffffffffff) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000380)={0x3, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r2, 0x4, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0xc0, 0x40, {}, {0x77359400}, {0x4, 0x0, 0x3, 0x5}, 0x1, @can={{0x2, 0x2, 0x3, 0x400}, 0x6, 0x2, 0x0, 0x0, "75d1097332fc149f"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r6, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000040)=0x80000000, 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x20000) read$eventfd(r2, &(0x7f0000000200), 0xfffffe08) [ 885.091439] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 885.096627] ? __lock_acquire+0x664/0x3e00 [ 885.100858] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 885.106044] ? environ_open+0x80/0x80 [ 885.109847] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 885.115032] ? __lock_acquire+0x664/0x3e00 [ 885.119264] ? mntput_no_expire+0x130/0xa90 [ 885.123589] ? print_irqtrace_events+0x270/0x270 [ 885.128346] ? trace_hardirqs_off+0x10/0x10 [ 885.132662] ? lock_acquire+0x1d5/0x580 [ 885.136621] ? trace_hardirqs_off+0x10/0x10 [ 885.140929] ? trace_hardirqs_off+0x10/0x10 [ 885.145235] ? __lock_acquire+0x664/0x3e00 [ 885.149454] ? check_same_owner+0x320/0x320 [ 885.153760] ? find_held_lock+0x35/0x1d0 [ 885.157807] ? _parse_integer+0xe9/0x140 [ 885.161850] ? trace_hardirqs_off+0x10/0x10 [ 885.166152] ? _parse_integer+0x140/0x140 [ 885.170285] ? trace_hardirqs_off+0x10/0x10 [ 885.174591] ? get_pid_task+0x93/0x140 [ 885.178460] ? lock_downgrade+0x980/0x980 [ 885.182592] ? find_held_lock+0x35/0x1d0 [ 885.186639] ? __f_unlock_pos+0x19/0x20 [ 885.190595] ? lock_downgrade+0x980/0x980 [ 885.194723] ? get_pid_task+0xbc/0x140 [ 885.198594] ? proc_fail_nth_write+0x9b/0x1d0 [ 885.203074] ? map_files_get_link+0x3a0/0x3a0 [ 885.207555] ? handle_mm_fault+0x35b/0xb10 [ 885.211780] _do_fork+0x1f7/0xf70 [ 885.215221] ? fork_idle+0x2d0/0x2d0 [ 885.218919] ? wait_for_completion+0x770/0x770 [ 885.223487] ? __lock_is_held+0xb6/0x140 [ 885.227546] ? __sb_end_write+0xa0/0xd0 [ 885.231508] ? fput+0xd2/0x140 [ 885.234686] ? SyS_write+0x184/0x220 [ 885.238398] ? SyS_read+0x220/0x220 [ 885.242009] SyS_clone+0x37/0x50 [ 885.245361] ? sys_vfork+0x30/0x30 [ 885.248888] do_syscall_64+0x281/0x940 [ 885.252758] ? vmalloc_sync_all+0x30/0x30 [ 885.256890] ? _raw_spin_unlock_irq+0x27/0x70 [ 885.261367] ? finish_task_switch+0x1c1/0x7e0 [ 885.265844] ? syscall_return_slowpath+0x550/0x550 [ 885.270756] ? syscall_return_slowpath+0x2ac/0x550 [ 885.275668] ? prepare_exit_to_usermode+0x350/0x350 [ 885.280665] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 885.286022] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 885.290854] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 885.296033] RIP: 0033:0x454e79 [ 885.299203] RSP: 002b:00007f935ae4bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 885.306894] RAX: ffffffffffffffda RBX: 00007f935ae4c6d4 RCX: 0000000000454e79 [ 885.314150] RDX: 00000000200008c0 RSI: 0000000020000800 RDI: 000000002000c100 [ 885.321407] RBP: 000000000072bea0 R08: 0000000020000940 R09: 0000000000000000 [ 885.328668] R10: 0000000020000900 R11: 0000000000000246 R12: 0000000000000014 [ 885.335921] R13: 0000000000000051 R14: 00000000006f2838 R15: 0000000000000028 [ 885.344558] ------------[ cut here ]------------ [ 885.349461] refcount_t: underflow; use-after-free. [ 885.354584] WARNING: CPU: 1 PID: 23141 at lib/refcount.c:187 refcount_sub_and_test+0x167/0x1b0 [ 885.363335] Kernel panic - not syncing: panic_on_warn set ... [ 885.363335] [ 885.370682] CPU: 1 PID: 23141 Comm: syz-executor2 Not tainted 4.16.0-rc7+ #373 [ 885.378024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 885.387368] Call Trace: [ 885.389942] dump_stack+0x194/0x24d [ 885.393552] ? arch_local_irq_restore+0x53/0x53 [ 885.398220] ? vsnprintf+0x1ed/0x1900 [ 885.402009] panic+0x1e4/0x41c [ 885.405188] ? refcount_error_report+0x214/0x214 [ 885.409941] ? show_regs_print_info+0x18/0x18 [ 885.414420] ? __warn+0x1c1/0x200 [ 885.417858] ? refcount_sub_and_test+0x167/0x1b0 [ 885.422599] __warn+0x1dc/0x200 [ 885.425864] ? __kasan_slab_free+0x11a/0x170 [ 885.430251] ? refcount_sub_and_test+0x167/0x1b0 [ 885.434989] report_bug+0x1f4/0x2b0 [ 885.438599] fixup_bug.part.10+0x37/0x80 [ 885.442651] do_error_trap+0x2d7/0x3e0 [ 885.446517] ? vprintk_default+0x28/0x30 [ 885.450818] ? math_error+0x400/0x400 [ 885.454595] ? printk+0xaa/0xca [ 885.457852] ? show_regs_print_info+0x18/0x18 [ 885.462330] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 885.467157] do_invalid_op+0x1b/0x20 [ 885.470851] invalid_op+0x1b/0x40 [ 885.474286] RIP: 0010:refcount_sub_and_test+0x167/0x1b0 [ 885.479624] RSP: 0018:ffff8801aa2df318 EFLAGS: 00010282 [ 885.484966] RAX: dffffc0000000008 RBX: 0000000000000000 RCX: ffffffff815b193e [ 885.492212] RDX: 0000000000040000 RSI: ffffc900026cc000 RDI: 1ffff1003545bde8 [ 885.499459] RBP: ffff8801aa2df3a8 R08: ffffffff88583158 R09: 0000000000000000 [ 885.506710] R10: ffff8801aa2df2d0 R11: 0000000000000000 R12: 1ffff1003545be64 [ 885.513961] R13: 00000000ffffffff R14: 0000000000000001 R15: ffff8801b4477260 [ 885.521227] ? vprintk_func+0x5e/0xc0 [ 885.525017] ? refcount_sub_and_test+0x167/0x1b0 [ 885.529757] ? refcount_inc+0x50/0x50 [ 885.533541] ? refcount_inc+0x50/0x50 [ 885.537327] ? ns_capable_common+0xcf/0x160 [ 885.541630] refcount_dec_and_test+0x1a/0x20 [ 885.546023] put_pid_ns+0x9d/0xc0 [ 885.549459] free_nsproxy+0xfa/0x1f0 [ 885.553170] switch_task_namespaces+0x9d/0xc0 [ 885.557648] exit_task_namespaces+0x17/0x20 [ 885.561948] copy_process.part.38+0x3aba/0x4bd0 [ 885.566602] ? __cleanup_sighand+0x40/0x40 [ 885.570827] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 885.576000] ? __lock_acquire+0x664/0x3e00 [ 885.580218] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 885.585400] ? environ_open+0x80/0x80 [ 885.589187] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 885.594354] ? __lock_acquire+0x664/0x3e00 [ 885.598568] ? mntput_no_expire+0x130/0xa90 [ 885.602868] ? print_irqtrace_events+0x270/0x270 [ 885.607601] ? trace_hardirqs_off+0x10/0x10 [ 885.611906] ? lock_acquire+0x1d5/0x580 [ 885.615857] ? trace_hardirqs_off+0x10/0x10 [ 885.620167] ? trace_hardirqs_off+0x10/0x10 [ 885.624491] ? __lock_acquire+0x664/0x3e00 [ 885.628707] ? check_same_owner+0x320/0x320 [ 885.633016] ? find_held_lock+0x35/0x1d0 [ 885.637066] ? _parse_integer+0xe9/0x140 [ 885.641110] ? trace_hardirqs_off+0x10/0x10 [ 885.645410] ? _parse_integer+0x140/0x140 [ 885.649547] ? trace_hardirqs_off+0x10/0x10 [ 885.653851] ? get_pid_task+0x93/0x140 [ 885.657721] ? lock_downgrade+0x980/0x980 [ 885.661853] ? find_held_lock+0x35/0x1d0 [ 885.665901] ? __f_unlock_pos+0x19/0x20 [ 885.669853] ? lock_downgrade+0x980/0x980 [ 885.673985] ? get_pid_task+0xbc/0x140 [ 885.677855] ? proc_fail_nth_write+0x9b/0x1d0 [ 885.682330] ? map_files_get_link+0x3a0/0x3a0 [ 885.686806] ? handle_mm_fault+0x35b/0xb10 [ 885.691029] _do_fork+0x1f7/0xf70 [ 885.694468] ? fork_idle+0x2d0/0x2d0 [ 885.698160] ? wait_for_completion+0x770/0x770 [ 885.702725] ? __lock_is_held+0xb6/0x140 [ 885.706778] ? __sb_end_write+0xa0/0xd0 [ 885.710736] ? fput+0xd2/0x140 [ 885.713915] ? SyS_write+0x184/0x220 [ 885.717614] ? SyS_read+0x220/0x220 [ 885.721224] SyS_clone+0x37/0x50 [ 885.724571] ? sys_vfork+0x30/0x30 [ 885.728095] do_syscall_64+0x281/0x940 [ 885.731968] ? vmalloc_sync_all+0x30/0x30 [ 885.736102] ? _raw_spin_unlock_irq+0x27/0x70 [ 885.740579] ? finish_task_switch+0x1c1/0x7e0 [ 885.745056] ? syscall_return_slowpath+0x550/0x550 [ 885.749968] ? syscall_return_slowpath+0x2ac/0x550 [ 885.754878] ? prepare_exit_to_usermode+0x350/0x350 [ 885.759892] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 885.765237] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 885.770061] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 885.775229] RIP: 0033:0x454e79 [ 885.778397] RSP: 002b:00007f935ae4bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 885.786086] RAX: ffffffffffffffda RBX: 00007f935ae4c6d4 RCX: 0000000000454e79 [ 885.793336] RDX: 00000000200008c0 RSI: 0000000020000800 RDI: 000000002000c100 [ 885.800597] RBP: 000000000072bea0 R08: 0000000020000940 R09: 0000000000000000 [ 885.807860] R10: 0000000020000900 R11: 0000000000000246 R12: 0000000000000014 [ 885.815120] R13: 0000000000000051 R14: 00000000006f2838 R15: 0000000000000028 [ 885.823230] Dumping ftrace buffer: [ 885.826982] (ftrace buffer empty) [ 885.830687] Kernel Offset: disabled [ 885.834321] Rebooting in 86400 seconds..