INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.42' (ECDSA) to the list of known hosts. 2018/04/25 09:55:20 fuzzer started 2018/04/25 09:55:20 dialing manager at 10.128.0.26:38541 syzkaller login: [ 46.772487] can: request_module (can-proto-0) failed. [ 46.783722] can: request_module (can-proto-0) failed. 2018/04/25 09:55:28 kcov=true, comps=false 2018/04/25 09:55:31 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000032fe4)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x9}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 2018/04/25 09:55:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0000)={0x80ffffff, 0x1700000000000000, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x1, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}}}]}, 0x60}, 0x1}, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000140), &(0x7f0000000180)=0x6) 2018/04/25 09:55:31 executing program 7: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_ifreq(r0, 0x8931, &(0x7f0000000080)={'bond_slave_1\x00', @ifru_hwaddr=@link_local={0x1, 0x80, 0xc2}}) 2018/04/25 09:55:31 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020a000007000000000000000000000005001a00ff0200e9ffffffffffffff000000000100000000000000000000ffffffffffff00000038"], 0x38}, 0x1}, 0x0) 2018/04/25 09:55:31 executing program 5: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x4000000000080003, 0x0) setsockopt(r0, 0x107, 0xd, &(0x7f0000001000), 0x47e) mmap(&(0x7f0000399000/0x1000)=nil, 0x40000, 0x0, 0x12, r0, 0x0) clone(0x0, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 2018/04/25 09:55:31 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000080)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14}}, @icmp=@parameter_prob={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}}}}}}, &(0x7f0000000200)) 2018/04/25 09:55:31 executing program 6: r0 = socket$unix(0x1, 0x1, 0x0) recvmsg(r0, &(0x7f0000000c80)={&(0x7f0000000880)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000000c00), 0x0, &(0x7f0000000c40)=""/38, 0x26}, 0x0) 2018/04/25 09:55:31 executing program 3: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x9, 0x101) [ 51.259897] IPVS: ftp: loaded support on port[0] = 21 [ 51.438191] IPVS: ftp: loaded support on port[0] = 21 [ 51.520546] IPVS: ftp: loaded support on port[0] = 21 [ 51.578510] IPVS: ftp: loaded support on port[0] = 21 [ 51.674252] IPVS: ftp: loaded support on port[0] = 21 [ 51.766648] IPVS: ftp: loaded support on port[0] = 21 [ 51.903631] IPVS: ftp: loaded support on port[0] = 21 [ 52.043606] IPVS: ftp: loaded support on port[0] = 21 [ 53.409313] ip (4698) used greatest stack depth: 53944 bytes left [ 54.527727] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.534195] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.561214] device bridge_slave_0 entered promiscuous mode [ 54.655637] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.662132] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.678179] device bridge_slave_0 entered promiscuous mode [ 54.769956] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.776443] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.807208] device bridge_slave_1 entered promiscuous mode [ 54.854363] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.860852] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.894706] device bridge_slave_1 entered promiscuous mode [ 54.939769] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.946239] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.968869] device bridge_slave_0 entered promiscuous mode [ 54.987801] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.994247] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.009976] device bridge_slave_0 entered promiscuous mode [ 55.047994] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 55.090105] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 55.116391] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.122873] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.150559] device bridge_slave_0 entered promiscuous mode [ 55.182846] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.189365] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.222142] device bridge_slave_1 entered promiscuous mode [ 55.241410] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.247839] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.263877] device bridge_slave_1 entered promiscuous mode [ 55.284394] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 55.291774] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.298270] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.323102] device bridge_slave_0 entered promiscuous mode [ 55.355724] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 55.376356] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.382810] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.426296] device bridge_slave_1 entered promiscuous mode [ 55.459167] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.465649] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.481920] device bridge_slave_0 entered promiscuous mode [ 55.490875] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 55.499120] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 55.539851] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.546353] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.574218] device bridge_slave_1 entered promiscuous mode [ 55.652078] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 55.664748] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 55.713430] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.719928] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.756938] device bridge_slave_1 entered promiscuous mode [ 55.776993] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 55.784563] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 55.816900] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 55.863878] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 55.875464] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.881910] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.941175] device bridge_slave_0 entered promiscuous mode [ 55.992562] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 55.999977] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 56.069754] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 56.102315] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 56.146612] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.153162] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.201292] device bridge_slave_1 entered promiscuous mode [ 56.220852] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 56.257313] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 56.303283] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 56.373190] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 56.457685] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 56.479097] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 56.497932] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 56.507686] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 56.514620] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 56.562829] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 56.571779] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 56.578701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 56.654299] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 56.688889] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 56.750945] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 56.797365] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 56.805017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 56.842456] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 56.849802] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 56.889238] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 56.904909] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 56.911857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 56.926411] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 56.933374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 56.972526] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 57.045096] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 57.053651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 57.118540] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 57.126356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 57.151253] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 57.190397] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 57.197821] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 57.228363] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 57.235329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 57.256407] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 57.271762] team0: Port device team_slave_0 added [ 57.355621] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 57.377862] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 57.385960] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 57.484422] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 57.512774] team0: Port device team_slave_1 added [ 57.586700] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 57.596820] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 57.607140] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 57.620919] team0: Port device team_slave_0 added [ 57.642772] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 57.744180] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 57.751217] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 57.768476] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 57.802996] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 57.820506] team0: Port device team_slave_0 added [ 57.839320] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 57.854903] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 57.865192] team0: Port device team_slave_1 added [ 57.881527] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 57.906344] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 57.924789] team0: Port device team_slave_0 added [ 57.943325] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 57.961773] team0: Port device team_slave_0 added [ 57.987695] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 57.997105] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 58.004204] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 58.015862] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 58.048731] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 58.087720] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 58.104265] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 58.136836] team0: Port device team_slave_1 added [ 58.163963] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 58.180925] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 58.209516] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 58.223411] team0: Port device team_slave_1 added [ 58.236847] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 58.245628] team0: Port device team_slave_0 added [ 58.256063] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 58.271125] team0: Port device team_slave_0 added [ 58.278381] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 58.287858] team0: Port device team_slave_1 added [ 58.303121] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 58.324562] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 58.351433] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 58.382800] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 58.390462] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 58.399648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 58.418395] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 58.463752] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 58.481993] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 58.501666] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 58.511130] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 58.520123] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 58.543553] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 58.554073] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 58.562472] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 58.574187] team0: Port device team_slave_1 added [ 58.594088] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 58.601780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 58.619765] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 58.655168] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 58.686292] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 58.707331] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 58.717501] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 58.726741] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 58.735410] team0: Port device team_slave_1 added [ 58.742585] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 58.749915] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 58.758889] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 58.794592] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 58.803351] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 58.815243] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 58.831671] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 58.847988] team0: Port device team_slave_0 added [ 58.854610] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 58.862220] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 58.869595] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 58.882270] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 58.911351] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 58.937482] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 58.952244] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 58.961208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 58.983746] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 59.004073] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 59.018185] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 59.026818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 59.038431] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 59.046673] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 59.054647] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 59.064262] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 59.072514] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 59.098614] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 59.137158] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 59.169896] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 59.194449] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 59.204550] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 59.213248] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 59.221579] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 59.231603] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 59.239438] team0: Port device team_slave_1 added [ 59.271217] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 59.283656] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 59.293365] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 59.304668] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 59.316627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 59.356347] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 59.389731] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 59.419682] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 59.441569] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 59.456137] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 59.465604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 59.473673] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 59.500553] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 59.516524] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 59.536412] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 59.546189] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 59.564577] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 59.596084] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 59.635230] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 59.673682] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 59.691733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 59.744280] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 59.751245] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 59.771145] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 59.802589] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 59.811224] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 59.847300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 59.888223] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 59.904107] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 59.922418] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 59.974098] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 59.987346] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 60.002277] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 60.196014] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 60.203584] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 60.220200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 61.109213] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.115704] bridge0: port 2(bridge_slave_1) entered forwarding state [ 61.122574] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.129085] bridge0: port 1(bridge_slave_0) entered forwarding state [ 61.189213] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 61.560180] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 61.651925] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.658409] bridge0: port 2(bridge_slave_1) entered forwarding state [ 61.665271] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.671729] bridge0: port 1(bridge_slave_0) entered forwarding state [ 61.729121] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 61.784298] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.790792] bridge0: port 2(bridge_slave_1) entered forwarding state [ 61.797662] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.804150] bridge0: port 1(bridge_slave_0) entered forwarding state [ 61.837669] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 61.862894] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.869390] bridge0: port 2(bridge_slave_1) entered forwarding state [ 61.876293] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.882764] bridge0: port 1(bridge_slave_0) entered forwarding state [ 61.905876] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 62.119188] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.125667] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.132535] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.139198] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.182402] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 62.252880] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.259371] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.266257] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.272721] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.311183] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 62.521772] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.528253] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.535176] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.541659] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.552141] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 62.624213] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 62.641403] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 62.664062] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 62.691824] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 62.719984] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 62.728427] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 62.786375] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.792878] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.799790] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.806252] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.845100] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 63.648541] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 70.623539] 8021q: adding VLAN 0 to HW filter on device bond0 [ 70.659012] 8021q: adding VLAN 0 to HW filter on device bond0 [ 70.861233] 8021q: adding VLAN 0 to HW filter on device bond0 [ 70.916938] 8021q: adding VLAN 0 to HW filter on device bond0 [ 71.147188] 8021q: adding VLAN 0 to HW filter on device bond0 [ 71.164410] 8021q: adding VLAN 0 to HW filter on device bond0 [ 71.402681] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 71.413581] 8021q: adding VLAN 0 to HW filter on device bond0 [ 71.495943] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 71.639677] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 71.772391] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 71.790499] 8021q: adding VLAN 0 to HW filter on device bond0 [ 71.889304] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 72.048927] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 72.228533] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 72.235338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 72.251323] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 72.280174] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 72.317795] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 72.324168] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 72.345309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 72.512255] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 72.519604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 72.527595] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 72.609700] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 72.618182] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 72.629908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 72.727247] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 72.796960] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 72.804503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 72.823632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 72.926408] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 72.932735] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 72.945869] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 73.014944] 8021q: adding VLAN 0 to HW filter on device team0 [ 73.180313] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 73.187973] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 73.201130] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 73.225010] 8021q: adding VLAN 0 to HW filter on device team0 [ 73.335602] 8021q: adding VLAN 0 to HW filter on device team0 [ 73.464569] 8021q: adding VLAN 0 to HW filter on device team0 [ 73.700335] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 73.706660] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 73.723258] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 73.753788] 8021q: adding VLAN 0 to HW filter on device team0 [ 73.791776] 8021q: adding VLAN 0 to HW filter on device team0 [ 74.012898] 8021q: adding VLAN 0 to HW filter on device team0 [ 74.490510] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/25 09:55:59 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000003031900000007000000068100022b0509000100010100ff3ffe58", 0x1f}], 0x1) 2018/04/25 09:55:59 executing program 4: 2018/04/25 09:55:59 executing program 3: 2018/04/25 09:55:59 executing program 1: 2018/04/25 09:55:59 executing program 4: 2018/04/25 09:55:59 executing program 3: 2018/04/25 09:56:00 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000032fe4)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x9}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 2018/04/25 09:56:00 executing program 3: 2018/04/25 09:56:00 executing program 5: 2018/04/25 09:56:00 executing program 1: 2018/04/25 09:56:00 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000080)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14}}, @icmp=@parameter_prob={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}}}}}}, &(0x7f0000000200)) 2018/04/25 09:56:00 executing program 4: 2018/04/25 09:56:00 executing program 7: 2018/04/25 09:56:00 executing program 6: 2018/04/25 09:56:00 executing program 1: 2018/04/25 09:56:00 executing program 6: 2018/04/25 09:56:00 executing program 5: 2018/04/25 09:56:00 executing program 3: 2018/04/25 09:56:00 executing program 4: 2018/04/25 09:56:00 executing program 2: 2018/04/25 09:56:00 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000032fe4)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x9}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 2018/04/25 09:56:00 executing program 7: 2018/04/25 09:56:00 executing program 1: 2018/04/25 09:56:00 executing program 6: 2018/04/25 09:56:00 executing program 4: 2018/04/25 09:56:00 executing program 7: 2018/04/25 09:56:00 executing program 5: 2018/04/25 09:56:00 executing program 3: 2018/04/25 09:56:00 executing program 1: 2018/04/25 09:56:00 executing program 2: 2018/04/25 09:56:00 executing program 6: 2018/04/25 09:56:00 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000032fe4)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x9}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 2018/04/25 09:56:00 executing program 5: 2018/04/25 09:56:00 executing program 7: 2018/04/25 09:56:01 executing program 4: 2018/04/25 09:56:01 executing program 3: 2018/04/25 09:56:01 executing program 1: 2018/04/25 09:56:01 executing program 2: 2018/04/25 09:56:01 executing program 6: 2018/04/25 09:56:01 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) write$binfmt_elf64(r0, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 2018/04/25 09:56:01 executing program 5: 2018/04/25 09:56:01 executing program 7: 2018/04/25 09:56:01 executing program 4: 2018/04/25 09:56:01 executing program 2: 2018/04/25 09:56:01 executing program 6: 2018/04/25 09:56:01 executing program 3: 2018/04/25 09:56:01 executing program 1: 2018/04/25 09:56:01 executing program 7: 2018/04/25 09:56:01 executing program 0: connect$inet6(0xffffffffffffffff, &(0x7f0000032fe4)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x9}, 0x1c) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 2018/04/25 09:56:01 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/wireless\x00') fcntl$lock(r0, 0x7, &(0x7f0000000040)={0x3}) 2018/04/25 09:56:01 executing program 6: 2018/04/25 09:56:01 executing program 4: 2018/04/25 09:56:01 executing program 2: 2018/04/25 09:56:01 executing program 3: 2018/04/25 09:56:01 executing program 1: 2018/04/25 09:56:01 executing program 0: r0 = socket$inet6(0xa, 0x0, 0xff) connect$inet6(r0, &(0x7f0000032fe4)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x9}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 2018/04/25 09:56:01 executing program 7: 2018/04/25 09:56:01 executing program 4: 2018/04/25 09:56:01 executing program 2: 2018/04/25 09:56:01 executing program 1: 2018/04/25 09:56:01 executing program 6: 2018/04/25 09:56:01 executing program 5: 2018/04/25 09:56:01 executing program 3: 2018/04/25 09:56:01 executing program 7: 2018/04/25 09:56:01 executing program 4: 2018/04/25 09:56:01 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x0) connect$inet6(r0, &(0x7f0000032fe4)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x9}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 2018/04/25 09:56:01 executing program 1: 2018/04/25 09:56:01 executing program 3: 2018/04/25 09:56:01 executing program 2: 2018/04/25 09:56:01 executing program 5: 2018/04/25 09:56:01 executing program 6: 2018/04/25 09:56:02 executing program 4: 2018/04/25 09:56:02 executing program 7: 2018/04/25 09:56:02 executing program 1: 2018/04/25 09:56:02 executing program 2: 2018/04/25 09:56:02 executing program 3: 2018/04/25 09:56:02 executing program 6: 2018/04/25 09:56:02 executing program 5: 2018/04/25 09:56:02 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(0xffffffffffffffff, &(0x7f0000032fe4)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x9}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 2018/04/25 09:56:02 executing program 4: 2018/04/25 09:56:02 executing program 2: 2018/04/25 09:56:02 executing program 1: 2018/04/25 09:56:02 executing program 3: 2018/04/25 09:56:02 executing program 7: 2018/04/25 09:56:02 executing program 6: 2018/04/25 09:56:02 executing program 5: 2018/04/25 09:56:02 executing program 4: 2018/04/25 09:56:02 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000032fe4)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 2018/04/25 09:56:02 executing program 1: 2018/04/25 09:56:02 executing program 3: 2018/04/25 09:56:02 executing program 2: 2018/04/25 09:56:02 executing program 7: 2018/04/25 09:56:02 executing program 5: 2018/04/25 09:56:02 executing program 4: 2018/04/25 09:56:02 executing program 6: 2018/04/25 09:56:02 executing program 1: 2018/04/25 09:56:02 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000032fe4)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x9}, 0x1c) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 2018/04/25 09:56:02 executing program 2: 2018/04/25 09:56:02 executing program 3: 2018/04/25 09:56:02 executing program 4: 2018/04/25 09:56:02 executing program 5: 2018/04/25 09:56:02 executing program 6: 2018/04/25 09:56:02 executing program 7: 2018/04/25 09:56:03 executing program 1: 2018/04/25 09:56:03 executing program 2: 2018/04/25 09:56:03 executing program 4: 2018/04/25 09:56:03 executing program 3: 2018/04/25 09:56:03 executing program 7: 2018/04/25 09:56:03 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000032fe4)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x9}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 2018/04/25 09:56:03 executing program 5: 2018/04/25 09:56:03 executing program 6: 2018/04/25 09:56:03 executing program 1: 2018/04/25 09:56:03 executing program 4: 2018/04/25 09:56:03 executing program 7: 2018/04/25 09:56:03 executing program 5: 2018/04/25 09:56:03 executing program 3: 2018/04/25 09:56:03 executing program 6: 2018/04/25 09:56:03 executing program 2: 2018/04/25 09:56:03 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000032fe4)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x9}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 2018/04/25 09:56:03 executing program 1: 2018/04/25 09:56:03 executing program 5: 2018/04/25 09:56:03 executing program 4: 2018/04/25 09:56:03 executing program 3: 2018/04/25 09:56:03 executing program 6: 2018/04/25 09:56:03 executing program 7: 2018/04/25 09:56:03 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000032fe4)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x9}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 2018/04/25 09:56:03 executing program 4: 2018/04/25 09:56:03 executing program 5: 2018/04/25 09:56:03 executing program 2: 2018/04/25 09:56:03 executing program 6: 2018/04/25 09:56:03 executing program 1: 2018/04/25 09:56:03 executing program 7: 2018/04/25 09:56:03 executing program 3: 2018/04/25 09:56:03 executing program 0: 2018/04/25 09:56:03 executing program 6: 2018/04/25 09:56:03 executing program 5: 2018/04/25 09:56:03 executing program 2: 2018/04/25 09:56:03 executing program 4: 2018/04/25 09:56:04 executing program 2: 2018/04/25 09:56:04 executing program 5: 2018/04/25 09:56:04 executing program 7: 2018/04/25 09:56:04 executing program 3: 2018/04/25 09:56:04 executing program 0: 2018/04/25 09:56:04 executing program 6: 2018/04/25 09:56:04 executing program 4: 2018/04/25 09:56:04 executing program 1: 2018/04/25 09:56:04 executing program 5: 2018/04/25 09:56:04 executing program 7: 2018/04/25 09:56:04 executing program 0: 2018/04/25 09:56:04 executing program 2: 2018/04/25 09:56:04 executing program 6: 2018/04/25 09:56:04 executing program 1: 2018/04/25 09:56:04 executing program 4: 2018/04/25 09:56:04 executing program 3: 2018/04/25 09:56:04 executing program 7: 2018/04/25 09:56:04 executing program 0: 2018/04/25 09:56:04 executing program 5: 2018/04/25 09:56:04 executing program 2: 2018/04/25 09:56:04 executing program 6: 2018/04/25 09:56:04 executing program 1: 2018/04/25 09:56:04 executing program 3: 2018/04/25 09:56:04 executing program 7: 2018/04/25 09:56:04 executing program 4: 2018/04/25 09:56:04 executing program 2: 2018/04/25 09:56:04 executing program 0: 2018/04/25 09:56:04 executing program 5: 2018/04/25 09:56:04 executing program 7: 2018/04/25 09:56:04 executing program 1: 2018/04/25 09:56:04 executing program 6: 2018/04/25 09:56:04 executing program 3: 2018/04/25 09:56:05 executing program 5: 2018/04/25 09:56:05 executing program 3: 2018/04/25 09:56:05 executing program 4: 2018/04/25 09:56:05 executing program 0: 2018/04/25 09:56:05 executing program 1: 2018/04/25 09:56:05 executing program 2: 2018/04/25 09:56:05 executing program 7: 2018/04/25 09:56:05 executing program 1: 2018/04/25 09:56:05 executing program 6: mkdir(&(0x7f0000226000)='./control\x00', 0x0) r0 = open(&(0x7f0000ac3000)='./control\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000016ff8)='./file0\x00', 0x0) unlinkat(r0, &(0x7f0000000240)='./file0\x00', 0x200) 2018/04/25 09:56:05 executing program 0: 2018/04/25 09:56:05 executing program 4: 2018/04/25 09:56:05 executing program 2: 2018/04/25 09:56:05 executing program 7: 2018/04/25 09:56:05 executing program 3: 2018/04/25 09:56:05 executing program 5: 2018/04/25 09:56:05 executing program 5: 2018/04/25 09:56:05 executing program 1: 2018/04/25 09:56:05 executing program 3: 2018/04/25 09:56:05 executing program 4: 2018/04/25 09:56:05 executing program 2: 2018/04/25 09:56:05 executing program 6: 2018/04/25 09:56:05 executing program 0: 2018/04/25 09:56:05 executing program 7: 2018/04/25 09:56:05 executing program 2: 2018/04/25 09:56:05 executing program 5: 2018/04/25 09:56:05 executing program 1: 2018/04/25 09:56:05 executing program 3: 2018/04/25 09:56:05 executing program 4: 2018/04/25 09:56:05 executing program 7: 2018/04/25 09:56:05 executing program 6: 2018/04/25 09:56:05 executing program 0: 2018/04/25 09:56:05 executing program 5: 2018/04/25 09:56:05 executing program 7: 2018/04/25 09:56:05 executing program 1: 2018/04/25 09:56:05 executing program 3: 2018/04/25 09:56:06 executing program 4: 2018/04/25 09:56:06 executing program 2: 2018/04/25 09:56:06 executing program 5: 2018/04/25 09:56:06 executing program 6: 2018/04/25 09:56:06 executing program 0: 2018/04/25 09:56:06 executing program 7: 2018/04/25 09:56:06 executing program 1: 2018/04/25 09:56:06 executing program 3: 2018/04/25 09:56:06 executing program 2: 2018/04/25 09:56:06 executing program 6: 2018/04/25 09:56:06 executing program 4: 2018/04/25 09:56:06 executing program 5: 2018/04/25 09:56:06 executing program 3: 2018/04/25 09:56:06 executing program 7: 2018/04/25 09:56:06 executing program 1: 2018/04/25 09:56:06 executing program 0: 2018/04/25 09:56:06 executing program 2: 2018/04/25 09:56:06 executing program 5: 2018/04/25 09:56:06 executing program 4: 2018/04/25 09:56:06 executing program 6: 2018/04/25 09:56:06 executing program 7: 2018/04/25 09:56:06 executing program 3: 2018/04/25 09:56:06 executing program 1: 2018/04/25 09:56:06 executing program 0: 2018/04/25 09:56:06 executing program 2: 2018/04/25 09:56:06 executing program 4: 2018/04/25 09:56:06 executing program 6: 2018/04/25 09:56:06 executing program 5: 2018/04/25 09:56:06 executing program 3: 2018/04/25 09:56:06 executing program 1: 2018/04/25 09:56:06 executing program 0: 2018/04/25 09:56:06 executing program 7: 2018/04/25 09:56:06 executing program 2: 2018/04/25 09:56:07 executing program 4: 2018/04/25 09:56:07 executing program 6: 2018/04/25 09:56:07 executing program 1: 2018/04/25 09:56:07 executing program 0: 2018/04/25 09:56:07 executing program 3: 2018/04/25 09:56:07 executing program 5: 2018/04/25 09:56:07 executing program 7: 2018/04/25 09:56:07 executing program 2: 2018/04/25 09:56:07 executing program 6: 2018/04/25 09:56:07 executing program 4: 2018/04/25 09:56:07 executing program 0: 2018/04/25 09:56:07 executing program 1: 2018/04/25 09:56:07 executing program 3: 2018/04/25 09:56:07 executing program 4: 2018/04/25 09:56:07 executing program 2: 2018/04/25 09:56:07 executing program 0: 2018/04/25 09:56:07 executing program 7: 2018/04/25 09:56:07 executing program 5: 2018/04/25 09:56:07 executing program 6: 2018/04/25 09:56:07 executing program 3: 2018/04/25 09:56:07 executing program 1: 2018/04/25 09:56:07 executing program 2: 2018/04/25 09:56:07 executing program 4: 2018/04/25 09:56:07 executing program 6: 2018/04/25 09:56:07 executing program 4: 2018/04/25 09:56:07 executing program 0: 2018/04/25 09:56:07 executing program 1: 2018/04/25 09:56:07 executing program 7: 2018/04/25 09:56:07 executing program 5: 2018/04/25 09:56:07 executing program 3: 2018/04/25 09:56:07 executing program 2: 2018/04/25 09:56:07 executing program 0: 2018/04/25 09:56:07 executing program 6: 2018/04/25 09:56:07 executing program 2: 2018/04/25 09:56:08 executing program 7: 2018/04/25 09:56:08 executing program 5: 2018/04/25 09:56:08 executing program 4: 2018/04/25 09:56:08 executing program 3: 2018/04/25 09:56:08 executing program 1: 2018/04/25 09:56:08 executing program 2: 2018/04/25 09:56:08 executing program 3: 2018/04/25 09:56:08 executing program 4: 2018/04/25 09:56:08 executing program 7: 2018/04/25 09:56:08 executing program 0: 2018/04/25 09:56:08 executing program 6: 2018/04/25 09:56:08 executing program 5: 2018/04/25 09:56:08 executing program 2: 2018/04/25 09:56:08 executing program 1: 2018/04/25 09:56:08 executing program 0: 2018/04/25 09:56:08 executing program 6: 2018/04/25 09:56:08 executing program 4: 2018/04/25 09:56:08 executing program 5: 2018/04/25 09:56:08 executing program 7: 2018/04/25 09:56:08 executing program 3: 2018/04/25 09:56:08 executing program 2: 2018/04/25 09:56:08 executing program 1: 2018/04/25 09:56:08 executing program 6: 2018/04/25 09:56:08 executing program 4: 2018/04/25 09:56:08 executing program 0: 2018/04/25 09:56:08 executing program 5: 2018/04/25 09:56:08 executing program 7: 2018/04/25 09:56:08 executing program 3: 2018/04/25 09:56:08 executing program 2: 2018/04/25 09:56:08 executing program 6: 2018/04/25 09:56:09 executing program 0: 2018/04/25 09:56:09 executing program 4: 2018/04/25 09:56:09 executing program 1: 2018/04/25 09:56:09 executing program 7: 2018/04/25 09:56:09 executing program 2: 2018/04/25 09:56:09 executing program 5: 2018/04/25 09:56:09 executing program 3: 2018/04/25 09:56:09 executing program 6: 2018/04/25 09:56:09 executing program 1: 2018/04/25 09:56:09 executing program 2: 2018/04/25 09:56:09 executing program 4: 2018/04/25 09:56:09 executing program 0: 2018/04/25 09:56:09 executing program 6: 2018/04/25 09:56:09 executing program 7: 2018/04/25 09:56:09 executing program 5: 2018/04/25 09:56:09 executing program 3: 2018/04/25 09:56:09 executing program 2: 2018/04/25 09:56:09 executing program 1: 2018/04/25 09:56:09 executing program 0: 2018/04/25 09:56:09 executing program 6: 2018/04/25 09:56:09 executing program 3: 2018/04/25 09:56:09 executing program 4: 2018/04/25 09:56:09 executing program 7: 2018/04/25 09:56:09 executing program 5: 2018/04/25 09:56:09 executing program 1: 2018/04/25 09:56:09 executing program 2: 2018/04/25 09:56:09 executing program 0: 2018/04/25 09:56:09 executing program 6: 2018/04/25 09:56:09 executing program 3: 2018/04/25 09:56:09 executing program 5: 2018/04/25 09:56:09 executing program 7: 2018/04/25 09:56:09 executing program 0: 2018/04/25 09:56:09 executing program 4: 2018/04/25 09:56:09 executing program 3: 2018/04/25 09:56:09 executing program 6: 2018/04/25 09:56:09 executing program 2: 2018/04/25 09:56:09 executing program 1: 2018/04/25 09:56:09 executing program 7: 2018/04/25 09:56:09 executing program 5: 2018/04/25 09:56:10 executing program 0: 2018/04/25 09:56:10 executing program 1: 2018/04/25 09:56:10 executing program 6: 2018/04/25 09:56:10 executing program 3: 2018/04/25 09:56:10 executing program 4: 2018/04/25 09:56:10 executing program 2: 2018/04/25 09:56:10 executing program 5: 2018/04/25 09:56:10 executing program 7: 2018/04/25 09:56:10 executing program 0: 2018/04/25 09:56:10 executing program 6: 2018/04/25 09:56:10 executing program 1: 2018/04/25 09:56:10 executing program 4: 2018/04/25 09:56:10 executing program 5: 2018/04/25 09:56:10 executing program 3: 2018/04/25 09:56:10 executing program 2: 2018/04/25 09:56:10 executing program 7: 2018/04/25 09:56:10 executing program 1: 2018/04/25 09:56:10 executing program 0: 2018/04/25 09:56:10 executing program 6: 2018/04/25 09:56:10 executing program 5: 2018/04/25 09:56:10 executing program 4: 2018/04/25 09:56:10 executing program 7: 2018/04/25 09:56:10 executing program 0: 2018/04/25 09:56:10 executing program 1: 2018/04/25 09:56:10 executing program 5: 2018/04/25 09:56:10 executing program 3: 2018/04/25 09:56:10 executing program 2: 2018/04/25 09:56:10 executing program 4: 2018/04/25 09:56:10 executing program 6: 2018/04/25 09:56:10 executing program 1: 2018/04/25 09:56:10 executing program 7: 2018/04/25 09:56:10 executing program 0: 2018/04/25 09:56:11 executing program 2: 2018/04/25 09:56:11 executing program 3: 2018/04/25 09:56:11 executing program 5: 2018/04/25 09:56:11 executing program 4: 2018/04/25 09:56:11 executing program 1: 2018/04/25 09:56:11 executing program 6: 2018/04/25 09:56:11 executing program 7: 2018/04/25 09:56:11 executing program 0: 2018/04/25 09:56:11 executing program 2: 2018/04/25 09:56:11 executing program 3: 2018/04/25 09:56:11 executing program 5: 2018/04/25 09:56:11 executing program 4: 2018/04/25 09:56:11 executing program 3: 2018/04/25 09:56:11 executing program 1: 2018/04/25 09:56:11 executing program 0: 2018/04/25 09:56:11 executing program 6: 2018/04/25 09:56:11 executing program 7: 2018/04/25 09:56:11 executing program 2: 2018/04/25 09:56:11 executing program 5: 2018/04/25 09:56:11 executing program 2: 2018/04/25 09:56:11 executing program 5: 2018/04/25 09:56:11 executing program 1: 2018/04/25 09:56:11 executing program 7: 2018/04/25 09:56:11 executing program 3: 2018/04/25 09:56:11 executing program 4: 2018/04/25 09:56:11 executing program 0: 2018/04/25 09:56:11 executing program 6: 2018/04/25 09:56:11 executing program 2: 2018/04/25 09:56:11 executing program 7: 2018/04/25 09:56:11 executing program 5: 2018/04/25 09:56:11 executing program 1: 2018/04/25 09:56:11 executing program 0: 2018/04/25 09:56:11 executing program 3: 2018/04/25 09:56:11 executing program 4: 2018/04/25 09:56:11 executing program 6: 2018/04/25 09:56:12 executing program 7: 2018/04/25 09:56:12 executing program 5: 2018/04/25 09:56:12 executing program 0: 2018/04/25 09:56:12 executing program 4: 2018/04/25 09:56:12 executing program 2: 2018/04/25 09:56:12 executing program 1: 2018/04/25 09:56:12 executing program 6: 2018/04/25 09:56:12 executing program 3: 2018/04/25 09:56:12 executing program 4: 2018/04/25 09:56:12 executing program 0: 2018/04/25 09:56:12 executing program 7: r0 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 2018/04/25 09:56:12 executing program 5: 2018/04/25 09:56:12 executing program 2: 2018/04/25 09:56:12 executing program 1: 2018/04/25 09:56:12 executing program 6: 2018/04/25 09:56:12 executing program 0: 2018/04/25 09:56:12 executing program 4: 2018/04/25 09:56:12 executing program 3: 2018/04/25 09:56:12 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b9bff0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) ioctl$int_in(r0, 0x0, &(0x7f0000000000)) open(&(0x7f0000000000)='./bus\x00', 0x100000141841, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, &(0x7f00000005c0), 0x1000, &(0x7f0000000340)=ANY=[]) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, &(0x7f0000000400), 0x1000, &(0x7f0000000180)=ANY=[]) creat(&(0x7f0000000200)='./bus\x00', 0x0) sendto$inet(r0, &(0x7f0000000080), 0x0, 0x20020003, &(0x7f0000385ff0)={0x2, 0x20000000004e21, @loopback=0x7f000001}, 0x10) recvfrom$inet(r0, &(0x7f0000769f0f)=""/241, 0xfffffffffffffdd4, 0x0, &(0x7f0000497ff0)={0x2, 0x0, @broadcast=0xffffffff}, 0x4e) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000000080)) shutdown(r0, 0x2) syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./bus\x00', 0x7fffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000000240), 0x0, 0x7fffffff}], 0x0, &(0x7f00000002c0)={[{@show_sys_files_no={'show_sys_files=no', 0x3d, [0x0, 0x0]}, 0x2c}, {@disable_sparse_no={'disable_sparse=no', 0x3d, [0x3f, 0x0, 0x34]}, 0x2c}, {@utf8='utf8', 0x2c}, {@errors_recover='errors=recover', 0x2c}, {@umask={'umask', 0x3d, [0x32]}, 0x2c}, {@utf8='utf8', 0x2c}]}) 2018/04/25 09:56:12 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000bb3f0a)=""/246) close(r0) 2018/04/25 09:56:12 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='veth1_to_bridge\x00', 0x10) sendto$inet(r0, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) 2018/04/25 09:56:13 executing program 4: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20000, 0x51) unlinkat(r0, &(0x7f0000000140)='./file0\x00', 0x200) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x400000, 0x8) fcntl$setstatus(r0, 0x4, 0x2000) io_setup(0x9, &(0x7f00000001c0)=0x0) io_destroy(r2) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x800000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00080000ec0500001302000012000000e2090000000200000001000084811f4ce10000001e000000000000000010ec0302000100526549734572334673000000030000000200010000000102010000000d000000000000000000000000000000000000000000000000000000000000000000000001001e007b78be5a00", 0x7d, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x0) io_setup(0x1, &(0x7f00000003c0)=0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000380)) splice(r0, &(0x7f0000000300), r1, &(0x7f0000000340), 0x0, 0x0) io_destroy(r3) mknodat(r1, &(0x7f0000000400)='./file0\x00', 0x2, 0x844) io_destroy(0x0) syncfs(r1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000240)="7e93c1ce14028ca86887e21befb2d3ae64f0da1ea4c1e502daddb04c8d23a4c0714416d306ce558e2baa4fd82c17bb1443fc94e6e788e832cebe07d105cbc283b29e9238bd257f4b7d57a379dc3f357bb8c0f6199b59b69592b6148074b335c3b137e68fd3540201b8601360ff30fb3d0039c7a4003817760b6ea665e8978a65916d7a70", 0x84}], 0x1, 0x0) ftruncate(r1, 0xfffffffffffffffc) 2018/04/25 09:56:13 executing program 0: syz_emit_ethernet(0x2a, &(0x7f000037c000)={@link_local={0x1, 0x80, 0xc2}, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @multicast1=0xe0000001}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) 2018/04/25 09:56:13 executing program 6 (fault-call:2 fault-nth:0): r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000032fe4)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x9}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 2018/04/25 09:56:13 executing program 3: r0 = socket$inet6(0xa, 0x80005, 0x0) setsockopt(r0, 0x0, 0x21, &(0x7f0000000000)='\x00\x00', 0x2) 2018/04/25 09:56:13 executing program 7: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) eventfd(0x0) r1 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000580), 0x3a158aaa0f166cea, r0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r0) keyctl$dh_compute(0x17, &(0x7f0000000580)={0x0, r1}, &(0x7f00000005c0)=""/175, 0xaf, 0x0) socket$inet6_icmp(0xa, 0x2, 0x3a) 2018/04/25 09:56:13 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f00000000c0)='./bus\x00', 0x0, 0x8}, 0x10) open(&(0x7f0000000040)='./bus/file0\x00', 0x0, 0x100000000000000) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000000780)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "312bc93c658ec68ea70a116eb9f11cc2f853b5a2b8242a83b00400280f07f9c333c8e514aed03523191cb7422301c7ad0f18b94fe8d0ccdc8df0e00b3de64798", "b6aaafa35d388f72fc3ebe1321047bfa323430969e4cbefb938949b727a185ca0c4dba22af39e703881c524c44d460ac0b94fbc870b8519df507394704027698", "e5fad256a9708800574e81a03d1da8905018c8da067f8e39d557828ebe61faa1"}) 2018/04/25 09:56:13 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b9bff0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) ioctl$int_in(r0, 0x0, &(0x7f0000000000)) open(&(0x7f0000000000)='./bus\x00', 0x100000141841, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, &(0x7f00000005c0), 0x1000, &(0x7f0000000340)=ANY=[]) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, &(0x7f0000000400), 0x1000, &(0x7f0000000180)=ANY=[]) creat(&(0x7f0000000200)='./bus\x00', 0x0) sendto$inet(r0, &(0x7f0000000080), 0x0, 0x20020003, &(0x7f0000385ff0)={0x2, 0x20000000004e21, @loopback=0x7f000001}, 0x10) recvfrom$inet(r0, &(0x7f0000769f0f)=""/241, 0xfffffffffffffdd4, 0x0, &(0x7f0000497ff0)={0x2, 0x0, @broadcast=0xffffffff}, 0x4e) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000000080)) shutdown(r0, 0x2) syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./bus\x00', 0x7fffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000000240), 0x0, 0x7fffffff}], 0x0, &(0x7f00000002c0)={[{@show_sys_files_no={'show_sys_files=no', 0x3d, [0x0, 0x0]}, 0x2c}, {@disable_sparse_no={'disable_sparse=no', 0x3d, [0x3f, 0x0, 0x34]}, 0x2c}, {@utf8='utf8', 0x2c}, {@errors_recover='errors=recover', 0x2c}, {@umask={'umask', 0x3d, [0x32]}, 0x2c}, {@utf8='utf8', 0x2c}]}) 2018/04/25 09:56:13 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000bb3f0a)=""/246) close(r0) [ 92.642946] FAULT_INJECTION: forcing a failure. [ 92.642946] name failslab, interval 1, probability 0, space 0, times 1 [ 92.654658] CPU: 0 PID: 7529 Comm: syz-executor6 Not tainted 4.16.0+ #87 [ 92.661525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 92.670903] Call Trace: [ 92.673539] dump_stack+0x185/0x1d0 [ 92.677214] should_fail+0x87b/0xab0 [ 92.680976] should_failslab+0x279/0x2a0 [ 92.685085] kmem_cache_alloc+0x136/0xb90 [ 92.689282] ? rt6_score_route+0xa5f/0xc30 [ 92.693552] ? dst_alloc+0x295/0x860 [ 92.697356] dst_alloc+0x295/0x860 [ 92.700937] ip6_rt_cache_alloc+0x445/0xd00 [ 92.705357] ip6_pol_route+0x3f19/0x5da0 [ 92.709487] ip6_pol_route_output+0xe6/0x110 [ 92.713949] fib6_rule_lookup+0x2d0/0x720 [ 92.718136] ? ip6_route_output_flags+0x590/0x590 [ 92.723061] ip6_route_output_flags+0x4fa/0x590 [ 92.727779] ip6_dst_lookup_tail+0x2fe/0x1a60 [ 92.732363] ? kmsan_set_origin+0x9e/0x160 [ 92.736640] ? __msan_metadata_ptr_for_load_8+0x10/0x20 2018/04/25 09:56:13 executing program 7: unshare(0x40600) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000633000)='/dev/ptmx\x00', 0x1000000000000000, 0x0) ioctl$TIOCCONS(r0, 0x541d) [ 92.742083] ? kmsan_set_origin_inline+0x6b/0x120 [ 92.746987] ip6_dst_lookup_flow+0xfc/0x270 [ 92.751355] rawv6_sendmsg+0x1b05/0x4fb0 [ 92.755497] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 92.760942] ? compat_rawv6_ioctl+0x100/0x100 [ 92.765474] inet_sendmsg+0x48d/0x740 [ 92.769330] ? security_socket_sendmsg+0x9e/0x210 [ 92.774254] ? inet_getname+0x500/0x500 [ 92.778310] sock_write_iter+0x3b9/0x470 [ 92.782432] ? sock_read_iter+0x480/0x480 [ 92.786619] __vfs_write+0x7fb/0x9f0 2018/04/25 09:56:13 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) listxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=""/176, 0xb0) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) r1 = syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0xffffffff, 0x80002) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r1, 0xc0a85322, &(0x7f0000000200)) sendto$inet(r0, &(0x7f0000eddffe)='(', 0x1, 0x1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x7) shutdown(r0, 0x2) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x14) [ 92.790392] vfs_write+0x463/0x8d0 [ 92.794041] SYSC_write+0x172/0x360 [ 92.797789] SyS_write+0x55/0x80 [ 92.801264] do_syscall_64+0x309/0x430 [ 92.805207] ? SYSC_read+0x360/0x360 [ 92.808967] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 92.814180] RIP: 0033:0x455389 [ 92.817386] RSP: 002b:00007f3d88fb1c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 92.825133] RAX: ffffffffffffffda RBX: 00007f3d88fb26d4 RCX: 0000000000455389 [ 92.832425] RDX: 0000000000000078 RSI: 0000000020000000 RDI: 0000000000000013 2018/04/25 09:56:13 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100000}, 0xc) pread64(r0, &(0x7f0000000100)=""/108, 0x6c, 0x0) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) mmap(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x0, 0x11, r1, 0x0) mmap(&(0x7f0000f99000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) [ 92.839716] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 92.847009] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 92.854644] R13: 00000000000006c4 R14: 00000000006fd300 R15: 0000000000000000 2018/04/25 09:56:14 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000018000)=0x1, 0x4) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) rt_tgsigqueueinfo(r1, r2, 0x1, &(0x7f0000000080)={0x2e, 0x100000000, 0x0, 0xfff}) bind$inet(r0, &(0x7f0000003ff0)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendto$inet(r0, &(0x7f000001d000)="a9", 0x1, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r0, 0x7) accept4(r0, 0x0, &(0x7f0000021000), 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000100)=0x4, 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000000c0)=[@in={0x2, 0x0, @multicast1=0xe0000001}], 0x10) 2018/04/25 09:56:14 executing program 4: r0 = semget(0x0, 0x3, 0x2) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000180)=""/50) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xfffffffffffffff8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) keyctl$search(0xa, r2, &(0x7f0000000080)='logon\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0xfffffffffffffffa) 2018/04/25 09:56:14 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000a38000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f00008d9ff8)=@abs={0x1}, 0x8) write$binfmt_aout(r2, &(0x7f00000003c0)=ANY=[], 0x0) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x200, 0x0) ioctl$sock_inet_SIOCDARP(r3, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @broadcast=0xffffffff}, {0x7, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x64, {0x2, 0x4e20, @multicast2=0xe0000002}, 'gre0\x00'}) connect$unix(r1, &(0x7f00000bc000)=@abs={0x1}, 0x8) connect$unix(r1, &(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) 2018/04/25 09:56:14 executing program 7: unshare(0x40600) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000633000)='/dev/ptmx\x00', 0x1000000000000000, 0x0) ioctl$TIOCCONS(r0, 0x541d) 2018/04/25 09:56:14 executing program 6 (fault-call:2 fault-nth:1): r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000032fe4)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x9}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 2018/04/25 09:56:14 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) close(r0) fcntl$dupfd(r1, 0x0, r0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) 2018/04/25 09:56:14 executing program 4: r0 = semget(0x0, 0x3, 0x2) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000180)=""/50) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xfffffffffffffff8) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) keyctl$search(0xa, r2, &(0x7f0000000080)='logon\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0xfffffffffffffffa) [ 93.316503] FAULT_INJECTION: forcing a failure. [ 93.316503] name failslab, interval 1, probability 0, space 0, times 0 [ 93.327887] CPU: 0 PID: 7578 Comm: syz-executor6 Not tainted 4.16.0+ #87 [ 93.334750] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 93.344128] Call Trace: [ 93.346762] dump_stack+0x185/0x1d0 [ 93.350440] should_fail+0x87b/0xab0 [ 93.354208] should_failslab+0x279/0x2a0 [ 93.358334] kmem_cache_alloc_node+0x151/0xc70 [ 93.362972] ? __alloc_skb+0x203/0x9f0 2018/04/25 09:56:14 executing program 7: unshare(0x40600) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000633000)='/dev/ptmx\x00', 0x1000000000000000, 0x0) ioctl$TIOCCONS(r0, 0x541d) [ 93.366952] __alloc_skb+0x203/0x9f0 [ 93.370765] ? __msan_poison_alloca+0x15c/0x1d0 [ 93.375480] alloc_skb_with_frags+0x1d4/0xb20 [ 93.380017] ? kmsan_set_origin_inline+0x6b/0x120 [ 93.384911] sock_alloc_send_pskb+0xb56/0x1190 [ 93.389541] sock_alloc_send_skb+0xca/0xe0 [ 93.393828] rawv6_sendmsg+0x2e6a/0x4fb0 [ 93.397971] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 93.403419] ? compat_rawv6_ioctl+0x100/0x100 [ 93.407950] inet_sendmsg+0x48d/0x740 [ 93.411803] ? security_socket_sendmsg+0x9e/0x210 2018/04/25 09:56:14 executing program 2: mount(&(0x7f00007a3ff8)='./file0\x00', &(0x7f00004f5ff8)='./file0\x00', &(0x7f00000e1000)='ramfs\x00', 0x8409, &(0x7f0000c81ffe)) unshare(0x40600) r0 = openat(0xffffffffffffff9c, &(0x7f0000012ff8)='./file0\x00', 0x0, 0x0) fsetxattr(r0, &(0x7f0000000100)=@known='system.sockprotoname\x00', &(0x7f0000000140)='user.syz\x00', 0x9, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) syz_open_procfs(r1, &(0x7f0000000080)='autogroup\x00') [ 93.416746] ? inet_getname+0x500/0x500 [ 93.420803] sock_write_iter+0x3b9/0x470 [ 93.424935] ? sock_read_iter+0x480/0x480 [ 93.429120] __vfs_write+0x7fb/0x9f0 [ 93.432896] vfs_write+0x463/0x8d0 [ 93.436540] SYSC_write+0x172/0x360 [ 93.440281] SyS_write+0x55/0x80 [ 93.443741] do_syscall_64+0x309/0x430 [ 93.447683] ? SYSC_read+0x360/0x360 [ 93.451438] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 93.456650] RIP: 0033:0x455389 [ 93.459857] RSP: 002b:00007f3d88fb1c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 93.467607] RAX: ffffffffffffffda RBX: 00007f3d88fb26d4 RCX: 0000000000455389 [ 93.474900] RDX: 0000000000000078 RSI: 0000000020000000 RDI: 0000000000000013 [ 93.482239] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 93.489530] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 93.496833] R13: 00000000000006c4 R14: 00000000006fd300 R15: 0000000000000001 2018/04/25 09:56:14 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmsg(r2, &(0x7f0000000080)={&(0x7f0000002c00)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000040), 0x0, &(0x7f0000002fc0)=""/182, 0xb6}, 0x2000) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x401) fcntl$getownex(r1, 0x10, &(0x7f0000000040)={0x0, 0x0}) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x4, 0x8, 0x142c, 0x8, 0x0, 0x100000000, 0x40, 0x4, 0xb4c, 0x1000, 0x7, 0x5, 0x8, 0x0, 0x200, 0x7fff, 0x9, 0x3, 0x3, 0x5, 0x307d, 0x0, 0x1, 0x9, 0x2, 0x1, 0x401, 0x2, 0x7, 0x8, 0x7, 0x3, 0x1000, 0x7fff, 0x9, 0x6, 0x0, 0x2, 0x3, @perf_config_ext={0xb0a, 0x7c}, 0x10000, 0x1000, 0x3, 0x7, 0xfff, 0xffffffffffffff01, 0xfff}, r3, 0x7, r0, 0x3) 2018/04/25 09:56:14 executing program 4: r0 = perf_event_open(&(0x7f0000001f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000f1f000/0x2000)=nil, 0x2000, 0xa, 0x11, r0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCMBIS(r1, 0x5416, &(0x7f0000000040)=0x1) mprotect(&(0x7f0000f1f000/0x1000)=nil, 0x1000, 0x3) 2018/04/25 09:56:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x23) sendmmsg(r0, &(0x7f0000003240)=[{{&(0x7f0000001080)=@nl=@kern={0x10, 0x0, 0x0, 0x80000000}, 0x80, &(0x7f0000001440), 0x0, &(0x7f0000001480)=[{0x10}], 0x10}}], 0x1, 0x0) 2018/04/25 09:56:14 executing program 7: unshare(0x40600) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000633000)='/dev/ptmx\x00', 0x1000000000000000, 0x0) ioctl$TIOCCONS(r0, 0x541d) 2018/04/25 09:56:14 executing program 2: r0 = memfd_create(&(0x7f0000d0bffe)="7b10", 0x3) ftruncate(r0, 0x0) fcntl$addseals(r0, 0x409, 0x4) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x3ff, 0xffffffff, 0x8000, 0xc5f, 0x4}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000140)={r1, 0x7, 0x30, 0x10000, 0xa4c}, &(0x7f0000000180)=0x18) io_setup(0x3, &(0x7f0000000000)=0x0) io_submit(r2, 0x1, &(0x7f0000000440)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000040)="e5", 0x1}]) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e) 2018/04/25 09:56:14 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) listxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=""/176, 0xb0) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) r1 = syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0xffffffff, 0x80002) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r1, 0xc0a85322, &(0x7f0000000200)) sendto$inet(r0, &(0x7f0000eddffe)='(', 0x1, 0x1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x7) shutdown(r0, 0x2) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x14) 2018/04/25 09:56:14 executing program 7: unshare(0x40600) openat$ptmx(0xffffffffffffff9c, &(0x7f0000633000)='/dev/ptmx\x00', 0x1000000000000000, 0x0) 2018/04/25 09:56:15 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000018000)=0x1, 0x4) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) rt_tgsigqueueinfo(r1, r2, 0x1, &(0x7f0000000080)={0x2e, 0x100000000, 0x0, 0xfff}) bind$inet(r0, &(0x7f0000003ff0)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendto$inet(r0, &(0x7f000001d000)="a9", 0x1, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r0, 0x7) accept4(r0, 0x0, &(0x7f0000021000), 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000100)=0x4, 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000000c0)=[@in={0x2, 0x0, @multicast1=0xe0000001}], 0x10) 2018/04/25 09:56:15 executing program 3: r0 = socket(0x10, 0x3, 0x6) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=@ipv6_getaddr={0x18, 0x16, 0x109, 0x0, 0x0, {0xa}}, 0x18}, 0x1}, 0x0) 2018/04/25 09:56:15 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) listxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=""/176, 0xb0) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) r1 = syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0xffffffff, 0x80002) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r1, 0xc0a85322, &(0x7f0000000200)) sendto$inet(r0, &(0x7f0000eddffe)='(', 0x1, 0x1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x7) shutdown(r0, 0x2) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x14) 2018/04/25 09:56:15 executing program 1: r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x200000, 0x0) tee(r0, r1, 0x3f, 0x0) fcntl$setstatus(r0, 0x4, 0x2400) 2018/04/25 09:56:15 executing program 4: r0 = perf_event_open(&(0x7f0000001f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000f1f000/0x2000)=nil, 0x2000, 0xa, 0x11, r0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCMBIS(r1, 0x5416, &(0x7f0000000040)=0x1) mprotect(&(0x7f0000f1f000/0x1000)=nil, 0x1000, 0x3) 2018/04/25 09:56:15 executing program 6 (fault-call:2 fault-nth:2): r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000032fe4)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x9}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 2018/04/25 09:56:15 executing program 7: openat$ptmx(0xffffffffffffff9c, &(0x7f0000633000)='/dev/ptmx\x00', 0x1000000000000000, 0x0) 2018/04/25 09:56:15 executing program 2: r0 = memfd_create(&(0x7f0000d0bffe)="7b10", 0x3) ftruncate(r0, 0x0) fcntl$addseals(r0, 0x409, 0x4) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x3ff, 0xffffffff, 0x8000, 0xc5f, 0x4}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000140)={r1, 0x7, 0x30, 0x10000, 0xa4c}, &(0x7f0000000180)=0x18) io_setup(0x3, &(0x7f0000000000)=0x0) io_submit(r2, 0x1, &(0x7f0000000440)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000040)="e5", 0x1}]) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e) 2018/04/25 09:56:15 executing program 7: openat$ptmx(0xffffffffffffff9c, &(0x7f0000633000)='/dev/ptmx\x00', 0x0, 0x0) [ 94.722961] FAULT_INJECTION: forcing a failure. [ 94.722961] name failslab, interval 1, probability 0, space 0, times 0 [ 94.734304] CPU: 0 PID: 7646 Comm: syz-executor6 Not tainted 4.16.0+ #87 [ 94.741168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 94.750544] Call Trace: [ 94.753177] dump_stack+0x185/0x1d0 [ 94.756850] should_fail+0x87b/0xab0 [ 94.760668] should_failslab+0x279/0x2a0 [ 94.764792] __kmalloc_node_track_caller+0x243/0x11c0 [ 94.770045] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 94.775449] ? alloc_skb_with_frags+0x1d4/0xb20 [ 94.780209] __alloc_skb+0x2cf/0x9f0 [ 94.784019] ? alloc_skb_with_frags+0x1d4/0xb20 [ 94.788765] ? __msan_poison_alloca+0x15c/0x1d0 [ 94.793480] alloc_skb_with_frags+0x1d4/0xb20 [ 94.798011] ? kmsan_set_origin_inline+0x6b/0x120 [ 94.802904] sock_alloc_send_pskb+0xb56/0x1190 [ 94.807540] sock_alloc_send_skb+0xca/0xe0 [ 94.811832] rawv6_sendmsg+0x2e6a/0x4fb0 [ 94.815970] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 94.821419] ? compat_rawv6_ioctl+0x100/0x100 [ 94.825948] inet_sendmsg+0x48d/0x740 [ 94.829800] ? security_socket_sendmsg+0x9e/0x210 [ 94.834730] ? inet_getname+0x500/0x500 [ 94.838791] sock_write_iter+0x3b9/0x470 [ 94.842915] ? sock_read_iter+0x480/0x480 [ 94.847100] __vfs_write+0x7fb/0x9f0 [ 94.851466] vfs_write+0x463/0x8d0 [ 94.855111] SYSC_write+0x172/0x360 [ 94.858854] SyS_write+0x55/0x80 [ 94.862314] do_syscall_64+0x309/0x430 [ 94.866254] ? SYSC_read+0x360/0x360 2018/04/25 09:56:15 executing program 7 (fault-call:0 fault-nth:0): openat$ptmx(0xffffffffffffff9c, &(0x7f0000633000)='/dev/ptmx\x00', 0x0, 0x0) [ 94.870005] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 94.875215] RIP: 0033:0x455389 [ 94.878421] RSP: 002b:00007f3d88fb1c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 94.886167] RAX: ffffffffffffffda RBX: 00007f3d88fb26d4 RCX: 0000000000455389 [ 94.893456] RDX: 0000000000000078 RSI: 0000000020000000 RDI: 0000000000000013 [ 94.900745] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 94.908037] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 94.915328] R13: 00000000000006c4 R14: 00000000006fd300 R15: 0000000000000002 [ 94.948123] FAULT_INJECTION: forcing a failure. [ 94.948123] name failslab, interval 1, probability 0, space 0, times 0 [ 94.959652] CPU: 1 PID: 7661 Comm: syz-executor7 Not tainted 4.16.0+ #87 [ 94.966523] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 94.975898] Call Trace: [ 94.978531] dump_stack+0x185/0x1d0 [ 94.982220] should_fail+0x87b/0xab0 [ 94.986028] should_failslab+0x279/0x2a0 [ 94.990177] kmem_cache_alloc+0x136/0xb90 [ 94.994359] ? getname_flags+0x12a/0xaa0 [ 94.998458] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 95.003854] ? fsnotify+0x493/0x18f0 [ 95.007609] getname_flags+0x12a/0xaa0 [ 95.011552] ? SYSC_openat+0xc7/0xe0 [ 95.015298] getname+0x55/0x60 [ 95.018573] do_sys_open+0x52a/0x960 [ 95.022381] SYSC_openat+0xc7/0xe0 [ 95.026005] SyS_openat+0x63/0x90 [ 95.029537] do_syscall_64+0x309/0x430 [ 95.033477] ? SYSC_open+0xc0/0xc0 [ 95.037063] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 95.042276] RIP: 0033:0x455389 2018/04/25 09:56:16 executing program 6 (fault-call:2 fault-nth:3): r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000032fe4)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x9}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 2018/04/25 09:56:16 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x840, 0x0) ioctl$sock_ipx_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={'veth1_to_bridge\x00', {0x4, 0x1b8f75ff, 0x2e0, "99a881ffd94d", 0x9}}) r1 = socket(0x10, 0x802, 0x0) ioctl$sock_ifreq(r1, 0x89a3, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x3, 0x0, @te1=&(0x7f0000000080)}}) 2018/04/25 09:56:16 executing program 4: r0 = perf_event_open(&(0x7f0000001f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000f1f000/0x2000)=nil, 0x2000, 0xa, 0x11, r0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCMBIS(r1, 0x5416, &(0x7f0000000040)=0x1) mprotect(&(0x7f0000f1f000/0x1000)=nil, 0x1000, 0x3) 2018/04/25 09:56:16 executing program 2: r0 = memfd_create(&(0x7f0000d0bffe)="7b10", 0x3) ftruncate(r0, 0x0) fcntl$addseals(r0, 0x409, 0x4) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x3ff, 0xffffffff, 0x8000, 0xc5f, 0x4}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000140)={r1, 0x7, 0x30, 0x10000, 0xa4c}, &(0x7f0000000180)=0x18) io_setup(0x3, &(0x7f0000000000)=0x0) io_submit(r2, 0x1, &(0x7f0000000440)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000040)="e5", 0x1}]) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e) 2018/04/25 09:56:16 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x2d, 0xfff, 0x3, 0xfffff004}, {0xa76c}]}, 0x10) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x8, &(0x7f0000000080)=[{0xfdb4, 0x67, 0x3f, 0x7fff}, {0xffffffff7fffffff, 0x9ab, 0x1, 0x10}, {0x40, 0x1ff, 0x0, 0x3}, {0x9, 0x4, 0x80000001, 0x6}, {0x76, 0x9, 0xffff, 0x3}, {0x9, 0x401, 0x7d7, 0xed4}, {0x1, 0x0, 0x1, 0x65a}, {0x8, 0x69ee, 0x90, 0xa53}]}) [ 95.045496] RSP: 002b:00007fe18dc58c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 95.053242] RAX: ffffffffffffffda RBX: 00007fe18dc596d4 RCX: 0000000000455389 [ 95.060535] RDX: 0000000000000000 RSI: 0000000020633000 RDI: ffffffffffffff9c [ 95.067841] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 95.075129] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 95.082422] R13: 000000000000043f R14: 00000000006f9688 R15: 0000000000000000 [ 95.199778] FAULT_INJECTION: forcing a failure. [ 95.199778] name failslab, interval 1, probability 0, space 0, times 0 [ 95.211117] CPU: 1 PID: 7676 Comm: syz-executor6 Not tainted 4.16.0+ #87 [ 95.217986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 95.227362] Call Trace: [ 95.229997] dump_stack+0x185/0x1d0 [ 95.233676] should_fail+0x87b/0xab0 [ 95.237488] should_failslab+0x279/0x2a0 [ 95.241681] __kmalloc+0xc2/0x350 [ 95.245238] ? __neigh_create+0xb51/0x26e0 2018/04/25 09:56:16 executing program 4: r0 = perf_event_open(&(0x7f0000001f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000f1f000/0x2000)=nil, 0x2000, 0xa, 0x11, r0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCMBIS(r1, 0x5416, &(0x7f0000000040)=0x1) mprotect(&(0x7f0000f1f000/0x1000)=nil, 0x1000, 0x3) [ 95.249553] __neigh_create+0xb51/0x26e0 [ 95.253694] ? __msan_poison_alloca+0x15c/0x1d0 [ 95.258449] ? ip6_finish_output2+0x1178/0x2130 [ 95.263203] ip6_finish_output2+0x1474/0x2130 [ 95.267827] ip6_finish_output+0xae9/0xba0 [ 95.272163] ip6_output+0x597/0x6c0 [ 95.275835] ? ip6_output+0x6c0/0x6c0 [ 95.279680] ? ac6_seq_show+0x200/0x200 [ 95.283690] rawv6_sendmsg+0x49fc/0x4fb0 [ 95.287826] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 95.293244] ? raw6_getfrag+0x630/0x630 [ 95.297284] ? compat_rawv6_ioctl+0x100/0x100 [ 95.301823] inet_sendmsg+0x48d/0x740 [ 95.305680] ? security_socket_sendmsg+0x9e/0x210 [ 95.310612] ? inet_getname+0x500/0x500 [ 95.314667] sock_write_iter+0x3b9/0x470 [ 95.318793] ? sock_read_iter+0x480/0x480 [ 95.322985] __vfs_write+0x7fb/0x9f0 [ 95.326757] vfs_write+0x463/0x8d0 [ 95.330398] SYSC_write+0x172/0x360 [ 95.334144] SyS_write+0x55/0x80 [ 95.337614] do_syscall_64+0x309/0x430 [ 95.341564] ? SYSC_read+0x360/0x360 [ 95.345326] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 95.350542] RIP: 0033:0x455389 [ 95.353752] RSP: 002b:00007f3d88fb1c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 95.361499] RAX: ffffffffffffffda RBX: 00007f3d88fb26d4 RCX: 0000000000455389 [ 95.368792] RDX: 0000000000000078 RSI: 0000000020000000 RDI: 0000000000000013 [ 95.376086] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 95.383377] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 95.390666] R13: 00000000000006c4 R14: 00000000006fd300 R15: 0000000000000003 2018/04/25 09:56:16 executing program 4: r0 = perf_event_open(&(0x7f0000001f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000f1f000/0x2000)=nil, 0x2000, 0xa, 0x11, r0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCMBIS(r1, 0x5416, &(0x7f0000000040)=0x1) 2018/04/25 09:56:16 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) listxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=""/176, 0xb0) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) r1 = syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0xffffffff, 0x80002) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r1, 0xc0a85322, &(0x7f0000000200)) sendto$inet(r0, &(0x7f0000eddffe)='(', 0x1, 0x1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x7) shutdown(r0, 0x2) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x14) 2018/04/25 09:56:16 executing program 7 (fault-call:0 fault-nth:1): openat$ptmx(0xffffffffffffff9c, &(0x7f0000633000)='/dev/ptmx\x00', 0x0, 0x0) 2018/04/25 09:56:16 executing program 3: r0 = socket$bt_cmtp(0x1f, 0x3, 0x5) fdatasync(r0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) unshare(0x40600) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000080)) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000040)) ioctl$TIOCSBRK(r1, 0x40044590) 2018/04/25 09:56:16 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x2d, 0xfff, 0x3, 0xfffff004}, {0xa76c}]}, 0x10) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x8, &(0x7f0000000080)=[{0xfdb4, 0x67, 0x3f, 0x7fff}, {0xffffffff7fffffff, 0x9ab, 0x1, 0x10}, {0x40, 0x1ff, 0x0, 0x3}, {0x9, 0x4, 0x80000001, 0x6}, {0x76, 0x9, 0xffff, 0x3}, {0x9, 0x401, 0x7d7, 0xed4}, {0x1, 0x0, 0x1, 0x65a}, {0x8, 0x69ee, 0x90, 0xa53}]}) 2018/04/25 09:56:16 executing program 2: r0 = memfd_create(&(0x7f0000d0bffe)="7b10", 0x3) ftruncate(r0, 0x0) fcntl$addseals(r0, 0x409, 0x4) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x3ff, 0xffffffff, 0x8000, 0xc5f, 0x4}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000140)={r1, 0x7, 0x30, 0x10000, 0xa4c}, &(0x7f0000000180)=0x18) io_setup(0x3, &(0x7f0000000000)=0x0) io_submit(r2, 0x1, &(0x7f0000000440)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000040)="e5", 0x1}]) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e) 2018/04/25 09:56:16 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000018000)=0x1, 0x4) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) rt_tgsigqueueinfo(r1, r2, 0x1, &(0x7f0000000080)={0x2e, 0x100000000, 0x0, 0xfff}) bind$inet(r0, &(0x7f0000003ff0)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendto$inet(r0, &(0x7f000001d000)="a9", 0x1, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r0, 0x7) accept4(r0, 0x0, &(0x7f0000021000), 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000100)=0x4, 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000000c0)=[@in={0x2, 0x0, @multicast1=0xe0000001}], 0x10) 2018/04/25 09:56:16 executing program 6 (fault-call:2 fault-nth:4): r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000032fe4)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x9}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) [ 95.664212] FAULT_INJECTION: forcing a failure. [ 95.664212] name failslab, interval 1, probability 0, space 0, times 0 [ 95.672273] FAULT_INJECTION: forcing a failure. [ 95.672273] name failslab, interval 1, probability 0, space 0, times 0 [ 95.675578] CPU: 1 PID: 7693 Comm: syz-executor6 Not tainted 4.16.0+ #87 [ 95.675617] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 95.702972] Call Trace: [ 95.705588] dump_stack+0x185/0x1d0 [ 95.709232] should_fail+0x87b/0xab0 [ 95.712974] should_failslab+0x279/0x2a0 [ 95.717059] __kmalloc+0xc2/0x350 [ 95.720523] ? __neigh_create+0xb51/0x26e0 [ 95.724770] __neigh_create+0xb51/0x26e0 [ 95.728840] ? kmsan_set_origin_inline+0x6b/0x120 [ 95.733694] ? local_bh_enable+0x36/0x40 [ 95.737772] ? __local_bh_enable_ip+0x3b/0x140 [ 95.742365] ip6_neigh_lookup+0x955/0xbf0 [ 95.746532] ? ip6_rt_blackhole_redirect+0x10/0x10 [ 95.751473] ip6_tnl_xmit+0xa05/0x3af0 [ 95.755413] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 95.760916] ? __save_stack_trace+0x90d/0xb00 [ 95.765428] ? __msan_poison_alloca+0x15c/0x1d0 [ 95.770123] ip6_tnl_start_xmit+0x1cc0/0x1ef0 [ 95.774643] ? ip6_tnl_dev_uninit+0x740/0x740 [ 95.779151] dev_hard_start_xmit+0x5f1/0xc70 [ 95.783586] __dev_queue_xmit+0x27ee/0x3520 [ 95.787950] dev_queue_xmit+0x4b/0x60 [ 95.791763] neigh_direct_output+0x42/0x50 [ 95.796075] ? neigh_connected_output+0x720/0x720 [ 95.800960] ip6_finish_output2+0x1d01/0x2130 [ 95.805545] ip6_finish_output+0xae9/0xba0 [ 95.809859] ip6_output+0x597/0x6c0 [ 95.813507] ? ip6_output+0x6c0/0x6c0 [ 95.817327] ? ac6_seq_show+0x200/0x200 [ 95.821315] rawv6_sendmsg+0x49fc/0x4fb0 [ 95.825419] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 95.830801] ? raw6_getfrag+0x630/0x630 [ 95.834807] ? compat_rawv6_ioctl+0x100/0x100 [ 95.839316] inet_sendmsg+0x48d/0x740 [ 95.843140] ? security_socket_sendmsg+0x9e/0x210 [ 95.848040] ? inet_getname+0x500/0x500 [ 95.852072] sock_write_iter+0x3b9/0x470 [ 95.856167] ? sock_read_iter+0x480/0x480 [ 95.860329] __vfs_write+0x7fb/0x9f0 [ 95.864077] vfs_write+0x463/0x8d0 [ 95.867686] SYSC_write+0x172/0x360 [ 95.871395] SyS_write+0x55/0x80 [ 95.874823] do_syscall_64+0x309/0x430 [ 95.878738] ? SYSC_read+0x360/0x360 [ 95.882465] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 95.887655] RIP: 0033:0x455389 [ 95.890843] RSP: 002b:00007f3d88fb1c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 95.898564] RAX: ffffffffffffffda RBX: 00007f3d88fb26d4 RCX: 0000000000455389 [ 95.905833] RDX: 0000000000000078 RSI: 0000000020000000 RDI: 0000000000000013 [ 95.913105] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 95.920377] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 95.927645] R13: 00000000000006c4 R14: 00000000006fd300 R15: 0000000000000004 [ 95.934940] CPU: 0 PID: 7703 Comm: syz-executor7 Not tainted 4.16.0+ #87 [ 95.941812] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 95.951186] Call Trace: [ 95.953814] dump_stack+0x185/0x1d0 [ 95.957483] should_fail+0x87b/0xab0 [ 95.961246] should_failslab+0x279/0x2a0 [ 95.965394] kmem_cache_alloc+0x136/0xb90 [ 95.969618] ? get_empty_filp+0x1f1/0x870 [ 95.973818] get_empty_filp+0x1f1/0x870 [ 95.977827] ? do_filp_open+0x261/0x640 [ 95.981838] path_openat+0x156/0x6610 [ 95.985670] ? kmsan_set_origin_inline+0x6b/0x120 [ 95.990546] ? kmsan_set_origin_inline+0x6b/0x120 [ 95.995458] ? __msan_poison_alloca+0x15c/0x1d0 [ 96.000202] ? expand_files+0x5b/0xde0 [ 96.004154] ? __alloc_fd+0x480/0xb90 [ 96.007991] ? kmsan_set_origin_inline+0x6b/0x120 [ 96.012865] ? __msan_poison_alloca+0x15c/0x1d0 [ 96.017602] ? do_sys_open+0x624/0x960 [ 96.021524] do_filp_open+0x261/0x640 [ 96.025398] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 96.030911] ? __alloc_fd+0x9f0/0xb90 [ 96.034801] do_sys_open+0x624/0x960 [ 96.038612] SYSC_openat+0xc7/0xe0 [ 96.042241] SyS_openat+0x63/0x90 [ 96.045778] do_syscall_64+0x309/0x430 [ 96.049721] ? SYSC_open+0xc0/0xc0 [ 96.053299] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 96.058508] RIP: 0033:0x455389 [ 96.061713] RSP: 002b:00007fe18dc58c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 96.069451] RAX: ffffffffffffffda RBX: 00007fe18dc596d4 RCX: 0000000000455389 [ 96.076747] RDX: 0000000000000000 RSI: 0000000020633000 RDI: ffffffffffffff9c [ 96.084039] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 96.091331] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 96.098619] R13: 000000000000043f R14: 00000000006f9688 R15: 0000000000000001 2018/04/25 09:56:17 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000018000)=0x1, 0x4) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) rt_tgsigqueueinfo(r1, r2, 0x1, &(0x7f0000000080)={0x2e, 0x100000000, 0x0, 0xfff}) bind$inet(r0, &(0x7f0000003ff0)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendto$inet(r0, &(0x7f000001d000)="a9", 0x1, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r0, 0x7) accept4(r0, 0x0, &(0x7f0000021000), 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000100)=0x4, 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000000c0)=[@in={0x2, 0x0, @multicast1=0xe0000001}], 0x10) 2018/04/25 09:56:17 executing program 4: r0 = perf_event_open(&(0x7f0000001f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000f1f000/0x2000)=nil, 0x2000, 0xa, 0x11, r0, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) 2018/04/25 09:56:17 executing program 2: r0 = memfd_create(&(0x7f0000d0bffe)="7b10", 0x3) ftruncate(r0, 0x0) fcntl$addseals(r0, 0x409, 0x4) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x3ff, 0xffffffff, 0x8000, 0xc5f, 0x4}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000140)={r1, 0x7, 0x30, 0x10000, 0xa4c}, &(0x7f0000000180)=0x18) io_setup(0x3, &(0x7f0000000000)=0x0) io_submit(r2, 0x1, &(0x7f0000000440)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000040)="e5", 0x1}]) 2018/04/25 09:56:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x2d, 0xfff, 0x3, 0xfffff004}, {0xa76c}]}, 0x10) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x8, &(0x7f0000000080)=[{0xfdb4, 0x67, 0x3f, 0x7fff}, {0xffffffff7fffffff, 0x9ab, 0x1, 0x10}, {0x40, 0x1ff, 0x0, 0x3}, {0x9, 0x4, 0x80000001, 0x6}, {0x76, 0x9, 0xffff, 0x3}, {0x9, 0x401, 0x7d7, 0xed4}, {0x1, 0x0, 0x1, 0x65a}, {0x8, 0x69ee, 0x90, 0xa53}]}) 2018/04/25 09:56:17 executing program 3: r0 = socket$bt_cmtp(0x1f, 0x3, 0x5) fdatasync(r0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) unshare(0x40600) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000080)) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000040)) ioctl$TIOCSBRK(r1, 0x40044590) 2018/04/25 09:56:17 executing program 6 (fault-call:2 fault-nth:5): r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000032fe4)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x9}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 2018/04/25 09:56:17 executing program 7 (fault-call:0 fault-nth:2): openat$ptmx(0xffffffffffffff9c, &(0x7f0000633000)='/dev/ptmx\x00', 0x0, 0x0) 2018/04/25 09:56:17 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) listxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=""/176, 0xb0) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) r1 = syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0xffffffff, 0x80002) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r1, 0xc0a85322, &(0x7f0000000200)) sendto$inet(r0, &(0x7f0000eddffe)='(', 0x1, 0x1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x7) shutdown(r0, 0x2) [ 96.942383] FAULT_INJECTION: forcing a failure. [ 96.942383] name failslab, interval 1, probability 0, space 0, times 0 [ 96.953768] CPU: 0 PID: 7720 Comm: syz-executor7 Not tainted 4.16.0+ #87 [ 96.960644] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 96.970019] Call Trace: [ 96.972650] dump_stack+0x185/0x1d0 [ 96.976327] should_fail+0x87b/0xab0 [ 96.980139] should_failslab+0x279/0x2a0 [ 96.984257] __kmalloc+0xc2/0x350 [ 96.987764] ? tty_alloc_file+0x57/0x120 2018/04/25 09:56:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x2d, 0xfff, 0x3, 0xfffff004}, {0xa76c}]}, 0x10) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x8, &(0x7f0000000080)=[{0xfdb4, 0x67, 0x3f, 0x7fff}, {0xffffffff7fffffff, 0x9ab, 0x1, 0x10}, {0x40, 0x1ff, 0x0, 0x3}, {0x9, 0x4, 0x80000001, 0x6}, {0x76, 0x9, 0xffff, 0x3}, {0x9, 0x401, 0x7d7, 0xed4}, {0x1, 0x0, 0x1, 0x65a}, {0x8, 0x69ee, 0x90, 0xa53}]}) [ 96.991882] tty_alloc_file+0x57/0x120 [ 96.995814] ptmx_open+0xf4/0x7a0 [ 96.999305] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 97.004706] ? ptm_open_peer+0x440/0x440 [ 97.008825] chrdev_open+0xc20/0xd90 [ 97.012585] ? cd_forget+0x330/0x330 [ 97.016336] do_dentry_open+0xcc6/0x1430 [ 97.020505] vfs_open+0x1b7/0x2e0 [ 97.024004] path_openat+0x481d/0x6610 [ 97.027982] ? __msan_poison_alloca+0x15c/0x1d0 [ 97.032744] ? __msan_poison_alloca+0x15c/0x1d0 [ 97.037483] ? do_sys_open+0x624/0x960 [ 97.041410] do_filp_open+0x261/0x640 [ 97.045320] do_sys_open+0x624/0x960 [ 97.049141] SYSC_openat+0xc7/0xe0 [ 97.052785] SyS_openat+0x63/0x90 [ 97.056329] do_syscall_64+0x309/0x430 [ 97.060269] ? SYSC_open+0xc0/0xc0 [ 97.063859] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 97.069072] RIP: 0033:0x455389 [ 97.072277] RSP: 002b:00007fe18dc58c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 97.080022] RAX: ffffffffffffffda RBX: 00007fe18dc596d4 RCX: 0000000000455389 [ 97.087314] RDX: 0000000000000000 RSI: 0000000020633000 RDI: ffffffffffffff9c [ 97.094608] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 97.101908] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 97.109199] R13: 000000000000043f R14: 00000000006f9688 R15: 0000000000000002 2018/04/25 09:56:18 executing program 1: socket$nl_route(0x10, 0x3, 0x0) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x8, &(0x7f0000000080)=[{0xfdb4, 0x67, 0x3f, 0x7fff}, {0xffffffff7fffffff, 0x9ab, 0x1, 0x10}, {0x40, 0x1ff, 0x0, 0x3}, {0x9, 0x4, 0x80000001, 0x6}, {0x76, 0x9, 0xffff, 0x3}, {0x9, 0x401, 0x7d7, 0xed4}, {0x1, 0x0, 0x1, 0x65a}, {0x8, 0x69ee, 0x90, 0xa53}]}) 2018/04/25 09:56:18 executing program 2: r0 = memfd_create(&(0x7f0000d0bffe)="7b10", 0x3) ftruncate(r0, 0x0) fcntl$addseals(r0, 0x409, 0x4) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x3ff, 0xffffffff, 0x8000, 0xc5f, 0x4}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000140)={r1, 0x7, 0x30, 0x10000, 0xa4c}, &(0x7f0000000180)=0x18) io_submit(0x0, 0x1, &(0x7f0000000440)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000040)="e5", 0x1}]) 2018/04/25 09:56:18 executing program 6: connect$inet6(0xffffffffffffffff, &(0x7f0000032fe4)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x9}, 0x1c) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="7f454c4600000000ff0700000000000000000000000000000000000000000000400000000000000000000000000000000000000000003800000000000000000000009c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000"], 0x78) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000005c0)=ANY=[@ANYBLOB="0a0000005782663457547d48e8d8cca9f278d02dcbc5e40c", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES64=r0, @ANYRES32=r0, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR64, @ANYRES64=r0, @ANYRES32=r0, @ANYRES16=r0, @ANYRES64=r0, @ANYRES16, @ANYBLOB="4afd78a8307fdd9180d0a92db0f669b472475a95994f380b1508b73f2422b148776b593aa547de35a991ff4098c3c72ceaa74b010902fd52ecae387f28b608e34c2bc0b289fb79c635ed9c62d81d3c995f01e212803ba27a6ba3e89258503d1afc87b231d8d73ecb0f656199e3b2592c6147e19b0c65166b445fe9cebc3f8b0aaeda61f963cc8173d1d485f229e0e797b5f6878f66f19681fd47166cadd40417b356d179ab032b0a6b3e5b69f3f257db5aed2f3b30392bfafe299be75d7c983cc8070d6194a2391c88337f0d5331eeea7f592d522f4ed58a2ed49458007ce08de49837824d0aab63db23", @ANYRES16=r0, @ANYRES64=r0, @ANYPTR], @ANYRES64=r0, @ANYRES32=r0, @ANYRES16=r0, @ANYRES16=r0, @ANYRES32=r0], @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES64=r0, @ANYPTR64=&(0x7f0000000300)=ANY=[@ANYRES16, @ANYRES32=r0, @ANYBLOB="f59cd89968a7ec4b054b7190aa20e84e40858d4fe39f9888578057dc4fc96b486b972bcfe979f1fde2412bc6a04777cd4be9e734fd044d107c68540de13863bcc34c4cc719f2d5b8f7c852b1503672bf50b8c7c2e0f6f851ed130ed5740d7773589bcca3830fcfa209120d92dd786506f2c4ad99264795d231a95e598410b002687f83322419c094de1f3602566e17a1c1d5b868c7b2790cf9672ea873626b40f56c2ab619b41d67312ca87ccb9d73e8"], @ANYRES64=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000080)=0xb) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}}, 0x84) 2018/04/25 09:56:18 executing program 4: r0 = perf_event_open(&(0x7f0000001f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000f1f000/0x2000)=nil, 0x2000, 0xa, 0x11, r0, 0x0) 2018/04/25 09:56:18 executing program 7 (fault-call:0 fault-nth:3): openat$ptmx(0xffffffffffffff9c, &(0x7f0000633000)='/dev/ptmx\x00', 0x0, 0x0) 2018/04/25 09:56:18 executing program 3: r0 = perf_event_open(&(0x7f0000001f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000f1f000/0x2000)=nil, 0x2000, 0xa, 0x11, r0, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) 2018/04/25 09:56:18 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) listxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=""/176, 0xb0) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) r1 = syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0xffffffff, 0x80002) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r1, 0xc0a85322, &(0x7f0000000200)) sendto$inet(r0, &(0x7f0000eddffe)='(', 0x1, 0x1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x7) 2018/04/25 09:56:18 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000018000)=0x1, 0x4) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) rt_tgsigqueueinfo(r1, r2, 0x1, &(0x7f0000000080)={0x2e, 0x100000000, 0x0, 0xfff}) bind$inet(r0, &(0x7f0000003ff0)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendto$inet(r0, &(0x7f000001d000)="a9", 0x1, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r0, 0x7) accept4(r0, 0x0, &(0x7f0000021000), 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000100)=0x4, 0x4) [ 97.967788] random: crng init done [ 98.018545] FAULT_INJECTION: forcing a failure. [ 98.018545] name failslab, interval 1, probability 0, space 0, times 0 [ 98.029914] CPU: 0 PID: 7762 Comm: syz-executor7 Not tainted 4.16.0+ #87 [ 98.036779] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 98.046163] Call Trace: [ 98.048792] dump_stack+0x185/0x1d0 [ 98.052470] should_fail+0x87b/0xab0 [ 98.056236] should_failslab+0x279/0x2a0 [ 98.060340] __kmalloc+0xc2/0x350 [ 98.063847] ? alloc_tty_struct+0x59/0xc10 2018/04/25 09:56:19 executing program 6: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000032fe4)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x9}, 0x1c) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="7f454c4600ff0700000000000000000000004f8f4a09000000000000000000004000000000000000000000000000000000020000000038000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000006ecdfd0b000000000000000000009300"], 0x78) [ 98.068160] ? alloc_tty_struct+0x8a/0xc10 [ 98.072444] alloc_tty_struct+0x8a/0xc10 [ 98.076597] ? rcu_all_qs+0x32/0x1f0 [ 98.080398] tty_init_dev+0xd3/0x1020 [ 98.084237] ? _cond_resched+0x3c/0xd0 [ 98.088167] ptmx_open+0x2bf/0x7a0 [ 98.091752] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 98.097156] ? ptm_open_peer+0x440/0x440 [ 98.101281] chrdev_open+0xc20/0xd90 [ 98.105036] ? cd_forget+0x330/0x330 [ 98.108786] do_dentry_open+0xcc6/0x1430 [ 98.112954] vfs_open+0x1b7/0x2e0 [ 98.116446] path_openat+0x481d/0x6610 [ 98.120419] ? __msan_poison_alloca+0x15c/0x1d0 [ 98.125180] ? __msan_poison_alloca+0x15c/0x1d0 [ 98.129932] ? do_sys_open+0x624/0x960 [ 98.133864] do_filp_open+0x261/0x640 [ 98.137778] do_sys_open+0x624/0x960 [ 98.141599] SYSC_openat+0xc7/0xe0 [ 98.145246] SyS_openat+0x63/0x90 [ 98.148802] do_syscall_64+0x309/0x430 [ 98.152752] ? SYSC_open+0xc0/0xc0 [ 98.156339] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 98.161548] RIP: 0033:0x455389 2018/04/25 09:56:19 executing program 6: r0 = socket$inet6(0xa, 0xf, 0xfb) connect$inet6(r0, &(0x7f0000032fe4)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x9}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) [ 98.164755] RSP: 002b:00007fe18dc58c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 98.172504] RAX: ffffffffffffffda RBX: 00007fe18dc596d4 RCX: 0000000000455389 [ 98.179796] RDX: 0000000000000000 RSI: 0000000020633000 RDI: ffffffffffffff9c [ 98.187091] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 98.194380] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 98.201673] R13: 000000000000043f R14: 00000000006f9688 R15: 0000000000000003 2018/04/25 09:56:19 executing program 2: r0 = memfd_create(&(0x7f0000d0bffe)="7b10", 0x3) ftruncate(r0, 0x0) fcntl$addseals(r0, 0x409, 0x4) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x3ff, 0xffffffff, 0x8000, 0xc5f, 0x4}, &(0x7f00000000c0)=0x14) io_setup(0x3, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000000440)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000040)="e5", 0x1}]) 2018/04/25 09:56:19 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x8, &(0x7f0000000080)=[{0xfdb4, 0x67, 0x3f, 0x7fff}, {0xffffffff7fffffff, 0x9ab, 0x1, 0x10}, {0x40, 0x1ff, 0x0, 0x3}, {0x9, 0x4, 0x80000001, 0x6}, {0x76, 0x9, 0xffff, 0x3}, {0x9, 0x401, 0x7d7, 0xed4}, {0x1, 0x0, 0x1, 0x65a}, {0x8, 0x69ee, 0x90, 0xa53}]}) 2018/04/25 09:56:19 executing program 3: r0 = perf_event_open(&(0x7f0000001f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000f1f000/0x2000)=nil, 0x2000, 0xa, 0x11, r0, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) 2018/04/25 09:56:19 executing program 4: mmap(&(0x7f0000f1f000/0x2000)=nil, 0x2000, 0xa, 0x11, 0xffffffffffffffff, 0x0) 2018/04/25 09:56:19 executing program 7 (fault-call:0 fault-nth:4): openat$ptmx(0xffffffffffffff9c, &(0x7f0000633000)='/dev/ptmx\x00', 0x0, 0x0) 2018/04/25 09:56:19 executing program 3: r0 = perf_event_open(&(0x7f0000001f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000f1f000/0x2000)=nil, 0x2000, 0xa, 0x11, r0, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) 2018/04/25 09:56:19 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x8, &(0x7f0000000080)=[{0xfdb4, 0x67, 0x3f, 0x7fff}, {0xffffffff7fffffff, 0x9ab, 0x1, 0x10}, {0x40, 0x1ff, 0x0, 0x3}, {0x9, 0x4, 0x80000001, 0x6}, {0x76, 0x9, 0xffff, 0x3}, {0x9, 0x401, 0x7d7, 0xed4}, {0x1, 0x0, 0x1, 0x65a}, {0x8, 0x69ee, 0x90, 0xa53}]}) 2018/04/25 09:56:19 executing program 6: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000032fe4)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x7}, 0x27e) r1 = shmget(0x2, 0x3000, 0x8, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_RMID(r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 2018/04/25 09:56:19 executing program 4: r0 = perf_event_open(&(0x7f0000001f88)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000f1f000/0x2000)=nil, 0x2000, 0xa, 0x11, r0, 0x0) 2018/04/25 09:56:19 executing program 2: r0 = memfd_create(&(0x7f0000d0bffe)="7b10", 0x3) ftruncate(r0, 0x0) fcntl$addseals(r0, 0x409, 0x4) io_setup(0x3, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000000440)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000040)="e5", 0x1}]) [ 98.564258] FAULT_INJECTION: forcing a failure. [ 98.564258] name failslab, interval 1, probability 0, space 0, times 0 [ 98.575637] CPU: 1 PID: 7798 Comm: syz-executor7 Not tainted 4.16.0+ #87 [ 98.582503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 98.591885] Call Trace: [ 98.594516] dump_stack+0x185/0x1d0 [ 98.598193] should_fail+0x87b/0xab0 [ 98.601961] should_failslab+0x279/0x2a0 [ 98.606070] __kmalloc+0xc2/0x350 [ 98.609588] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 98.615075] ? tty_ldisc_get+0x667/0x8d0 [ 98.619179] tty_ldisc_get+0x667/0x8d0 [ 98.623126] tty_ldisc_init+0x59/0x130 [ 98.627087] alloc_tty_struct+0x11e/0xc10 [ 98.631347] ? rcu_all_qs+0x32/0x1f0 [ 98.635144] tty_init_dev+0xd3/0x1020 [ 98.638991] ? _cond_resched+0x3c/0xd0 [ 98.642918] ptmx_open+0x2bf/0x7a0 [ 98.646502] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 98.651896] ? ptm_open_peer+0x440/0x440 [ 98.655993] chrdev_open+0xc20/0xd90 [ 98.659752] ? cd_forget+0x330/0x330 [ 98.663505] do_dentry_open+0xcc6/0x1430 [ 98.667670] vfs_open+0x1b7/0x2e0 [ 98.671167] path_openat+0x481d/0x6610 [ 98.675148] ? __msan_poison_alloca+0x15c/0x1d0 [ 98.679910] ? __msan_poison_alloca+0x15c/0x1d0 [ 98.684661] ? do_sys_open+0x624/0x960 [ 98.688590] do_filp_open+0x261/0x640 [ 98.692500] do_sys_open+0x624/0x960 [ 98.696327] SYSC_openat+0xc7/0xe0 [ 98.699975] SyS_openat+0x63/0x90 [ 98.703518] do_syscall_64+0x309/0x430 [ 98.707457] ? SYSC_open+0xc0/0xc0 [ 98.711039] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 98.716250] RIP: 0033:0x455389 [ 98.719462] RSP: 002b:00007fe18dc58c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 98.727206] RAX: ffffffffffffffda RBX: 00007fe18dc596d4 RCX: 0000000000455389 [ 98.734503] RDX: 0000000000000000 RSI: 0000000020633000 RDI: ffffffffffffff9c [ 98.741792] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 98.749080] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 98.756367] R13: 000000000000043f R14: 00000000006f9688 R15: 0000000000000004 [ 98.763962] Kernel panic - not syncing: n_tty: init_tty [ 98.769366] CPU: 1 PID: 7798 Comm: syz-executor7 Not tainted 4.16.0+ #87 [ 98.776219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 98.785588] Call Trace: [ 98.788216] dump_stack+0x185/0x1d0 [ 98.791889] panic+0x39d/0x940 [ 98.795150] ? tty_ldisc_get+0x700/0x8d0 [ 98.799259] tty_ldisc_init+0x123/0x130 [ 98.803297] alloc_tty_struct+0x11e/0xc10 [ 98.807553] ? rcu_all_qs+0x32/0x1f0 [ 98.811359] tty_init_dev+0xd3/0x1020 [ 98.815205] ? _cond_resched+0x3c/0xd0 [ 98.819140] ptmx_open+0x2bf/0x7a0 [ 98.822727] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 98.828130] ? ptm_open_peer+0x440/0x440 [ 98.832230] chrdev_open+0xc20/0xd90 [ 98.835991] ? cd_forget+0x330/0x330 [ 98.839743] do_dentry_open+0xcc6/0x1430 [ 98.843905] vfs_open+0x1b7/0x2e0 [ 98.847402] path_openat+0x481d/0x6610 [ 98.851380] ? __msan_poison_alloca+0x15c/0x1d0 [ 98.856137] ? __msan_poison_alloca+0x15c/0x1d0 [ 98.860887] ? do_sys_open+0x624/0x960 [ 98.864815] do_filp_open+0x261/0x640 [ 98.868734] do_sys_open+0x624/0x960 [ 98.872551] SYSC_openat+0xc7/0xe0 [ 98.876194] SyS_openat+0x63/0x90 [ 98.879739] do_syscall_64+0x309/0x430 [ 98.883679] ? SYSC_open+0xc0/0xc0 [ 98.887265] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 98.892485] RIP: 0033:0x455389 [ 98.895694] RSP: 002b:00007fe18dc58c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 98.903438] RAX: ffffffffffffffda RBX: 00007fe18dc596d4 RCX: 0000000000455389 [ 98.910728] RDX: 0000000000000000 RSI: 0000000020633000 RDI: ffffffffffffff9c [ 98.918016] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 98.925310] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 98.932585] R13: 000000000000043f R14: 00000000006f9688 R15: 0000000000000004 [ 98.940359] Dumping ftrace buffer: [ 98.943893] (ftrace buffer empty) [ 98.947586] Kernel Offset: disabled [ 98.951207] Rebooting in 86400 seconds..